Oracle

Graalvm

180 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.32%
  • Veröffentlicht 15.07.2020 18:15:35
  • Zuletzt bearbeitet 21.11.2024 05:03:58

Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: JVMCI). Supported versions that are affected are 19.3.2 and 20.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via ...

Exploit
  • EPSS 1.18%
  • Veröffentlicht 08.06.2020 14:15:13
  • Zuletzt bearbeitet 21.11.2024 05:38:26

TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.

  • EPSS 0.68%
  • Veröffentlicht 03.06.2020 23:15:11
  • Zuletzt bearbeitet 21.11.2024 04:56:44

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings e...

  • EPSS 0.3%
  • Veröffentlicht 15.04.2020 14:15:34
  • Zuletzt bearbeitet 21.11.2024 05:26:35

Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: Tools). Supported versions that are affected are 19.3.1 and 20.0.0. Difficult to exploit vulnerability allows low privileged attacker with network access via...

  • EPSS 0.39%
  • Veröffentlicht 15.04.2020 14:15:28
  • Zuletzt bearbeitet 21.11.2024 05:26:18

Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: GraalVM Compiler). Supported versions that are affected are 19.3.1 and 20.0.0. Easily exploitable vulnerability allows low privileged attacker with network a...

  • EPSS 0.45%
  • Veröffentlicht 15.04.2020 14:15:27
  • Zuletzt bearbeitet 21.11.2024 05:26:18

Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: GraalVM Compiler). Supported versions that are affected are 19.3.1 and 20.0.0. Difficult to exploit vulnerability allows low privileged attacker with network...

  • EPSS 1.56%
  • Veröffentlicht 30.03.2020 19:15:15
  • Zuletzt bearbeitet 21.11.2024 04:32:31

The "Apache NetBeans" autoupdate system does not validate SSL certificates and hostnames for https based downloads. This allows an attacker to intercept downloads of autoupdates and modify the download, potentially injecting malicious code. “Apache N...

  • EPSS 0.73%
  • Veröffentlicht 30.03.2020 19:15:15
  • Zuletzt bearbeitet 21.11.2024 04:32:31

The "Apache NetBeans" autoupdate system does not fully validate code signatures. An attacker could modify the downloaded nbm and include additional code. "Apache NetBeans" versions up to and including 11.2 are affected by this vulnerability.

Exploit
  • EPSS 4.72%
  • Veröffentlicht 07.02.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 04:29:06

Improper Certificate Validation in Node.js 10, 12, and 13 causes the process to abort when sending a crafted X.509 certificate

  • EPSS 32.25%
  • Veröffentlicht 07.02.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 04:29:06

HTTP request smuggling in Node.js 10, 12, and 13 causes malicious payload delivery when transfer-encoding is malformed