Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All Vulnerabilities
APPLICATION
Cargo | Rust
Objective-C, CocoaPods | Swift
Composer | PHP
Conan | C/C++
GitHub | Go
Hex | Elixir / Erlang
Maven | Java
npm | JavaScript
NuGet | C#/F#/VB
Pypi | Python
pub | Dart, Flutter
RubyGems | Ruby
Swift Packages | Swift
C/C++
OPERATING SYSTEM
All OS vulnerabilities
AlmaLinux
Alpine Linux
Amazon Linux
CentOS
Chainguard
Debian
MinimOS
Oracle Linux
Red Hat Enterprise Linux
Rocky Linux
SUSE Linux Enterprise Server
Ubuntu
Wolfi
Report a new vulnerability
Vulnerabilities
Packages
H
Use After Free
CVE-2025-66627
Affects
wasmi
| Versions
>=0.41.0 <0.41.2
>=0.42.0 <0.47.1
>=0.50.0 <0.51.3
>=1.0.0 <1.0.1
M
Improper Handling of Exceptional Conditions
CVE-2025-66622
Affects
matrix-sdk-base
| Versions
<0.16.0
C
Malicious Package
Affects
sha-rust
| Versions
*
C
Malicious Package
Affects
finch-rust
| Versions
*
C
Malicious Package
Affects
evm-units
| Versions
*
H
Use of a Broken or Risky Cryptographic Algorithm
Affects
libcrux-intrinsics
| Versions
>=0.0.3 <0.0.4
M
Regular Expression Denial of Service (ReDoS)
Affects
rumdl
| Versions
<0.0.179
H
Out-of-Bounds
Affects
maxminddb
| Versions
>=0.11.0 <0.27.0
H
Allocation of Resources Without Limits or Throttling
CVE-2025-64334
Affects
suricata-htp
| Versions
>=8.0.0 <8.0.2
M
Heap-based Buffer Overflow
Affects
nftnl
| Versions
<0.9.0
C
Improper Verification of Cryptographic Signature
CVE-2025-66016
Affects
paillier-zk
| Versions
<0.4.3
>=0.7.0-alpha.1 <0.7.0-alpha.2
C
Use of a Broken or Risky Cryptographic Algorithm
CVE-2025-66017
Affects
cggmp24
| Versions
<0.7.0-alpha.2
C
Use of a Broken or Risky Cryptographic Algorithm
CVE-2025-66017
Affects
cggmp21
| Versions
>=0.0.0
H
Missing Release of Resource after Effective Lifetime
CVE-2025-65947
Affects
thread-amount
| Versions
<0.2.2
M
Missing Password Field Masking
CVE-2025-64170
Affects
sudo-rs
| Versions
>=0.2.7 <0.2.10
M
Improper Authentication
CVE-2025-64517
Affects
sudo-rs
| Versions
>=0.2.6 <0.2.10
L
Race Condition
CVE-2025-64345
Affects
wasmtime
| Versions
<24.0.5
>=26.0.0 <36.0.3
>=37.0.0 <37.0.3
>=38.0.1 <38.0.4
L
Race Condition
CVE-2025-64345
Affects
wasmtime-wast
| Versions
<24.0.5
>=26.0.0 <36.0.3
>=37.0.0 <37.0.3
>=38.0.1 <38.0.4
H
Incorrect Privilege Assignment
CVE-2025-64347
Affects
apollo-router
| Versions
<1.61.12
>=2.0.0-alpha.2 <2.8.1
H
Authentication Bypass Using an Alternate Path or Channel
CVE-2025-64173
Affects
apollo-router
| Versions
<1.61.12
>=2.0.0-alpha.2 <2.8.1
H
Race Condition Enabling Link Following
CVE-2025-62161
Affects
libcgroups
| Versions
<0.5.7
H
Race Condition Enabling Link Following
CVE-2025-62161
Affects
libcontainer
| Versions
<0.5.7
H
UNIX Symbolic Link (Symlink) Following
CVE-2025-62596
Affects
libcontainer
| Versions
<0.5.7
H
UNIX Symbolic Link (Symlink) Following
CVE-2025-62596
Affects
libcgroups
| Versions
<0.5.7
H
Uncaught Exception
Affects
js-sandbox
| Versions
>=0.0.0
H
Improper Verification of Cryptographic Signature
Affects
cggmp21-keygen
| Versions
<0.3.0
H
Use After Free
Affects
pared
| Versions
<0.4.0
L
Improper Handling of Exceptional Conditions
CVE-2025-62711
Affects
cranelift-codegen
| Versions
<0.125.0
L
Improper Handling of Exceptional Conditions
CVE-2025-62711
Affects
wasmtime-internal-cranelift
| Versions
>=38.0.0 <38.0.3
L
Improper Handling of Exceptional Conditions
CVE-2025-62711
Affects
wasmtime-environ
| Versions
>=38.0.0 <38.0.3