Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All Vulnerabilities
APPLICATION
Cargo | Rust
Objective-C, CocoaPods | Swift
Composer | PHP
Conan | C/C++
GitHub | Go
Hex | Elixir / Erlang
Maven | Java
npm | JavaScript
NuGet | C#/F#/VB
Pypi | Python
pub | Dart, Flutter
RubyGems | Ruby
Swift Packages | Swift
C/C++
OPERATING SYSTEM
All OS vulnerabilities
AlmaLinux
Alpine Linux
Amazon Linux
CentOS
Chainguard
Debian
MinimOS
Oracle Linux
Red Hat Enterprise Linux
Rocky Linux
SUSE Linux Enterprise Server
Ubuntu
Wolfi
Report a new vulnerability
Vulnerabilities
Packages
M
Missing Authorization
Affects
openclaw
| Versions
>=2026.2.14 <2026.3.28-beta.1
M
Allocation of Resources Without Limits or Throttling
Affects
openclaw
| Versions
<2026.3.28-beta.1
H
Untrusted Search Path
Affects
openclaw
| Versions
<2026.3.28-beta.1
M
Incorrect Authorization
Affects
@openclaw/feishu
| Versions
>=2026.2.6
M
Incorrect Authorization
Affects
openclaw
| Versions
>=2026.2.6 <2026.3.28-beta.1
H
Permissive List of Allowed Inputs
Affects
openclaw
| Versions
<2026.3.22-beta.1
H
Incorrect Authorization
Affects
openclaw
| Versions
<2026.3.28-beta.1
L
Incomplete List of Disallowed Inputs
Affects
openclaw
| Versions
<2026.3.28-beta.1
H
Incorrect Authorization
Affects
openclaw
| Versions
<2026.3.28-beta.1
H
Improper Authorization
CVE-2026-34784
Affects
parse-server
| Versions
<8.6.71
>=9.0.0 <9.7.1-alpha.1
M
Incorrect Comparison
CVE-2026-34574
Affects
parse-server
| Versions
<8.6.69
>=9.0.0 <9.7.0-alpha.14
M
Access of Resource Using Incompatible Type ('Type Confusion')
CVE-2026-34595
Affects
parse-server
| Versions
<8.6.70
>=9.0.0 <9.7.0-alpha.16
H
Inefficient Algorithmic Complexity
CVE-2026-34573
Affects
parse-server
| Versions
<8.6.68
>=9.0.0 <9.7.0-alpha.12
C
Incorrect Authorization
CVE-2026-34532
Affects
parse-server
| Versions
<8.6.67
>=9.0.0 <9.7.0-alpha.11
C
Malicious Package
Affects
@c8o/nimbus-core
| Versions
=1.0.13
M
Brute Force
CVE-2026-33580
Affects
openclaw
| Versions
<2026.3.28-beta.1
M
Brute Force
CVE-2026-33580
Affects
@openclaw/nextcloud-talk
| Versions
>=0.0.0
M
Incorrect Authorization
CVE-2026-33578
Affects
openclaw
| Versions
<2026.3.28-beta.1
H
Incorrect Authorization
CVE-2026-33577
Affects
openclaw
| Versions
<2026.3.28-beta.1
M
Incorrect Authorization
CVE-2026-33576
Affects
openclaw
| Versions
<2026.3.28-beta.1
M
Incorrect Authorization
CVE-2026-33576
Affects
@openclaw/zalo
| Versions
>=0.0.0
H
Directory Traversal
CVE-2026-33581
Affects
openclaw
| Versions
<2026.3.24-beta.1
H
Incorrect Authorization
CVE-2026-33579
Affects
openclaw
| Versions
<2026.3.28-beta.1
H
Incorrect Authorization
CVE-2026-33579
Affects
@openclaw/nextcloud-talk
| Versions
>=0.0.0
H
Insufficient Session Expiration
CVE-2026-34503
Affects
openclaw
| Versions
<2026.3.28-beta.1
M
Server-side Request Forgery (SSRF)
CVE-2026-34504
Affects
openclaw
| Versions
<2026.3.28-beta.1
C
Replay Attack
Affects
mppx
| Versions
<0.4.8
H
Replay Attack
CVE-2026-34209
Affects
mppx
| Versions
<0.4.11
M
Replay Attack
CVE-2026-34210
Affects
mppx
| Versions
<0.4.11
M
Incorrect Authorization
CVE-2026-35653
Affects
openclaw
| Versions
<2026.3.28-beta.1