Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All Vulnerabilities
APPLICATION
Cargo | Rust
Objective-C, CocoaPods | Swift
Composer | PHP
Conan | C/C++
GitHub | Go
Hex | Elixir / Erlang
Maven | Java
npm | JavaScript
NuGet | C#/F#/VB
Pypi | Python
pub | Dart, Flutter
RubyGems | Ruby
Swift Packages | Swift
C/C++
OPERATING SYSTEM
All OS vulnerabilities
AlmaLinux
Alpine Linux
Amazon Linux
CentOS
Chainguard
Debian
MinimOS
Oracle Linux
Red Hat Enterprise Linux
Rocky Linux
SUSE Linux Enterprise Server
Ubuntu
Wolfi
Report a new vulnerability
Vulnerabilities
Packages
L
GHSA-6g7g-w4f8-9c9x
Affects
weaviate-fips-1.34
| Versions
<1.34.19-r1
C
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
CVE-2026-33228
Affects
argo-workflows-3.6
| Versions
*
L
Improper Authorization
CVE-2026-33186
Affects
metrics-server-compat
| Versions
<0.8.1-r4
L
Improper Authorization
CVE-2026-33186
Affects
metrics-server
| Versions
<0.8.1-r4
L
Improper Authorization
CVE-2026-33186
Affects
argocd-image-updater-fips-1.0
| Versions
<1.0.3-r3
L
Improper Authorization
CVE-2026-33186
Affects
eck-operator-fips-3
| Versions
<3.3.1-r1
L
Use of Externally-Controlled Format String
CVE-2026-33210
Affects
ruby3.4-json
| Versions
<2.19.2-r0
L
Improper Authorization
CVE-2026-33186
Affects
kube-state-metrics-fips
| Versions
<2.18.0-r5
L
Improper Authorization
CVE-2026-33186
Affects
weaviate-1.34
| Versions
<1.34.19-r1
L
Use of Externally-Controlled Format String
CVE-2026-33210
Affects
ruby3.2-json
| Versions
<2.19.2-r0
L
Improper Authorization
CVE-2026-33186
Affects
loki-3.6-canary
| Versions
<3.6.7-r3
L
Improper Authorization
CVE-2026-33186
Affects
loki-3.6-promtail
| Versions
<3.6.7-r3
L
Improper Authorization
CVE-2026-33186
Affects
eck-operator-2-compat
| Versions
<2.16.1-r12
L
Improper Authorization
CVE-2026-33186
Affects
loki-3.6-logcli
| Versions
<3.6.7-r3
L
Improper Authorization
CVE-2026-33186
Affects
eck-operator-2
| Versions
<2.16.1-r12
L
Improper Authorization
CVE-2026-33186
Affects
loki-3.6-default-config
| Versions
<3.6.7-r3
L
Improper Authorization
CVE-2026-33186
Affects
loki-3.6
| Versions
<3.6.7-r3
L
Improper Authorization
CVE-2026-33186
Affects
traefik-3
| Versions
<3.6.11-r1
L
Improper Authorization
CVE-2026-33186
Affects
weaviate-fips-1.33
| Versions
<1.33.18-r3
H
Improper Validation of Array Index
CVE-2026-4427
Affects
argo-workflows-ui-3.6
| Versions
*
H
Improper Validation of Array Index
CVE-2026-4427
Affects
argo-workflow-cli-3.6
| Versions
*
H
Improper Validation of Array Index
CVE-2026-4427
Affects
argo-workflow-executor-compat-3.6
| Versions
*
H
Improper Validation of Array Index
CVE-2026-4427
Affects
argo-workflow-controller-compat-3.6
| Versions
*
L
Improper Authorization
CVE-2026-33186
Affects
grafana-rollout-operator
| Versions
<0.35.0-r2
H
Improper Validation of Array Index
CVE-2026-4427
Affects
argo-workflow-executor-3.6
| Versions
*
H
Improper Validation of Array Index
CVE-2026-4427
Affects
argo-workflow-controller-3.6
| Versions
*
L
Improper Authorization
CVE-2026-33186
Affects
minio
| Versions
<0.20251015.172955-r9
H
Improper Validation of Array Index
CVE-2026-4427
Affects
argo-workflows-known-hosts-3.6
| Versions
*
H
Improper Validation of Array Index
CVE-2026-4427
Affects
argo-workflows-3.6
| Versions
*
C
Incorrect Authorization
CVE-2026-31998
Affects
openclaw
| Versions
<2026.2.24-r0