Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All Vulnerabilities
APPLICATION
Cargo | Rust
Objective-C, CocoaPods | Swift
Composer | PHP
Conan | C/C++
GitHub | Go
Hex | Elixir / Erlang
Maven | Java
npm | JavaScript
NuGet | C#/F#/VB
Pypi | Python
pub | Dart, Flutter
RubyGems | Ruby
Swift Packages | Swift
C/C++
OPERATING SYSTEM
All OS vulnerabilities
AlmaLinux
Alpine Linux
Amazon Linux
CentOS
Chainguard
Debian
MinimOS
Oracle Linux
Red Hat Enterprise Linux
Rocky Linux
SUSE Linux Enterprise Server
Ubuntu
Wolfi
Report a new vulnerability
Vulnerabilities
Packages
M
Incorrect Permission Assignment for Critical Resource
Affects
openclaw
| Versions
<2026.3.31-beta.1
M
Incorrect Authorization
Affects
@openclaw/discord
| Versions
>=0.0.0
M
Incorrect Authorization
Affects
openclaw
| Versions
<2026.3.31-beta.1
M
Allocation of Resources Without Limits or Throttling
Affects
openclaw
| Versions
<2026.3.31-beta.1
H
Incorrect Authorization
Affects
openclaw
| Versions
<2026.3.22-beta.1
M
Brute Force
Affects
openclaw
| Versions
<2026.3.31-beta.1
H
Improper Authorization
Affects
openclaw
| Versions
<2026.3.28-beta.1
L
Insufficient Session Expiration
Affects
openclaw
| Versions
<2026.3.31-beta.1
M
Always-Incorrect Control Flow Implementation
Affects
openclaw
| Versions
<2026.3.31-beta.1
M
Incorrect Authorization
Affects
openclaw
| Versions
<2026.3.31-beta.1
M
Allocation of Resources Without Limits or Throttling
Affects
openclaw
| Versions
<2026.3.31-beta.1
C
Time-of-check Time-of-use (TOCTOU) Race Condition
Affects
openclaw
| Versions
<2026.3.31-beta.1
H
DNS Rebinding
Affects
openclaw
| Versions
<2026.3.31-beta.1
M
Time-of-check Time-of-use (TOCTOU) Race Condition
Affects
openclaw
| Versions
<2026.3.31-beta.1
M
Incorrect Authorization
Affects
@openclaw/discord
| Versions
>=0.0.0
M
Incorrect Authorization
Affects
openclaw
| Versions
<2026.3.31-beta.1
L
Missing Authorization
Affects
@openclaw/discord
| Versions
>=0.0.0
L
Missing Authorization
Affects
openclaw
| Versions
<2026.3.31-beta.1
H
Insufficient Verification of Data Authenticity
CVE-2026-34511
Affects
openclaw
| Versions
<2026.4.2
H
Denial of Service (DoS)
CVE-2026-34829
Affects
rack
| Versions
<2.2.23
>=3.0.0.beta1, <3.1.21
>=3.2.0, <3.2.6
M
Incorrect Behavior Order: Validate Before Canonicalize
CVE-2026-34786
Affects
rack
| Versions
<2.2.23
>=3.0.0.beta1, <3.1.21
>=3.2.0, <3.2.6
M
Permissive Regular Expression
CVE-2026-34763
Affects
rack
| Versions
<2.2.23
>=3.0.0.beta1, <3.1.21
>=3.2.0, <3.2.6
M
Denial of Service (DoS)
CVE-2026-34826
Affects
rack
| Versions
<2.2.23
>=3.0.0.beta1, <3.1.21
>=3.2.0, <3.2.6
H
Permissive Regular Expression
CVE-2026-34830
Affects
rack
| Versions
<2.2.23
>=3.0.0.beta1, <3.1.21
>=3.2.0, <3.2.6
M
Denial of Service (DoS)
CVE-2026-34230
Affects
rack
| Versions
<2.2.23
>=3.0.0.beta1, <3.1.21
>=3.2.0, <3.2.6
H
Partial String Comparison
CVE-2026-34785
Affects
rack
| Versions
<2.2.23
>=3.0.0.beta1, <3.1.21
>=3.2.0, <3.2.6
M
Improper Handling of Length Parameter Inconsistency
CVE-2026-34831
Affects
rack
| Versions
<2.2.23
>=3.0.0.beta1, <3.1.21
>=3.2.0, <3.2.6
M
CRLF Injection
CVE-2026-26962
Affects
rack
| Versions
>=3.2.0, <3.2.6
M
Interpretation Conflict
CVE-2026-32762
Affects
rack
| Versions
>=3.0.0.beta1, <3.1.21
>=3.2.0, <3.2.6
M
Improper Validation of Syntactic Correctness of Input
CVE-2026-34835
Affects
rack
| Versions
>=3.0.0.beta1, <3.1.21
>=3.2.0, <3.2.6