java-21-amazon-corretto-devel

Direct Vulnerabilities

Known vulnerabilities in the java-21-amazon-corretto-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:21.0.11+10-1.amzn2023.1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:21.0.11+10-1.amzn2023.1
  • H
Uncontrolled Recursion

<1:21.0.11+10-1.amzn2023.1
  • H
Cleartext Transmission of Sensitive Information

<1:21.0.11+10-1.amzn2023.1
  • H
Out-of-bounds Read

<1:21.0.11+10-1.amzn2023.1
  • H
XML External Entity (XXE) Injection

<1:21.0.11+10-1.amzn2023.1
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:21.0.11+10-1.amzn2023.1
  • H
Key Exchange without Entity Authentication

<1:21.0.10+7-1.amzn2023.1
  • H
CRLF Injection

<1:21.0.10+7-1.amzn2023.1
  • H
Improper Certificate Validation

<1:21.0.10+7-1.amzn2023.1
  • H
Improper Validation of Specified Type of Input

<1:21.0.10+7-1.amzn2023.1
  • M
Object Model Violation: Just One of Equals and Hashcode Defined

<1:21.0.9+10-1.amzn2023.1
  • M
CVE-2025-53066

<1:21.0.9+10-1.amzn2023.1
  • M
Inappropriate Encoding for Output Context

<1:21.0.9+10-1.amzn2023.1
  • H
Heap-based Buffer Overflow

<1:21.0.8+9-1.amzn2023.1
  • H
Missing Required Cryptographic Step

<1:21.0.8+9-1.amzn2023.1
  • H
Information Exposure

<1:21.0.8+9-1.amzn2023.1
  • H
Heap-based Buffer Overflow

<1:21.0.8+9-1.amzn2023.1
  • H
Information Exposure

<1:21.0.7+6-1.amzn2023.1
  • H
Buffer Overflow

<1:21.0.7+6-1.amzn2023.1
  • H
Heap-based Buffer Overflow

<1:21.0.7+6-1.amzn2023.1
  • M
Signed to Unsigned Conversion Error

<1:21.0.6+7-1.amzn2023.1
  • M
Signed to Unsigned Conversion Error

<1:21.0.5+11-1.amzn2023.1
  • M
Integer Overflow or Wraparound

<1:21.0.5+11-1.amzn2023.1
  • M
Improper Handling of Length Parameter Inconsistency

<1:21.0.5+11-1.amzn2023.1
  • M
Uncontrolled Memory Allocation

<1:21.0.5+11-1.amzn2023.1
  • H
CVE-2024-21140

<1:21.0.4+7-1.amzn2023.1
  • H
Out-of-bounds Write

<1:21.0.4+7-1.amzn2023.1
  • H
CVE-2024-21131

<1:21.0.4+7-1.amzn2023.1
  • H
CVE-2024-21147

<1:21.0.4+7-1.amzn2023.1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:21.0.4+7-1.amzn2023.1
  • L
Reliance on Reverse DNS Resolution for a Security-Critical Action

<1:21.0.3+9-1.amzn2023.1
  • L
Improper Output Neutralization for Logs

<1:21.0.3+9-1.amzn2023.1
  • L
Out-of-bounds Write

<1:21.0.3+9-1.amzn2023.1
  • L
Integer Overflow or Wraparound

<1:21.0.3+9-1.amzn2023.1
  • H
Information Exposure Through Log Files

<1:21.0.2+13-1.amzn2023.1
  • H
Covert Timing Channel

<1:21.0.2+13-1.amzn2023.1
  • H
Improper Input Validation

<1:21.0.2+13-1.amzn2023.1
  • H
Improper Input Validation

<1:21.0.2+13-1.amzn2023.1
  • H
CVE-2024-20922

<1:21.0.2+13-1.amzn2023.1
  • H
CVE-2024-20925

<1:21.0.2+13-1.amzn2023.1
  • H
CVE-2024-20923

<1:21.0.2+13-1.amzn2023.1
  • H
Out-of-bounds Write

<1:21.0.2+13-1.amzn2023.1
  • M
Out-of-Bounds

<1:21.0.1+12-1.amzn2023.1
  • M
Improper Certificate Validation

<1:21.0.1+12-1.amzn2023.1