Логотип exploitDog
bind:"CVE-2022-21619" OR bind:"CVE-2022-21624" OR bind:"CVE-2022-21626" OR bind:"CVE-2022-21628"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2022-21619" OR bind:"CVE-2022-21624" OR bind:"CVE-2022-21626" OR bind:"CVE-2022-21628"

Количество 67

Количество 67

suse-cvrf логотип

SUSE-SU-2022:4166-1

около 3 лет назад

Security update for java-1_8_0-ibm

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9955

больше 3 лет назад

ELSA-2022-9955: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9954

больше 3 лет назад

ELSA-2022-9954: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9953

больше 3 лет назад

ELSA-2022-9953: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9952

больше 3 лет назад

ELSA-2022-9952: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9951

больше 3 лет назад

ELSA-2022-9951: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9950

больше 3 лет назад

ELSA-2022-9950: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9949

больше 3 лет назад

ELSA-2022-9949: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9948

больше 3 лет назад

ELSA-2022-9948: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9947

больше 3 лет назад

ELSA-2022-9947: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9946

больше 3 лет назад

ELSA-2022-9946: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9945

больше 3 лет назад

ELSA-2022-9945: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9944

больше 3 лет назад

ELSA-2022-9944: GraalVM Security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4079-1

около 3 лет назад

Security update for java-17-openjdk

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2025:0067-1

12 месяцев назад

Security update for java-17-openj9

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2025:0066-1

12 месяцев назад

Security update for java-11-openj9

EPSS: Низкий
ubuntu логотип

CVE-2022-21619

больше 3 лет назад

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., throug...

CVSS3: 3.7
EPSS: Низкий
redhat логотип

CVE-2022-21619

больше 3 лет назад

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., throug...

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2022-21619

больше 3 лет назад

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a

CVSS3: 3.7
EPSS: Низкий
msrc логотип

CVE-2022-21619

4 месяца назад

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a

CVSS3: 3.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2022:4166-1

Security update for java-1_8_0-ibm

около 3 лет назад
oracle-oval логотип
ELSA-2022-9955

ELSA-2022-9955: GraalVM Security update (IMPORTANT)

больше 3 лет назад
oracle-oval логотип
ELSA-2022-9954

ELSA-2022-9954: GraalVM Security update (IMPORTANT)

больше 3 лет назад
oracle-oval логотип
ELSA-2022-9953

ELSA-2022-9953: GraalVM Security update (IMPORTANT)

больше 3 лет назад
oracle-oval логотип
ELSA-2022-9952

ELSA-2022-9952: GraalVM Security update (IMPORTANT)

больше 3 лет назад
oracle-oval логотип
ELSA-2022-9951

ELSA-2022-9951: GraalVM Security update (IMPORTANT)

больше 3 лет назад
oracle-oval логотип
ELSA-2022-9950

ELSA-2022-9950: GraalVM Security update (IMPORTANT)

больше 3 лет назад
oracle-oval логотип
ELSA-2022-9949

ELSA-2022-9949: GraalVM Security update (IMPORTANT)

больше 3 лет назад
oracle-oval логотип
ELSA-2022-9948

ELSA-2022-9948: GraalVM Security update (IMPORTANT)

больше 3 лет назад
oracle-oval логотип
ELSA-2022-9947

ELSA-2022-9947: GraalVM Security update (IMPORTANT)

больше 3 лет назад
oracle-oval логотип
ELSA-2022-9946

ELSA-2022-9946: GraalVM Security update (IMPORTANT)

больше 3 лет назад
oracle-oval логотип
ELSA-2022-9945

ELSA-2022-9945: GraalVM Security update (IMPORTANT)

больше 3 лет назад
oracle-oval логотип
ELSA-2022-9944

ELSA-2022-9944: GraalVM Security update (IMPORTANT)

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:4079-1

Security update for java-17-openjdk

около 3 лет назад
suse-cvrf логотип
openSUSE-SU-2025:0067-1

Security update for java-17-openj9

12 месяцев назад
suse-cvrf логотип
openSUSE-SU-2025:0066-1

Security update for java-11-openj9

12 месяцев назад
ubuntu логотип
CVE-2022-21619

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., throug...

CVSS3: 3.7
0%
Низкий
больше 3 лет назад
redhat логотип
CVE-2022-21619

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., throug...

CVSS3: 3.7
0%
Низкий
больше 3 лет назад
nvd логотип
CVE-2022-21619

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a

CVSS3: 3.7
0%
Низкий
больше 3 лет назад
msrc логотип
CVE-2022-21619

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a

CVSS3: 3.7
0%
Низкий
4 месяца назад

Уязвимостей на страницу