Vulnerability Directory

If you’re currently using these frameworks in your application’s tech stack, your application could be vulnerable.

Secure drop-in replacements for open source software from HeroDevs helps you stay secure, compliant, and compatible while you migrate.

Switch to Never-Ending Support (NES) from HeroDevs to immediately mitigate these vulnerabilities.
Arrow down

Vulnerability Directory

If you’re currently using these frameworks in your application’s tech stack, your application could be vulnerable.

Secure drop-in replacements for open source software from HeroDevs helps you stay secure, compliant, and compatible while you migrate.

Switch to Never-Ending Support (NES) from HeroDevs to immediately mitigate these vulnerabilities.

Codey gradient
Search here
Clear
Filter by Severity
Clear
Filter by Technology
Sign up for the latest vulnerability alerts
Rss feed icon
Subscribe via RSS
or
Thanks for signing up for our Newsletter! We look forward to connecting with you.
Oops! Something went wrong while submitting the form.
Severity
ID
Technology
Libraries Affected
Category
Version(s) Affected
Published Date
High
Next.js
Next.js
Denial of Service
>=13.0.0 <13.4.20-canary.13
Apr 9, 2025
High
.NET
ASP.NET Core Runtime; Microsoft.AspNetCore.Identity
Weak Authentication
ASP.NET Core: >= 6.0.0 <= 6.0.36 >= 8.0.0 <= 8.0.13 >= 9.0.0 <= 9.0.2 Microsoft.AspNetCore.Identity: <= 2.3.0
Apr 4, 2025
High
.NET
.NET Runtime
Buffer Over-read
>= 6.0.0 <= 6.0.36 >= 8.0.0 <= 8.0.11 <= 9.0.0
Apr 4, 2025
High
.NET
.NET Runtime
Creation of Temporary File in Directory with Insecure Permissions
>= 6.0.0 <= 6.0.36 >= 8.0.0 <= 8.0.11 <= 9.0.0
Apr 4, 2025
High
.NET
.NET Runtime
Heap-based Buffer Overflow
>= 6.0.0 <= 6.0.36 >= 8.0.0 <= 8.0.11 <= 9.0.0
Apr 4, 2025
High
.NET
ASP.NET Core Runtime
Use After Free
>= 6.0.0 <= 6.0.36 >= 8.0.0 <= 8.0.8 >= 9.0.0-preview.1.24081.5 <= 9.0.0.RC.1
Apr 4, 2025
Critical
.NET
ASP.NET Core Runtime
Use After Free
>= 6.0.0 <= 6.0.36 >= 8.0.0 <= 8.0.6
Apr 4, 2025
Critical
Next.js
Next.js
Authorization Bypass
>=11.1.4 <12.3.5, >=13.0.0 <13.5.9, >=14.0.0 <14.2.25, >=15.0.0 <15.2.3
Mar 23, 2025
Medium
Apache Solr & Lucene
Apache Solr
Remote Code Execution
<9.8.0
Mar 21, 2025
Medium
Apache Solr & Lucene
Apache Solr
Path Traversal
<=9.0.0 <9.8.0
Mar 21, 2025
Medium
Apache Solr & Lucene
Apache Lucene
Remote Code Execution
>=4.4.0 <9.12.0
Mar 21, 2025
High
Spring
Spring Security
Authorization Bypass
<=5.6.12, >=5.7.0 <5.7.16, >=5.8.0 <5.8.18, >=6.0.0 <=6.0.16, >=6.1.0 <6.1.14, >=6.2.0 <6.2.10, >=6.3.0 <6.3.8, >=6.4.0 <6.4.4
Mar 20, 2025
Medium
Rails
Rack
Log Injection
<2.2.12, <3.0.13, <3.1.11
Mar 4, 2025
Medium
Spring
Spring for Apache Kafka
Remote Code Execution
<2.9.11, >=3.0.0 <3.0.10
Mar 3, 2025
Medium
Bootstrap
Bootstrap
Cross-Site Scripting
>=2.0.0 <=2.3.2, >=3.0.0-rc1 <3.4.1
Feb 28, 2025
Exclamation icon
No results found

Please enter a valid Vulnerability ID number or Technology name.