java-25-amazon-corretto-devel

Direct Vulnerabilities

Known vulnerabilities in the java-25-amazon-corretto-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:25.0.3+9-1.amzn2023.1
  • H
Cleartext Transmission of Sensitive Information

<1:25.0.3+9-1.amzn2023.1
  • H
Heap-based Buffer Overflow

<1:25.0.3+9-1.amzn2023.1
  • H
Out-of-bounds Read

<1:25.0.3+9-1.amzn2023.1
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:25.0.3+9-1.amzn2023.1
  • H
Uncontrolled Recursion

<1:25.0.3+9-1.amzn2023.1
  • H
XML External Entity (XXE) Injection

<1:25.0.3+9-1.amzn2023.1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:25.0.3+9-1.amzn2023.1
  • H
Key Exchange without Entity Authentication

<1:25.0.2+10-1.amzn2023.1
  • H
CRLF Injection

<1:25.0.2+10-1.amzn2023.1
  • H
Improper Certificate Validation

<1:25.0.2+10-1.amzn2023.1
  • H
Improper Validation of Specified Type of Input

<1:25.0.2+10-1.amzn2023.1
  • M
Inappropriate Encoding for Output Context

<1:25.0.1+8-1.amzn2023.1
  • M
Object Model Violation: Just One of Equals and Hashcode Defined

<1:25.0.1+8-1.amzn2023.1
  • M
CVE-2025-53066

<1:25.0.1+8-1.amzn2023.1