Find out if you have vulnerabilities that put you at risk

Test your applications
Toggle filtering controls
Report a new vulnerability
VULNERABILITYAFFECTSTYPEPUBLISHED
  • C
XML External Entity (XXE) Injection
io.github.bonigarcia:webdrivermanager[,6.1.0)Maven18 Jun 2025
  • M
Directory Traversal
org.wso2.carbon.commons:org.wso2.carbon.logging.service[,4.6.0)Maven18 Jun 2025
  • M
Cross-site Scripting (XSS)
org.wso2.carbon.commons:org.wso2.carbon.ndatasource.ui[,4.5.4)Maven18 Jun 2025
  • M
Cross-site Scripting (XSS)
org.wso2.carbon.identity.framework:org.wso2.carbon.identity.mgt.ui[,4.5.4)Maven18 Jun 2025
  • M
Cross-site Scripting (XSS)
org.wso2.carbon.commons:org.wso2.carbon.messageflows.ui[,4.5.4)Maven18 Jun 2025
  • H
Allocation of Resources Without Limits or Throttling
org.apache.tomcat:tomcat-catalina[ ,9.0.106)[10.1.0-M1,10.1.42)[11.0.0-M1,11.0.8)Maven17 Jun 2025
  • H
Allocation of Resources Without Limits or Throttling
org.apache.tomcat.embed:tomcat-embed-core[ ,9.0.106)[10.1.0-M1,10.1.42)[11.0.0-M1,11.0.8)Maven17 Jun 2025
  • H
Directory Traversal
com.liferay:com.liferay.server.admin.web[,5.0.23)Maven17 Jun 2025
  • H
Allocation of Resources Without Limits or Throttling
com.liferay.portal:com.liferay.portal.kernel[,38.0.0)Maven17 Jun 2025
  • H
Allocation of Resources Without Limits or Throttling
com.liferay:com.liferay.portal.vulcan.impl[,5.0.103)Maven17 Jun 2025
  • M
Authentication Bypass Using an Alternate Path or Channel
org.apache.tomcat:tomcat-catalina[ ,9.0.106)[10.1.0-M1,10.1.42)[11.0.0-M1,11.0.8)Maven17 Jun 2025
  • M
Authentication Bypass Using an Alternate Path or Channel
org.apache.tomcat.embed:tomcat-embed-core[ ,9.0.106)[10.1.0-M1,10.1.42)[11.0.0-M1,11.0.8)Maven17 Jun 2025
  • H
Allocation of Resources Without Limits or Throttling
commons-fileupload:commons-fileupload[,1.6.0)Maven17 Jun 2025
  • H
Allocation of Resources Without Limits or Throttling
org.apache.commons:commons-fileupload2-core[,2.0.0-M4)Maven17 Jun 2025
  • H
Information Exposure
org.apache.maven.scm:maven-scm-providers-git[2.1.0,]Maven16 Jun 2025
  • L
Regular Expression Denial of Service (ReDoS)
org.webjars.bowergithub.juliangruber:brace-expansion[0,]Maven16 Jun 2025
  • L
Regular Expression Denial of Service (ReDoS)
org.webjars.npm:brace-expansion[,1.1.12)[2.0.0,]Maven16 Jun 2025
  • H
Information Exposure
org.webjars.npm:serve-handler[0,]Maven15 Jun 2025
  • H
Deserialization of Untrusted Data
org.apache.kafka:kafka-clients[2.3.0,3.9.1)Maven13 Jun 2025
  • H
Deserialization of Untrusted Data
org.apache.kafka:kafka-clients[2.0.0,3.9.1)Maven13 Jun 2025
  • C
Deserialization of Untrusted Data
org.apache.inlong:manager-service[1.13.0,2.1.0)Maven13 Jun 2025
  • C
Deserialization of Untrusted Data
org.apache.inlong:manager-pojo[1.13.0,2.1.0)Maven13 Jun 2025
  • M
HTTP Response Splitting
org.springframework:spring-web[6.0.5,6.1.21)[6.2.0,6.2.8)Maven13 Jun 2025
  • M
Regular Expression Denial of Service (ReDoS)
org.apereo.cas:cas-server-core-configuration-metadata-repository[,6.0.0)Maven12 Jun 2025
  • H
Incorrect Implementation of Authentication Algorithm
org.postgresql:postgresql[42.7.4,42.7.7)Maven12 Jun 2025
  • M
Incomplete Filtering of Special Elements
org.webjars:angular-sanitize[1.0.7,)Maven11 Jun 2025
  • M
Incomplete Filtering of Special Elements
org.webjars.bower:angular-sanitize[1.0.7,)Maven11 Jun 2025
  • M
Incomplete Filtering of Special Elements
org.webjars.npm:angular-sanitize[1.2.29,)Maven11 Jun 2025
  • H
Server-side Request Forgery (SSRF)
org.apache.kafka:kafka-clients[3.1.0,3.9.1)Maven11 Jun 2025
  • M
Arbitrary File Upload
xyz.erupt:erupt[0,]Maven11 Jun 2025