Lookup for vulnerable packages by Package URL.
| Purl | pkg:maven/org.springframework.boot/spring-boot@2.2.11.RELEASE |
| Type | maven |
| Namespace | org.springframework.boot |
| Name | spring-boot |
| Version | 2.2.11.RELEASE |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 3.0.13 |
| Latest_non_vulnerable_version | 3.4.5 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-k3fg-3bs3-87b9 |
| vulnerability_id |
VCID-k3fg-3bs3-87b9 |
| summary |
Spring Boot EndpointRequest.to() creates wrong matcher if actuator endpoint is not exposed
EndpointRequest.to() creates a matcher for null/** if the actuator endpoint, for which the EndpointRequest has been created, is disabled or not exposed.
Your application may be affected by this if all the following conditions are met:
* You use Spring Security
* EndpointRequest.to() has been used in a Spring Security chain configuration
* The endpoint which EndpointRequest references is disabled or not exposed via web
* Your application handles requests to /null and this path needs protection
You are not affected if any of the following is true:
* You don't use Spring Security
* You don't use EndpointRequest.to()
* The endpoint which EndpointRequest.to() refers to is enabled and is exposed
* Your application does not handle requests to /null or this path does not need protection |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-22235 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60082 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60094 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60077 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60108 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60121 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60114 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60076 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60028 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60093 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60052 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60107 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60022 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60086 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60072 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-22235 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-22235, GHSA-rc42-6c7j-7h5r
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k3fg-3bs3-87b9 |
|
| 1 |
| url |
VCID-kwk7-s11d-4ygy |
| vulnerability_id |
VCID-kwk7-s11d-4ygy |
| summary |
Spring Boot Actuator denial of service vulnerability
In Spring Boot versions 2.7.0 - 2.7.17, 3.0.0-3.0.12 and 3.1.0-3.1.5, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition.
Specifically, an application is vulnerable when all of the following are true:
* the application uses Spring MVC or Spring WebFlux
* `org.springframework.boot:spring-boot-actuator` is on the classpath |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-34055 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51568 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51574 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.516 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51561 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51615 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51612 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51661 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51639 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51623 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51664 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51671 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51651 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51602 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51609 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-34055 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-34055, GHSA-jjfh-589g-3hjx
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kwk7-s11d-4ygy |
|
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-6sye-grs9-dqfh |
| vulnerability_id |
VCID-6sye-grs9-dqfh |
| summary |
Exposure of Resource to Wrong Sphere
spring-boot versions prior to version v2.2.11.RELEASE was vulnerable to temporary directory hijacking. This vulnerability impacted the `org.springframework.boot.web.server.AbstractConfigurableWebServerFactory.createTempDir` method. NOTE: This vulnerability only affects products and/or versions that are no longer supported by the maintainer. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27772 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63333 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63245 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63297 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63315 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63332 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63316 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63279 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63324 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63303 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63322 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63335 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63251 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6328 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27772 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-27772, GHSA-cm59-pr5q-cw85
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6sye-grs9-dqfh |
|
|
| Risk_score | 4.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.boot/spring-boot@2.2.11.RELEASE |