Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All Vulnerabilities
APPLICATION
Cargo | Rust
Objective-C, CocoaPods | Swift
Composer | PHP
Conan | C/C++
GitHub | Go
Hex | Elixir / Erlang
Maven | Java
npm | JavaScript
NuGet | C#/F#/VB
Pypi | Python
pub | Dart, Flutter
RubyGems | Ruby
Swift Packages | Swift
C/C++
OPERATING SYSTEM
All OS vulnerabilities
AlmaLinux
Alpine Linux
Amazon Linux
CentOS
Chainguard
Debian
MinimOS
Oracle Linux
Red Hat Enterprise Linux
Rocky Linux
SUSE Linux Enterprise Server
Ubuntu
Wolfi
Report a new vulnerability
Vulnerabilities
Packages
H
Out-of-bounds Read
CVE-2026-34876
Affects
armmbed/mbedtls
| Versions
[3.1.0,3.6.6)
H
Out-of-bounds Read
CVE-2026-34876
Affects
Mbed-TLS/TF-PSA-Crypto
| Versions
[,1.1.0)
M
Out-of-bounds Read
CVE-2026-28386
Affects
openssl
| Versions
[3.6.0-alpha1,3.6.2)
M
Use After Free
CVE-2026-28387
Affects
openssl
| Versions
[,3.0.20)
[3.1.0-alpha1,3.3.7)
[3.4.0-alpha1,3.4.5)
[3.5.0-alpha1,3.5.6)
[3.6.0-alpha1,3.6.2)
M
NULL Pointer Dereference
CVE-2026-28388
Affects
openssl
| Versions
[,3.0.20)
[3.1.0-alpha1,3.3.7)
[3.4.0-alpha1,3.4.5)
[3.5.0-alpha1,3.5.6)
[3.6.0-alpha1,3.6.2)
M
NULL Pointer Dereference
CVE-2026-28389
Affects
openssl
| Versions
[,3.0.20)
[3.1.0-alpha1,3.3.7)
[3.4.0-alpha1,3.4.5)
[3.5.0-alpha1,3.5.6)
[3.6.0-alpha1,3.6.2)
H
Improper Check for Unusual or Exceptional Conditions
CVE-2026-31790
Affects
openssl
| Versions
[,3.0.20)
[3.1.0-alpha1,3.3.7)
[3.4.0-alpha1,3.4.5)
[3.5.0-alpha1,3.5.6)
[3.6.0-alpha1,3.6.2)
M
Out-of-bounds Write
CVE-2026-31789
Affects
openssl
| Versions
[,3.0.20)
[3.1.0-alpha1,3.3.7)
[3.4.0-alpha1,3.4.5)
[3.5.0-alpha1,3.5.6)
[3.6.0-alpha1,3.6.2)
M
NULL Pointer Dereference
CVE-2026-28390
Affects
openssl
| Versions
[,3.0.20)
[3.1.0-alpha1,3.3.7)
[3.4.0-alpha1,3.4.5)
[3.5.0-alpha1,3.5.6)
[3.6.0-alpha1,3.6.2)
M
Covert Timing Channel
CVE-2025-66442
Affects
armmbed/mbedtls
| Versions
[0,]
M
Covert Timing Channel
CVE-2025-66442
Affects
Mbed-TLS/TF-PSA-Crypto
| Versions
[0,]
M
Out-of-bounds Read
CVE-2026-34608
Affects
emqx/nanomq
| Versions
[,0.24.10-beta.2)
H
Privilege Dropping / Lowering Errors
CVE-2026-35535
Affects
sudo
| Versions
[0,]
L
Always-Incorrect Control Flow Implementation
CVE-2026-35414
Affects
openssh-portable
| Versions
[,10.3)
H
Improper Preservation of Permissions
CVE-2026-35385
Affects
openssh-portable
| Versions
[,10.3)
L
Incorrect Behavior Order
CVE-2026-35386
Affects
openssh-portable
| Versions
[,10.3)
L
Unprotected Alternate Channel
CVE-2026-35388
Affects
openssh-portable
| Versions
[,10.3)
L
Always-Incorrect Control Flow Implementation
CVE-2026-35387
Affects
openssh-portable
| Versions
[,10.3)
M
Heap-based Buffer Overflow
CVE-2026-34743
Affects
tukaani-project/xz
| Versions
[,5.8.3)
M
Expired Pointer Dereference
CVE-2026-35094
Affects
libinput/libinput
| Versions
[,1.30.3)
[1.31.0,1.31.1)
M
Arbitrary Code Injection
CVE-2026-35093
Affects
libinput/libinput
| Versions
[,1.30.3)
[1.31.0,1.31.1)
M
HTTP Request Smuggling
CVE-2026-34441
Affects
yhirose/cpp-httplib
| Versions
[,0.40.0)
M
Heap-based Buffer Overflow
CVE-2026-34979
Affects
OpenPrinting/cups
| Versions
[0, 2.4.17)
M
Improper Certificate Validation
CVE-2026-34990
Affects
OpenPrinting/cups
| Versions
[0, 2.4.17)
M
Improper Validation of Specified Type of Input
CVE-2026-34980
Affects
OpenPrinting/cups
| Versions
[0, 2.4.17)
M
Directory Traversal
CVE-2026-34978
Affects
OpenPrinting/cups
| Versions
[0, 2.4.17)
M
Incorrect Authorization
CVE-2026-27447
Affects
OpenPrinting/cups
| Versions
[0, 2.4.17)
H
Incorrect Check of Function Return Value
CVE-2026-35091
Affects
corosync/corosync
| Versions
[0,]
H
Integer Overflow or Wraparound
CVE-2026-35092
Affects
corosync/corosync
| Versions
[0,]
H
Integer Overflow or Wraparound
CVE-2026-3308
Affects
mupdf
| Versions
[0,]