Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All Vulnerabilities
APPLICATION
Cargo | Rust
Objective-C, CocoaPods | Swift
Composer | PHP
Conan | C/C++
GitHub | Go
Hex | Elixir / Erlang
Maven | Java
npm | JavaScript
NuGet | C#/F#/VB
Pypi | Python
pub | Dart, Flutter
RubyGems | Ruby
Swift Packages | Swift
C/C++
OPERATING SYSTEM
All OS vulnerabilities
AlmaLinux
Alpine Linux
Amazon Linux
CentOS
Chainguard
Debian
MinimOS
Oracle Linux
Red Hat Enterprise Linux
Rocky Linux
SUSE Linux Enterprise Server
Ubuntu
Wolfi
Report a new vulnerability
Vulnerabilities
Packages
H
Insertion of Sensitive Information Into Sent Data
CVE-2026-34226
Affects
happy-dom
| Versions
<20.8.9
H
Prototype Pollution
CVE-2026-33993
Affects
locutus
| Versions
<3.0.25
H
Prototype Pollution
CVE-2026-33994
Affects
locutus
| Versions
>=2.0.39 <3.0.25
H
Allocation of Resources Without Limits or Throttling
CVE-2026-34043
Affects
serialize-javascript
| Versions
<7.0.5
H
Permissive List of Allowed Inputs
CVE-2026-33979
Affects
express-xss-sanitizer
| Versions
>=1.2.0 <2.0.2
H
Improper Check for Unusual or Exceptional Conditions
CVE-2026-33939
Affects
handlebars
| Versions
>=4.0.0 <4.7.9
H
Improper Encoding or Escaping of Output
CVE-2026-33941
Affects
handlebars
| Versions
>=4.0.0 <4.7.9
C
Access of Resource Using Incompatible Type ('Type Confusion')
CVE-2026-33940
Affects
handlebars
| Versions
>=4.0.0 <4.7.9
C
Access of Resource Using Incompatible Type ('Type Confusion')
CVE-2026-33937
Affects
handlebars
| Versions
>=4.0.0 <4.7.9
C
Access of Resource Using Incompatible Type ('Type Confusion')
CVE-2026-33938
Affects
handlebars
| Versions
>=4.0.0 <4.7.9
M
Weak Password Requirements
Affects
@openclaw/bluebubbles
| Versions
>=0.0.0
M
Weak Password Requirements
Affects
openclaw
| Versions
<2026.3.28-beta.1
C
Incorrect Authorization
Affects
openclaw
| Versions
<2026.3.28-beta.1
M
Incorrect Authorization
Affects
@openclaw/bluebubbles
| Versions
>=0.0.0
H
Incorrect Authorization
Affects
openclaw
| Versions
<2026.3.28-beta.1
M
Weak Password Requirements
Affects
openclaw
| Versions
<2026.3.28-beta.1
H
Incorrect Authorization
Affects
openclaw
| Versions
<2026.3.28-beta.1
C
Incorrect Authorization
Affects
openclaw
| Versions
<2026.3.28-beta.1
M
Incorrect Authorization
Affects
@openclaw/matrix
| Versions
>=0.0.0
M
Incorrect Authorization
Affects
openclaw
| Versions
<2026.2.23-beta.1
L
Incorrect Authorization
Affects
@openclaw/tlon
| Versions
>=0.0.0
L
Incorrect Authorization
Affects
openclaw
| Versions
<2026.3.22-beta.1
M
UNIX Symbolic Link (Symlink) Following
Affects
openclaw
| Versions
<2026.3.24-beta.1
M
User Impersonation
Affects
openclaw
| Versions
<2026.3.22-beta.1
M
Improper Authorization
Affects
openclaw
| Versions
<2026.3.22-beta.1
H
Incorrect Authorization
Affects
@openclaw/nextcloud-talk
| Versions
>=0.0.0
H
Incorrect Authorization
Affects
@openclaw/mattermost
| Versions
>=0.0.0
H
Incorrect Authorization
Affects
openclaw
| Versions
<2026.3.22-beta.1
M
Incorrect Authorization
Affects
openclaw
| Versions
<2026.3.22-beta.1
H
Insufficiently Protected Credentials
Affects
openclaw
| Versions
<2026.3.22-beta.1