About the Veracode Vulnerability Database

Veracode Software Composition Analysis

You can use the Veracode Vulnerability Database as a tool to determine if a library is safe prior to adding it to your code. It also provides important details about a library, such as the license in use and insight into specific vulnerabilities.

The Veracode Vulnerability Database catalogs all of the open-source libraries along with their associated vulnerabilities for these resources:

Searching the Vulnerability Database

Searching the Veracode Vulnerability Database is simple. You can use the following keywords filter your search results:

Keyword Usage Possible Values Example
type Restricts results to either libraries or vulnerabilities library, vulnerability type: library
language Restricts results to the specified language java, ruby, python, objectivec, go,php language: go
released Filters results to latest library versions or vulnerabilities released since the specified date yyyy-mm-dd released: 2017-05-25
source Restricts results to libraries catalogued from the specified source maven, pypi, gem, npm, bower, cocoapods, packagist source: bower
license Restricts results to libraries with the specified license apache, mit, bsd, gpl license: gpl
severity Restricts results to vulnerabilities with a severity between the specified range. Requires type: vulnerability. Two numbers from 0.0 to 10 separated by two periods severity: 1.2..9.9
vulnerable Restricts results to libraries with vulnerabilities associated with them true vulnerable: true
vulnerable_method Restricts results to vulnerabilities with vulnerable methods associated with them true vulnerable_method: true
enhanced Restricts results to vulnerabilities with full write-up details true enhanced: true

Vulnerability details

Veracode Software Composition Analysis provides detailed information for each vulnerability in the database.


The Summary area provides a breadth of information related to the selected vulnerability including the following:
Technical overview
A paragraph describing the vulnerability.
Severity CVSS score
Relative severity of the vulnerability. A detailed explanation of the CVSS score is available in the CVSS guide.
Library Vulnerability Information
The name of the library and a dropdown menu with one or more of the vulnerable version ranges for the library, along with the fixed and latest versions.

Technical Info

For Enhanced artifacts, this area provides the full writeup describing the vulnerability with analysis of the issue.

Risk Score

This area provides a detailed breakdown of the CVSS score, including the scores for each CVSS vector.

Library Fix Info

This area provides complete information regarding how to fix a library that contains a vulnerability. You can the affected library version ranges here in addition to safe versions to use and the code for updating to the safe version. In some cases, multiple libraries are associated with the same vulnerability. This area includes those libraries as well.


This area provides external references related to the vulnerability, including blog posts, the GitHub pull request for the fix, and other links with relevant information.

Library Signatures

This area allows users to view the coordinates corresponding to the vulnerable libraries that Veracode SCA uses to identify the vulnerability.

Vulnerable Methods

You can view the actual vulnerable part of the library. Even if a vulnerable library is in use, Veracode SCA can identify if a vulnerable method is in use. If the specific vulnerable method is not in use, the project might not be subject to a potential exploit.

Library details

If you want to view details for a library and all of its versions, select a library from the database search.


This page shows the history of a given library, organized by either the vulnerability severities or by the version released. With each list of library versions and vulnerabilities, there is a search box for narrowing down the list of vulnerabilities or versions.


You can use the Versions page to see vulnerability, license, and library evidence information sorted by library version. You can filter the list to only show library versions that include vulnerabilities.