Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2026-21947 |
|
Cross-Site Scripting (XSS) in java (CVE-2026-21947)
cross-site scripting in java (CVE-2026-21947). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.481` or later.
|
| CVE-2026-21945 |
|
Vulnerability in java (CVE-2026-21945)
vulnerability in java (CVE-2026-21945). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.481, 11.0.30, 17.0.18, 21.0.10, 25.0.2` or later.
|
| CVE-2026-21933 |
|
Vulnerability in java (CVE-2026-21933)
vulnerability in java (CVE-2026-21933). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.481, 11.0.30, 17.0.18, 21.0.10, 25.0.2` or later.
|
| CVE-2026-21932 |
|
Vulnerability in java (CVE-2026-21932)
vulnerability in java (CVE-2026-21932). Data can be tampered with by attackers. Mitigation: upgrade to `1.8.0, 8.0.481, 11.0.30, 17.0.18, 21.0.10, 25.0.2` or later.
|
| CVE-2026-21925 |
|
Vulnerability in java (CVE-2026-21925)
vulnerability in java (CVE-2026-21925). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.481, 11.0.30, 17.0.18, 21.0.10, 25.0.2` or later.
|
| CVE-2025-61748 |
|
Vulnerability in java (CVE-2025-61748)
vulnerability in java (CVE-2025-61748). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `21.0.9, 25.0.1` or later.
|
| CVE-2025-53066 |
|
Information Disclosure in java (CVE-2025-53066)
vulnerability in java (CVE-2025-53066). Confidential information can be exposed externally. Mitigation: upgrade to `1.8.0, 8.0.471, 11.0.29, 17.0.17, 21.0.9, 25.0.1` or later.
|
| CVE-2025-53057 |
|
Vulnerability in java (CVE-2025-53057)
vulnerability in java (CVE-2025-53057). Data can be tampered with by attackers. Mitigation: upgrade to `1.8.0, 8.0.471, 11.0.29, 17.0.17, 21.0.9, 25.0.1` or later.
|
| CVE-2013-4578 |
|
Vulnerability in oracle (CVE-2013-4578)
vulnerability in oracle (CVE-2013-4578). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-10388 |
|
Vulnerability in c (CVE-2017-10388)
vulnerability in c (CVE-2017-10388). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10356 |
|
Vulnerability in c (CVE-2017-10356)
vulnerability in c (CVE-2017-10356). Confidential information can be exposed externally.
|
| CVE-2017-10346 |
|
Vulnerability in c (CVE-2017-10346)
vulnerability in c (CVE-2017-10346). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10347 |
|
Vulnerability in c (CVE-2017-10347)
vulnerability in c (CVE-2017-10347). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-10348 |
|
Vulnerability in c (CVE-2017-10348)
vulnerability in c (CVE-2017-10348). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-10349 |
|
Vulnerability in c (CVE-2017-10349)
vulnerability in c (CVE-2017-10349). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-10350 |
|
Vulnerability in c (CVE-2017-10350)
vulnerability in c (CVE-2017-10350). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-10355 |
|
Vulnerability in c (CVE-2017-10355)
vulnerability in c (CVE-2017-10355). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-10357 |
|
Vulnerability in c (CVE-2017-10357)
vulnerability in c (CVE-2017-10357). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-10345 |
|
Vulnerability in c (CVE-2017-10345)
vulnerability in c (CVE-2017-10345). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-10309 |
|
Vulnerability in c (CVE-2017-10309)
vulnerability in c (CVE-2017-10309). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-10295 |
|
Vulnerability in c (CVE-2017-10295)
vulnerability in c (CVE-2017-10295). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-10293 |
|
Vulnerability in c (CVE-2017-10293)
vulnerability in c (CVE-2017-10293). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-10285 |
|
Vulnerability in c (CVE-2017-10285)
vulnerability in c (CVE-2017-10285). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10281 |
|
Vulnerability in c (CVE-2017-10281)
vulnerability in c (CVE-2017-10281). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-10274 |
|
Vulnerability in c (CVE-2017-10274)
vulnerability in c (CVE-2017-10274). Confidential information can be exposed externally.
|
| CVE-2017-10243 |
|
Vulnerability in c (CVE-2017-10243)
vulnerability in c (CVE-2017-10243). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-10198 |
|
Vulnerability in c (CVE-2017-10198)
vulnerability in c (CVE-2017-10198). Confidential information can be exposed externally.
|
| CVE-2017-10176 |
|
Vulnerability in c (CVE-2017-10176)
vulnerability in c (CVE-2017-10176). Confidential information can be exposed externally.
|
| CVE-2017-10193 |
|
Vulnerability in c (CVE-2017-10193)
vulnerability in c (CVE-2017-10193). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-10135 |
|
Vulnerability in c (CVE-2017-10135)
vulnerability in c (CVE-2017-10135). Confidential information can be exposed externally.
|
| CVE-2017-10125 |
|
Vulnerability in c (CVE-2017-10125)
vulnerability in c (CVE-2017-10125). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10111 |
|
Vulnerability in c (CVE-2017-10111)
vulnerability in c (CVE-2017-10111). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10096 |
|
Vulnerability in c (CVE-2017-10096)
vulnerability in c (CVE-2017-10096). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10101 |
|
Vulnerability in c (CVE-2017-10101)
vulnerability in c (CVE-2017-10101). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10102 |
|
Vulnerability in c (CVE-2017-10102)
vulnerability in c (CVE-2017-10102). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10105 |
|
Vulnerability in c (CVE-2017-10105)
vulnerability in c (CVE-2017-10105). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-10107 |
|
Vulnerability in c (CVE-2017-10107)
vulnerability in c (CVE-2017-10107). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10108 |
|
Vulnerability in c (CVE-2017-10108)
vulnerability in c (CVE-2017-10108). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-10109 |
|
Vulnerability in c (CVE-2017-10109)
vulnerability in c (CVE-2017-10109). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-10110 |
|
Vulnerability in c (CVE-2017-10110)
vulnerability in c (CVE-2017-10110). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10114 |
|
Vulnerability in c (CVE-2017-10114)
vulnerability in c (CVE-2017-10114). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10115 |
|
Vulnerability in c (CVE-2017-10115)
vulnerability in c (CVE-2017-10115). Confidential information can be exposed externally.
|
| CVE-2017-10116 |
|
Vulnerability in c (CVE-2017-10116)
vulnerability in c (CVE-2017-10116). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10118 |
|
Vulnerability in c (CVE-2017-10118)
vulnerability in c (CVE-2017-10118). Confidential information can be exposed externally.
|
| CVE-2017-10089 |
|
Vulnerability in c (CVE-2017-10089)
vulnerability in c (CVE-2017-10089). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10090 |
|
Vulnerability in c (CVE-2017-10090)
vulnerability in c (CVE-2017-10090). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10087 |
|
Vulnerability in c (CVE-2017-10087)
vulnerability in c (CVE-2017-10087). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10086 |
|
Vulnerability in c (CVE-2017-10086)
vulnerability in c (CVE-2017-10086). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10081 |
|
Vulnerability in c (CVE-2017-10081)
vulnerability in c (CVE-2017-10081). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-10078 |
|
Vulnerability in c (CVE-2017-10078)
vulnerability in c (CVE-2017-10078). Confidential information can be exposed externally.
|