Vulnerability Directory
If you’re currently using these frameworks in your application’s tech stack, your application could be vulnerable.
Secure drop-in replacements for open source software from HeroDevs helps you stay secure, compliant, and compatible while you migrate.
Switch to Never-Ending Support (NES) from HeroDevs to immediately mitigate these vulnerabilities.
Secure drop-in replacements for open source software from HeroDevs helps you stay secure, compliant, and compatible while you migrate.
Switch to Never-Ending Support (NES) from HeroDevs to immediately mitigate these vulnerabilities.
Severity
ID
Technology
Libraries Affected
Category
Version(s) Affected
Published Date
High
Rails
Ruby on Rails Framework
Information Exposure
6.0.0 - <= 6.0.0.beta2 5.2.0 - <= 5.2.2.0 All of 4.x prior to HeroDevs 4.2 LTS All of 3.x prior to HeroDevs 3.2 LTS All of 2.x prior to HeroDevs 2.3
Mar 27, 2019
Critical
Rails
Ruby on Rails Framework
Remote Code Execution
6.0.0.0 - <= 6.0.0.beta2 5.2.0.0 - <= 5.2.2.0
Mar 27, 2019
High
Rails
Ruby on Rails Framework
No items found.
6.0.0 - <= 6.0.0.beta2 5.2.0 - <= 5.2.2.0 All of 4.x prior to HeroDevs 4.2 LTS All of 3.x prior to HeroDevs 3.2 LTS All of 2.x prior to HeroDevs 2.3
Mar 27, 2019
Critical
Struts
Apache Struts 2
Command Injection
>= 2.3.5 - <2.3.31, >=2.5 - <2.5.10
Mar 16, 2017
High
Struts
Apache Struts
Remote Code Execution
>=2.3.19 <2.3.20.3, >=2.3.21 <2.3.24.3, >=2.3.25 <2.3.28.1
Apr 20, 2016
High
Rails
Ruby on Rails Framework
Remote Code Execution
<= 3.2.22.1 <= 4.1.14.1 <= 4.2.5.1
Apr 7, 2016
High
Rails
Ruby on Rails Framework
Cross-Site Scripting
< 5.0.0.beta1 <= 4.2.5.0 <= 4.1.14.0
Feb 15, 2016
High
Rails
Ruby on Rails Framework
Denial of Service
<=4.0.6 <=4.1.3 Only for instances using PostgreSQL
Jul 7, 2014
High
Spring
Spring Security
Authorization Bypass
>=3.1.0 <3.1.6, >=3.2.0 <3.2.2
Mar 11, 2014
Critical
Rails
Ruby on Rails Framework
Remote Code Execution
3.0.0 - <3.1.0 2.0.0 - <2.3.17
Feb 12, 2013
High
Rails
Ruby on Rails Framework
Remote Code Execution
<= 2.3.15 <= 3.0.19 <= 3.1.9 <= 3.2.10 Not affected: • applications using the yajl gem
Jan 13, 2013
Medium
Spring
Spring Security
Authorization Bypass
<2.0.9, >=3.0.0, <3.0.9, >=3.1.0, <3.1.4
Dec 12, 2012
No results found
Please enter a valid Vulnerability ID number or Technology name.