Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All Vulnerabilities
APPLICATION
Cargo | Rust
Objective-C, CocoaPods | Swift
Composer | PHP
Conan | C/C++
GitHub | Go
Hex | Elixir / Erlang
Maven | Java
npm | JavaScript
NuGet | C#/F#/VB
Pypi | Python
pub | Dart, Flutter
RubyGems | Ruby
Swift Packages | Swift
C/C++
OPERATING SYSTEM
All OS vulnerabilities
AlmaLinux
Alpine Linux
Amazon Linux
CentOS
Chainguard
Debian
MinimOS
Oracle Linux
Red Hat Enterprise Linux
Rocky Linux
SUSE Linux Enterprise Server
Ubuntu
Wolfi
Report a new vulnerability
Vulnerabilities
Packages
H
Use After Free
Affects
kernel-debug-modules
| Versions
<0:4.18.0-477.10.1.el8_8
H
Use After Free
Affects
kernel-debug
| Versions
<0:4.18.0-477.10.1.el8_8
H
Use After Free
Affects
kernel-abi-stablelists
| Versions
<0:4.18.0-477.10.1.el8_8
H
Use After Free
Affects
kernel-debug-modules-extra
| Versions
<0:4.18.0-477.10.1.el8_8
H
Use After Free
Affects
perf
| Versions
<0:4.18.0-477.10.1.el8_8
H
Use After Free
Affects
kernel-zfcpdump
| Versions
<0:4.18.0-477.10.1.el8_8
H
Use After Free
Affects
kernel-core
| Versions
<0:4.18.0-477.10.1.el8_8
H
Use After Free
Affects
kernel-tools
| Versions
<0:4.18.0-477.10.1.el8_8
H
Use After Free
Affects
kernel-doc
| Versions
<0:4.18.0-477.10.1.el8_8
H
Use After Free
Affects
kernel-debug-devel
| Versions
<0:4.18.0-477.10.1.el8_8
H
Use After Free
Affects
kernel-debug-core
| Versions
<0:4.18.0-477.10.1.el8_8
H
Use After Free
Affects
kernel-zfcpdump-modules
| Versions
<0:4.18.0-477.10.1.el8_8
H
Use After Free
Affects
kernel-tools-libs
| Versions
<0:4.18.0-477.10.1.el8_8
H
Use After Free
Affects
kernel-zfcpdump-devel
| Versions
<0:4.18.0-477.10.1.el8_8
H
Use After Free
Affects
kernel
| Versions
<0:4.18.0-477.10.1.el8_8
H
Use After Free
Affects
kernel-devel
| Versions
<0:4.18.0-477.10.1.el8_8
H
Access of Uninitialized Pointer
Affects
kernel-rt-core
| Versions
<0:5.14.0-362.8.1.el9_3
H
Improper Validation of Specified Index, Position, or Offset in Input
Affects
kernel-rt-core
| Versions
<0:5.14.0-362.8.1.el9_3
H
Improper Locking
Affects
kernel-rt-core
| Versions
<0:5.14.0-362.8.1.el9_3
H
Out-of-bounds Write
Affects
kernel-rt-core
| Versions
<0:5.14.0-362.8.1.el9_3
H
NULL Pointer Dereference
Affects
kernel-rt-core
| Versions
<0:5.14.0-362.8.1.el9_3
H
Information Exposure
Affects
kernel-rt-core
| Versions
<0:5.14.0-362.8.1.el9_3
H
Access of Uninitialized Pointer
Affects
kernel-modules-core
| Versions
<0:5.14.0-362.8.1.el9_3
H
Improper Validation of Specified Index, Position, or Offset in Input
Affects
kernel-modules-core
| Versions
<0:5.14.0-362.8.1.el9_3
H
Improper Locking
Affects
kernel-modules-core
| Versions
<0:5.14.0-362.8.1.el9_3
H
Out-of-bounds Write
Affects
kernel-modules-core
| Versions
<0:5.14.0-362.8.1.el9_3
H
NULL Pointer Dereference
Affects
kernel-modules-core
| Versions
<0:5.14.0-362.8.1.el9_3
H
Information Exposure
Affects
kernel-modules-core
| Versions
<0:5.14.0-362.8.1.el9_3
H
Access of Uninitialized Pointer
Affects
kernel-64k-debug-devel-matched
| Versions
<0:5.14.0-362.8.1.el9_3
H
Improper Validation of Specified Index, Position, or Offset in Input
Affects
kernel-64k-debug-devel-matched
| Versions
<0:5.14.0-362.8.1.el9_3