Find out if you have vulnerabilities that put you at risk

Test your applications
Toggle filtering controls
Report a new vulnerability
VULNERABILITYAFFECTSTYPEPUBLISHED
  • H
Deserialization of Untrusted Data
javapackages-tools:201801/slf4j-sources<0:1.7.25-4.module+el8.10.0+23274+27840b45rhel:826 Jun 2025
  • C
Malicious Package
jcl-over-slf4j*npm23 Jul 2025
  • L
Uncontrolled Recursion
jcl-over-slf4j*centos:812 Jul 2025
  • L
Uncontrolled Recursion
jcl-over-slf4j*rhel:912 Jul 2025
  • L
Uncontrolled Recursion
jcl-over-slf4j*centos:912 Jul 2025
  • H
CVE-2025-48734
jcl-over-slf4j<0:1.7.25-4.module+el8.10.0+90622+accb6b48oracle:89 Jul 2025
  • H
Deserialization of Untrusted Data
jcl-over-slf4j<0:1.7.25-4.module+el8.10.0+90622+accb6b48oracle:89 Jul 2025
  • H
Improper Access Control
jcl-over-slf4j<0:1.7.25-4.module+el8.10.0+23274+27840b45centos:826 Jun 2025
  • H
Deserialization of Untrusted Data
jcl-over-slf4j<0:1.7.25-4.module+el8.10.0+23274+27840b45centos:826 Jun 2025
  • M
Cross-site Scripting (XSS)
jcl-over-slf4j<0:1.7.25-4.module+el8.6.0+843+5a13dac3rocky:85 Jan 2023
  • M
CVE-2020-1695
jcl-over-slf4j<0:1.7.25-4.module+el8.6.0+843+5a13dac3rocky:85 Jan 2023
  • M
Cross-site Scripting (XSS)
jcl-over-slf4j<0:1.7.25-4.module+el8.6.0+843+5a13dac3rocky:85 Jan 2023
  • M
Cross-site Scripting (XSS)
jcl-over-slf4j<0:1.7.25-4.module+el8.6.0+843+5a13dac3rocky:85 Jan 2023
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
jcl-over-slf4j<0:1.7.25-4.module+el8.6.0+843+5a13dac3rocky:85 Jan 2023
  • M
Cross-site Scripting (XSS)
jcl-over-slf4j<0:1.7.25-4.module+el8.6.0+843+5a13dac3rocky:85 Jan 2023
  • M
Cross-site Scripting (XSS)
jcl-over-slf4j<0:1.7.25-4.module+el8.6.0+843+5a13dac3rocky:85 Jan 2023
  • M
Cross-site Scripting (XSS)
jcl-over-slf4j<0:1.7.25-4.module+el8.6.0+843+5a13dac3rocky:85 Jan 2023
  • M
Cross-site Scripting (XSS)
jcl-over-slf4j<0:1.7.25-4.module+el8.6.0+843+5a13dac3rocky:85 Jan 2023
  • H
Improper Encoding or Escaping of Output
jcl-over-slf4j<0:1.7.25-4.module+el8.3.0+133+b8b54b58rocky:85 Jan 2023
  • M
CVE-2020-13956
jcl-over-slf4j<0:1.7.28-3.module+el8.3.0+134+f7791fe0rocky:85 Jan 2023
  • M
CVE-2020-13956
jcl-over-slf4j<0:1.7.28-3.module+el8.6.0+20615+edd0bff8oracle:818 May 2022
  • H
Improper Encoding or Escaping of Output
jcl-over-slf4j<0:1.7.25-4.module+el8+5161+5cac467coracle:830 Apr 2022
  • H
Arbitrary Command Injection
jcl-over-slf4j<0:1.7.25-4.module+el8+2452+b359bfcdcentos:826 Apr 2022
  • M
Information Exposure
jcl-over-slf4j*centos:826 Jul 2021
  • M
Improper Input Validation
jcl-over-slf4j<0:1.7.25-4.module+el8+2452+b359bfcdcentos:826 Jul 2021
  • L
Uncontrolled Recursion
jul-to-slf4j*centos:812 Jul 2025
  • H
CVE-2025-48734
jul-to-slf4j<0:1.7.25-4.module+el8.10.0+90622+accb6b48oracle:89 Jul 2025
  • H
Deserialization of Untrusted Data
jul-to-slf4j<0:1.7.25-4.module+el8.10.0+90622+accb6b48oracle:89 Jul 2025
  • H
Improper Access Control
jul-to-slf4j<0:1.7.25-4.module+el8.10.0+23274+27840b45centos:826 Jun 2025
  • H
Deserialization of Untrusted Data
jul-to-slf4j<0:1.7.25-4.module+el8.10.0+23274+27840b45centos:826 Jun 2025