Software catalogue for Eclipse

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › Eclipse

Software catalogue for Eclipse

AspectJ DTLS server Eclipse Birt Eclipse Buildship Eclipse Californium Eclipse Che Eclipse Equinox Eclipse IDE for Java Eclipse JDT Core Spring Plugin Eclipse Memory Analyzer
Eclipse Mosquitto Eclipse Platform Eclipse Platform Text Eclipse Theia Equinox GlassFish Jakarta Activation Jakarta Annotations Jakarta Mail Jakarta SOAP with Attachments


Showing elements 1 - 20 out of 36

  • Previous
  • 2
  • Next

Latest security bulletins

Secuity bulletin Severity Status Published
SB2026030559: Memory leak when handling gzip content in Eclipse Jetty Medium
Patched
05.03.2026
SB2026030558: Security restrictions bypass in Eclipse Jetty Low
Patched
05.03.2026
SB2026012071: Race condition in Eclipse Jersey Medium
Patched
20.01.2026
SB2025120346: Missing authentication in Eclipse Che machine-exec API Critical
Not patched Exploited
03.12.2025
SB2025102374: Multiple vulnerabilities in Vert.x-Web Medium
Patched
23.10.2025
SB2025082154: SMTP command injection in Jakarta Mail Medium
Patched
21.08.2025
SB2025082101: HTTP/2 Made You Reset Attack in Jetty Medium
Patched
21.08.2025
SB2025081408: XML external entity injection in Eclipse JGit High
Patched
14.08.2025
SB2025070315: Stack-based buffer overflow in Eclipse OpenJ9 Medium
Patched
03.07.2025
SB2025050925: Improper input validation in Jetty GzipHandler Medium
Patched
09.05.2025

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or