Vulnerability Directory
If you’re currently using these frameworks in your application’s tech stack, your application could be vulnerable.
Secure drop-in replacements for open source software from HeroDevs helps you stay secure, compliant, and compatible while you migrate.
Switch to Never-Ending Support (NES) from HeroDevs to immediately mitigate these vulnerabilities.
Secure drop-in replacements for open source software from HeroDevs helps you stay secure, compliant, and compatible while you migrate.
Switch to Never-Ending Support (NES) from HeroDevs to immediately mitigate these vulnerabilities.
Severity
ID
Technology
Libraries Affected
Category
Version(s) Affected
Published Date
High
Rails
Ruby on Rails Framework
Remote Code Execution
< 2.1.3 < 2.2.0 Applications that do not use Rack::Directory
Jul 20, 2020
High
Rails
Ruby on Rails Framework
Remote Code Execution
<= 5.0.0 Not affected: Applications that do not allow users to control the names of locals. <= 4.2.11.1
Jul 2, 2020
High
Rails
Ruby on Rails Framework
Authorization Bypass
<= 5.2.4.1 <= 6.0.3.0 Not affected: Applications that do not use the direct upload functionality of the ActiveStorage S3 adapter.
Jun 19, 2020
Critical
Rails
Ruby on Rails Framework
Remote Code Execution
6.0.0 - <= 6.0.3.0 5.0.0 - <= 5.2.4.2
Jun 19, 2020
Critical
Rails
Ruby on Rails Framework
Remote Code Execution
Rails 3.x Rails 2.x Rails > 4.x if using actionpack_page-cache <= 1.2.0
May 12, 2020
Medium
Spring
Spring Security
Information Exposure
<4.2.16, >=5.0.0 <5.0.16, >=5.1.0 <5.1.10, >=5.2.0 <5.2.4, >=5.3.0 <5.3.2
May 7, 2020
Low
Spring
Spring Security
Information Exposure
<4.2.12, >=5.0.0 <5.0.12, >=5.1.0 <5.1.5
Apr 19, 2019
No results found
Please enter a valid Vulnerability ID number or Technology name.