Find out if you have vulnerabilities that put you at risk

Test your applications
Toggle filtering controls
Report a new vulnerability
VULNERABILITYAFFECTSTYPEPUBLISHED
  • M
Resource Management Errors
ruby[0,]Conan8 May 2025
  • M
Improper Authentication
ruby[0,]Conan8 May 2025
  • H
Regular Expression Denial of Service (ReDoS)
ruby[0,]Conan8 May 2025
  • M
Access Restriction Bypass
ruby[0,]Conan8 May 2025
  • H
Arbitrary Code Execution
ruby[0,]Conan8 May 2025
  • M
Resource Management Errors
ruby[0,]Conan8 May 2025
  • C
Out-of-Bounds
ruby[0,]Conan8 May 2025
  • M
Improper Input Validation
ruby[0,]Conan8 May 2025
  • M
Cross-site Scripting (XSS)
ruby[0,]Conan8 May 2025
  • M
Improper Authentication
ruby[0,]Conan8 May 2025
  • C
Arbitrary Code Execution
ruby[0,]Conan8 May 2025
  • C
Out-of-bounds Read
ruby[0,]Conan8 May 2025
  • M
Improper Input Validation
resiprocate[0,]Conan8 May 2025
  • H
Denial of Service (DoS)
resiprocate[0,]Conan8 May 2025
  • M
Symlink Attack
readline[0,]Conan8 May 2025
  • H
Buffer Overflow
re2c[,3.0)Conan8 May 2025
  • H
Out-of-bounds Write
re2c[1.3,2.0.3)Conan8 May 2025
  • M
Buffer Overflow
re2c[,2.0.3)Conan8 May 2025
  • M
Cross-site Scripting (XSS)
raylib[,5.0)Conan8 May 2025
  • H
Integer Underflow
rapidjson[0,]Conan8 May 2025
  • H
Integer Overflow to Buffer Overflow
rapidjson[0,]Conan8 May 2025
  • M
Information Exposure
rabbitmq-c[0,]Conan8 May 2025
  • C
Out-of-bounds Write
rabbitmq-c[,0.10.0)Conan8 May 2025
  • H
NULL Pointer Dereference
quickjs[0,]Conan8 May 2025
  • C
Use After Free
quickjs[0,]Conan8 May 2025
  • H
Buffer Overflow
quickjs[0,]Conan8 May 2025
  • L
Heap-based Buffer Overflow
quickjs[0,]Conan8 May 2025
  • L
Heap-based Buffer Overflow
quickjs[0,]Conan8 May 2025
  • H
NULL Pointer Dereference
qt[0,]Conan8 May 2025
  • H
Infinite loop
qt[,5.15.16)[6.2.4,6.5.3)Conan8 May 2025