Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All Vulnerabilities
APPLICATION
Cargo | Rust
Objective-C, CocoaPods | Swift
Composer | PHP
Conan | C/C++
GitHub | Go
Hex | Elixir / Erlang
Maven | Java
npm | JavaScript
NuGet | C#/F#/VB
Pypi | Python
pub | Dart, Flutter
RubyGems | Ruby
Swift Packages | Swift
C/C++
OPERATING SYSTEM
All OS vulnerabilities
AlmaLinux
Alpine Linux
Amazon Linux
CentOS
Chainguard
Debian
MinimOS
Oracle Linux
Red Hat Enterprise Linux
Rocky Linux
SUSE Linux Enterprise Server
Ubuntu
Wolfi
Report a new vulnerability
Vulnerabilities
Packages
H
Command Injection
CVE-2026-28391
Affects
openclaw
| Versions
<2026.2.2
H
Command Injection
CVE-2026-28470
Affects
openclaw
| Versions
<2026.2.2
H
Improper Certificate Validation
CVE-2026-26327
Affects
openclaw
| Versions
<2026.2.14
H
Command Injection
CVE-2026-26323
Affects
openclaw
| Versions
<2026.2.14
H
Directory Traversal
CVE-2026-28456
Affects
openclaw
| Versions
<2026.2.14
H
Directory Traversal
CVE-2026-28482
Affects
openclaw
| Versions
<2026.2.12
H
Directory Traversal
CVE-2026-26321
Affects
@openclaw/feishu
| Versions
<2026.2.14
H
Allocation of Resources Without Limits or Throttling
CVE-2026-29612
Affects
openclaw
| Versions
<2026.2.14
C
Authentication Bypass Using an Alternate Path or Channel
CVE-2026-28454
Affects
@openclaw/zalo
| Versions
<2026.2.13
C
Authentication Bypass Using an Alternate Path or Channel
CVE-2026-28454
Affects
@openclaw/voice-call
| Versions
<2026.2.13
C
Authentication Bypass Using an Alternate Path or Channel
CVE-2026-28454
Affects
@openclaw/nostr
| Versions
<2026.2.13
C
Authentication Bypass Using an Alternate Path or Channel
CVE-2026-28454
Affects
@openclaw/nextcloud-talk
| Versions
<2026.2.13
C
Authentication Bypass Using an Alternate Path or Channel
CVE-2026-28454
Affects
@openclaw/msteams
| Versions
<2026.2.13
C
Authentication Bypass Using an Alternate Path or Channel
CVE-2026-28454
Affects
@openclaw/feishu
| Versions
<2026.2.13
C
Authentication Bypass Using an Alternate Path or Channel
CVE-2026-28454
Affects
@openclaw/bluebubbles
| Versions
<2026.2.13
C
Authentication Bypass Using an Alternate Path or Channel
CVE-2026-28454
Affects
openclaw
| Versions
<2026.2.1
H
Allocation of Resources Without Limits or Throttling
CVE-2026-28478
Affects
openclaw
| Versions
<2026.2.14
H
Reliance on Untrusted Inputs in a Security Decision
CVE-2026-29610
Affects
openclaw
| Versions
<2026.2.14
H
Server-side Request Forgery (SSRF)
CVE-2026-26322
Affects
openclaw
| Versions
<2026.2.14
H
Server-side Request Forgery (SSRF)
CVE-2026-26324
Affects
openclaw
| Versions
<2026.2.14
M
Command Injection
CVE-2026-28463
Affects
openclaw
| Versions
<2026.2.14
C
Missing Authentication for Critical Function
CVE-2026-28472
Affects
openclaw
| Versions
<2026.2.2
H
Directory Traversal
CVE-2026-28447
Affects
openclaw
| Versions
>=2026.1.29-beta.1 <2026.2.1
H
Improper Authentication
CVE-2026-28446
Affects
@openclaw/voice-call
| Versions
<2026.2.2
H
Improper Following of Specification by Caller
CVE-2025-69287
Affects
@bsv/sdk
| Versions
<2.0.0
H
XML Entity Expansion
CVE-2026-26278
Affects
fast-xml-parser
| Versions
>=4.1.3 <4.5.4
>=5.0.0 <5.3.6
H
Directory Traversal
CVE-2026-26960
Affects
tar
| Versions
<7.5.8
C
Malicious Package
Affects
bigmathutils
| Versions
*
C
Malicious Package
Affects
bignumberx
| Versions
*
C
Malicious Package
Affects
graphkitx
| Versions
*