Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-43035 | In Eclipse Openj9 before version 0.35.0, interface calls can be inlined without a runtime type check. Malicious bytecode could make use of this inlining to access or modify memory via an incompatible type. |
Wed, 07 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2025-05-07T15:59:25.715Z
Reserved: 2022-10-24T00:00:00.000Z
Link: CVE-2022-3676
Updated: 2024-08-03T01:14:03.367Z
Status : Modified
Published: 2022-10-24T14:15:51.953
Modified: 2025-05-07T16:15:20.613
Link: CVE-2022-3676
No data.
OpenCVE Enrichment
No data.
EUVD