Find out if you have vulnerabilities that put you at risk

Test your applications
Toggle filtering controls
Report a new vulnerability
VULNERABILITYAFFECTSTYPEPUBLISHED
  • H
Improper Access Control
mod_proxy_html-debuginfo<1:2.4.64-1.amzn2023.0.1amzn:20236 Aug 2025
  • H
Integer Overflow or Wraparound
perf-debuginfo<1:6.1.144-170.251.amzn2023amzn:20236 Aug 2025
  • H
Improper Access Control
mod_ldap-debuginfo<0:2.4.64-1.amzn2023.0.1amzn:20236 Aug 2025
  • H
CVE-2025-38215
kernel-livepatch-6.1.144-170.251<1:1.0-0.amzn2023amzn:20236 Aug 2025
  • H
Improper Authentication
httpd-core-debuginfo<0:2.4.64-1.amzn2023.0.1amzn:20236 Aug 2025
  • H
HTTP Response Splitting
httpd-devel<0:2.4.64-1.amzn2023.0.1amzn:20236 Aug 2025
  • H
Integer Overflow or Wraparound
python3-perf<1:6.1.144-170.251.amzn2023amzn:20236 Aug 2025
  • L
OS Command Injection
ruby3.2-rubygem-io-console-debuginfo<0:0.6.0-184.amzn2023.0.4amzn:20236 Aug 2025
  • H
Improper Access Control
mod_ldap<0:2.4.64-1.amzn2023.0.1amzn:20236 Aug 2025
  • L
OS Command Injection
ruby3.2-bundled-gems<0:3.2.8-184.amzn2023.0.4amzn:20236 Aug 2025
  • L
OS Command Injection
ruby3.2<0:3.2.8-184.amzn2023.0.4amzn:20236 Aug 2025
  • L
OS Command Injection
ruby3.2-rubygem-io-console<0:0.6.0-184.amzn2023.0.4amzn:20236 Aug 2025
  • H
Improper Output Neutralization for Logs
httpd<0:2.4.64-1.amzn2023.0.1amzn:20236 Aug 2025
  • L
OS Command Injection
ruby3.2-rubygem-typeprof<0:0.21.3-184.amzn2023.0.4amzn:20236 Aug 2025
  • H
HTTP Response Splitting
httpd-manual<0:2.4.64-1.amzn2023.0.1amzn:20236 Aug 2025
  • L
OS Command Injection
ruby3.2-rubygem-json<0:2.6.3-184.amzn2023.0.4amzn:20236 Aug 2025
  • H
HTTP Response Splitting
httpd-core<0:2.4.64-1.amzn2023.0.1amzn:20236 Aug 2025
  • L
OS Command Injection
ruby3.2-rubygem-power_assert<0:2.0.3-184.amzn2023.0.4amzn:20236 Aug 2025
  • H
CVE-2025-38231
kernel6.12-debuginfo-common-aarch64<0:6.12.35-55.103.amzn2023amzn:20236 Aug 2025
  • H
Improper Output Neutralization for Logs
mod_ldap-debuginfo<0:2.4.64-1.amzn2023.0.1amzn:20236 Aug 2025
  • H
Acceptance of Extraneous Untrusted Data With Trusted Data
unbound-utils<0:1.17.1-1.amzn2023.0.8amzn:20236 Aug 2025
  • M
Resource Exhaustion
nodejs-full-i18n<1:18.20.8-1.amzn2023.0.2amzn:20236 Aug 2025
  • L
OS Command Injection
ruby3.2-bundled-gems-debuginfo<0:3.2.8-184.amzn2023.0.4amzn:20236 Aug 2025
  • H
Integer Overflow or Wraparound
kernel-libbpf<1:6.1.144-170.251.amzn2023amzn:20236 Aug 2025
  • H
Acceptance of Extraneous Untrusted Data With Trusted Data
unbound-devel<0:1.17.1-1.amzn2023.0.8amzn:20236 Aug 2025
  • M
Directory Traversal
pam-docs<0:1.5.1-8.amzn2023.0.6amzn:20236 Aug 2025
  • H
Server-Side Request Forgery (SSRF)
httpd-core-debuginfo<0:2.4.64-1.amzn2023.0.1amzn:20236 Aug 2025
  • H
CVE-2025-38154
kernel-livepatch-6.1.144-170.251<1:1.0-0.amzn2023amzn:20236 Aug 2025
  • H
CVE-2025-38154
kernel-tools<1:6.1.144-170.251.amzn2023amzn:20236 Aug 2025
  • H
CVE-2025-38147
python3-perf-debuginfo<1:6.1.144-170.251.amzn2023amzn:20236 Aug 2025