Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
graalvm_for_jdk Vendor: oracle

About This Product

graalvm_for_jdk is a software product developed by oracle, a major technology provider with a global presence in enterprise and consumer markets. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 51 known vulnerabilities affecting oracle graalvm_for_jdk. This includes 11 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2023 to 2026, indicating a recent active security attention. 17 medium-severity issues and 23 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2023-22006 2023-07-18 2024-11-21 3.1 - -
CVE-2023-22036 2023-07-18 2024-11-21 3.7 - -
CVE-2023-22041 2023-07-18 2024-11-21 5.1 - -
CVE-2023-22044 2023-07-18 2024-11-21 3.7 - -
CVE-2023-22045 2023-07-18 2024-11-21 3.7 - -
CVE-2023-22049 2023-07-18 2024-11-21 3.7 - -
CVE-2023-22051 2023-07-18 2024-11-21 3.7 - -
CVE-2023-22025 2023-10-17 2024-11-21 3.7 - -
CVE-2023-22081 2023-10-17 2025-11-03 5.3 - -
CVE-2023-22091 2023-10-17 2024-11-21 4.8 - -
CVE-2024-20918 2024-01-16 2025-11-03 7.4 - -
CVE-2024-20926 2024-01-16 2025-11-03 5.9 - -
CVE-2024-20932 2024-01-16 2024-11-21 7.5 - -
CVE-2024-20952 2024-01-16 2025-11-03 7.4 - -
CVE-2024-20955 2024-01-16 2025-06-03 3.7 - -
CVE-2024-20919 2024-02-17 2025-11-04 5.9 - -
CVE-2024-20921 2024-02-17 2025-11-04 5.9 - -
CVE-2024-20945 2024-02-17 2025-11-04 4.7 - -
CVE-2024-20954 2024-04-16 2024-12-06 3.7 - -
CVE-2024-21011 2024-04-16 2025-05-21 3.7 - -
CVE-2024-21012 2024-04-16 2025-05-21 3.7 - -
CVE-2024-21068 2024-04-16 2024-12-06 3.7 - -
CVE-2024-21094 2024-04-16 2025-05-21 3.7 - -
CVE-2024-21098 2024-04-16 2024-12-06 3.7 - -
CVE-2024-21131 2024-07-16 2024-12-05 3.7 - -
CVE-2024-21138 2024-07-16 2024-12-05 3.7 - -
CVE-2024-21140 2024-07-16 2025-06-18 4.8 - -
CVE-2024-21145 2024-07-16 2025-03-13 4.8 - -
CVE-2024-21147 2024-07-16 2025-06-17 7.4 - -
CVE-2024-21208 2024-10-15 2025-11-03 3.7 - -
CVE-2024-21211 2024-10-15 2025-06-23 3.7 - -
CVE-2024-21217 2024-10-15 2025-11-03 3.7 - -
CVE-2024-21235 2024-10-15 2025-11-03 4.8 - -
CVE-2025-21502 2025-01-21 2025-06-18 4.8 - -
CVE-2025-21587 2025-04-15 2025-11-03 7.4 - -
CVE-2025-30691 2025-04-15 2025-11-03 4.8 - -
CVE-2025-30698 2025-04-15 2025-11-03 5.6 - -
CVE-2025-30749 2025-07-15 2025-11-03 8.1 - -
CVE-2025-30752 2025-07-15 2025-08-04 3.7 - -
CVE-2025-30754 2025-07-15 2025-11-03 4.8 - -
CVE-2025-50059 2025-07-15 2025-11-03 8.6 - -
CVE-2025-50065 2025-07-15 2025-08-04 3.7 - -
CVE-2025-50106 2025-07-15 2025-11-03 8.1 - -
CVE-2025-53057 2025-10-21 2025-11-03 5.9 - -
CVE-2025-53066 2025-10-21 2025-11-03 7.5 - -
CVE-2025-61748 2025-10-21 2025-10-28 3.7 - -
CVE-2025-61755 2025-10-21 2025-10-27 3.7 - -
CVE-2026-21925 2026-01-20 2026-01-30 4.8 - -
CVE-2026-21932 2026-01-20 2026-01-30 7.4 - -
CVE-2026-21933 2026-01-20 2026-01-30 6.1 - -
CVE-2026-21945 2026-01-20 2026-01-30 7.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for oracle graalvm_for_jdk by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.