Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All Vulnerabilities
APPLICATION
Cargo | Rust
Objective-C, CocoaPods | Swift
Composer | PHP
Conan | C/C++
GitHub | Go
Hex | Elixir / Erlang
Maven | Java
npm | JavaScript
NuGet | C#/F#/VB
Pypi | Python
pub | Dart, Flutter
RubyGems | Ruby
Swift Packages | Swift
C/C++
OPERATING SYSTEM
All OS vulnerabilities
AlmaLinux
Alpine Linux
Amazon Linux
CentOS
Chainguard
Debian
MinimOS
Oracle Linux
Red Hat Enterprise Linux
Rocky Linux
SUSE Linux Enterprise Server
Ubuntu
Wolfi
Report a new vulnerability
Vulnerabilities
Packages
M
Double Free
CVE-2026-5657
Affects
wireshark
| Versions
[4.4.0,4.4.15)
[4.6.0,4.6.5)
H
Heap-based Buffer Overflow
CVE-2026-5402
Affects
wireshark
| Versions
[4.6.0,4.6.5)
M
Infinite loop
CVE-2026-5407
Affects
wireshark
| Versions
[4.4.0,4.4.15)
[4.6.0,4.6.5)
M
Heap-based Buffer Overflow
CVE-2026-6530
Affects
wireshark
| Versions
[4.4.0,4.4.15)
[4.6.0,4.6.5)
M
Uncontrolled Recursion
CVE-2026-5406
Affects
wireshark
| Versions
[4.4.0,4.4.15)
[4.6.0,4.6.5)
M
Infinite loop
CVE-2026-6536
Affects
wireshark
| Versions
[4.6.0,4.6.5)
M
Stack-based Buffer Overflow
CVE-2026-6537
Affects
wireshark
| Versions
[4.4.0,4.4.15)
[4.6.0,4.6.5)
M
Infinite loop
CVE-2026-6531
Affects
wireshark
| Versions
[4.4.0,4.4.15)
[4.6.0,4.6.5)
M
Uncontrolled Recursion
CVE-2026-5401
Affects
wireshark
| Versions
[4.4.0,4.4.15)
[4.6.0,4.6.5)
M
Infinite loop
CVE-2026-6521
Affects
wireshark
| Versions
[4.4.0,4.4.15)
[4.6.0,4.6.5)
M
Heap-based Buffer Overflow
CVE-2026-7378
Affects
wireshark
| Versions
[4.4.0,4.4.15)
[4.6.0,4.6.5)
M
Stack-based Buffer Overflow
CVE-2026-6868
Affects
wireshark
| Versions
[4.4.0,4.4.15)
[4.6.0,4.6.5)
M
Missing Release of Memory after Effective Lifetime
CVE-2026-7379
Affects
wireshark
| Versions
[4.4.0,4.4.15)
[4.6.0,4.6.5)
M
Infinite loop
CVE-2026-7375
Affects
wireshark
| Versions
[4.4.0,4.4.15)
[4.6.0,4.6.5)
M
NULL Pointer Dereference
CVE-2026-7376
Affects
wireshark
| Versions
[4.4.0,4.4.15)
[4.6.0,4.6.5)
H
XML External Entity (XXE) Injection
CVE-2026-22016
Affects
openjdk
| Versions
[,8.0.491)
[9.0.0,11.0.31)
[12.0.0, 17.0.19)
[18.0.0, 21.0.11)
[22.0.0, 25.0.3)
[26.0.0, 26.0.1)
L
Use of a Broken or Risky Cryptographic Algorithm
CVE-2026-22007
Affects
openjdk
| Versions
[,8.0.491)
[9.0.0,11.0.31)
[12.0.0, 17.0.19)
[18.0.0, 21.0.11)
[22.0.0, 25.0.3)
[26.0.0, 26.0.1)
M
Heap-based Buffer Overflow
CVE-2026-22008
Affects
openjdk
| Versions
[, 25.0.2)
L
Use of a Broken or Risky Cryptographic Algorithm
CVE-2026-34268
Affects
openjdk
| Versions
[,8.0.491)
[9.0.0,11.0.31)
[12.0.0, 17.0.19)
[18.0.0, 21.0.11)
[22.0.0, 25.0.3)
[26.0.0, 26.0.1)
H
Out-of-bounds Read
CVE-2026-22018
Affects
openjdk
| Versions
[,8.0.491)
[9.0.0,11.0.31)
[12.0.0, 17.0.19)
[18.0.0, 21.0.11)
[22.0.0, 25.0.3)
[26.0.0, 26.0.1)
H
Out-of-bounds Read
CVE-2026-41604
Affects
apache/thrift
| Versions
[,0.23.0)
M
Cleartext Transmission of Sensitive Information
CVE-2026-22013
Affects
openjdk
| Versions
[,8.0.491)
[9.0.0,11.0.31)
[12.0.0, 17.0.19)
[18.0.0, 21.0.11)
[22.0.0, 25.0.3)
[26.0.0, 26.0.1)
M
Out-of-bounds Read
CVE-2026-40026
Affects
sleuthkit/sleuthkit
| Versions
[,4.15.0)
M
Out-of-bounds Read
CVE-2026-40025
Affects
sleuthkit/sleuthkit
| Versions
[,4.15.0)
H
Directory Traversal
CVE-2026-40024
Affects
sleuthkit/sleuthkit
| Versions
[,4.15.0)
H
NULL Pointer Dereference
CVE-2026-40355
Affects
kerberos
| Versions
[1.18,4.4-beta1)
H
Integer Underflow (Wrap or Wraparound)
CVE-2026-40356
Affects
kerberos
| Versions
[1.18,4.4-beta1)
M
Buffer Overflow
CVE-2026-5435
Affects
glibc
| Versions
[0,]
M
Command Injection
CVE-2026-41411
Affects
vim/vim
| Versions
[,9.2.0357)
M
Stack-based Buffer Overflow
CVE-2026-40489
Affects
editorconfig/editorconfig-core-c
| Versions
[,0.12.11)