Skip to Content

Putki Security Vulnerability Scans

Last Updated: 05 Mar 2026 00:37:28

Development

Severity Breakdown

SeverityCount
HIGH3
MEDIUM12
LOW3

Details for version: Development

CVE Details for Version: Development

SeverityScoreCVE IDDescription
HIGH9.3CVE-2008-0888CVE-2008-0888
HIGH8.7GHSA-72hv-8253-57qqGHSA-72hv-8253-57qq: Allocation of Resources Without Limits or Throttling
HIGH7.5CVE-2022-41404CVE-2022-41404: Uncontrolled Resource Consumption
MEDIUM6.5CVE-2016-5004CVE-2016-5004: Uncontrolled Resource Consumption
MEDIUM6.5CVE-2024-45993CVE-2024-45993
MEDIUM6.5CVE-2025-48924CVE-2025-48924: Uncontrolled Recursion
MEDIUM6.5CVE-2025-60876CVE-2025-60876
MEDIUM6.3CVE-2025-14017CVE-2025-14017
MEDIUM6.3CVE-2025-8916CVE-2025-8916: Allocation of Resources Without Limits or Throttling
MEDIUM5.9CVE-2025-13034CVE-2025-13034
MEDIUM5.9CVE-2026-28208com.github.junrar/junrar: Junrar: Remote code execution via path traversal when extracting crafted RAR archives
MEDIUM5.7CVE-2025-46551CVE-2025-46551: Improper Certificate Validation
MEDIUM5.3CVE-2025-14524CVE-2025-14524
MEDIUM5.3CVE-2025-14819CVE-2025-14819
MEDIUM5.3CVE-2025-15079CVE-2025-15079
LOW3.3CVE-2026-3293snowflake-jdbc: snowflake-jdbc: Denial of Service via inefficient regular expression processing
LOW3.1CVE-2025-15224CVE-2025-15224
LOW2.9CVE-2026-27171CVE-2026-27171

2025.08

Severity Breakdown

SeverityCount
CRITICAL3
HIGH27
MEDIUM50
LOW13

Details for version: 2025.08

CVE Details for Version: 2025.08

SeverityScoreCVE IDDescription
CRITICAL10.0CVE-2025-66516CVE-2025-66516: Improper Restriction of XML External Entity Reference
CRITICAL9.8CVE-2025-15467CVE-2025-15467
CRITICAL9.3CVE-2025-54988CVE-2025-54988: Improper Restriction of XML External Entity Reference
HIGH8.8CVE-2025-48734CVE-2025-48734: Improper Access Control
HIGH8.7CVE-2023-52428CVE-2023-52428: Uncontrolled Resource Consumption
HIGH8.7GHSA-72hv-8253-57qqGHSA-72hv-8253-57qq: Allocation of Resources Without Limits or Throttling
HIGH8.3CVE-2026-25646CVE-2026-25646
HIGH8.2CVE-2025-49146CVE-2025-49146: Improper Authentication
HIGH8.2CVE-2025-55163CVE-2025-55163: Allocation of Resources Without Limits or Throttling
HIGH8.1CVE-2025-59250CVE-2025-59250: Improper Input Validation
HIGH7.7CVE-2024-47072CVE-2024-47072: Stack-based Buffer Overflow
HIGH7.5CVE-2021-31684CVE-2021-31684: Out-of-bounds Read
HIGH7.5CVE-2022-41404CVE-2022-41404: Uncontrolled Resource Consumption
HIGH7.5CVE-2023-1370CVE-2023-1370: Uncontrolled Recursion
HIGH7.5CVE-2025-13151CVE-2025-13151
HIGH7.5CVE-2025-53066CVE-2025-53066
HIGH7.5CVE-2025-59375CVE-2025-59375
HIGH7.5CVE-2025-69420CVE-2025-69420
HIGH7.5CVE-2025-69421CVE-2025-69421
HIGH7.5CVE-2025-9086CVE-2025-9086
HIGH7.5CVE-2025-9230CVE-2025-9230
HIGH7.5CVE-2026-21945CVE-2026-21945
HIGH7.4CVE-2025-69419CVE-2025-69419
HIGH7.4CVE-2026-21932CVE-2026-21932
HIGH7.2CVE-2024-13009CVE-2024-13009: Improper Resource Shutdown or Release
HIGH7.1CVE-2025-64720CVE-2025-64720
HIGH7.1CVE-2025-65018CVE-2025-65018
HIGH7.1CVE-2025-66293CVE-2025-66293
HIGH0.0CVE-2025-12183lz4-java: lz4-java: Out-of-bounds memory operations lead to denial of service and information disclosure
HIGH0.0CVE-2025-66566lz4-java: lz4-java: Information Disclosure via Insufficient Output Buffer Clearing
MEDIUM6.9CVE-2025-31672CVE-2025-31672: Improper Input Validation
MEDIUM6.9CVE-2025-58050CVE-2025-58050
MEDIUM6.9CVE-2025-58057CVE-2025-58057: Improper Handling of Highly Compressed Data (Data Amplification)
MEDIUM6.9CVE-2026-25210CVE-2026-25210
MEDIUM6.8CVE-2025-4949CVE-2025-4949: Improper Restriction of XML External Entity Reference
MEDIUM6.8CVE-2026-22801CVE-2026-22801
MEDIUM6.5CVE-2016-5004CVE-2016-5004: Uncontrolled Resource Consumption
MEDIUM6.5CVE-2024-45993CVE-2024-45993
MEDIUM6.5CVE-2025-48924CVE-2025-48924: Uncontrolled Recursion
MEDIUM6.5CVE-2025-60876CVE-2025-60876
MEDIUM6.5CVE-2025-67735CVE-2025-67735: Improper Neutralization of CRLF Sequences ('CRLF Injection')
MEDIUM6.5CVE-2025-9231CVE-2025-9231
MEDIUM6.3CVE-2024-6763CVE-2024-6763: Improper Validation of Syntactic Correctness of Input
MEDIUM6.3CVE-2025-14017CVE-2025-14017
MEDIUM6.3CVE-2025-68161CVE-2025-68161: Improper Validation of Certificate with Host Mismatch
MEDIUM6.3CVE-2025-8916CVE-2025-8916: Allocation of Resources Without Limits or Throttling
MEDIUM6.2CVE-2025-27817CVE-2025-27817: Server-Side Request Forgery (SSRF)
MEDIUM6.1CVE-2025-11187CVE-2025-11187
MEDIUM6.1CVE-2025-22227CVE-2025-22227: Exposure of Sensitive Information to an Unauthorized Actor
MEDIUM6.1CVE-2025-64505CVE-2025-64505
MEDIUM6.1CVE-2025-64506CVE-2025-64506
MEDIUM6.1CVE-2026-21933CVE-2026-21933
MEDIUM6.1CVE-2026-22695CVE-2026-22695
MEDIUM5.9CVE-2024-8184CVE-2024-8184: Uncontrolled Resource Consumption
MEDIUM5.9CVE-2025-13034CVE-2025-13034
MEDIUM5.9CVE-2025-15468CVE-2025-15468
MEDIUM5.9CVE-2025-53057CVE-2025-53057
MEDIUM5.9CVE-2025-62408CVE-2025-62408
MEDIUM5.9CVE-2025-66199CVE-2025-66199
MEDIUM5.9CVE-2025-9232CVE-2025-9232
MEDIUM5.9CVE-2026-28208com.github.junrar/junrar: Junrar: Remote code execution via path traversal when extracting crafted RAR archives
MEDIUM5.8CVE-2025-53864CVE-2025-53864: Uncontrolled Recursion
MEDIUM5.7CVE-2025-46551CVE-2025-46551: Improper Certificate Validation
MEDIUM5.5CVE-2023-2976CVE-2023-2976: Creation of Temporary File in Directory with Insecure Permissions
MEDIUM5.5CVE-2025-15469CVE-2025-15469
MEDIUM5.5CVE-2026-22795CVE-2026-22795
MEDIUM5.3CVE-2021-34429CVE-2021-34429: Exposure of Sensitive Information to an Unauthorized Actor
MEDIUM5.3CVE-2023-26048CVE-2023-26048: Uncontrolled Resource Consumption
MEDIUM5.3CVE-2023-40167CVE-2023-40167: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
MEDIUM5.3CVE-2024-9823CVE-2024-9823: Uncontrolled Resource Consumption
MEDIUM5.3CVE-2025-10148CVE-2025-10148
MEDIUM5.3CVE-2025-14524CVE-2025-14524
MEDIUM5.3CVE-2025-14819CVE-2025-14819
MEDIUM5.3CVE-2025-15079CVE-2025-15079
MEDIUM5.3CVE-2026-22796CVE-2026-22796
MEDIUM4.8CVE-2026-21925CVE-2026-21925
MEDIUM4.7CVE-2025-68160CVE-2025-68160
MEDIUM4.3CVE-2023-41900CVE-2023-41900: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
MEDIUM4.3CVE-2025-10966CVE-2025-10966
MEDIUM4.0CVE-2025-69418CVE-2025-69418
LOW3.9GHSA-58qw-p7qm-5rvhGHSA-58qw-p7qm-5rvh: Improper Restriction of XML External Entity Reference
LOW3.5CVE-2023-36479CVE-2023-36479: Improper Neutralization of Quoting Syntax
LOW3.3CVE-2020-8908CVE-2020-8908: Improper Handling of Alternate Encoding
LOW3.3CVE-2026-3293snowflake-jdbc: snowflake-jdbc: Denial of Service via inefficient regular expression processing
LOW3.2CVE-2025-46394CVE-2025-46394
LOW3.1CVE-2025-15224CVE-2025-15224
LOW3.1CVE-2025-58056CVE-2025-58056: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
LOW2.9CVE-2026-24515CVE-2026-24515
LOW2.9CVE-2026-27171CVE-2026-27171
LOW2.7CVE-2022-2047CVE-2022-2047: Improper Input Validation
LOW2.5CVE-2024-58251CVE-2024-58251
LOW2.4CVE-2023-26049CVE-2023-26049: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
LOW0.0CVE-2025-66453Rhino is an open-source implementation of JavaScript written entirely ...

2025.05

Severity Breakdown

SeverityCount
CRITICAL3
HIGH30
MEDIUM52
LOW13

Details for version: 2025.05

CVE Details for Version: 2025.05

SeverityScoreCVE IDDescription
CRITICAL10.0CVE-2025-66516CVE-2025-66516: Improper Restriction of XML External Entity Reference
CRITICAL9.8CVE-2025-15467CVE-2025-15467
CRITICAL9.3CVE-2025-54988CVE-2025-54988: Improper Restriction of XML External Entity Reference
HIGH8.8CVE-2025-48734CVE-2025-48734: Improper Access Control
HIGH8.7CVE-2023-52428CVE-2023-52428: Uncontrolled Resource Consumption
HIGH8.7GHSA-72hv-8253-57qqGHSA-72hv-8253-57qq: Allocation of Resources Without Limits or Throttling
HIGH8.6CVE-2025-50059CVE-2025-50059
HIGH8.3CVE-2026-25646CVE-2026-25646
HIGH8.2CVE-2025-49146CVE-2025-49146: Improper Authentication
HIGH8.2CVE-2025-55163CVE-2025-55163: Allocation of Resources Without Limits or Throttling
HIGH8.1CVE-2025-30749CVE-2025-30749
HIGH8.1CVE-2025-50106CVE-2025-50106
HIGH8.1CVE-2025-59250CVE-2025-59250: Improper Input Validation
HIGH7.7CVE-2024-47072CVE-2024-47072: Stack-based Buffer Overflow
HIGH7.5CVE-2021-31684CVE-2021-31684: Out-of-bounds Read
HIGH7.5CVE-2022-41404CVE-2022-41404: Uncontrolled Resource Consumption
HIGH7.5CVE-2023-1370CVE-2023-1370: Uncontrolled Recursion
HIGH7.5CVE-2025-13151CVE-2025-13151
HIGH7.5CVE-2025-53066CVE-2025-53066
HIGH7.5CVE-2025-59375CVE-2025-59375
HIGH7.5CVE-2025-69420CVE-2025-69420
HIGH7.5CVE-2025-69421CVE-2025-69421
HIGH7.5CVE-2025-9086CVE-2025-9086
HIGH7.5CVE-2025-9230CVE-2025-9230
HIGH7.5CVE-2026-21945CVE-2026-21945
HIGH7.4CVE-2025-69419CVE-2025-69419
HIGH7.4CVE-2026-21932CVE-2026-21932
HIGH7.2CVE-2024-13009CVE-2024-13009: Improper Resource Shutdown or Release
HIGH7.1CVE-2025-64720CVE-2025-64720
HIGH7.1CVE-2025-65018CVE-2025-65018
HIGH7.1CVE-2025-66293CVE-2025-66293
HIGH0.0CVE-2025-12183lz4-java: lz4-java: Out-of-bounds memory operations lead to denial of service and information disclosure
HIGH0.0CVE-2025-66566lz4-java: lz4-java: Information Disclosure via Insufficient Output Buffer Clearing
MEDIUM6.9CVE-2025-31672CVE-2025-31672: Improper Input Validation
MEDIUM6.9CVE-2025-58050CVE-2025-58050
MEDIUM6.9CVE-2025-58057CVE-2025-58057: Improper Handling of Highly Compressed Data (Data Amplification)
MEDIUM6.9CVE-2026-25210CVE-2026-25210
MEDIUM6.8CVE-2025-4949CVE-2025-4949: Improper Restriction of XML External Entity Reference
MEDIUM6.8CVE-2026-22801CVE-2026-22801
MEDIUM6.5CVE-2016-5004CVE-2016-5004: Uncontrolled Resource Consumption
MEDIUM6.5CVE-2024-45993CVE-2024-45993
MEDIUM6.5CVE-2025-4575CVE-2025-4575
MEDIUM6.5CVE-2025-48924CVE-2025-48924: Uncontrolled Recursion
MEDIUM6.5CVE-2025-60876CVE-2025-60876
MEDIUM6.5CVE-2025-67735CVE-2025-67735: Improper Neutralization of CRLF Sequences ('CRLF Injection')
MEDIUM6.5CVE-2025-9231CVE-2025-9231
MEDIUM6.3CVE-2024-6763CVE-2024-6763: Improper Validation of Syntactic Correctness of Input
MEDIUM6.3CVE-2025-14017CVE-2025-14017
MEDIUM6.3CVE-2025-68161CVE-2025-68161: Improper Validation of Certificate with Host Mismatch
MEDIUM6.3CVE-2025-8916CVE-2025-8916: Allocation of Resources Without Limits or Throttling
MEDIUM6.2CVE-2025-27817CVE-2025-27817: Server-Side Request Forgery (SSRF)
MEDIUM6.1CVE-2025-11187CVE-2025-11187
MEDIUM6.1CVE-2025-22227CVE-2025-22227: Exposure of Sensitive Information to an Unauthorized Actor
MEDIUM6.1CVE-2025-64505CVE-2025-64505
MEDIUM6.1CVE-2025-64506CVE-2025-64506
MEDIUM6.1CVE-2026-21933CVE-2026-21933
MEDIUM6.1CVE-2026-22695CVE-2026-22695
MEDIUM5.9CVE-2024-8184CVE-2024-8184: Uncontrolled Resource Consumption
MEDIUM5.9CVE-2025-13034CVE-2025-13034
MEDIUM5.9CVE-2025-15468CVE-2025-15468
MEDIUM5.9CVE-2025-53057CVE-2025-53057
MEDIUM5.9CVE-2025-62408CVE-2025-62408
MEDIUM5.9CVE-2025-66199CVE-2025-66199
MEDIUM5.9CVE-2025-9232CVE-2025-9232
MEDIUM5.9CVE-2026-28208com.github.junrar/junrar: Junrar: Remote code execution via path traversal when extracting crafted RAR archives
MEDIUM5.8CVE-2025-53864CVE-2025-53864: Uncontrolled Recursion
MEDIUM5.7CVE-2025-46551CVE-2025-46551: Improper Certificate Validation
MEDIUM5.5CVE-2023-2976CVE-2023-2976: Creation of Temporary File in Directory with Insecure Permissions
MEDIUM5.5CVE-2025-15469CVE-2025-15469
MEDIUM5.5CVE-2026-22795CVE-2026-22795
MEDIUM5.3CVE-2021-34429CVE-2021-34429: Exposure of Sensitive Information to an Unauthorized Actor
MEDIUM5.3CVE-2023-26048CVE-2023-26048: Uncontrolled Resource Consumption
MEDIUM5.3CVE-2023-40167CVE-2023-40167: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
MEDIUM5.3CVE-2024-9823CVE-2024-9823: Uncontrolled Resource Consumption
MEDIUM5.3CVE-2025-10148CVE-2025-10148
MEDIUM5.3CVE-2025-14524CVE-2025-14524
MEDIUM5.3CVE-2025-14819CVE-2025-14819
MEDIUM5.3CVE-2025-15079CVE-2025-15079
MEDIUM5.3CVE-2026-22796CVE-2026-22796
MEDIUM4.8CVE-2025-30754CVE-2025-30754
MEDIUM4.8CVE-2026-21925CVE-2026-21925
MEDIUM4.7CVE-2025-68160CVE-2025-68160
MEDIUM4.3CVE-2023-41900CVE-2023-41900: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
MEDIUM4.3CVE-2025-10966CVE-2025-10966
MEDIUM4.0CVE-2025-69418CVE-2025-69418
LOW3.9GHSA-58qw-p7qm-5rvhGHSA-58qw-p7qm-5rvh: Improper Restriction of XML External Entity Reference
LOW3.5CVE-2023-36479CVE-2023-36479: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
LOW3.3CVE-2020-8908CVE-2020-8908: Improper Handling of Alternate Encoding
LOW3.3CVE-2026-3293snowflake-jdbc: snowflake-jdbc: Denial of Service via inefficient regular expression processing
LOW3.2CVE-2025-46394CVE-2025-46394
LOW3.1CVE-2025-15224CVE-2025-15224
LOW3.1CVE-2025-58056CVE-2025-58056: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
LOW2.9CVE-2026-24515CVE-2026-24515
LOW2.9CVE-2026-27171CVE-2026-27171
LOW2.7CVE-2022-2047CVE-2022-2047: Improper Input Validation
LOW2.5CVE-2024-58251CVE-2024-58251
LOW2.4CVE-2023-26049CVE-2023-26049: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
LOW0.0CVE-2025-66453Rhino is an open-source implementation of JavaScript written entirely ...