Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All Vulnerabilities
APPLICATION
Cargo | Rust
Objective-C, CocoaPods | Swift
Composer | PHP
Conan | C/C++
GitHub | Go
Hex | Elixir / Erlang
Maven | Java
npm | JavaScript
NuGet | C#/F#/VB
Pypi | Python
pub | Dart, Flutter
RubyGems | Ruby
Swift Packages | Swift
C/C++
OPERATING SYSTEM
All OS vulnerabilities
AlmaLinux
Alpine Linux
Amazon Linux
CentOS
Chainguard
Debian
MinimOS
Oracle Linux
Red Hat Enterprise Linux
Rocky Linux
SUSE Linux Enterprise Server
Ubuntu
Wolfi
Report a new vulnerability
Vulnerabilities
Packages
H
Uncaught Exception
Affects
surrealdb
| Versions
<2.1.0
H
Uncaught Exception
Affects
surrealdb-core
| Versions
<2.1.0
H
Uncaught Exception
Affects
surrealdb
| Versions
<2.1.0
H
Uncaught Exception
Affects
surrealdb-core
| Versions
<2.1.0
M
Uncaught Exception
Affects
surrealdb
| Versions
<2.1.0
M
Uncaught Exception
Affects
surrealdb-core
| Versions
<2.1.0
H
Insufficient Entropy
Affects
blahaj
| Versions
<0.6.0
H
Race Condition
Affects
s2n-tls
| Versions
<1.5.9
H
Allocation of Resources Without Limits or Throttling
Affects
zlib-rs
| Versions
<0.4.0
H
Allocation of Resources Without Limits or Throttling
Affects
libz-rs-sys
| Versions
<0.4.0
H
Allocation of Resources Without Limits or Throttling
Affects
libz-rs-sys-cdylib
| Versions
<0.4.0
M
Reliance on Undefined, Unspecified, or Implementation-Defined Behavior
Affects
fast-float
| Versions
>=0.0.0
H
Access of Uninitialized Pointer
Affects
simd-json-derive
| Versions
<0.12.0
H
Access of Uninitialized Pointer
Affects
simd-json-derive-int
| Versions
<0.12.0
M
Access of Uninitialized Pointer
Affects
mimalloc
| Versions
<0.1.39
M
Use of a Broken or Risky Cryptographic Algorithm
Affects
paillier-zk
| Versions
<0.4.1
M
Use of a Broken or Risky Cryptographic Algorithm
Affects
cggmp21-keygen
| Versions
<0.3.1
M
Use of a Broken or Risky Cryptographic Algorithm
Affects
cggmp21
| Versions
<0.4.1
M
Use of a Broken or Risky Cryptographic Algorithm
Affects
key-share
| Versions
<0.4.1
M
Improper Validation of Integrity Check Value
Affects
sp1-recursion-circuit-v2
| Versions
*
M
Improper Validation of Integrity Check Value
Affects
sp1-recursion-circuit
| Versions
<3.0.0-rc4
H
Directory Traversal
CVE-2024-51990
Affects
jj-lib
| Versions
<0.23.0
L
Directory Traversal
CVE-2024-51756
Affects
cap-async-std
| Versions
<3.4.1
L
Directory Traversal
CVE-2024-51756
Affects
cap-primitives
| Versions
<3.4.1
L
Directory Traversal
CVE-2024-51756
Affects
cap-std
| Versions
<3.4.1
M
Buffer Overflow
CVE-2024-51502
Affects
loona-hpack
| Versions
<0.4.3
M
Integer Overflow or Wraparound
Affects
sp1-recursion-gnark-ffi
| Versions
<1.2.0
M
Use After Free
CVE-2024-9979
Affects
pyo3
| Versions
>=0.22.0 <0.22.4
L
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-47813
Affects
wasmtime
| Versions
>=19.0.0 <21.0.2
>=22.0.0 <22.0.1
>=23.0.0 <23.0.3
>=24.0.0 <24.0.1
>=25.0.0 <25.0.2
M
Reachable Assertion
CVE-2024-47763
Affects
wasmtime
| Versions
>=12.0.0 <21.0.2
>=21.0.0 <21.0.2
>=22.0.0 <22.0.1
>=23.0.0 <23.0.3
>=24.0.0 <24.0.1
>=25.0.0 <25.0.2