org.graalvm.sdk:graal-sdk vulnerabilities

  • latest version

    25.0.0

  • latest non vulnerable version

  • first published

    6 years ago

  • latest version published

    27 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.graalvm.sdk:graal-sdk package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Access Control Bypass

    [,17.0.16)[18.0.0,21.0.8)[22.0.0,24.0.2)
    • C
    Deserialization of Untrusted Data

    [,17.0.16)[18.0.0,21.0.8)[22.0.0,24.0.2)
    • C
    Deserialization of Untrusted Data

    [,17.0.16)[18.0.0,21.0.8)[22.0.0,24.0.2)
    • M
    Access Control Bypass

    [,17.0.16)[18.0.0,21.0.8)[22.0.0,24.0.2)
    • M
    Buffer Overflow

    [,17.0.15)[18.0.0,21.0.7)[22.0.0,24.0.1)
    • M
    Heap-based Buffer Overflow

    [,17.0.15)[18.0.0,21.0.7)[22.0.0,24.0.1)
    • C
    Timing Attack

    [,17.0.15)[18.0.0,21.0.7)[22.0.0,24.0.1)
    • M
    Signed to Unsigned Conversion Error

    [,20.3.17)[21.0.0,21.3.13)
    • M
    Access Control Bypass

    [,20.3.16)[21.0.0,21.3.12)
    • M
    Denial of Service (DoS)

    [,20.3.16)[21.0.0,21.3.12)
    • M
    Denial of Service (DoS)

    [,20.3.16)[21.0.0,21.3.12)
    • M
    Information Exposure

    [,20.3.16)[21.0.0,21.3.12)
    • C
    Improper Access Control

    [17.0.0,17.0.12)[21.0.0,21.0.4)[22.0.0,22.0.2)
    • M
    Improper Access Control

    [20.0.0,20.3.15)[21.0.0,21.3.11)
    • M
    Resource Exhaustion

    [,20.3.15)[21.0.0,21.3.11)
    • M
    Improper Access Control

    [17.0.11,17.0.12)[21.0.3,21.0.4)[22.0.1,22.0.2)
    • M
    Buffer Overflow

    [17.0.11,17.0.12)[21.0.3,21.0.4)[22.0.1,22.0.2)
    • M
    Loop with Unreachable Exit Condition ('Infinite Loop')

    [17.0.11,17.0.12)[21.0.3,21.0.4)[22.0.1,22.0.2)
    • L
    Improper Access Control

    [,21.3.10)[22.0.0,22.0.1)
    • L
    Denial of Service (DoS)

    [17.0.10,17.0.11)[21.0.2,21.0.3)[22.0.0,22.0.1)
    • L
    Denial of Service (DoS)

    [,21.3.10)[22.0.0,22.0.1)
    • L
    Improper Access Control

    [17.0.10,17.0.11)[21.0.2,21.0.3)[22.0.0,22.0.1)
    • L
    Information Exposure

    [17.0.0,17.0.11)[21.0.0,21.0.3)[22.0.0,22.0.1)
    • L
    Improper Access Control

    [20.3.13,20.3.14)[21.3.9,21.3.10)
    • L
    Access Control Bypass

    [,20.3.13)[21.0.0,21.3.9)
    • L
    Information Exposure

    [,20.3.13)[21.0.0,21.3.9)
    • M
    Improper Input Validation

    [,20.3.13)[21.0.0,21.3.9)[22.0.0,23.0.0)
    • H
    Improper Privilege Management

    [,20.3.13)[21.0.0,21.3.9)[22.0.0,22.3.5)
    • M
    Insertion of Sensitive Information into Log File

    [,20.3.13)[21.0.0,21.3.9)[22.0.0,23.0.0)
    • M
    Improper Input Validation

    [,20.3.13)[21.0.0,21.3.9)[22.0.0,23.0.0)
    • M
    Information Exposure

    [,20.3.13)[21.0.0,21.3.9)[22.0.0,22.3.5)
    • H
    Improper Privilege Management

    [,21.3.9)[22.0.0,22.3.5)
    • H
    Covert Timing Channel

    [,20.3.13)[21.0.0,21.3.9)[22.0.0,23.0.0)
    • L
    Improper Privilege Management

    [,20.3.13)[21.0.0,21.3.9)
    • L
    Buffer Overflow

    [21.0.0,21.0.1)
    • M
    Denial of Service (DoS)

    [17.0.0,21.1.0)
    • L
    Denial of Service (DoS)

    [20.0.0,20.3.11)[21.0.0,21.3.7)[22.0.0,22.3.3)
    • L
    Information Exposure

    [20.0.0,20.3.11)[21.0.0,21.3.7)[22.0.0,22.3.3)
    • L
    Information Exposure

    [21.0.0,21.3.7)[22.0.0,22.3.3)
    • M
    Improper Access Control

    [20.0.0,20.3.11)[21.0.0,21.3.7)[22.0.0,22.3.3)
    • L
    Access Restriction Bypass

    [20.0.0,20.3.11)[21.0.0,21.3.7)[22.0.0,22.3.3)
    • L
    Access Restriction Bypass

    [20.0.0,20.3.11)[21.0.0,21.3.7)[22.0.0,22.3.3)
    • L
    Improper Neutralization of Null Byte or NUL Character

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • M
    Improper Input Validation

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • L
    Improper Input Validation

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • M
    Denial of Service (DoS)

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • L
    Remote Code Execution (RCE)

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • H
    Information Exposure

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • M
    Information Exposure

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • L
    User Impersonation

    [20.3.7,20.3.7.1)[21.3.3,21.3.3.1)[22.2.0,22.2.0.1)
    • M
    Allocation of Resources Without Limits or Throttling

    [20.3.7,20.3.7.1)[21.3.3,21.3.3.1)[22.2.0,22.2.0.1)
    • M
    Denial of Service (DoS)

    [20.3.7,20.3.7.1)[21.3.3,21.3.3.1)[22.2.0,22.2.0.1)
    • L
    Insecure Randomness

    [20.3.7,20.3.7.1)[21.3.3,21.3.3.1)[22.2.0,22.2.0.1)
    • M
    Remote Code Execution (RCE)

    [21.3.3,21.3.3.1)[22.2.0,22.2.0.1)
    • L
    Remote Code Execution (RCE)

    [20.3.7,20.3.7.1)[21.3.3,21.3.3.1)[22.2.0,22.2.0.1)
    • M
    Unsafe Reflection

    [,20.3.6)[21.3.0,21.3.2)[22.0.0.2,22.1.0)
    • M
    Denial of Service (DoS)

    [,20.3.6)[21.3.0,21.3.2)[22.0.0.2,22.1.0)
    • L
    Denial of Service (DoS)

    [,20.3.6)[21.3.0,21.3.2)[22.0.0.2,22.1.0)
    • H
    Information Exposure

    [,20.3.6)[21.3.0,21.3.2)[22.0.0.2,22.1.0)
    • M
    Improper Input Validation

    [,20.3.6)[21.3.0,21.3.2)[22.0.0.2,22.1.0)
    • H
    Access Restriction Bypass

    [,20.3.6)[21.3.0,21.3.2)[22.0.0.2,22.1.0)
    • M
    Out-of-bounds Write

    [,20.3.5)[21.0.0,21.3.1)
    • L
    Deserialization of Untrusted Data

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Information Exposure

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Allocation of Resources Without Limits or Throttling

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Allocation of Resources Without Limits or Throttling

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Infinite loop

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Information Exposure

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Integer Overflow or Wraparound

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Improper Input Validation

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Improper Input Validation

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Uncaught Exception

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Allocation of Resources Without Limits or Throttling

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Integer Overflow or Wraparound

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Allocation of Resources Without Limits or Throttling

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Allocation of Resources Without Limits or Throttling

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Improper Access Control

    [,20.3.4)[21.0.0,21.3.0)
    • M
    Access Restriction Bypass

    [,20.3.4)[21.0.0,21.3.0)
    • L
    Timing Attack

    [,20.3.4)[21.0.0,21.3.0)

    Package versions

    111 VERSIONS IN TOTAL See all versions
    versionpublisheddirect vulnerabilities
    25.0.016 Sep, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    24.2.213 Jul, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    24.2.115 Apr, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    24.2.018 Mar, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    24.1.220 Jan, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    24.1.115 Oct, 2024
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    24.1.016 Sep, 2024
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    24.0.28 Jul, 2024
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    24.0.116 Apr, 2024
    • 2
      C
    • 1
      H
    • 1
      M
    • 0
      L
    24.0.018 Mar, 2024
    • 3
      C
    • 1
      H
    • 3
      M
    • 0
      L