Vulnerability Directory

If you’re currently using these frameworks in your application’s tech stack, your application could be vulnerable.

Secure drop-in replacements for open source software from HeroDevs helps you stay secure, compliant, and compatible while you migrate.

Switch to Never-Ending Support (NES) from HeroDevs to immediately mitigate these vulnerabilities.
Arrow down
Search here
Clear
Filter by Severity
Clear
Filter by Technology
Sign up for the latest vulnerability alerts
Rss feed icon
Subscribe via RSS
or
Thanks for signing up for our Newsletter! We look forward to connecting with you.
Oops! Something went wrong while submitting the form.
Severity
ID
Technology
Libraries Affected
Category
Version(s) Affected
Published Date
High
AngularJS
AngularJS
ReDoS Vulnerability
>=1.3.0
Feb 10, 2024
High
Struts
Apache Commons BeanUtils
Remote Code Execution
<=1.9.2
Feb 1, 2024
High
Struts
Apache Struts
Cross-Site Scripting
>=1.0.0 <=1.3.10
Feb 1, 2024
High
Struts
Apache Struts
Authorization Bypass
>=1.0.0 <=1.3.10
Feb 1, 2024
High
Struts
Apache Struts
Authorization Bypass
>=1.1.0 <=1.3.10
Feb 1, 2024
Low
Struts
Apache Struts
Cross-Site Scripting
<=1.3.10
Feb 1, 2024
High
Spring
Spring Boot
Denial of Service
>=1.5.0 <=1.5.22, >=2.5.0 <2.5.15, >=2.6.0 <2.6.15, >=2.7.0 <2.7.12 >=3.0.0 <3.0.7
May 19, 2023
High
Spring
Spring Security
Improper Session Handling
>=5.7.0 <5.7.8, >=5.8.0 <5.8.3, >=6.0.0 <6.0.3
Apr 19, 2023
Medium
Spring
Spring Framework
Denial of Service
<5.2.24, >=5.3.0 <5.3.27, >=6.0.0 <6.0.8
Apr 13, 2023
High
Spring
Spring Boot
Resource Injection
<2.2.11
Mar 30, 2023
Medium
AngularJS
AngularJS
ReDoS Vulnerability
>=1.4.9
Mar 30, 2023
Medium
AngularJS
AngularJS
ReDoS Vulnerability
>=1.0.0
Mar 30, 2023
Medium
AngularJS
AngularJS
ReDoS Vulnerability
>=1.2.21
Mar 30, 2023
Medium
Spring
Spring Framework
Denial of Service
<5.2.23, >=5.3.0 <5.3.26, >=6.0.0 <6.0.7
Mar 23, 2023
High
Rails
Ruby on Rails Framework
Remote Code Execution
<=6.0.6.0 <=6.1.7.0 <=7.0.4.0
Feb 9, 2023