Логотип exploitDog
bind:"CVE-2022-21619" OR bind:"CVE-2022-21624" OR bind:"CVE-2022-21626" OR bind:"CVE-2022-21628"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2022-21619" OR bind:"CVE-2022-21624" OR bind:"CVE-2022-21626" OR bind:"CVE-2022-21628"

Количество 67

Количество 67

suse-cvrf логотип

SUSE-SU-2022:4166-1

около 3 лет назад

Security update for java-1_8_0-ibm

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9955

около 3 лет назад

ELSA-2022-9955: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9954

около 3 лет назад

ELSA-2022-9954: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9953

около 3 лет назад

ELSA-2022-9953: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9952

около 3 лет назад

ELSA-2022-9952: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9951

около 3 лет назад

ELSA-2022-9951: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9950

около 3 лет назад

ELSA-2022-9950: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9949

около 3 лет назад

ELSA-2022-9949: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9948

около 3 лет назад

ELSA-2022-9948: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9947

около 3 лет назад

ELSA-2022-9947: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9946

около 3 лет назад

ELSA-2022-9946: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9945

около 3 лет назад

ELSA-2022-9945: GraalVM Security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-9944

около 3 лет назад

ELSA-2022-9944: GraalVM Security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4079-1

около 3 лет назад

Security update for java-17-openjdk

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2025:0067-1

11 месяцев назад

Security update for java-17-openj9

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2025:0066-1

11 месяцев назад

Security update for java-11-openj9

EPSS: Низкий
ubuntu логотип

CVE-2022-21619

около 3 лет назад

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., throug...

CVSS3: 3.7
EPSS: Низкий
redhat логотип

CVE-2022-21619

около 3 лет назад

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., throug...

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2022-21619

около 3 лет назад

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a

CVSS3: 3.7
EPSS: Низкий
msrc логотип

CVE-2022-21619

4 месяца назад

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a

CVSS3: 3.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2022:4166-1

Security update for java-1_8_0-ibm

около 3 лет назад
oracle-oval логотип
ELSA-2022-9955

ELSA-2022-9955: GraalVM Security update (IMPORTANT)

около 3 лет назад
oracle-oval логотип
ELSA-2022-9954

ELSA-2022-9954: GraalVM Security update (IMPORTANT)

около 3 лет назад
oracle-oval логотип
ELSA-2022-9953

ELSA-2022-9953: GraalVM Security update (IMPORTANT)

около 3 лет назад
oracle-oval логотип
ELSA-2022-9952

ELSA-2022-9952: GraalVM Security update (IMPORTANT)

около 3 лет назад
oracle-oval логотип
ELSA-2022-9951

ELSA-2022-9951: GraalVM Security update (IMPORTANT)

около 3 лет назад
oracle-oval логотип
ELSA-2022-9950

ELSA-2022-9950: GraalVM Security update (IMPORTANT)

около 3 лет назад
oracle-oval логотип
ELSA-2022-9949

ELSA-2022-9949: GraalVM Security update (IMPORTANT)

около 3 лет назад
oracle-oval логотип
ELSA-2022-9948

ELSA-2022-9948: GraalVM Security update (IMPORTANT)

около 3 лет назад
oracle-oval логотип
ELSA-2022-9947

ELSA-2022-9947: GraalVM Security update (IMPORTANT)

около 3 лет назад
oracle-oval логотип
ELSA-2022-9946

ELSA-2022-9946: GraalVM Security update (IMPORTANT)

около 3 лет назад
oracle-oval логотип
ELSA-2022-9945

ELSA-2022-9945: GraalVM Security update (IMPORTANT)

около 3 лет назад
oracle-oval логотип
ELSA-2022-9944

ELSA-2022-9944: GraalVM Security update (IMPORTANT)

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:4079-1

Security update for java-17-openjdk

около 3 лет назад
suse-cvrf логотип
openSUSE-SU-2025:0067-1

Security update for java-17-openj9

11 месяцев назад
suse-cvrf логотип
openSUSE-SU-2025:0066-1

Security update for java-11-openj9

11 месяцев назад
ubuntu логотип
CVE-2022-21619

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., throug...

CVSS3: 3.7
0%
Низкий
около 3 лет назад
redhat логотип
CVE-2022-21619

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., throug...

CVSS3: 3.7
0%
Низкий
около 3 лет назад
nvd логотип
CVE-2022-21619

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a

CVSS3: 3.7
0%
Низкий
около 3 лет назад
msrc логотип
CVE-2022-21619

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a

CVSS3: 3.7
0%
Низкий
4 месяца назад

Уязвимостей на страницу