Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All Vulnerabilities
APPLICATION
Cargo | Rust
Objective-C, CocoaPods | Swift
Composer | PHP
Conan | C/C++
GitHub | Go
Hex | Elixir / Erlang
Maven | Java
npm | JavaScript
NuGet | C#/F#/VB
Pypi | Python
pub | Dart, Flutter
RubyGems | Ruby
Swift Packages | Swift
C/C++
OPERATING SYSTEM
All OS vulnerabilities
AlmaLinux
Alpine Linux
Amazon Linux
CentOS
Chainguard
Debian
MinimOS
Oracle Linux
Red Hat Enterprise Linux
Rocky Linux
SUSE Linux Enterprise Server
Ubuntu
Wolfi
Report a new vulnerability
Vulnerabilities
Packages
M
Information Exposure
CVE-2024-22192
Affects
ursa
| Versions
>=0.0.0
M
Information Exposure
CVE-2024-22192
Affects
anoncreds-clsignatures
| Versions
<0.1.0
L
Improper Verification of Cryptographic Signature
CVE-2022-31021
Affects
anoncreds-clsignatures
| Versions
>=0.0.0
L
Improper Verification of Cryptographic Signature
CVE-2022-31021
Affects
ursa
| Versions
>=0.0.0
M
Resource Exhaustion
CVE-2023-6237
Affects
openssl-src
| Versions
>=300.0.0+3.0.0 <300.2.2+3.2.1
H
Use After Free
Affects
tracing
| Versions
>=0.1.38 <0.1.40
M
Use of a Broken or Risky Cryptographic Algorithm
CVE-2023-6129
Affects
openssl-src
| Versions
>=300.0.0+3.0.0 <300.2.2+3.2.1
M
Improper Handling of Exceptional Conditions
CVE-2024-21629
Affects
evm
| Versions
<0.41.1
M
Information Exposure Through Timing Discrepancy
Affects
safe_pqc_kyber
| Versions
>=0.0.0
M
Out-of-bounds Write
CVE-2023-50711
Affects
vmm-sys-util
| Versions
>=0.5.0 <0.12.0
M
Denial of Service (DoS)
CVE-2023-5678
Affects
openssl-src
| Versions
<300.2.0+3.2.0
H
Improper Input Validation
CVE-2023-53157
Affects
rosenpass
| Versions
<0.2.1-rc.1
M
Access of Uninitialized Pointer
Affects
unsafe-libyaml
| Versions
<0.2.10
H
Denial of Service (DoS)
CVE-2022-47085
Affects
ostree
| Versions
<0.17.1
M
Access of Resource Using Incompatible Type ('Type Confusion')
Affects
zerocopy
| Versions
>=0.2.2 <0.2.9
>=0.3.0 <0.3.2
>=0.4.0 <0.4.1
>=0.5.0 <0.5.2
>=0.6.0 <0.6.6
>=0.7.0 <0.7.31
M
Authentication Bypass by Capture-replay
CVE-2023-48795
Affects
russh
| Versions
<0.40.2
H
Incorrect Default Permissions
Affects
surrealdb
| Versions
<1.0.1
H
Exposure of Resource to Wrong Sphere
CVE-2023-51661
Affects
wasmer-cli
| Versions
>=3.0.0 <4.2.4
M
Uncontrolled Resource Consumption ('Resource Exhaustion')
CVE-2023-6193
Affects
quiche
| Versions
>=0.15.0 <0.19.1
H
Uncontrolled Resource Consumption ('Resource Exhaustion')
CVE-2023-6245
Affects
candid
| Versions
>=0.9.0 <0.9.10
M
Denial of Service (DoS)
CVE-2023-6180
Affects
tokio-boring
| Versions
>=4.0.0 <4.1.0
M
Insufficient Entropy
CVE-2023-26154
Affects
pubnub
| Versions
<0.4.0
M
Information Exposure
Affects
birdcage
| Versions
<0.7.0
H
Observable Timing Discrepancy
CVE-2023-49092
Affects
rsa
| Versions
*
C
Incorrect Calculation
Affects
self_cell
| Versions
<0.10.3
>=1.0.0 <1.0.2
M
Uncontrolled Resource Consumption ('Resource Exhaustion')
Affects
s2n-quic
| Versions
<1.31.0
M
Buffer Overflow
CVE-2023-46135
Affects
stellar-strkey
| Versions
<0.0.8
M
Missing Cryptographic Step
CVE-2023-5363
Affects
openssl-src
| Versions
<300.1.6+3.1.4
H
Insufficiently Protected Credentials
CVE-2023-46115
Affects
tauri-cli
| Versions
<2.0.0-alpha.16
H
Improper Privilege Management
CVE-2023-46277
Affects
pleaser
| Versions
>=0.0.0