Search CVE reports


Toggle filters

1 – 10 of 81 results


CVE-2025-41254

Medium priority
Needs evaluation

STOMP over WebSocket applications may be vulnerable to a security bypass that allows an attacker to send unauthorized messages. Affected Spring Products and VersionsSpring Framework: * 6.2.0 - 6.2.11 * 6.1.0 - 6.1.23 * ...

1 affected package

libspring-java

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libspring-java Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-41249

Medium priority
Needs evaluation

The Spring Framework annotation detection mechanism may not correctly resolve annotations on methods within type hierarchies with a parameterized super type with unbounded generics. This can be an issue if such annotations are...

1 affected package

libspring-java

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libspring-java Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-41242

Medium priority
Needs evaluation

Spring Framework MVC applications can be vulnerable to a “Path Traversal Vulnerability” when deployed on a non-compliant Servlet container. An application can be vulnerable when all the following are true: * the application is...

1 affected package

libspring-java

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libspring-java Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-41234

Medium priority
Needs evaluation

Description In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x and 6.2.x, an application is vulnerable to a reflected file download (RFD) attack when it sets a “Content-Disposition” header with a non-ASCII charset,...

1 affected package

libspring-java

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libspring-java Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-22233

Medium priority
Needs evaluation

CVE-2024-38820 ensured Locale-independent, lowercase conversion for both the configured disallowedFields patterns and for request parameter names. However, there are still cases where it is possible to bypass the disallowedFields...

1 affected package

libspring-java

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libspring-java Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-22235

Medium priority
Needs evaluation

EndpointRequest.to() creates a matcher for null/** if the actuator endpoint, for which the EndpointRequest has been created, is disabled or not exposed. Your application may be affected by this if all the following conditions are...

1 affected package

libspring-java

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libspring-java Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-38819

Medium priority
Needs evaluation

Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system...

1 affected package

libspring-java

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libspring-java Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-38829

Medium priority
Needs evaluation

A vulnerability in Spring LDAP allows data exposure for case sensitive comparisons.This issue affects Spring LDAP: from 2.4.0 through 2.4.3, from 3.0.0 through 3.0.9, from 3.1.0 through 3.1.7, from 3.2.0 through 3.2.7, AND all...

1 affected package

libspring-java

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libspring-java Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-38828

Medium priority
Needs evaluation

Spring MVC controller methods with an @RequestBody byte[] method parameter are vulnerable to a DoS attack.

1 affected package

libspring-java

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libspring-java Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-48426

Medium priority
Needs evaluation

A segmentation fault (SEGV) was detected in the SortByPTypeProcess::Execute function in the Assimp library during fuzz testing with AddressSanitizer. The crash occurred due to a read access to an invalid memory address (0x1000c9714971).

4 affected packages

assimp, qt6-3d, qt6-quick3d, spring

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
assimp Needs evaluation Needs evaluation Needs evaluation Needs evaluation
qt6-3d Needs evaluation Needs evaluation Not in release
qt6-quick3d Needs evaluation Needs evaluation Not in release
spring Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages