Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All Vulnerabilities
APPLICATION
Cargo | Rust
Objective-C, CocoaPods | Swift
Composer | PHP
Conan | C/C++
GitHub | Go
Hex | Elixir / Erlang
Maven | Java
npm | JavaScript
NuGet | C#/F#/VB
Pypi | Python
pub | Dart, Flutter
RubyGems | Ruby
Swift Packages | Swift
C/C++
OPERATING SYSTEM
All OS vulnerabilities
AlmaLinux
Alpine Linux
Amazon Linux
CentOS
Chainguard
Debian
MinimOS
Oracle Linux
Red Hat Enterprise Linux
Rocky Linux
SUSE Linux Enterprise Server
Ubuntu
Wolfi
Report a new vulnerability
Vulnerabilities
Packages
M
Improper Handling of Length Parameter Inconsistency
CVE-2026-34831
Affects
rack
| Versions
<2.2.23
>=3.0.0.beta1, <3.1.21
>=3.2.0, <3.2.6
M
CRLF Injection
CVE-2026-26962
Affects
rack
| Versions
>=3.2.0, <3.2.6
M
Interpretation Conflict
CVE-2026-32762
Affects
rack
| Versions
>=3.0.0.beta1, <3.1.21
>=3.2.0, <3.2.6
M
Improper Validation of Syntactic Correctness of Input
CVE-2026-34835
Affects
rack
| Versions
>=3.0.0.beta1, <3.1.21
>=3.2.0, <3.2.6
H
Inefficient Algorithmic Complexity
CVE-2026-34827
Affects
rack
| Versions
>=3.0.0.beta1, <3.1.21
>=3.2.0, <3.2.6
M
Interpretation Conflict
CVE-2026-26961
Affects
rack
| Versions
<2.2.23
>=3.0.0.beta1, <3.1.21
>=3.2.0, <3.2.6
H
Allocation of Resources Without Limits or Throttling
CVE-2026-34756
Affects
vllm
| Versions
[0.1.0,0.19.0)
C
Embedded Malicious Code
Affects
mgc
| Versions
=1.2.1
=1.2.2
=1.2.3
=1.2.4
H
Memory Allocation with Excessive Size Value
CVE-2026-35549
Affects
MariaDB/server
| Versions
[,11.4.10)
[11.5.0,11.8.6)
[12.0.0,12.2.2)
M
Improper Input Validation
CVE-2026-34760
Affects
vllm
| Versions
[0.5.5,0.18.0)
C
Authentication Bypass Using an Alternate Path or Channel
Affects
better-auth
| Versions
<1.4.9
H
Use of a Broken or Risky Cryptographic Algorithm
CVE-2026-34950
Affects
fast-jwt
| Versions
*
C
Improper Validation of Unsafe Equivalence in Input
CVE-2026-35039
Affects
fast-jwt
| Versions
<6.1.0
L
Unquoted Search Path or Element
CVE-2026-34768
Affects
org.webjars.npm:electron
| Versions
[0,]
L
Missing Authorization
CVE-2026-34766
Affects
org.webjars.npm:electron
| Versions
[0,]
M
HTTP Response Splitting
CVE-2026-34767
Affects
org.webjars.npm:electron
| Versions
[0,]
M
Origin Validation Error
CVE-2026-34777
Affects
org.webjars.npm:electron
| Versions
[0,]
H
Command Injection
CVE-2026-34779
Affects
org.webjars.npm:electron
| Versions
[0,]
M
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2026-34773
Affects
org.webjars.npm:electron
| Versions
[0,]
H
Use After Free
CVE-2026-34770
Affects
org.webjars.npm:electron
| Versions
[0,]
M
Use After Free
CVE-2026-34772
Affects
org.webjars.npm:electron
| Versions
[0,]
M
Insufficient Verification of Data Authenticity
CVE-2026-34778
Affects
org.webjars.npm:electron
| Versions
[0,]
H
Use After Free
CVE-2026-34771
Affects
org.webjars.npm:electron
| Versions
[0,]
M
Out-of-bounds Read
CVE-2026-34776
Affects
org.webjars.npm:electron
| Versions
[0,]
H
Improper Isolation or Compartmentalization
CVE-2026-34775
Affects
org.webjars.npm:electron
| Versions
[0,]
M
Origin Validation Error
CVE-2026-34777
Affects
electron
| Versions
<38.8.6
>=39.0.0-alpha.1 <39.8.1
>=40.0.0-alpha.2 <40.8.1
>=41.0.0-alpha.1 <41.0.0
H
Command Injection
CVE-2026-34779
Affects
electron
| Versions
<38.8.6
>=39.0.0-alpha.1 <39.8.1
>=40.0.0-alpha.2 <40.8.0
>=41.0.0-alpha.1 <41.0.0-beta.8
M
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2026-34773
Affects
electron
| Versions
<38.8.6
>=39.0.0-alpha.1 <39.8.1
>=40.0.0-alpha.2 <40.8.1
>=41.0.0-alpha.1 <41.0.0
H
Use After Free
CVE-2026-34770
Affects
electron
| Versions
<38.8.6
>=39.0.0-alpha.1 <39.8.1
>=40.0.0-alpha.2 <40.8.0
>=41.0.0-alpha.1 <41.0.0-beta.8
M
Use After Free
CVE-2026-34772
Affects
electron
| Versions
<38.8.6
>=39.0.0-alpha.1 <39.8.0
>=40.0.0-alpha.2 <40.7.0
>=41.0.0-alpha.1 <41.0.0-beta.7