java-25-openjdk-demo

Direct Vulnerabilities

Known vulnerabilities in the java-25-openjdk-demo package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:25.0.3.0.9-1.el9
  • H
Out-of-bounds Write

*
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:25.0.3.0.9-1.el9
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:25.0.3.0.9-1.el9
  • H
Buffer Underflow

<1:25.0.3.0.9-1.el9
  • H
Expired Pointer Dereference

<1:25.0.3.0.9-1.el9
  • H
Out-of-bounds Write

<1:25.0.3.0.9-1.el9
  • H
CVE-2026-23865

<1:25.0.3.0.9-1.el9
  • H
Uncontrolled Recursion

<1:25.0.3.0.9-1.el9
  • H
Out-of-bounds Read

<1:25.0.3.0.9-1.el9
  • H
XML External Entity (XXE) Injection

<1:25.0.3.0.9-1.el9
  • H
Cleartext Transmission of Sensitive Information

<1:25.0.3.0.9-1.el9
  • H
Heap-based Buffer Overflow

<1:25.0.3.0.9-1.el9
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:25.0.3.0.9-1.el9
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:25.0.3.0.9-1.el9
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:25.0.3.0.9-1.el9
  • H
Buffer Underflow

<1:25.0.3.0.9-1.el9
  • H
Expired Pointer Dereference

<1:25.0.3.0.9-1.el9
  • H
Out-of-bounds Write

<1:25.0.3.0.9-1.el9
  • H
CVE-2026-23865

<1:25.0.3.0.9-1.el9
  • H
Uncontrolled Recursion

<1:25.0.3.0.9-1.el9
  • H
Out-of-bounds Read

<1:25.0.3.0.9-1.el9
  • H
XML External Entity (XXE) Injection

<1:25.0.3.0.9-1.el9
  • H
Cleartext Transmission of Sensitive Information

<1:25.0.3.0.9-1.el9
  • H
Heap-based Buffer Overflow

<1:25.0.3.0.9-1.el9
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:25.0.3.0.9-1.el9
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:25.0.3.0.9-1.el9
  • H
Cleartext Transmission of Sensitive Information

<1:25.0.3.0.9-1.el9
  • H
Heap-based Buffer Overflow

<1:25.0.3.0.9-1.el9
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:25.0.3.0.9-1.el9
  • H
Uncontrolled Recursion

<1:25.0.3.0.9-1.el9
  • H
Out-of-bounds Read

<1:25.0.3.0.9-1.el9
  • H
XML External Entity (XXE) Injection

<1:25.0.3.0.9-1.el9
  • M
Integer Overflow or Wraparound

*
  • M
Expired Pointer Dereference

*
  • H
Expired Pointer Dereference

<1:25.0.3.0.9-1.el9
  • H
Buffer Underflow

<1:25.0.3.0.9-1.el9
  • H
Out-of-bounds Write

<1:25.0.3.0.9-1.el9
  • M
Incorrect Calculation of Buffer Size

*
  • H
Out-of-bounds Read

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
CVE-2026-23865

<1:25.0.3.0.9-1.el9
  • M
Buffer Overflow

*
  • H
Improper Certificate Validation

<1:25.0.2.0.10-1.el9
  • H
CRLF Injection

<1:25.0.2.0.10-1.el9
  • H
Key Exchange without Entity Authentication

<1:25.0.2.0.10-1.el9
  • H
Out-of-bounds Write

<1:25.0.2.0.10-1.el9
  • H
Out-of-bounds Read

<1:25.0.2.0.10-1.el9
  • H
Improper Certificate Validation

<1:25.0.2.0.10-1.el9
  • H
CRLF Injection

<1:25.0.2.0.10-1.el9
  • H
Key Exchange without Entity Authentication

<1:25.0.2.0.10-1.el9
  • H
Out-of-bounds Write

<1:25.0.2.0.10-1.el9
  • H
Out-of-bounds Read

<1:25.0.2.0.10-1.el9
  • H
Improper Certificate Validation

<1:25.0.2.0.10-1.el9
  • H
Out-of-bounds Read

<1:25.0.2.0.10-1.el9
  • H
Out-of-bounds Write

<1:25.0.2.0.10-1.el9
  • H
CRLF Injection

<1:25.0.2.0.10-1.el9
  • H
Key Exchange without Entity Authentication

<1:25.0.2.0.10-1.el9
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • H
Buffer Overflow

*