Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All Vulnerabilities
APPLICATION
Cargo | Rust
Objective-C, CocoaPods | Swift
Composer | PHP
Conan | C/C++
GitHub | Go
Hex | Elixir / Erlang
Maven | Java
npm | JavaScript
NuGet | C#/F#/VB
Pypi | Python
pub | Dart, Flutter
RubyGems | Ruby
Swift Packages | Swift
C/C++
OPERATING SYSTEM
All OS vulnerabilities
AlmaLinux
Alpine Linux
Amazon Linux
CentOS
Chainguard
Debian
MinimOS
Oracle Linux
Red Hat Enterprise Linux
Rocky Linux
SUSE Linux Enterprise Server
Ubuntu
Wolfi
Report a new vulnerability
Vulnerabilities
Packages
C
Improper Following of Specification by Caller
CVE-2026-41583
Affects
zebra-script
| Versions
<5.0.1
C
Reachable Assertion
CVE-2026-41584
Affects
zebrad
| Versions
<4.3.1
C
Reachable Assertion
CVE-2026-41584
Affects
zebra-chain
| Versions
<6.0.2
H
Comparison Using Wrong Factors
CVE-2026-40880
Affects
zebra-consensus
| Versions
<5.0.2
H
Comparison Using Wrong Factors
CVE-2026-40880
Affects
zebrad
| Versions
<4.3.1
M
Allocation of Resources Without Limits or Throttling
CVE-2026-40881
Affects
zebrad
| Versions
<4.3.1
M
Allocation of Resources Without Limits or Throttling
CVE-2026-40881
Affects
zebra-network
| Versions
<5.0.1
M
HTTP Request Smuggling
Affects
actix-http
| Versions
<3.12.1
M
Insufficient Verification of Data Authenticity
CVE-2026-6967
Affects
tough
| Versions
<0.22.0
M
Insufficient Verification of Data Authenticity
CVE-2026-6967
Affects
tuftool
| Versions
<0.15.0
M
Improper Verification of Cryptographic Signature
CVE-2026-6966
Affects
tuftool
| Versions
<0.15.0
M
Improper Verification of Cryptographic Signature
CVE-2026-6966
Affects
tough
| Versions
<0.22.0
M
Directory Traversal
CVE-2026-6968
Affects
tuftool
| Versions
<0.15.0
M
Directory Traversal
CVE-2026-6968
Affects
tough
| Versions
<0.22.0
H
Out-of-bounds Read
Affects
rustls-webpki
| Versions
<0.103.13
>=0.104.0-alpha.1 <0.104.0-alpha.7
M
Improper Preservation of Permissions
CVE-2026-35351
Affects
coreutils
| Versions
>=0.0.0
M
Improper Preservation of Permissions
CVE-2026-35350
Affects
coreutils
| Versions
>=0.0.0
M
Insecure Temporary File
CVE-2026-35342
Affects
coreutils
| Versions
<0.6.0
M
Improper Handling of Unicode Encoding
CVE-2026-35346
Affects
coreutils
| Versions
<0.6.0
M
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2026-35345
Affects
coreutils
| Versions
>=0.0.0
M
Unchecked Return Value
CVE-2026-35344
Affects
coreutils
| Versions
>=0.0.0
M
Improper Input Validation
CVE-2026-35347
Affects
coreutils
| Versions
<0.6.0
H
Incorrect Permission Assignment for Critical Resource
CVE-2026-35341
Affects
coreutils
| Versions
>=0.0.0
M
Incorrect Check of Function Return Value
CVE-2026-35340
Affects
coreutils
| Versions
<0.6.0
H
Directory Traversal
CVE-2026-35338
Affects
coreutils
| Versions
<0.6.0
M
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2026-35359
Affects
coreutils
| Versions
>=0.0.0
M
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2026-35353
Affects
coreutils
| Versions
<0.6.0
M
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2026-35355
Affects
coreutils
| Versions
<0.6.0
M
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2026-35354
Affects
coreutils
| Versions
>=0.0.0
M
Use of Incorrectly-Resolved Name or Reference
CVE-2026-35358
Affects
coreutils
| Versions
<0.7.0