org.graalvm.sdk:graal-sdk vulnerabilities

  • latest version

    25.0.1

  • latest non vulnerable version

  • first published

    7 years ago

  • latest version published

    12 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.graalvm.sdk:graal-sdk package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    XML External Entity (XXE) Injection

    [,17.0.17)[21.0.0,21.0.9)
    • H
    Improper Verification of Cryptographic Signature

    [,17.0.17)[21.0.0,21.0.9)
    • M
    Improper Input Validation

    [,21.0.9)
    • H
    Access Control Bypass

    [,17.0.16)[18.0.0,21.0.8)[22.0.0,24.0.2)
    • C
    Deserialization of Untrusted Data

    [,17.0.16)[18.0.0,21.0.8)[22.0.0,24.0.2)
    • C
    Deserialization of Untrusted Data

    [,17.0.16)[18.0.0,21.0.8)[22.0.0,24.0.2)
    • M
    Access Control Bypass

    [,17.0.16)[18.0.0,21.0.8)[22.0.0,24.0.2)
    • M
    Buffer Overflow

    [,17.0.15)[18.0.0,21.0.7)[22.0.0,24.0.1)
    • M
    Heap-based Buffer Overflow

    [,17.0.15)[18.0.0,21.0.7)[22.0.0,24.0.1)
    • C
    Timing Attack

    [,17.0.15)[18.0.0,21.0.7)[22.0.0,24.0.1)
    • M
    Signed to Unsigned Conversion Error

    [,20.3.17)[21.0.0,21.3.13)
    • M
    Access Control Bypass

    [,20.3.16)[21.0.0,21.3.12)
    • M
    Denial of Service (DoS)

    [,20.3.16)[21.0.0,21.3.12)
    • M
    Denial of Service (DoS)

    [,20.3.16)[21.0.0,21.3.12)
    • M
    Information Exposure

    [,20.3.16)[21.0.0,21.3.12)
    • C
    Improper Access Control

    [17.0.0,17.0.12)[21.0.0,21.0.4)[22.0.0,22.0.2)
    • M
    Improper Access Control

    [20.0.0,20.3.15)[21.0.0,21.3.11)
    • M
    Resource Exhaustion

    [,20.3.15)[21.0.0,21.3.11)
    • M
    Improper Access Control

    [17.0.11,17.0.12)[21.0.3,21.0.4)[22.0.1,22.0.2)
    • M
    Buffer Overflow

    [17.0.11,17.0.12)[21.0.3,21.0.4)[22.0.1,22.0.2)
    • M
    Loop with Unreachable Exit Condition ('Infinite Loop')

    [17.0.11,17.0.12)[21.0.3,21.0.4)[22.0.1,22.0.2)
    • L
    Improper Access Control

    [,21.3.10)[22.0.0,22.0.1)
    • L
    Denial of Service (DoS)

    [17.0.10,17.0.11)[21.0.2,21.0.3)[22.0.0,22.0.1)
    • L
    Denial of Service (DoS)

    [,21.3.10)[22.0.0,22.0.1)
    • L
    Improper Access Control

    [17.0.10,17.0.11)[21.0.2,21.0.3)[22.0.0,22.0.1)
    • L
    Information Exposure

    [17.0.0,17.0.11)[21.0.0,21.0.3)[22.0.0,22.0.1)
    • L
    Improper Access Control

    [20.3.13,20.3.14)[21.3.9,21.3.10)
    • L
    Access Control Bypass

    [,20.3.13)[21.0.0,21.3.9)
    • L
    Information Exposure

    [,20.3.13)[21.0.0,21.3.9)
    • M
    Improper Input Validation

    [,20.3.13)[21.0.0,21.3.9)[22.0.0,23.0.0)
    • H
    Improper Privilege Management

    [,20.3.13)[21.0.0,21.3.9)[22.0.0,22.3.5)
    • M
    Insertion of Sensitive Information into Log File

    [,20.3.13)[21.0.0,21.3.9)[22.0.0,23.0.0)
    • M
    Improper Input Validation

    [,20.3.13)[21.0.0,21.3.9)[22.0.0,23.0.0)
    • M
    Information Exposure

    [,20.3.13)[21.0.0,21.3.9)[22.0.0,22.3.5)
    • H
    Improper Privilege Management

    [,21.3.9)[22.0.0,22.3.5)
    • H
    Covert Timing Channel

    [,20.3.13)[21.0.0,21.3.9)[22.0.0,23.0.0)
    • L
    Improper Privilege Management

    [,20.3.13)[21.0.0,21.3.9)
    • L
    Buffer Overflow

    [21.0.0,21.0.1)
    • M
    Denial of Service (DoS)

    [17.0.0,21.1.0)
    • L
    Denial of Service (DoS)

    [20.0.0,20.3.11)[21.0.0,21.3.7)[22.0.0,22.3.3)
    • L
    Information Exposure

    [20.0.0,20.3.11)[21.0.0,21.3.7)[22.0.0,22.3.3)
    • L
    Information Exposure

    [21.0.0,21.3.7)[22.0.0,22.3.3)
    • M
    Improper Access Control

    [20.0.0,20.3.11)[21.0.0,21.3.7)[22.0.0,22.3.3)
    • L
    Access Restriction Bypass

    [20.0.0,20.3.11)[21.0.0,21.3.7)[22.0.0,22.3.3)
    • L
    Access Restriction Bypass

    [20.0.0,20.3.11)[21.0.0,21.3.7)[22.0.0,22.3.3)
    • L
    Improper Neutralization of Null Byte or NUL Character

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • M
    Improper Input Validation

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • L
    Improper Input Validation

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • M
    Denial of Service (DoS)

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • L
    Remote Code Execution (RCE)

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • H
    Information Exposure

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • M
    Information Exposure

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • L
    User Impersonation

    [20.3.7,20.3.7.1)[21.3.3,21.3.3.1)[22.2.0,22.2.0.1)
    • M
    Allocation of Resources Without Limits or Throttling

    [20.3.7,20.3.7.1)[21.3.3,21.3.3.1)[22.2.0,22.2.0.1)
    • M
    Denial of Service (DoS)

    [20.3.7,20.3.7.1)[21.3.3,21.3.3.1)[22.2.0,22.2.0.1)
    • L
    Insecure Randomness

    [20.3.7,20.3.7.1)[21.3.3,21.3.3.1)[22.2.0,22.2.0.1)
    • M
    Remote Code Execution (RCE)

    [21.3.3,21.3.3.1)[22.2.0,22.2.0.1)
    • L
    Remote Code Execution (RCE)

    [20.3.7,20.3.7.1)[21.3.3,21.3.3.1)[22.2.0,22.2.0.1)
    • M
    Unsafe Reflection

    [,20.3.6)[21.3.0,21.3.2)[22.0.0.2,22.1.0)
    • M
    Denial of Service (DoS)

    [,20.3.6)[21.3.0,21.3.2)[22.0.0.2,22.1.0)
    • L
    Denial of Service (DoS)

    [,20.3.6)[21.3.0,21.3.2)[22.0.0.2,22.1.0)
    • H
    Information Exposure

    [,20.3.6)[21.3.0,21.3.2)[22.0.0.2,22.1.0)
    • M
    Improper Input Validation

    [,20.3.6)[21.3.0,21.3.2)[22.0.0.2,22.1.0)
    • H
    Access Restriction Bypass

    [,20.3.6)[21.3.0,21.3.2)[22.0.0.2,22.1.0)
    • M
    Out-of-bounds Write

    [,20.3.5)[21.0.0,21.3.1)
    • L
    Deserialization of Untrusted Data

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Information Exposure

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Allocation of Resources Without Limits or Throttling

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Allocation of Resources Without Limits or Throttling

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Infinite loop

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Information Exposure

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Integer Overflow or Wraparound

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Improper Input Validation

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Improper Input Validation

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Uncaught Exception

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Allocation of Resources Without Limits or Throttling

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Integer Overflow or Wraparound

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Allocation of Resources Without Limits or Throttling

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Allocation of Resources Without Limits or Throttling

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Access Restriction Bypass

    [,20.3.4)[21.0.0,21.3.0)
    • L
    Timing Attack

    [,20.3.4)[21.0.0,21.3.0)
    • M
    Improper Access Control

    [,20.3.4)[21.0.0,21.3.0)

    Package versions

    115 VERSIONS IN TOTAL See all versions
    versionpublisheddirect vulnerabilities
    25.0.121 Oct, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    25.0.016 Sep, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    24.2.213 Jul, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    24.2.115 Apr, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    24.2.018 Mar, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    24.1.220 Jan, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    24.1.115 Oct, 2024
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    24.1.016 Sep, 2024
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    24.0.28 Jul, 2024
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    24.0.116 Apr, 2024
    • 2
      C
    • 1
      H
    • 1
      M
    • 0
      L