Vulnerability Directory

If you’re currently using these frameworks in your application’s tech stack, your application could be vulnerable.

Secure drop-in replacements for open source software from HeroDevs helps you stay secure, compliant, and compatible while you migrate.

Switch to Never-Ending Support (NES) from HeroDevs to immediately mitigate these vulnerabilities.

Codey gradient
Filtering by:
Severity
=
Text for Severity
Close icon
Clear Filters
Severity
ID
Technology
Libraries Affected
Category
Version(s) Affected
Published Date
High
Struts
Apache Commons BeanUtils
Remote Code Execution
<=1.9.2
Feb 1, 2024
High
Struts
Apache Struts
Cross-Site Scripting
>=1.0.0 <=1.3.10
Feb 1, 2024
High
Struts
Apache Struts
Authorization Bypass
>=1.0.0 <=1.3.10
Feb 1, 2024
High
Struts
Apache Struts
Authorization Bypass
>=1.1.0 <=1.3.10
Feb 1, 2024
Low
Struts
Apache Struts
Cross-Site Scripting
<=1.3.10
Feb 1, 2024
Medium
Node.js
Node.js
Cryptographic Weakness
4.0 < 16.20.1, 18 < 18.16.1, 20 < 20.3.1
Nov 28, 2023
Medium
Node.js
Node.js
Uncontrolled Resource Consumption
4.0 < 16.20.1 , 18 < 18.16.1, 20 < 20.3.1
Nov 28, 2023
Medium
Node.js
Node.js
Insufficient Verification of Data Authenticity
4.0 <= 18.18.1, 20 < 20.8.1
Oct 18, 2023
Medium
Node.js
Node.js
Privilege Escalation
4 <= 16.20.1, 0 <= 18.17.0, 0 <= 20.5.0
Aug 24, 2023
High
Node.js
Node.js
Privilege Escalation
4 <= 16.20.1, 18 <= 18.17.0, 20 <= 20.5.0
Aug 21, 2023
Medium
Node.js
Node.js
Privilege Escalation
Information Exposure
4.0 < 16.20.2, 18 < 18.17.1, 20 < 20.5.1
Aug 15, 2023
Medium
Node.js
Node.js
HTTP Request Smuggling
4.0 < 16.20.1, 18 < 18.16.1, 20 < 20.3.1
Jun 30, 2023
High
Spring
Spring Boot
Denial of Service
>=1.5.0 <=1.5.22, >=2.5.0 <2.5.15, >=2.6.0 <2.6.15, >=2.7.0 <2.7.12 >=3.0.0 <3.0.7
May 19, 2023
High
Spring
Spring Security
Improper Session Handling
>=5.7.0 <5.7.8, >=5.8.0 <5.8.3, >=6.0.0 <6.0.3
Apr 19, 2023
Medium
Spring
Spring Framework
Denial of Service
<5.2.24, >=5.3.0 <5.3.27, >=6.0.0 <6.0.8
Apr 13, 2023
Exclamation icon
No results found

Please enter a valid Vulnerability ID number or Technology name.

Sign up for the latest vulnerability alerts
Rss feed icon
Subscribe via RSS
or
Thanks for signing up for our Newsletter! We look forward to connecting with you.
Oops! Something went wrong while submitting the form.