Find out if you have vulnerabilities that put you at risk

Test your applications
Toggle filtering controls
Report a new vulnerability
VULNERABILITYAFFECTSTYPEPUBLISHED
  • H
Out-of-bounds Write
sdl_image[0,]Conan8 May 2025
  • H
Out-of-bounds Write
sdl_image[0,]Conan8 May 2025
  • H
Out-of-bounds Write
sdl_image[0,]Conan8 May 2025
  • M
Out-of-bounds Read
sdl_image[0,]Conan8 May 2025
  • H
Integer Overflow or Wraparound
sdl_image[0,]Conan8 May 2025
  • H
Out-of-Bounds
sdl_image[0,]Conan8 May 2025
  • M
Out-of-bounds Read
sdl_image[0,]Conan8 May 2025
  • M
Out-of-bounds Read
sdl_image[0,]Conan8 May 2025
  • H
Double Free
sdl_image[0,]Conan8 May 2025
  • H
Out-of-Bounds
sdl_image[0,]Conan8 May 2025
  • H
Out-of-bounds Write
sdl_image[0,]Conan8 May 2025
  • H
Out-of-bounds Write
sdl_image[0,]Conan8 May 2025
  • H
Out-of-Bounds
sdl_image[0,]Conan8 May 2025
  • H
Out-of-Bounds
sdl_image[0,]Conan8 May 2025
  • H
Out-of-Bounds
sdl_image[0,]Conan8 May 2025
  • H
Integer Overflow or Wraparound
sdl[0,]Conan8 May 2025
  • M
Improper Authentication
s2n[,1.5.0)Conan8 May 2025
  • L
Observable Timing Discrepancy
s2n[,1.4.16)Conan8 May 2025
  • C
Covert Timing Channel
ruby[0,]Conan8 May 2025
  • H
Denial of Service (DoS)
ruby[0,]Conan8 May 2025
  • H
Denial of Service (DoS)
ruby[0,]Conan8 May 2025
  • M
Denial of Service (DoS)
ruby[0,]Conan8 May 2025
  • M
Improper Authentication
ruby[0,]Conan8 May 2025
  • H
Symlink Attack
ruby[0,]Conan8 May 2025
  • M
Arbitrary Code Injection
ruby[0,]Conan8 May 2025
  • M
Improper Input Validation
ruby[0,]Conan8 May 2025
  • M
Access Restriction Bypass
ruby[0,]Conan8 May 2025
  • C
Arbitrary Code Execution
ruby[0,]Conan8 May 2025
  • H
CVE-2005-1992
ruby[0,]Conan8 May 2025
  • H
Improper Input Validation
ruby[0,]Conan8 May 2025