Vulnerability Directory
If you’re currently using these frameworks in your application’s tech stack, your application could be vulnerable.
Secure drop-in replacements for open source software from HeroDevs helps you stay secure, compliant, and compatible while you migrate.
Switch to Never-Ending Support (NES) from HeroDevs to immediately mitigate these vulnerabilities.
Severity
ID
Technology
Libraries Affected
Category
Version(s) Affected
Published Date
High
Apache Tomcat
Apache Tomcat
Command Injection
>=8.5.60 <=8.5.100, >=9.0.40 <9.0.109, >=10.1.0-M1 <10.1.45, >=11.0.0-M1 <11.0.11
Nov 7, 2025
Medium
Apache Tomcat
Apache Tomcat
Denial of Service
>=8.5.0 <=8.5.100, >=9.0.0.M1 <9.0.110, >=10.1.0-M1 <10.1.47, >=11.0.0-M1 <11.0.12
Nov 7, 2025
High
Apache Tomcat
Apache Tomcat
Path Traversal
>=8.5.6 <=8.5.100, >=9.0.0.M11 <9.0.109, >=10.1.0-M1 <10.1.45, >=11.0.0-M1 <11.0.11
Nov 7, 2025
High
Spring
Spring Cloud Gateway
Information Exposure
>=3.1.0 <=3.1.11, >=4.0.0, >=4.1.0 <=4.1.11, >=4.2.0 <=4.2.5, >=4.3.0 <=4.3.1
Oct 21, 2025
Medium
Spring
Spring Framework
Cross-site Request Forgery
>=6.2.0 < 6.2.12, >=6.1.0 < 6.1.24, >=6.0.0 <=6.0.29, >=5.3.0 < 5.3.46, <5.3.0, >4.3.0 <= 4.3.30
Oct 21, 2025
Critical
.NET
ASP.NET Core Runtime, Microsoft.AspNetCore.Server.Kestrel.Core
Inconsistent Interpretation of HTTP Requests
ASP.NET Core: >= 6.0.0 <= 6.0.36 >= 8.0.0 <= 8.0.20 >= 9.0.0 <= 9.0.9 <= 10.0.0-rc.1 Microsoft.AspNetCore.Server.Kestrel.Core: <= 2.3.0
Oct 17, 2025
Medium
Spring
Spring Framework
Privilege Abuse
>=5.3.0 <=5.3.44, >=6.0.0 <=6.0.29, >=6.1.0 <6.1.23, >=6.2.0 <6.2.11
Sep 22, 2025
No results found
Please enter a valid Vulnerability ID number or Technology name.
