Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2026-42454 |
|
OS Command Injection in docker (CVE-2026-42454)
OS command injection in docker (CVE-2026-42454). Successful exploitation can lead to full system takeover. Exploitable via `GET /docker/containers/`.
|
| CVE-2026-42298 |
|
Code Injection in docker (CVE-2026-42298)
code injection in docker (CVE-2026-42298). Successful exploitation can lead to full system takeover. Exploitable via ``GITHUB_TOKEN``. Mitigation: upgrade to `>= 0` or later.
|
| CVE-2026-42302 |
|
Vulnerability in openai-sdk (CVE-2026-42302)
vulnerability in openai-sdk (CVE-2026-42302). Successful exploitation can lead to full system takeover. Exploitable via ``entrypoint.sh``.
|
| CVE-2026-41512 |
|
Code Injection in gem (CVE-2026-41512)
code injection in gem (CVE-2026-41512). Successful exploitation can lead to full system takeover. Exploitable via `POST /targets/auto_detect_selectors`.
|
| CVE-2026-42880 |
|
Information Disclosure in argo-cd (CVE-2026-42880)
vulnerability in argo-cd (CVE-2026-42880). Confidential information can be exposed externally.
|
| CVE-2026-34282 |
|
Vulnerability in java (CVE-2026-34282)
vulnerability in java (CVE-2026-34282). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491, 11.0.31, 17.0.19, 21.0.11, 25.0.3, 26.0.1` or later.
|
| CVE-2026-34268 |
|
Vulnerability in java (CVE-2026-34268)
vulnerability in java (CVE-2026-34268). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491, 11.0.31, 17.0.19, 21.0.11, 25.0.3, 26.0.1` or later.
|
| CVE-2026-23865 |
|
Vulnerability in java (CVE-2026-23865)
vulnerability in java (CVE-2026-23865). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `11.0.31, 17.0.19, 21.0.11, 25.0.3, 26.0.1` or later.
|
| CVE-2026-22021 |
|
Vulnerability in java (CVE-2026-22021)
vulnerability in java (CVE-2026-22021). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491, 11.0.31, 17.0.19, 21.0.11, 25.0.3, 26.0.1` or later.
|
| CVE-2026-22013 |
|
Vulnerability in java (CVE-2026-22013)
vulnerability in java (CVE-2026-22013). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491, 11.0.31, 17.0.19, 21.0.11, 25.0.3, 26.0.1` or later.
|
| CVE-2026-22008 |
|
Vulnerability in java (CVE-2026-22008)
vulnerability in java (CVE-2026-22008). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `25.0.2` or later.
|
| CVE-2026-22007 |
|
Vulnerability in java (CVE-2026-22007)
vulnerability in java (CVE-2026-22007). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491, 11.0.31, 17.0.19, 21.0.11, 25.0.3, 26.0.1` or later.
|
| CVE-2026-22003 |
|
Vulnerability in java (CVE-2026-22003)
vulnerability in java (CVE-2026-22003). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491` or later.
|
| CVE-2026-21947 |
|
Vulnerability in java (CVE-2026-21947)
vulnerability in java (CVE-2026-21947). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.481` or later.
|
| CVE-2026-21945 |
|
Vulnerability in java (CVE-2026-21945)
vulnerability in java (CVE-2026-21945). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.481, 11.0.30, 17.0.18, 21.0.10, 25.0.2` or later.
|
| CVE-2026-21933 |
|
Vulnerability in java (CVE-2026-21933)
vulnerability in java (CVE-2026-21933). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.481, 11.0.30, 17.0.18, 21.0.10, 25.0.2` or later.
|
| CVE-2026-21932 |
|
Vulnerability in java (CVE-2026-21932)
vulnerability in java (CVE-2026-21932). Data can be tampered with by attackers. Mitigation: upgrade to `1.8.0, 8.0.481, 11.0.30, 17.0.18, 21.0.10, 25.0.2` or later.
|
| CVE-2026-21925 |
|
Vulnerability in java (CVE-2026-21925)
vulnerability in java (CVE-2026-21925). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.481, 11.0.30, 17.0.18, 21.0.10, 25.0.2` or later.
|
| CVE-2026-20676 |
|
Vulnerability in java (CVE-2026-20676)
vulnerability in java (CVE-2026-20676). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491` or later.
|
| CVE-2026-20652 |
|
Vulnerability in java (CVE-2026-20652)
vulnerability in java (CVE-2026-20652). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491` or later.
|
| CVE-2026-20644 |
|
Vulnerability in java (CVE-2026-20644)
vulnerability in java (CVE-2026-20644). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491` or later.
|
| CVE-2026-20636 |
|
Vulnerability in java (CVE-2026-20636)
vulnerability in java (CVE-2026-20636). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491` or later.
|
| CVE-2026-20635 |
|
Vulnerability in java (CVE-2026-20635)
vulnerability in java (CVE-2026-20635). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491` or later.
|
| CVE-2026-20608 |
|
Vulnerability in java (CVE-2026-20608)
vulnerability in java (CVE-2026-20608). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491` or later.
|
| CVE-2025-7425 |
|
Vulnerability in java (CVE-2025-7425)
vulnerability in java (CVE-2025-7425). Data can be tampered with by attackers. Mitigation: upgrade to `1.8.0, 8.0.481` or later.
|
| CVE-2025-7424 |
|
Vulnerability in java (CVE-2025-7424)
vulnerability in java (CVE-2025-7424). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.481` or later.
|
| CVE-2025-61748 |
|
Vulnerability in java (CVE-2025-61748)
vulnerability in java (CVE-2025-61748). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `21.0.9, 25.0.1` or later.
|
| CVE-2025-6052 |
|
Vulnerability in java (CVE-2025-6052)
vulnerability in java (CVE-2025-6052). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.481` or later.
|
| CVE-2025-53066 |
|
Vulnerability in java (CVE-2025-53066)
vulnerability in java (CVE-2025-53066). Confidential information can be exposed externally. Mitigation: upgrade to `1.8.0, 8.0.471, 11.0.29, 17.0.17, 21.0.9, 25.0.1` or later.
|
| CVE-2025-53057 |
|
Vulnerability in java (CVE-2025-53057)
vulnerability in java (CVE-2025-53057). Data can be tampered with by attackers. Mitigation: upgrade to `1.8.0, 8.0.471, 11.0.29, 17.0.17, 21.0.9, 25.0.1` or later.
|
| CVE-2025-50106 |
|
Vulnerability in java (CVE-2025-50106)
vulnerability in java (CVE-2025-50106). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `1.8.0, 8.0.461, 11.0.28, 17.0.16, 21.0.8, 24.0.2` or later.
|
| CVE-2025-50059 |
|
Vulnerability in java (CVE-2025-50059)
vulnerability in java (CVE-2025-50059). Confidential information can be exposed externally. Mitigation: upgrade to `11.0.28, 17.0.16, 21.0.8, 24.0.2` or later.
|
| CVE-2025-47219 |
|
Vulnerability in java (CVE-2025-47219)
vulnerability in java (CVE-2025-47219). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `1.8.0, 8.0.481` or later.
|
| CVE-2025-43457 |
|
Vulnerability in java (CVE-2025-43457)
vulnerability in java (CVE-2025-43457). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491` or later.
|
| CVE-2025-32415 |
|
Vulnerability in java (CVE-2025-32415)
vulnerability in java (CVE-2025-32415). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.461` or later.
|
| CVE-2025-32414 |
|
Vulnerability in java (CVE-2025-32414)
vulnerability in java (CVE-2025-32414). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.461` or later.
|
| CVE-2025-30761 |
|
Vulnerability in java (CVE-2025-30761)
vulnerability in java (CVE-2025-30761). Data can be tampered with by attackers. Mitigation: upgrade to `1.8.0, 8.0.461, 11.0.28` or later.
|
| CVE-2025-30754 |
|
Vulnerability in java (CVE-2025-30754)
vulnerability in java (CVE-2025-30754). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.461, 11.0.28, 17.0.16, 21.0.8, 24.0.2` or later.
|
| CVE-2025-30752 |
|
Vulnerability in java (CVE-2025-30752)
vulnerability in java (CVE-2025-30752). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `24.0.2` or later.
|
| CVE-2025-24928 |
|
Vulnerability in java (CVE-2025-24928)
vulnerability in java (CVE-2025-24928). Confidential information can be exposed externally. Mitigation: upgrade to `1.8.0, 8.0.461` or later.
|
| CVE-2025-24855 |
|
Vulnerability in java (CVE-2025-24855)
vulnerability in java (CVE-2025-24855). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `1.8.0, 8.0.461` or later.
|
| CVE-2025-21587 |
|
Vulnerability in java (CVE-2025-21587)
vulnerability in java (CVE-2025-21587). Confidential information can be exposed externally. Mitigation: upgrade to `1.8.0, 8.0.451, 11.0.27, 17.0.15, 21.0.7, 24.0.1` or later.
|
| CVE-2025-21502 |
|
Vulnerability in java (CVE-2025-21502)
vulnerability in java (CVE-2025-21502). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.441, 11.0.26, 17.0.14, 21.0.6, 23.0.2` or later.
|
| CVE-2025-10911 |
|
Vulnerability in java (CVE-2025-10911)
vulnerability in java (CVE-2025-10911). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.481` or later.
|
| CVE-2025-0509 |
|
Vulnerability in java (CVE-2025-0509)
vulnerability in java (CVE-2025-0509). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `1.8.0, 8.0.441` or later.
|
| CVE-2024-56171 |
|
Vulnerability in java (CVE-2024-56171)
vulnerability in java (CVE-2024-56171). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `1.8.0, 8.0.461` or later.
|
| CVE-2024-55549 |
|
Vulnerability in java (CVE-2024-55549)
vulnerability in java (CVE-2024-55549). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `1.8.0, 8.0.461` or later.
|
| CVE-2024-54534 |
|
Vulnerability in java (CVE-2024-54534)
vulnerability in java (CVE-2024-54534). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `1.8.0, 8.0.451` or later.
|
| CVE-2024-47778 |
|
Out-of-Bounds Read in java (CVE-2024-47778)
vulnerability in java (CVE-2024-47778). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.24.10` or later.
|
| CVE-2024-47777 |
|
Out-of-Bounds Read in java (CVE-2024-47777)
vulnerability in java (CVE-2024-47777). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.24.10` or later.
|