Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All Vulnerabilities
APPLICATION
Cargo | Rust
Objective-C, CocoaPods | Swift
Composer | PHP
Conan | C/C++
GitHub | Go
Hex | Elixir / Erlang
Maven | Java
npm | JavaScript
NuGet | C#/F#/VB
Pypi | Python
pub | Dart, Flutter
RubyGems | Ruby
Swift Packages | Swift
C/C++
OPERATING SYSTEM
All OS vulnerabilities
AlmaLinux
Alpine Linux
Amazon Linux
CentOS
Chainguard
Debian
MinimOS
Oracle Linux
Red Hat Enterprise Linux
Rocky Linux
SUSE Linux Enterprise Server
Ubuntu
Wolfi
Report a new vulnerability
Vulnerabilities
Packages
L
Integer Underflow (Wrap or Wraparound)
CVE-2026-40386
Affects
libexif
| Versions
[0,]
L
Integer Underflow (Wrap or Wraparound)
CVE-2026-40386
Affects
libexif/libexif
| Versions
[,0.6.26)
L
Integer Overflow or Wraparound
CVE-2026-40385
Affects
libexif
| Versions
[0,]
L
Integer Overflow or Wraparound
CVE-2026-40385
Affects
libexif/libexif
| Versions
[,0.6.26)
L
UNIX Symbolic Link (Symlink) Following
CVE-2026-40354
Affects
flatpak/xdg-desktop-portal
| Versions
[,1.20.4)
[1.21.0,1.21.1)
H
Uncontrolled Search Path Element
CVE-2026-4158
Affects
keepassxreboot/keepassxc
| Versions
[,2.7.12)
M
Improper Null Termination
CVE-2026-33948
Affects
jqlang/jq
| Versions
[0,]
H
Use of Weak Hash
CVE-2026-40164
Affects
jqlang/jq
| Versions
[0,]
M
Out-of-bounds Read
CVE-2026-39956
Affects
jqlang/jq
| Versions
[0,]
M
Uncontrolled Recursion
CVE-2026-33947
Affects
jqlang/jq
| Versions
[0,]
M
Out-of-bounds Read
CVE-2026-39979
Affects
jqlang/jq
| Versions
[0,]
H
Heap-based Buffer Overflow
CVE-2026-32316
Affects
jqlang/jq
| Versions
[0,]
M
Binding to an Unrestricted IP Address
Affects
openclaw
| Versions
<2026.4.10
H
Missing Authentication for Critical Function
Affects
openclaw
| Versions
>=2026.2.21 <2026.4.10
M
Incorrect Authorization
Affects
openclaw
| Versions
<2026.4.10
M
Incorrect Authorization
Affects
@openclaw/nostr
| Versions
>=0.0.0
H
Directory Traversal
Affects
openclaw
| Versions
<2026.4.10
H
Incorrect Authorization
Affects
openclaw
| Versions
>=2026.4.5 <2026.4.10
M
Directory Traversal
Affects
openclaw
| Versions
>=2026.4.7 <2026.4.10
M
Time-of-check Time-of-use (TOCTOU) Race Condition
Affects
openclaw
| Versions
>=2026.3.31 <2026.4.10
H
Use of a Key Past its Expiration Date
Affects
openclaw
| Versions
<2026.4.15-beta.1
M
Incorrect Authorization
Affects
openclaw
| Versions
>=2026.4.9 <2026.4.10
C
Insecure Default Initialization of Resource
Affects
@openclaw/feishu
| Versions
>=2026.3.12
H
External Control of File Name or Path
CVE-2026-41389
Affects
openclaw
| Versions
>=2026.4.7-1 <2026.4.15-beta.1
H
Incorrect Authorization
Affects
openclaw
| Versions
>=2026.4.5 <2026.4.10
M
Incorrect Authorization
Affects
openclaw
| Versions
>=2026.4.7-1 <2026.4.14-beta.1
H
LDAP Injection
CVE-2026-40459
Affects
org.pac4j:pac4j-ldap
| Versions
[,4.5.10)
[5.0.0-RC1,5.7.10)
[6.0.0-RC1,6.4.1)
H
Cross-site Request Forgery (CSRF)
CVE-2026-40458
Affects
org.pac4j:pac4j-core
| Versions
[5.0.0-RC1,5.7.10)
[6.0.0-RC1,6.4.1)
H
Authentication Bypass Using an Alternate Path or Channel
CVE-2026-3605
Affects
github.com/hashicorp/vault/api
| Versions
>=0.10.0 <2.0.0
M
Use of a Broken or Risky Cryptographic Algorithm
Affects
flowise-components
| Versions
<3.1.0