Vulnerabilities

Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.

Filtering: Tag: jdk Clear
ID Title
CVE-2017-10074 Vulnerability in c (CVE-2017-10074)
vulnerability in c (CVE-2017-10074). Successful exploitation can lead to full system takeover.
CVE-2017-10067 Vulnerability in c (CVE-2017-10067)
vulnerability in c (CVE-2017-10067). Successful exploitation can lead to full system takeover.
CVE-2017-10053 Vulnerability in c (CVE-2017-10053)
vulnerability in c (CVE-2017-10053). Risk of unauthorized operations or information disclosure.
CVE-2016-9843 Vulnerability in c (CVE-2016-9843)
vulnerability in c (CVE-2016-9843). Successful exploitation can lead to full system takeover.
CVE-2016-9840 Vulnerability in c (CVE-2016-9840)
vulnerability in c (CVE-2016-9840). Successful exploitation can lead to full system takeover.
CVE-2016-9841 Vulnerability in c (CVE-2016-9841)
vulnerability in c (CVE-2016-9841). Successful exploitation can lead to full system takeover.
CVE-2016-9842 Vulnerability in c (CVE-2016-9842)
vulnerability in c (CVE-2016-9842). Successful exploitation can lead to full system takeover.
CVE-2017-3544 Vulnerability in c (CVE-2017-3544)
vulnerability in c (CVE-2017-3544). Risk of unauthorized operations or information disclosure.
CVE-2017-3539 Vulnerability in c (CVE-2017-3539)
vulnerability in c (CVE-2017-3539). Risk of unauthorized operations or information disclosure.
CVE-2017-3526 Vulnerability in c (CVE-2017-3526)
vulnerability in c (CVE-2017-3526). Risk of unauthorized operations or information disclosure.
CVE-2017-3509 Vulnerability in c (CVE-2017-3509)
vulnerability in c (CVE-2017-3509). Risk of unauthorized operations or information disclosure.
CVE-2017-3511 Vulnerability in c (CVE-2017-3511)
vulnerability in c (CVE-2017-3511). Successful exploitation can lead to full system takeover.
CVE-2017-3512 Vulnerability in c (CVE-2017-3512)
vulnerability in c (CVE-2017-3512). Successful exploitation can lead to full system takeover.
CVE-2017-3514 Vulnerability in c (CVE-2017-3514)
vulnerability in c (CVE-2017-3514). Successful exploitation can lead to full system takeover.
CVE-2017-3533 Vulnerability in c (CVE-2017-3533)
vulnerability in c (CVE-2017-3533). Risk of unauthorized operations or information disclosure.
CVE-2017-3289 Vulnerability in oracle (CVE-2017-3289)
vulnerability in oracle (CVE-2017-3289). Successful exploitation can lead to full system takeover.
CVE-2017-3272 Vulnerability in oracle (CVE-2017-3272)
vulnerability in oracle (CVE-2017-3272). Successful exploitation can lead to full system takeover.
CVE-2017-3262 Vulnerability in oracle (CVE-2017-3262)
vulnerability in oracle (CVE-2017-3262). Risk of unauthorized operations or information disclosure.
CVE-2017-3261 Vulnerability in oracle (CVE-2017-3261)
vulnerability in oracle (CVE-2017-3261). Risk of unauthorized operations or information disclosure.
CVE-2017-3260 Vulnerability in oracle (CVE-2017-3260)
vulnerability in oracle (CVE-2017-3260). Successful exploitation can lead to full system takeover.
CVE-2017-3259 Vulnerability in oracle (CVE-2017-3259)
vulnerability in oracle (CVE-2017-3259). Risk of unauthorized operations or information disclosure.
CVE-2017-3253 Vulnerability in dos (CVE-2017-3253)
vulnerability in dos (CVE-2017-3253). Risk of unauthorized operations or information disclosure.
CVE-2017-3252 Vulnerability in oracle (CVE-2017-3252)
vulnerability in oracle (CVE-2017-3252). Data can be tampered with by attackers.
CVE-2017-3241 Vulnerability in oracle (CVE-2017-3241)
vulnerability in oracle (CVE-2017-3241). Successful exploitation can lead to full system takeover.
CVE-2017-3231 Information Disclosure in oracle (CVE-2017-3231)
vulnerability in oracle (CVE-2017-3231). Risk of unauthorized operations or information disclosure.
CVE-2016-8328 Vulnerability in oracle (CVE-2016-8328)
vulnerability in oracle (CVE-2016-8328). Risk of unauthorized operations or information disclosure.
CVE-2016-5547 Vulnerability in dos (CVE-2016-5547)
vulnerability in dos (CVE-2016-5547). Risk of unauthorized operations or information disclosure.
CVE-2016-5546 Vulnerability in oracle (CVE-2016-5546)
vulnerability in oracle (CVE-2016-5546). Data can be tampered with by attackers.
CVE-2016-5552 Vulnerability in oracle (CVE-2016-5552)
vulnerability in oracle (CVE-2016-5552). Risk of unauthorized operations or information disclosure.
CVE-2016-5549 Vulnerability in oracle (CVE-2016-5549)
vulnerability in oracle (CVE-2016-5549). Confidential information can be exposed externally.
CVE-2016-5548 Vulnerability in oracle (CVE-2016-5548)
vulnerability in oracle (CVE-2016-5548). Confidential information can be exposed externally.

🍪 About cookies

We use cookies to keep you logged in, remember your language, and improve the service.

Details →