Find out if you have vulnerabilities that put you at risk

Test your applications
Toggle filtering controls
Expand this section

PACKAGE MANAGER

Report a new vulnerability
VULNERABILITY AFFECTS TYPE PUBLISHED
  • M
CVE-2022-1804
accountsservice Open this link in a new tab <22.07.5-2ubuntu1.3 ubuntu:22.04 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
openssl-debugsource Open this link in a new tab * rhel:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
compat-openssl10 Open this link in a new tab * rhel:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
openssl-devel Open this link in a new tab * rhel:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
shim-aa64 Open this link in a new tab * rhel:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
openssl-perl Open this link in a new tab * rhel:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
edk2 Open this link in a new tab * rhel:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
edk2-ovmf Open this link in a new tab * rhel:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
shim-ia32 Open this link in a new tab * rhel:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
edk2-aarch64 Open this link in a new tab * centos:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
openssl-static Open this link in a new tab * centos:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
openssl-devel Open this link in a new tab * centos:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
shim-aa64 Open this link in a new tab * centos:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
shim-ia32 Open this link in a new tab * centos:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
shim Open this link in a new tab * centos:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
shim-x64 Open this link in a new tab * centos:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
openssl-libs Open this link in a new tab * centos:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
compat-openssl10 Open this link in a new tab * centos:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
openssl Open this link in a new tab * centos:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
openssl-perl Open this link in a new tab * centos:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
openssl-debugsource Open this link in a new tab * centos:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
edk2 Open this link in a new tab * centos:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
edk2-ovmf Open this link in a new tab * centos:8 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
openssl Open this link in a new tab * centos:7 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
openssl-devel Open this link in a new tab * centos:7 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
AAVMF Open this link in a new tab * centos:7 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
openssl-static Open this link in a new tab * centos:7 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
openssl-perl Open this link in a new tab * centos:7 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
openssl-libs Open this link in a new tab * centos:7 24 May 2022
  • M
Use of a Broken or Risky Cryptographic Algorithm
ovmf Open this link in a new tab * centos:7 24 May 2022