Vulnerabilities

Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.

Filtering: Tag: jdk Clear
ID Title
CVE-2026-21947 Cross-Site Scripting (XSS) in java (CVE-2026-21947)
cross-site scripting in java (CVE-2026-21947). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.481` or later.
CVE-2026-21945 Vulnerability in java (CVE-2026-21945)
vulnerability in java (CVE-2026-21945). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.481, 11.0.30, 17.0.18, 21.0.10, 25.0.2` or later.
CVE-2026-21933 Vulnerability in java (CVE-2026-21933)
vulnerability in java (CVE-2026-21933). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.481, 11.0.30, 17.0.18, 21.0.10, 25.0.2` or later.
CVE-2026-21932 Vulnerability in java (CVE-2026-21932)
vulnerability in java (CVE-2026-21932). Data can be tampered with by attackers. Mitigation: upgrade to `1.8.0, 8.0.481, 11.0.30, 17.0.18, 21.0.10, 25.0.2` or later.
CVE-2026-21925 Vulnerability in java (CVE-2026-21925)
vulnerability in java (CVE-2026-21925). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.481, 11.0.30, 17.0.18, 21.0.10, 25.0.2` or later.
CVE-2025-61748 Vulnerability in java (CVE-2025-61748)
vulnerability in java (CVE-2025-61748). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `21.0.9, 25.0.1` or later.
CVE-2025-53066 Information Disclosure in java (CVE-2025-53066)
vulnerability in java (CVE-2025-53066). Confidential information can be exposed externally. Mitigation: upgrade to `1.8.0, 8.0.471, 11.0.29, 17.0.17, 21.0.9, 25.0.1` or later.
CVE-2025-53057 Vulnerability in java (CVE-2025-53057)
vulnerability in java (CVE-2025-53057). Data can be tampered with by attackers. Mitigation: upgrade to `1.8.0, 8.0.471, 11.0.29, 17.0.17, 21.0.9, 25.0.1` or later.
CVE-2013-4578 Vulnerability in oracle (CVE-2013-4578)
vulnerability in oracle (CVE-2013-4578). Risk of unauthorized operations or information disclosure.
CVE-2017-10388 Vulnerability in c (CVE-2017-10388)
vulnerability in c (CVE-2017-10388). Successful exploitation can lead to full system takeover.
CVE-2017-10356 Vulnerability in c (CVE-2017-10356)
vulnerability in c (CVE-2017-10356). Confidential information can be exposed externally.
CVE-2017-10346 Vulnerability in c (CVE-2017-10346)
vulnerability in c (CVE-2017-10346). Successful exploitation can lead to full system takeover.
CVE-2017-10347 Vulnerability in c (CVE-2017-10347)
vulnerability in c (CVE-2017-10347). Risk of unauthorized operations or information disclosure.
CVE-2017-10348 Vulnerability in c (CVE-2017-10348)
vulnerability in c (CVE-2017-10348). Risk of unauthorized operations or information disclosure.
CVE-2017-10349 Vulnerability in c (CVE-2017-10349)
vulnerability in c (CVE-2017-10349). Risk of unauthorized operations or information disclosure.
CVE-2017-10350 Vulnerability in c (CVE-2017-10350)
vulnerability in c (CVE-2017-10350). Risk of unauthorized operations or information disclosure.
CVE-2017-10355 Vulnerability in c (CVE-2017-10355)
vulnerability in c (CVE-2017-10355). Risk of unauthorized operations or information disclosure.
CVE-2017-10357 Vulnerability in c (CVE-2017-10357)
vulnerability in c (CVE-2017-10357). Risk of unauthorized operations or information disclosure.
CVE-2017-10345 Vulnerability in c (CVE-2017-10345)
vulnerability in c (CVE-2017-10345). Risk of unauthorized operations or information disclosure.
CVE-2017-10309 Vulnerability in c (CVE-2017-10309)
vulnerability in c (CVE-2017-10309). Risk of unauthorized operations or information disclosure.
CVE-2017-10295 Vulnerability in c (CVE-2017-10295)
vulnerability in c (CVE-2017-10295). Risk of unauthorized operations or information disclosure.
CVE-2017-10293 Vulnerability in c (CVE-2017-10293)
vulnerability in c (CVE-2017-10293). Risk of unauthorized operations or information disclosure.
CVE-2017-10285 Vulnerability in c (CVE-2017-10285)
vulnerability in c (CVE-2017-10285). Successful exploitation can lead to full system takeover.
CVE-2017-10281 Vulnerability in c (CVE-2017-10281)
vulnerability in c (CVE-2017-10281). Risk of unauthorized operations or information disclosure.
CVE-2017-10274 Vulnerability in c (CVE-2017-10274)
vulnerability in c (CVE-2017-10274). Confidential information can be exposed externally.
CVE-2017-10243 Vulnerability in c (CVE-2017-10243)
vulnerability in c (CVE-2017-10243). Risk of unauthorized operations or information disclosure.
CVE-2017-10198 Vulnerability in c (CVE-2017-10198)
vulnerability in c (CVE-2017-10198). Confidential information can be exposed externally.
CVE-2017-10176 Vulnerability in c (CVE-2017-10176)
vulnerability in c (CVE-2017-10176). Confidential information can be exposed externally.
CVE-2017-10193 Vulnerability in c (CVE-2017-10193)
vulnerability in c (CVE-2017-10193). Risk of unauthorized operations or information disclosure.
CVE-2017-10135 Vulnerability in c (CVE-2017-10135)
vulnerability in c (CVE-2017-10135). Confidential information can be exposed externally.
CVE-2017-10125 Vulnerability in c (CVE-2017-10125)
vulnerability in c (CVE-2017-10125). Successful exploitation can lead to full system takeover.
CVE-2017-10111 Vulnerability in c (CVE-2017-10111)
vulnerability in c (CVE-2017-10111). Successful exploitation can lead to full system takeover.
CVE-2017-10096 Vulnerability in c (CVE-2017-10096)
vulnerability in c (CVE-2017-10096). Successful exploitation can lead to full system takeover.
CVE-2017-10101 Vulnerability in c (CVE-2017-10101)
vulnerability in c (CVE-2017-10101). Successful exploitation can lead to full system takeover.
CVE-2017-10102 Vulnerability in c (CVE-2017-10102)
vulnerability in c (CVE-2017-10102). Successful exploitation can lead to full system takeover.
CVE-2017-10105 Vulnerability in c (CVE-2017-10105)
vulnerability in c (CVE-2017-10105). Risk of unauthorized operations or information disclosure.
CVE-2017-10107 Vulnerability in c (CVE-2017-10107)
vulnerability in c (CVE-2017-10107). Successful exploitation can lead to full system takeover.
CVE-2017-10108 Vulnerability in c (CVE-2017-10108)
vulnerability in c (CVE-2017-10108). Risk of unauthorized operations or information disclosure.
CVE-2017-10109 Vulnerability in c (CVE-2017-10109)
vulnerability in c (CVE-2017-10109). Risk of unauthorized operations or information disclosure.
CVE-2017-10110 Vulnerability in c (CVE-2017-10110)
vulnerability in c (CVE-2017-10110). Successful exploitation can lead to full system takeover.
CVE-2017-10114 Vulnerability in c (CVE-2017-10114)
vulnerability in c (CVE-2017-10114). Successful exploitation can lead to full system takeover.
CVE-2017-10115 Vulnerability in c (CVE-2017-10115)
vulnerability in c (CVE-2017-10115). Confidential information can be exposed externally.
CVE-2017-10116 Vulnerability in c (CVE-2017-10116)
vulnerability in c (CVE-2017-10116). Successful exploitation can lead to full system takeover.
CVE-2017-10118 Vulnerability in c (CVE-2017-10118)
vulnerability in c (CVE-2017-10118). Confidential information can be exposed externally.
CVE-2017-10089 Vulnerability in c (CVE-2017-10089)
vulnerability in c (CVE-2017-10089). Successful exploitation can lead to full system takeover.
CVE-2017-10090 Vulnerability in c (CVE-2017-10090)
vulnerability in c (CVE-2017-10090). Successful exploitation can lead to full system takeover.
CVE-2017-10087 Vulnerability in c (CVE-2017-10087)
vulnerability in c (CVE-2017-10087). Successful exploitation can lead to full system takeover.
CVE-2017-10086 Vulnerability in c (CVE-2017-10086)
vulnerability in c (CVE-2017-10086). Successful exploitation can lead to full system takeover.
CVE-2017-10081 Vulnerability in c (CVE-2017-10081)
vulnerability in c (CVE-2017-10081). Risk of unauthorized operations or information disclosure.
CVE-2017-10078 Vulnerability in c (CVE-2017-10078)
vulnerability in c (CVE-2017-10078). Confidential information can be exposed externally.

🍪 About cookies

We use cookies to keep you logged in, remember your language, and improve the service.

Details →