Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libspring-java@3.0.6.RELEASE-13?distro=trixie
Typedeb
Namespacedebian
Namelibspring-java
Version3.0.6.RELEASE-13
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.0.6.RELEASE-14
Latest_non_vulnerable_version4.3.30-4
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-ajex-5x84-8ygb
vulnerability_id VCID-ajex-5x84-8ygb
summary Cross-site scripting (XSS) vulnerability in web/servlet/tags/form/FormTag.java in Spring MVC in Spring Framework 3.0.0 before 3.2.8 and 4.0.0 before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via the requested URI in a default action.
references
0
reference_url http://docs.spring.io/spring/docs/3.2.8.RELEASE/changelog.txt
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://docs.spring.io/spring/docs/3.2.8.RELEASE/changelog.txt
1
reference_url http://rhn.redhat.com/errata/RHSA-2014-0400.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2014-0400.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1904.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1904.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1904
reference_id
reference_type
scores
0
value 0.0181
scoring_system epss
scoring_elements 0.8287
published_at 2026-04-21T12:55:00Z
1
value 0.0181
scoring_system epss
scoring_elements 0.82867
published_at 2026-04-18T12:55:00Z
2
value 0.0181
scoring_system epss
scoring_elements 0.82868
published_at 2026-04-16T12:55:00Z
3
value 0.0181
scoring_system epss
scoring_elements 0.82833
published_at 2026-04-12T12:55:00Z
4
value 0.0181
scoring_system epss
scoring_elements 0.82891
published_at 2026-04-24T12:55:00Z
5
value 0.0181
scoring_system epss
scoring_elements 0.82821
published_at 2026-04-09T12:55:00Z
6
value 0.0181
scoring_system epss
scoring_elements 0.82837
published_at 2026-04-11T12:55:00Z
7
value 0.0181
scoring_system epss
scoring_elements 0.82763
published_at 2026-04-01T12:55:00Z
8
value 0.0181
scoring_system epss
scoring_elements 0.82779
published_at 2026-04-02T12:55:00Z
9
value 0.0181
scoring_system epss
scoring_elements 0.82829
published_at 2026-04-13T12:55:00Z
10
value 0.0181
scoring_system epss
scoring_elements 0.82793
published_at 2026-04-04T12:55:00Z
11
value 0.0181
scoring_system epss
scoring_elements 0.8279
published_at 2026-04-07T12:55:00Z
12
value 0.0181
scoring_system epss
scoring_elements 0.82815
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1904
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0054
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1904
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1904
6
reference_url http://seclists.org/fulldisclosure/2014/Mar/101
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2014/Mar/101
7
reference_url http://secunia.com/advisories/57915
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://secunia.com/advisories/57915
8
reference_url https://github.com/spring-projects/spring-framework
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework
9
reference_url https://github.com/spring-projects/spring-framework/commit/741b4b229ae032bd17175b46f98673ce0bd2d485
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commit/741b4b229ae032bd17175b46f98673ce0bd2d485
10
reference_url https://github.com/spring-projects/spring-framework/commit/75e08695a04980dbceae6789364717e9d8764d58
reference_id
reference_type
scores
url https://github.com/spring-projects/spring-framework/commit/75e08695a04980dbceae6789364717e9d8764d58
11
reference_url https://github.com/spring-projects/spring-framework/commit/75e08695a04980dbceae6789364717e9d8764d58#diff-5c29d6685335045274d9908c5cd45e45
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commit/75e08695a04980dbceae6789364717e9d8764d58#diff-5c29d6685335045274d9908c5cd45e45
12
reference_url https://jira.springsource.org/browse/SPR-11426
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://jira.springsource.org/browse/SPR-11426
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1904
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-1904
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1075296
reference_id 1075296
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1075296
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741604
reference_id 741604
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741604
16
reference_url https://bugzilla.redhat.com/CVE-2014-1904
reference_id CVE-2014-1904
reference_type
scores
url https://bugzilla.redhat.com/CVE-2014-1904
17
reference_url http://www.gopivotal.com/security/cve-2014-1904
reference_id CVE-2014-1904
reference_type
scores
url http://www.gopivotal.com/security/cve-2014-1904
18
reference_url https://github.com/advisories/GHSA-ff7p-jqjm-v66h
reference_id GHSA-ff7p-jqjm-v66h
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-ff7p-jqjm-v66h
19
reference_url https://access.redhat.com/errata/RHSA-2014:0400
reference_id RHSA-2014:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0400
20
reference_url https://access.redhat.com/errata/RHSA-2014:0401
reference_id RHSA-2014:0401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0401
fixed_packages
0
url pkg:deb/debian/libspring-java@3.0.6.RELEASE-13?distro=trixie
purl pkg:deb/debian/libspring-java@3.0.6.RELEASE-13?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libspring-java@3.0.6.RELEASE-13%3Fdistro=trixie
1
url pkg:deb/debian/libspring-java@4.3.30-1?distro=trixie
purl pkg:deb/debian/libspring-java@4.3.30-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libspring-java@4.3.30-1%3Fdistro=trixie
2
url pkg:deb/debian/libspring-java@4.3.30-2?distro=trixie
purl pkg:deb/debian/libspring-java@4.3.30-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libspring-java@4.3.30-2%3Fdistro=trixie
3
url pkg:deb/debian/libspring-java@4.3.30-3?distro=trixie
purl pkg:deb/debian/libspring-java@4.3.30-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libspring-java@4.3.30-3%3Fdistro=trixie
4
url pkg:deb/debian/libspring-java@4.3.30-4?distro=trixie
purl pkg:deb/debian/libspring-java@4.3.30-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libspring-java@4.3.30-4%3Fdistro=trixie
aliases CVE-2014-1904, GHSA-ff7p-jqjm-v66h
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ajex-5x84-8ygb
1
url VCID-vkf8-5z5m-wqc7
vulnerability_id VCID-vkf8-5z5m-wqc7
summary The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External Entity (XXE) issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4152, CVE-2013-7315, and CVE-2013-6429.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2014-0400.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2014-0400.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0054.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0054.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0054
reference_id
reference_type
scores
0
value 0.02548
scoring_system epss
scoring_elements 0.85525
published_at 2026-04-24T12:55:00Z
1
value 0.02548
scoring_system epss
scoring_elements 0.85461
published_at 2026-04-08T12:55:00Z
2
value 0.02548
scoring_system epss
scoring_elements 0.85469
published_at 2026-04-09T12:55:00Z
3
value 0.02548
scoring_system epss
scoring_elements 0.85484
published_at 2026-04-11T12:55:00Z
4
value 0.02548
scoring_system epss
scoring_elements 0.85482
published_at 2026-04-12T12:55:00Z
5
value 0.02548
scoring_system epss
scoring_elements 0.85478
published_at 2026-04-13T12:55:00Z
6
value 0.02548
scoring_system epss
scoring_elements 0.85502
published_at 2026-04-16T12:55:00Z
7
value 0.02548
scoring_system epss
scoring_elements 0.85507
published_at 2026-04-18T12:55:00Z
8
value 0.02548
scoring_system epss
scoring_elements 0.85503
published_at 2026-04-21T12:55:00Z
9
value 0.02548
scoring_system epss
scoring_elements 0.85405
published_at 2026-04-01T12:55:00Z
10
value 0.02548
scoring_system epss
scoring_elements 0.85417
published_at 2026-04-02T12:55:00Z
11
value 0.02548
scoring_system epss
scoring_elements 0.85437
published_at 2026-04-04T12:55:00Z
12
value 0.02548
scoring_system epss
scoring_elements 0.8544
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0054
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0054
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1904
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1904
5
reference_url https://github.com/spring-projects/spring-framework/commit/1a8629d40825c073b6863ae2ab748b647b28506a
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commit/1a8629d40825c073b6863ae2ab748b647b28506a
6
reference_url https://github.com/spring-projects/spring-framework/commit/1c5cab2a4069ec3239c531d741aeb07a434f521b
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commit/1c5cab2a4069ec3239c531d741aeb07a434f521b
7
reference_url https://github.com/spring-projects/spring-framework/commit/edba32b3093703d5e9ed42b5b8ec23ecc1998398
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commit/edba32b3093703d5e9ed42b5b8ec23ecc1998398
8
reference_url https://github.com/spring-projects/spring-framework/commit/fb0683c066e74e9667d6cd8c5fa01f674c68c3be
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commit/fb0683c066e74e9667d6cd8c5fa01f674c68c3be
9
reference_url https://github.com/spring-projects/spring-framework/issues/16003
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/issues/16003
10
reference_url https://jira.spring.io/browse/SPR-11376
reference_id
reference_type
scores
url https://jira.spring.io/browse/SPR-11376
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-0054
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-0054
12
reference_url http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0054
reference_id
reference_type
scores
url http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0054
13
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1075328
reference_id 1075328
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1075328
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741604
reference_id 741604
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741604
16
reference_url http://www.pivotal.io/security/cve-2014-0054
reference_id CVE-2014-0054
reference_type
scores
url http://www.pivotal.io/security/cve-2014-0054
17
reference_url https://github.com/advisories/GHSA-8cmm-qj8g-fcp6
reference_id GHSA-8cmm-qj8g-fcp6
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8cmm-qj8g-fcp6
18
reference_url https://access.redhat.com/errata/RHSA-2014:0400
reference_id RHSA-2014:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0400
19
reference_url https://access.redhat.com/errata/RHSA-2014:0401
reference_id RHSA-2014:0401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0401
fixed_packages
0
url pkg:deb/debian/libspring-java@3.0.6.RELEASE-13?distro=trixie
purl pkg:deb/debian/libspring-java@3.0.6.RELEASE-13?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libspring-java@3.0.6.RELEASE-13%3Fdistro=trixie
1
url pkg:deb/debian/libspring-java@4.3.30-1?distro=trixie
purl pkg:deb/debian/libspring-java@4.3.30-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libspring-java@4.3.30-1%3Fdistro=trixie
2
url pkg:deb/debian/libspring-java@4.3.30-2?distro=trixie
purl pkg:deb/debian/libspring-java@4.3.30-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libspring-java@4.3.30-2%3Fdistro=trixie
3
url pkg:deb/debian/libspring-java@4.3.30-3?distro=trixie
purl pkg:deb/debian/libspring-java@4.3.30-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libspring-java@4.3.30-3%3Fdistro=trixie
4
url pkg:deb/debian/libspring-java@4.3.30-4?distro=trixie
purl pkg:deb/debian/libspring-java@4.3.30-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libspring-java@4.3.30-4%3Fdistro=trixie
aliases CVE-2014-0054, GHSA-8cmm-qj8g-fcp6
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vkf8-5z5m-wqc7
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libspring-java@3.0.6.RELEASE-13%3Fdistro=trixie