Putki Security Vulnerability Scans
Last Updated: 05 Mar 2026 00:37:28
Quick Navigation
↑Development
Severity Breakdown
| Severity | Count |
|---|---|
| HIGH | 3 |
| MEDIUM | 12 |
| LOW | 3 |
Details for version: Development
CVE Details for Version: Development
| Severity | Score | CVE ID | Description |
|---|---|---|---|
| HIGH | 9.3 | CVE-2008-0888 | CVE-2008-0888 |
| HIGH | 8.7 | GHSA-72hv-8253-57qq | GHSA-72hv-8253-57qq: Allocation of Resources Without Limits or Throttling |
| HIGH | 7.5 | CVE-2022-41404 | CVE-2022-41404: Uncontrolled Resource Consumption |
| MEDIUM | 6.5 | CVE-2016-5004 | CVE-2016-5004: Uncontrolled Resource Consumption |
| MEDIUM | 6.5 | CVE-2024-45993 | CVE-2024-45993 |
| MEDIUM | 6.5 | CVE-2025-48924 | CVE-2025-48924: Uncontrolled Recursion |
| MEDIUM | 6.5 | CVE-2025-60876 | CVE-2025-60876 |
| MEDIUM | 6.3 | CVE-2025-14017 | CVE-2025-14017 |
| MEDIUM | 6.3 | CVE-2025-8916 | CVE-2025-8916: Allocation of Resources Without Limits or Throttling |
| MEDIUM | 5.9 | CVE-2025-13034 | CVE-2025-13034 |
| MEDIUM | 5.9 | CVE-2026-28208 | com.github.junrar/junrar: Junrar: Remote code execution via path traversal when extracting crafted RAR archives |
| MEDIUM | 5.7 | CVE-2025-46551 | CVE-2025-46551: Improper Certificate Validation |
| MEDIUM | 5.3 | CVE-2025-14524 | CVE-2025-14524 |
| MEDIUM | 5.3 | CVE-2025-14819 | CVE-2025-14819 |
| MEDIUM | 5.3 | CVE-2025-15079 | CVE-2025-15079 |
| LOW | 3.3 | CVE-2026-3293 | snowflake-jdbc: snowflake-jdbc: Denial of Service via inefficient regular expression processing |
| LOW | 3.1 | CVE-2025-15224 | CVE-2025-15224 |
| LOW | 2.9 | CVE-2026-27171 | CVE-2026-27171 |
↑2025.08
Severity Breakdown
| Severity | Count |
|---|---|
| CRITICAL | 3 |
| HIGH | 27 |
| MEDIUM | 50 |
| LOW | 13 |
Details for version: 2025.08
CVE Details for Version: 2025.08
| Severity | Score | CVE ID | Description |
|---|---|---|---|
| CRITICAL | 10.0 | CVE-2025-66516 | CVE-2025-66516: Improper Restriction of XML External Entity Reference |
| CRITICAL | 9.8 | CVE-2025-15467 | CVE-2025-15467 |
| CRITICAL | 9.3 | CVE-2025-54988 | CVE-2025-54988: Improper Restriction of XML External Entity Reference |
| HIGH | 8.8 | CVE-2025-48734 | CVE-2025-48734: Improper Access Control |
| HIGH | 8.7 | CVE-2023-52428 | CVE-2023-52428: Uncontrolled Resource Consumption |
| HIGH | 8.7 | GHSA-72hv-8253-57qq | GHSA-72hv-8253-57qq: Allocation of Resources Without Limits or Throttling |
| HIGH | 8.3 | CVE-2026-25646 | CVE-2026-25646 |
| HIGH | 8.2 | CVE-2025-49146 | CVE-2025-49146: Improper Authentication |
| HIGH | 8.2 | CVE-2025-55163 | CVE-2025-55163: Allocation of Resources Without Limits or Throttling |
| HIGH | 8.1 | CVE-2025-59250 | CVE-2025-59250: Improper Input Validation |
| HIGH | 7.7 | CVE-2024-47072 | CVE-2024-47072: Stack-based Buffer Overflow |
| HIGH | 7.5 | CVE-2021-31684 | CVE-2021-31684: Out-of-bounds Read |
| HIGH | 7.5 | CVE-2022-41404 | CVE-2022-41404: Uncontrolled Resource Consumption |
| HIGH | 7.5 | CVE-2023-1370 | CVE-2023-1370: Uncontrolled Recursion |
| HIGH | 7.5 | CVE-2025-13151 | CVE-2025-13151 |
| HIGH | 7.5 | CVE-2025-53066 | CVE-2025-53066 |
| HIGH | 7.5 | CVE-2025-59375 | CVE-2025-59375 |
| HIGH | 7.5 | CVE-2025-69420 | CVE-2025-69420 |
| HIGH | 7.5 | CVE-2025-69421 | CVE-2025-69421 |
| HIGH | 7.5 | CVE-2025-9086 | CVE-2025-9086 |
| HIGH | 7.5 | CVE-2025-9230 | CVE-2025-9230 |
| HIGH | 7.5 | CVE-2026-21945 | CVE-2026-21945 |
| HIGH | 7.4 | CVE-2025-69419 | CVE-2025-69419 |
| HIGH | 7.4 | CVE-2026-21932 | CVE-2026-21932 |
| HIGH | 7.2 | CVE-2024-13009 | CVE-2024-13009: Improper Resource Shutdown or Release |
| HIGH | 7.1 | CVE-2025-64720 | CVE-2025-64720 |
| HIGH | 7.1 | CVE-2025-65018 | CVE-2025-65018 |
| HIGH | 7.1 | CVE-2025-66293 | CVE-2025-66293 |
| HIGH | 0.0 | CVE-2025-12183 | lz4-java: lz4-java: Out-of-bounds memory operations lead to denial of service and information disclosure |
| HIGH | 0.0 | CVE-2025-66566 | lz4-java: lz4-java: Information Disclosure via Insufficient Output Buffer Clearing |
| MEDIUM | 6.9 | CVE-2025-31672 | CVE-2025-31672: Improper Input Validation |
| MEDIUM | 6.9 | CVE-2025-58050 | CVE-2025-58050 |
| MEDIUM | 6.9 | CVE-2025-58057 | CVE-2025-58057: Improper Handling of Highly Compressed Data (Data Amplification) |
| MEDIUM | 6.9 | CVE-2026-25210 | CVE-2026-25210 |
| MEDIUM | 6.8 | CVE-2025-4949 | CVE-2025-4949: Improper Restriction of XML External Entity Reference |
| MEDIUM | 6.8 | CVE-2026-22801 | CVE-2026-22801 |
| MEDIUM | 6.5 | CVE-2016-5004 | CVE-2016-5004: Uncontrolled Resource Consumption |
| MEDIUM | 6.5 | CVE-2024-45993 | CVE-2024-45993 |
| MEDIUM | 6.5 | CVE-2025-48924 | CVE-2025-48924: Uncontrolled Recursion |
| MEDIUM | 6.5 | CVE-2025-60876 | CVE-2025-60876 |
| MEDIUM | 6.5 | CVE-2025-67735 | CVE-2025-67735: Improper Neutralization of CRLF Sequences ('CRLF Injection') |
| MEDIUM | 6.5 | CVE-2025-9231 | CVE-2025-9231 |
| MEDIUM | 6.3 | CVE-2024-6763 | CVE-2024-6763: Improper Validation of Syntactic Correctness of Input |
| MEDIUM | 6.3 | CVE-2025-14017 | CVE-2025-14017 |
| MEDIUM | 6.3 | CVE-2025-68161 | CVE-2025-68161: Improper Validation of Certificate with Host Mismatch |
| MEDIUM | 6.3 | CVE-2025-8916 | CVE-2025-8916: Allocation of Resources Without Limits or Throttling |
| MEDIUM | 6.2 | CVE-2025-27817 | CVE-2025-27817: Server-Side Request Forgery (SSRF) |
| MEDIUM | 6.1 | CVE-2025-11187 | CVE-2025-11187 |
| MEDIUM | 6.1 | CVE-2025-22227 | CVE-2025-22227: Exposure of Sensitive Information to an Unauthorized Actor |
| MEDIUM | 6.1 | CVE-2025-64505 | CVE-2025-64505 |
| MEDIUM | 6.1 | CVE-2025-64506 | CVE-2025-64506 |
| MEDIUM | 6.1 | CVE-2026-21933 | CVE-2026-21933 |
| MEDIUM | 6.1 | CVE-2026-22695 | CVE-2026-22695 |
| MEDIUM | 5.9 | CVE-2024-8184 | CVE-2024-8184: Uncontrolled Resource Consumption |
| MEDIUM | 5.9 | CVE-2025-13034 | CVE-2025-13034 |
| MEDIUM | 5.9 | CVE-2025-15468 | CVE-2025-15468 |
| MEDIUM | 5.9 | CVE-2025-53057 | CVE-2025-53057 |
| MEDIUM | 5.9 | CVE-2025-62408 | CVE-2025-62408 |
| MEDIUM | 5.9 | CVE-2025-66199 | CVE-2025-66199 |
| MEDIUM | 5.9 | CVE-2025-9232 | CVE-2025-9232 |
| MEDIUM | 5.9 | CVE-2026-28208 | com.github.junrar/junrar: Junrar: Remote code execution via path traversal when extracting crafted RAR archives |
| MEDIUM | 5.8 | CVE-2025-53864 | CVE-2025-53864: Uncontrolled Recursion |
| MEDIUM | 5.7 | CVE-2025-46551 | CVE-2025-46551: Improper Certificate Validation |
| MEDIUM | 5.5 | CVE-2023-2976 | CVE-2023-2976: Creation of Temporary File in Directory with Insecure Permissions |
| MEDIUM | 5.5 | CVE-2025-15469 | CVE-2025-15469 |
| MEDIUM | 5.5 | CVE-2026-22795 | CVE-2026-22795 |
| MEDIUM | 5.3 | CVE-2021-34429 | CVE-2021-34429: Exposure of Sensitive Information to an Unauthorized Actor |
| MEDIUM | 5.3 | CVE-2023-26048 | CVE-2023-26048: Uncontrolled Resource Consumption |
| MEDIUM | 5.3 | CVE-2023-40167 | CVE-2023-40167: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| MEDIUM | 5.3 | CVE-2024-9823 | CVE-2024-9823: Uncontrolled Resource Consumption |
| MEDIUM | 5.3 | CVE-2025-10148 | CVE-2025-10148 |
| MEDIUM | 5.3 | CVE-2025-14524 | CVE-2025-14524 |
| MEDIUM | 5.3 | CVE-2025-14819 | CVE-2025-14819 |
| MEDIUM | 5.3 | CVE-2025-15079 | CVE-2025-15079 |
| MEDIUM | 5.3 | CVE-2026-22796 | CVE-2026-22796 |
| MEDIUM | 4.8 | CVE-2026-21925 | CVE-2026-21925 |
| MEDIUM | 4.7 | CVE-2025-68160 | CVE-2025-68160 |
| MEDIUM | 4.3 | CVE-2023-41900 | CVE-2023-41900: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| MEDIUM | 4.3 | CVE-2025-10966 | CVE-2025-10966 |
| MEDIUM | 4.0 | CVE-2025-69418 | CVE-2025-69418 |
| LOW | 3.9 | GHSA-58qw-p7qm-5rvh | GHSA-58qw-p7qm-5rvh: Improper Restriction of XML External Entity Reference |
| LOW | 3.5 | CVE-2023-36479 | CVE-2023-36479: Improper Neutralization of Quoting Syntax |
| LOW | 3.3 | CVE-2020-8908 | CVE-2020-8908: Improper Handling of Alternate Encoding |
| LOW | 3.3 | CVE-2026-3293 | snowflake-jdbc: snowflake-jdbc: Denial of Service via inefficient regular expression processing |
| LOW | 3.2 | CVE-2025-46394 | CVE-2025-46394 |
| LOW | 3.1 | CVE-2025-15224 | CVE-2025-15224 |
| LOW | 3.1 | CVE-2025-58056 | CVE-2025-58056: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') |
| LOW | 2.9 | CVE-2026-24515 | CVE-2026-24515 |
| LOW | 2.9 | CVE-2026-27171 | CVE-2026-27171 |
| LOW | 2.7 | CVE-2022-2047 | CVE-2022-2047: Improper Input Validation |
| LOW | 2.5 | CVE-2024-58251 | CVE-2024-58251 |
| LOW | 2.4 | CVE-2023-26049 | CVE-2023-26049: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| LOW | 0.0 | CVE-2025-66453 | Rhino is an open-source implementation of JavaScript written entirely ... |
↑2025.05
Severity Breakdown
| Severity | Count |
|---|---|
| CRITICAL | 3 |
| HIGH | 30 |
| MEDIUM | 52 |
| LOW | 13 |
Details for version: 2025.05
CVE Details for Version: 2025.05
| Severity | Score | CVE ID | Description |
|---|---|---|---|
| CRITICAL | 10.0 | CVE-2025-66516 | CVE-2025-66516: Improper Restriction of XML External Entity Reference |
| CRITICAL | 9.8 | CVE-2025-15467 | CVE-2025-15467 |
| CRITICAL | 9.3 | CVE-2025-54988 | CVE-2025-54988: Improper Restriction of XML External Entity Reference |
| HIGH | 8.8 | CVE-2025-48734 | CVE-2025-48734: Improper Access Control |
| HIGH | 8.7 | CVE-2023-52428 | CVE-2023-52428: Uncontrolled Resource Consumption |
| HIGH | 8.7 | GHSA-72hv-8253-57qq | GHSA-72hv-8253-57qq: Allocation of Resources Without Limits or Throttling |
| HIGH | 8.6 | CVE-2025-50059 | CVE-2025-50059 |
| HIGH | 8.3 | CVE-2026-25646 | CVE-2026-25646 |
| HIGH | 8.2 | CVE-2025-49146 | CVE-2025-49146: Improper Authentication |
| HIGH | 8.2 | CVE-2025-55163 | CVE-2025-55163: Allocation of Resources Without Limits or Throttling |
| HIGH | 8.1 | CVE-2025-30749 | CVE-2025-30749 |
| HIGH | 8.1 | CVE-2025-50106 | CVE-2025-50106 |
| HIGH | 8.1 | CVE-2025-59250 | CVE-2025-59250: Improper Input Validation |
| HIGH | 7.7 | CVE-2024-47072 | CVE-2024-47072: Stack-based Buffer Overflow |
| HIGH | 7.5 | CVE-2021-31684 | CVE-2021-31684: Out-of-bounds Read |
| HIGH | 7.5 | CVE-2022-41404 | CVE-2022-41404: Uncontrolled Resource Consumption |
| HIGH | 7.5 | CVE-2023-1370 | CVE-2023-1370: Uncontrolled Recursion |
| HIGH | 7.5 | CVE-2025-13151 | CVE-2025-13151 |
| HIGH | 7.5 | CVE-2025-53066 | CVE-2025-53066 |
| HIGH | 7.5 | CVE-2025-59375 | CVE-2025-59375 |
| HIGH | 7.5 | CVE-2025-69420 | CVE-2025-69420 |
| HIGH | 7.5 | CVE-2025-69421 | CVE-2025-69421 |
| HIGH | 7.5 | CVE-2025-9086 | CVE-2025-9086 |
| HIGH | 7.5 | CVE-2025-9230 | CVE-2025-9230 |
| HIGH | 7.5 | CVE-2026-21945 | CVE-2026-21945 |
| HIGH | 7.4 | CVE-2025-69419 | CVE-2025-69419 |
| HIGH | 7.4 | CVE-2026-21932 | CVE-2026-21932 |
| HIGH | 7.2 | CVE-2024-13009 | CVE-2024-13009: Improper Resource Shutdown or Release |
| HIGH | 7.1 | CVE-2025-64720 | CVE-2025-64720 |
| HIGH | 7.1 | CVE-2025-65018 | CVE-2025-65018 |
| HIGH | 7.1 | CVE-2025-66293 | CVE-2025-66293 |
| HIGH | 0.0 | CVE-2025-12183 | lz4-java: lz4-java: Out-of-bounds memory operations lead to denial of service and information disclosure |
| HIGH | 0.0 | CVE-2025-66566 | lz4-java: lz4-java: Information Disclosure via Insufficient Output Buffer Clearing |
| MEDIUM | 6.9 | CVE-2025-31672 | CVE-2025-31672: Improper Input Validation |
| MEDIUM | 6.9 | CVE-2025-58050 | CVE-2025-58050 |
| MEDIUM | 6.9 | CVE-2025-58057 | CVE-2025-58057: Improper Handling of Highly Compressed Data (Data Amplification) |
| MEDIUM | 6.9 | CVE-2026-25210 | CVE-2026-25210 |
| MEDIUM | 6.8 | CVE-2025-4949 | CVE-2025-4949: Improper Restriction of XML External Entity Reference |
| MEDIUM | 6.8 | CVE-2026-22801 | CVE-2026-22801 |
| MEDIUM | 6.5 | CVE-2016-5004 | CVE-2016-5004: Uncontrolled Resource Consumption |
| MEDIUM | 6.5 | CVE-2024-45993 | CVE-2024-45993 |
| MEDIUM | 6.5 | CVE-2025-4575 | CVE-2025-4575 |
| MEDIUM | 6.5 | CVE-2025-48924 | CVE-2025-48924: Uncontrolled Recursion |
| MEDIUM | 6.5 | CVE-2025-60876 | CVE-2025-60876 |
| MEDIUM | 6.5 | CVE-2025-67735 | CVE-2025-67735: Improper Neutralization of CRLF Sequences ('CRLF Injection') |
| MEDIUM | 6.5 | CVE-2025-9231 | CVE-2025-9231 |
| MEDIUM | 6.3 | CVE-2024-6763 | CVE-2024-6763: Improper Validation of Syntactic Correctness of Input |
| MEDIUM | 6.3 | CVE-2025-14017 | CVE-2025-14017 |
| MEDIUM | 6.3 | CVE-2025-68161 | CVE-2025-68161: Improper Validation of Certificate with Host Mismatch |
| MEDIUM | 6.3 | CVE-2025-8916 | CVE-2025-8916: Allocation of Resources Without Limits or Throttling |
| MEDIUM | 6.2 | CVE-2025-27817 | CVE-2025-27817: Server-Side Request Forgery (SSRF) |
| MEDIUM | 6.1 | CVE-2025-11187 | CVE-2025-11187 |
| MEDIUM | 6.1 | CVE-2025-22227 | CVE-2025-22227: Exposure of Sensitive Information to an Unauthorized Actor |
| MEDIUM | 6.1 | CVE-2025-64505 | CVE-2025-64505 |
| MEDIUM | 6.1 | CVE-2025-64506 | CVE-2025-64506 |
| MEDIUM | 6.1 | CVE-2026-21933 | CVE-2026-21933 |
| MEDIUM | 6.1 | CVE-2026-22695 | CVE-2026-22695 |
| MEDIUM | 5.9 | CVE-2024-8184 | CVE-2024-8184: Uncontrolled Resource Consumption |
| MEDIUM | 5.9 | CVE-2025-13034 | CVE-2025-13034 |
| MEDIUM | 5.9 | CVE-2025-15468 | CVE-2025-15468 |
| MEDIUM | 5.9 | CVE-2025-53057 | CVE-2025-53057 |
| MEDIUM | 5.9 | CVE-2025-62408 | CVE-2025-62408 |
| MEDIUM | 5.9 | CVE-2025-66199 | CVE-2025-66199 |
| MEDIUM | 5.9 | CVE-2025-9232 | CVE-2025-9232 |
| MEDIUM | 5.9 | CVE-2026-28208 | com.github.junrar/junrar: Junrar: Remote code execution via path traversal when extracting crafted RAR archives |
| MEDIUM | 5.8 | CVE-2025-53864 | CVE-2025-53864: Uncontrolled Recursion |
| MEDIUM | 5.7 | CVE-2025-46551 | CVE-2025-46551: Improper Certificate Validation |
| MEDIUM | 5.5 | CVE-2023-2976 | CVE-2023-2976: Creation of Temporary File in Directory with Insecure Permissions |
| MEDIUM | 5.5 | CVE-2025-15469 | CVE-2025-15469 |
| MEDIUM | 5.5 | CVE-2026-22795 | CVE-2026-22795 |
| MEDIUM | 5.3 | CVE-2021-34429 | CVE-2021-34429: Exposure of Sensitive Information to an Unauthorized Actor |
| MEDIUM | 5.3 | CVE-2023-26048 | CVE-2023-26048: Uncontrolled Resource Consumption |
| MEDIUM | 5.3 | CVE-2023-40167 | CVE-2023-40167: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| MEDIUM | 5.3 | CVE-2024-9823 | CVE-2024-9823: Uncontrolled Resource Consumption |
| MEDIUM | 5.3 | CVE-2025-10148 | CVE-2025-10148 |
| MEDIUM | 5.3 | CVE-2025-14524 | CVE-2025-14524 |
| MEDIUM | 5.3 | CVE-2025-14819 | CVE-2025-14819 |
| MEDIUM | 5.3 | CVE-2025-15079 | CVE-2025-15079 |
| MEDIUM | 5.3 | CVE-2026-22796 | CVE-2026-22796 |
| MEDIUM | 4.8 | CVE-2025-30754 | CVE-2025-30754 |
| MEDIUM | 4.8 | CVE-2026-21925 | CVE-2026-21925 |
| MEDIUM | 4.7 | CVE-2025-68160 | CVE-2025-68160 |
| MEDIUM | 4.3 | CVE-2023-41900 | CVE-2023-41900: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| MEDIUM | 4.3 | CVE-2025-10966 | CVE-2025-10966 |
| MEDIUM | 4.0 | CVE-2025-69418 | CVE-2025-69418 |
| LOW | 3.9 | GHSA-58qw-p7qm-5rvh | GHSA-58qw-p7qm-5rvh: Improper Restriction of XML External Entity Reference |
| LOW | 3.5 | CVE-2023-36479 | CVE-2023-36479: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| LOW | 3.3 | CVE-2020-8908 | CVE-2020-8908: Improper Handling of Alternate Encoding |
| LOW | 3.3 | CVE-2026-3293 | snowflake-jdbc: snowflake-jdbc: Denial of Service via inefficient regular expression processing |
| LOW | 3.2 | CVE-2025-46394 | CVE-2025-46394 |
| LOW | 3.1 | CVE-2025-15224 | CVE-2025-15224 |
| LOW | 3.1 | CVE-2025-58056 | CVE-2025-58056: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') |
| LOW | 2.9 | CVE-2026-24515 | CVE-2026-24515 |
| LOW | 2.9 | CVE-2026-27171 | CVE-2026-27171 |
| LOW | 2.7 | CVE-2022-2047 | CVE-2022-2047: Improper Input Validation |
| LOW | 2.5 | CVE-2024-58251 | CVE-2024-58251 |
| LOW | 2.4 | CVE-2023-26049 | CVE-2023-26049: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| LOW | 0.0 | CVE-2025-66453 | Rhino is an open-source implementation of JavaScript written entirely ... |