Browse all 4 CVE security advisories affecting JuliaWeb. AI-powered Chinese analysis, POCs, and references for each vulnerability.
JuliaWeb is a web application framework primarily used for building dynamic websites and web services. Historically, it has been susceptible to common web vulnerabilities including remote code execution, cross-site scripting (XSS), and privilege escalation flaws. The framework has accumulated four CVEs to date, with notable security characteristics including inconsistent input validation and session management weaknesses. While no major public security incidents have been widely documented, the presence of multiple CVEs suggests ongoing challenges in secure coding practices. Organizations implementing JuliaWeb should prioritize regular security assessments and timely patching to mitigate potential exploitation risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-61689 | HTTP.jl vulnerable to Header injection/Response splitting via header construction. — HTTP.jlCWE-113 | 6.3AI | MediumAI | 2025-10-10 |
| CVE-2025-52479 | HTTP.jl vulnerable to CR/LF Injection in URIs — HTTP.jlCWE-93 | 5.4AI | MediumAI | 2025-06-25 |
This page lists every published CVE security advisory associated with JuliaWeb. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.