cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-20883,https://securityvulnerability.io/vulnerability/CVE-2023-20883,Denial-of-Service Vulnerability in Spring Boot by VMware,"A vulnerability exists in various versions of Spring Boot where the combination of Spring MVC and a reverse proxy cache may lead to a denial-of-service (DoS) attack. This can allow attackers to exploit the affected application, causing potential service disruptions and unavailability. Users are encouraged to review their versions and apply security updates as necessary to mitigate this risk.",Vmware,Spring Boot,7.5,HIGH,0.0014299999456852674,false,false,false,false,,false,false,2023-05-26T00:00:00.000Z,0 CVE-2023-20873,https://securityvulnerability.io/vulnerability/CVE-2023-20873,Security Bypass in Spring Boot Affecting Cloud Foundry Deployments,"In specific versions of Spring Boot, applications deployed to Cloud Foundry may encounter a vulnerability that allows security bypassing. This issue affects Spring Boot versions up to 3.0.5 and 2.7.10 as well as older unsupported releases, posing significant risks to application integrity. To mitigate this vulnerability, users are advised to upgrade to Spring Boot 3.0.6 or higher for 3.0.x versions, and to 2.7.11 or higher for 2.7.x versions.",Vmware,Spring Boot,9.8,CRITICAL,0.007300000172108412,false,false,false,false,,false,false,2023-04-20T00:00:00.000Z,0 CVE-2022-27772,https://securityvulnerability.io/vulnerability/CVE-2022-27772,,spring-boot versions prior to version v2.2.11.RELEASE was vulnerable to temporary directory hijacking. This vulnerability impacted the org.springframework.boot.web.server.AbstractConfigurableWebServerFactory.createTempDir method. NOTE: This vulnerability only affects products and/or versions that are no longer supported by the maintainer,Vmware,Spring Boot,7.8,HIGH,0.0004799999878741801,false,false,false,true,true,false,false,2022-03-30T17:45:42.000Z,0