Report a CVE to HeroDevs

Committed to Security and Confidentiality

At HeroDevs, safeguarding the security of open-source software and its ecosystem is our priority. As a Certified Numbering Authority (CNA), we ensure your vulnerability reports are handled with utmost confidentiality and professionalism.

Search tool icon

Report a Vulnerability

When you report a CVE, you can trust that:
  • Your submission is reviewed promptly and securely by our team of security experts.
  • Details of the vulnerability will not be disclosed until appropriate patches are developed and coordinated with the necessary stakeholders.
  • Your role as the reporter will be respected, with attribution provided as per your preference.
Every vulnerability we address strengthens the open-source ecosystem and ensures the continued security of end-of-life software. At HeroDevs, we actively track, assess, and address vulnerabilities to safeguard the security of open source software and protect the businesses that rely on it.

By clicking “submit” I acknowledge receipt of our Privacy Policy.

Thank you! Your submission has been received!
Please enter a company email.
Early Detection and CVE Remediation

75 Security Issues Fixed
(and always looking for more)

Below is a snapshot of the most recent 10 of 75 vulnerabilities in our database, demonstrating our commitment to transparency and proactive security.
Severity
ID
Technology
Libraries Affected
Category
Version(s) Affected
Published Date
High
Node.js
Node.js
Use of Unmaintained Third Party
<= 21.7.3
Jan 21, 2025
High
Node.js
Node.js
Use of Unmaintained Third Party
<= 19.9.0
Jan 21, 2025
High
Node.js
Node.js
Use of Unmaintained Third Party
<= 17.9.1
Jan 21, 2025
Critical
Struts
Apache Struts
Remote Code Execution
>=2.0.0 <=2.3.37, >=2.5.0 <=2.5.33, >=6.0.0 <=6.3.0.2
Dec 17, 2024
Low
Spring
Spring LDAP
Authorization Bypass
<=2.4.3, >=3.0.0 <=3.0.9, >=3.1.0 <=3.1.7, >=3.2.0 <3.2.7
Nov 20, 2024
Medium
Spring
Spring Security
Authorization Bypass
<=5.7.13, >=5.8.0 <=5.8.15, >=6.0.0 <=6.0.13, >=6.1.0 <=6.1.11, >=6.2.0 <=6.2.7, >=6.3.0 <=6.3.4
Nov 19, 2024
Medium
Spring
Spring Framework
Denial of Service
<5.3.42
Nov 15, 2024
High
Spring
Spring Framework
Path Traversal
<5.3.41, >=6.0.0 <6.0.25, >=6.1.0 <6.1.14
Oct 30, 2024
Medium
Express
Express
Resource Injection
>=3.0.0-alpha1 <=3.21.2
Oct 29, 2024
Critical
Spring
Spring Security
Authorization Bypass
>=5.7.0 <5.7.13, >=5.8.0 <5.8.15, >=6.0.0 <6.0.13, >=6.1.0 <6.1.11, >=6.2.0 <6.2.7, >=6.3.0 <6.3.4
Oct 25, 2024
For more details on CVEs found in end-of-life software, visit our vulnerability directory.