Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

JUNG — Vulnerabilities & Security Advisories 7

Browse all 7 CVE security advisories affecting JUNG. AI-powered Chinese analysis, POCs, and references for each vulnerability.

JUNG is a Java-based network graph visualization library primarily used for rendering interactive graph structures in applications. Historically, it has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues due to insecure deserialization and improper input validation. The library's complex architecture and extensive API surface have contributed to these security challenges. While no major public incidents have been widely documented, the seven CVEs recorded highlight ongoing security concerns, particularly around deserialization and input handling. Developers implementing JUNG should ensure proper input sanitization and consider sandboxing to mitigate potential risks from untrusted graph data.

Found 3 results / 7Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2017-20084 JUNG Smart Visu Server KNX Group Address backdoor — Smart Visu ServerCWE-912 5.3 Medium2022-06-22
CVE-2017-20083 JUNG Smart Visu Server SSH Server backdoor — Smart Visu ServerCWE-912 5.3 Medium2022-06-22
CVE-2017-20082 JUNG Smart Visu Server backdoor — Smart Visu ServerCWE-912 5.5 Medium2022-06-22

This page lists every published CVE security advisory associated with JUNG. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.