Vulnerability Directory
If you’re currently using these frameworks in your application’s tech stack, your application could be vulnerable.
Secure drop-in replacements for open source software from HeroDevs helps you stay secure, compliant, and compatible while you migrate.
Switch to Never-Ending Support (NES) from HeroDevs to immediately mitigate these vulnerabilities.
Severity
ID
Technology
Libraries Affected
Category
Version(s) Affected
Published Date
Critical
Struts
Apache Struts
Remote Code Execution
>=2.3.0 <2.3.35, >=2.5.0 <2.5.17
Aug 18, 2022
High
Node.js
Node.js
Resource Injection
4.0 < 14.20.0, 16 < 16.20.0, 18 < 18.5.0
Jul 14, 2022
Medium
Node.js
Node.js
HTTP Request Smuggling
4.0 < 14.20.1, 16 < 16.17.1, 18 < 18.9.1
Jul 14, 2022
High
Node.js
Node.js
Authorization Bypass
4.0 < 14.20.1, 16 < 16.17.1, 18 < 18.9.1
Jul 14, 2022
Medium
Node.js
Node.js
HTTP Request Smuggling
4.0 < 14.20.0, 16 < 16.20.0, 18 < 18.5.0
Jul 14, 2022
Medium
Node.js
Node.js
HTTP Request Smuggling
4.0 < 14.20.1, 16 < 16.17.1, 18 < 18.9.1
Jul 14, 2022
Critical
Rails
Ruby on Rails Framework
Remote Code Execution
7.0.0.0 - <= 7.0.2.2 6.1.0.0 - <= 6.1.4.6 6.0.0.0 - <= 6.0.4.6 5.2.0.0 - <= 5.2.6.2
May 26, 2022
High
Spring
Spring Security
Authorization Bypass
<5.4.11, >=5.5.0 <5.5.7, >=5.6.x <5.6.4
May 16, 2022
No results found
Please enter a valid Vulnerability ID number or Technology name.
