Oracle Graalvm vulnerabilities
180 known vulnerabilities affecting oracle/graalvm.
Total CVEs
180
CISA KEV
1
actively exploited
Public exploits
0
Exploited in wild
1
Severity breakdown
CRITICAL6HIGH53MEDIUM79LOW42
Vulnerabilities
Page 8 of 9
CVE-2021-23840HIGHCVSS 7.5v19.3.5v20.3.1.2+1 more2021-02-16
CVE-2021-23840 [HIGH] CWE-190 CVE-2021-23840: Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length ar
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. Th
nvd
CVE-2021-23841MEDIUMCVSS 5.9v19.3.5v20.3.1.2+1 more2021-02-16
CVE-2021-23841 [MEDIUM] CWE-476 CVE-2021-23841: The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value
The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This ma
nvd
CVE-2021-23839LOWCVSS 3.7v19.3.5v20.3.1.2+1 more2021-02-16
CVE-2021-23839 [LOW] CWE-327 CVE-2021-23839: OpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configur
OpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A
nvd
CVE-2020-8265HIGHCVSS 8.1v19.3.4v20.3.02021-01-06
CVE-2020-8265 [HIGH] CWE-416 CVE-2020-8265: Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in
Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to th
nvd
CVE-2020-8287MEDIUMCVSS 6.5v19.3.4v20.3.02021-01-06
CVE-2020-8287 [MEDIUM] CWE-444 CVE-2020-8287: Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an H
Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.
nvd
CVE-2020-1971MEDIUMCVSS 5.9v19.3.4v20.3.02020-12-08
CVE-2020-1971 [MEDIUM] CWE-476 CVE-2020-1971: The X.509 GeneralName type is a generic type for representing different types of names. One of those
The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A
nvd
CVE-2020-28928MEDIUMCVSS 5.5v20.3.2v21.1.02020-11-24
CVE-2020-28928 [MEDIUM] CWE-787 CVE-2020-28928: In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size
In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).
nvd
CVE-2020-8277HIGHCVSS 7.5v19.3.4v20.3.02020-11-19
CVE-2020-8277 [HIGH] CWE-400 CVE-2020-8277: A Node.js application that allows an attacker to trigger a DNS request for a host of their choice co
A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.
nvd
CVE-2020-7774CRITICALCVSS 9.8v19.3.5v20.3.1.2+1 more2020-11-17
CVE-2020-7774 [CRITICAL] CWE-1321 CVE-2020-7774: The package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution.
The package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution.
nvd
CVE-2020-14803MEDIUMCVSS 5.3v19.3.3v19.3.4+2 more2020-10-21
CVE-2020-14803 [MEDIUM] CVE-2020-14803: Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions th
Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a
nvd
CVE-2020-14718HIGHCVSS 7.2v19.3.2v20.1.02020-07-15
CVE-2020-14718 [HIGH] CVE-2020-14718: Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: JVMCI).
Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: JVMCI). Supported versions that are affected are 19.3.2 and 20.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability ca
nvd
CVE-2020-8172HIGHCVSS 7.4v19.3.2v20.1.02020-06-08
CVE-2020-8172 [HIGH] CWE-295 CVE-2020-8172: TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 1
TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.
nvd
CVE-2020-11080HIGHCVSS 7.5v19.3.2v20.1.02020-06-03
CVE-2020-11080 [HIGH] CWE-707 CVE-2020-11080: In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of se
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vul
nvd
CVE-2020-2802HIGHCVSS 7.7v19.3.1v20.0.02020-04-15
CVE-2020-2802 [HIGH] CVE-2020-2802: Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: GraalVM
Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: GraalVM Compiler). Supported versions that are affected are 19.3.1 and 20.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Oracle GraalVM Enterprise Edition. While the vulnerability is in Oracl
nvd
CVE-2020-2799MEDIUMCVSS 6.3v19.3.1v20.0.02020-04-15
CVE-2020-2799 [MEDIUM] CVE-2020-2799: Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: GraalVM
Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: GraalVM Compiler). Supported versions that are affected are 19.3.1 and 20.0.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise Oracle GraalVM Enterprise Edition. While the vulnerability is in O
nvd
CVE-2020-2900LOWCVSS 3.7v19.3.1v20.0.02020-04-15
CVE-2020-2900 [LOW] CVE-2020-2900: Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: Tools).
Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: Tools). Supported versions that are affected are 19.3.1 and 20.0.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise Oracle GraalVM Enterprise Edition. Successful attacks require human interaction
nvd
CVE-2019-17560CRITICALCVSS 9.1v19.3.2v20.1.02020-03-30
CVE-2019-17560 [CRITICAL] CWE-295 CVE-2019-17560: The "Apache NetBeans" autoupdate system does not validate SSL certificates and hostnames for https b
The "Apache NetBeans" autoupdate system does not validate SSL certificates and hostnames for https based downloads. This allows an attacker to intercept downloads of autoupdates and modify the download, potentially injecting malicious code. “Apache NetBeans" versions up to and including 11.2 are affected by this vulnerability.
nvd
CVE-2019-17561HIGHCVSS 7.5v19.3.2v20.1.02020-03-30
CVE-2019-17561 [HIGH] CWE-347 CVE-2019-17561: The "Apache NetBeans" autoupdate system does not fully validate code signatures. An attacker could m
The "Apache NetBeans" autoupdate system does not fully validate code signatures. An attacker could modify the downloaded nbm and include additional code. "Apache NetBeans" versions up to and including 11.2 are affected by this vulnerability.
nvd
CVE-2019-15605CRITICALCVSS 9.8v19.3.1v20.0.02020-02-07
CVE-2019-15605 [CRITICAL] CWE-444 CVE-2019-15605: HTTP request smuggling in Node.js 10, 12, and 13 causes malicious payload delivery when transfer-enc
HTTP request smuggling in Node.js 10, 12, and 13 causes malicious payload delivery when transfer-encoding is malformed
nvd
CVE-2019-15606CRITICALCVSS 9.8v19.3.1v20.0.02020-02-07
CVE-2019-15606 [CRITICAL] CWE-20 CVE-2019-15606: Including trailing white space in HTTP header values in Nodejs 10, 12, and 13 causes bypass of autho
Including trailing white space in HTTP header values in Nodejs 10, 12, and 13 causes bypass of authorization based on header value comparisons
nvd