Vulnerability Directory
If you’re currently using these frameworks in your application’s tech stack, your application could be vulnerable.
Secure drop-in replacements for open source software from HeroDevs helps you stay secure, compliant, and compatible while you migrate.
Switch to Never-Ending Support (NES) from HeroDevs to immediately mitigate these vulnerabilities.
Secure drop-in replacements for open source software from HeroDevs helps you stay secure, compliant, and compatible while you migrate.
Switch to Never-Ending Support (NES) from HeroDevs to immediately mitigate these vulnerabilities.
Severity
ID
Technology
Libraries Affected
Category
Version(s) Affected
Published Date
Critical
Rails
Ruby on Rails Framework
Remote Code Execution
2.2.0.0 - <=2.2.3.0 2.1.0.0 - <=2.1.4.0 2.0.0.0 - <=2.0.9.0
Dec 5, 2022
High
Spring
Spring Security
Authorization Bypass
>=5.6.0 <5.6.9, >=5.7.0 <5.7.5
Oct 31, 2022
Critical
Struts
Apache Struts
Remote Code Execution
>=2.3.0 <2.3.35, >=2.5.0 <2.5.17
Aug 18, 2022
Critical
Rails
Ruby on Rails Framework
Remote Code Execution
7.0.0.0 - <= 7.0.2.2 6.1.0.0 - <= 6.1.4.6 6.0.0.0 - <= 6.0.4.6 5.2.0.0 - <= 5.2.6.2
May 26, 2022
High
Spring
Spring Security
Authorization Bypass
<5.4.11, >=5.5.0 <5.5.7, >=5.6.x <5.6.4
May 16, 2022
Critical
Spring
Spring Framework
Remote Code Execution
<5.2.20, >=5.3.0 <5.3.18
Apr 1, 2022
Low
Spring
Spring Security
Denial of Service
<5.2.9.RELEASE, >=5.3.0 <5.3.9.RELEASE, >=5.4.0 <5.4.4
Feb 19, 2021
No results found
Please enter a valid Vulnerability ID number or Technology name.