Find out if you have vulnerabilities that put you at risk

Test your applications
Toggle filtering controls
Report a new vulnerability
VULNERABILITYAFFECTSTYPEPUBLISHED
  • H
Improper Handling of Parameters
io.debezium:debezium-core[,2.3.0.Alpha1)Maven20 Nov 2024
  • M
Authorization Bypass
org.springframework.security:spring-security-taglibs[,5.7.14)[5.8.0,5.8.16)[6.2.0,6.2.8)[6.3.0,6.3.5)Maven20 Nov 2024
  • M
Authorization Bypass
org.springframework.security:spring-security-web[,5.7.14)[5.8.0,5.8.16)[6.2.0,6.2.8)[6.3.0,6.3.5)Maven20 Nov 2024
  • M
Authorization Bypass
org.springframework.security:spring-security-oauth2-client[,5.7.14)[5.8.0,5.8.16)[6.2.0,6.2.8)[6.3.0,6.3.5)Maven20 Nov 2024
  • M
Authorization Bypass
org.springframework.security:spring-security-ldap[,5.7.14)[5.8.0,5.8.16)[6.2.0,6.2.8)[6.3.0,6.3.5)Maven20 Nov 2024
  • M
Authorization Bypass
org.springframework.security:spring-security-crypto[,5.7.14)[5.8.0,5.8.16)[6.2.0,6.2.8)[6.3.0,6.3.5)Maven20 Nov 2024
  • M
Authorization Bypass
org.springframework.security:spring-security-config[,5.7.14)[5.8.0,5.8.16)[6.2.0,6.2.8)[6.3.0,6.3.5)Maven20 Nov 2024
  • M
Authorization Bypass
org.springframework.security:spring-security-cas[,5.7.14)[5.8.0,5.8.16)[6.2.0,6.2.8)[6.3.0,6.3.5)Maven20 Nov 2024
  • M
Authorization Bypass
org.springframework.security:spring-security-core[,5.7.14)[5.8.0,5.8.16)[6.2.0,6.2.8)[6.3.0,6.3.5)Maven20 Nov 2024
  • M
Information Exposure
org.springframework.ldap:spring-ldap-odm[,2.4.4)[3.2.0,3.2.8)Maven20 Nov 2024
  • M
Information Exposure
org.springframework.ldap:spring-ldap-core[,2.4.4)[3.2.0,3.2.8)Maven20 Nov 2024
  • M
Cross-site Scripting (XSS)
org.apache.tomcat:tomcat-jasper[9.0.96,9.0.97)[10.1.31,10.1.32)[11.0.0,11.0.1)Maven19 Nov 2024
  • M
Files or Directories Accessible to External Parties
org.apache.kafka:kafka-clients[2.3.0,3.8.0)Maven19 Nov 2024
  • H
Information Exposure
org.graylog2:graylog2-server[6.1.0,6.1.2)Maven19 Nov 2024
  • M
Denial of Service (DoS)
org.springframework:spring-webmvc[,6.0.0)Maven19 Nov 2024
  • C
Uncaught Exception
org.apache.tomcat.embed:tomcat-embed-core[9.0.0.M1,9.0.96)[10.1.0-M1,10.1.31)[11.0.0-M1,11.0.0)Maven19 Nov 2024
  • C
Uncaught Exception
org.apache.tomcat:tomcat-catalina[9.0.0.M1,9.0.96)[10.1.0-M1,10.1.31)[11.0.0-M1,11.0.0)Maven19 Nov 2024
  • M
Inadequate Encryption Strength
org.apache.tomcat.embed:tomcat-embed-core[9.0.93,9.0.96)[10.1.28,10.1.31)[11.0.0-M24,11.0.0)Maven19 Nov 2024
  • M
Inadequate Encryption Strength
org.apache.tomcat:tomcat-coyote[9.0.93,9.0.96)[10.1.28,10.1.31)[11.0.0-M24,11.0.0)Maven19 Nov 2024
  • C
HTTP Request Smuggling
io.undertow:undertow-core[,2.2.30.Final)[2.3.0.Alpha1,2.3.11.Final)Maven18 Nov 2024
  • M
Arbitrary Code Execution
org.webjars.npm:dom-iterator[0,]Maven17 Nov 2024
  • M
Cross-site Scripting (XSS)
org.fitnesse:fitnesse[,20241026)Maven15 Nov 2024
  • M
Directory Traversal
org.fitnesse:fitnesse[,20241026)Maven15 Nov 2024
  • H
Session Fixation
org.jenkins-ci.plugins:oic-auth[,4.421.v5422614eb_e0a_)Maven14 Nov 2024
  • H
Access Control Bypass
io.jenkins.plugins:shared-library-version-override[,19.v3a_c975738d4a_)Maven14 Nov 2024
  • H
Access Restriction Bypass
org.jenkins-ci.plugins:pipeline-model-definition[0,]Maven14 Nov 2024
  • H
Cross-site Scripting (XSS)
org.jenkins-ci.plugins:authorize-project[,1.8.0)Maven14 Nov 2024
  • H
Access Restriction Bypass
org.jenkins-ci.plugins.workflow:workflow-cps-parent[,3975.3977.v478dd9e956c3)[3990.vd281dd77a_388,3993.v3e20a_37282f8)Maven14 Nov 2024
  • M
Information Exposure
org.jenkins-ci.plugins:script-security[,1362.1364.v4cf2dc5d8776)[1365.v4778ca_84b_de5,1365.1367.va_3b_b_89f8a_95b_)[1366.vd44b_49a_5c85c,1368.vb_b_402e3547e7)Maven14 Nov 2024
  • M
Denial of Service (DoS)
io.netty:netty-common[,4.1.115.Final)Maven12 Nov 2024