Find out if you have vulnerabilities that put you at risk

Test your applications
Toggle filtering controls
Expand this section

APPLICATION

Expand this section

OPERATING SYSTEM

Report a new vulnerability
VULNERABILITY AFFECTS TYPE PUBLISHED
  • M
Information Exposure
ruby-doc <0:2.0.0.648-36.amzn2.0.9 amzn:2 1 May 2024
  • M
Information Exposure
rubygems-devel <0:2.0.14.1-36.amzn2.0.9 amzn:2 1 May 2024
  • M
Information Exposure
rubygems <0:2.0.14.1-36.amzn2.0.9 amzn:2 1 May 2024
  • M
Information Exposure
rubygem-rdoc <0:4.0.0-36.amzn2.0.9 amzn:2 1 May 2024
  • H
Resource Exhaustion
bind-license <32:9.11.4-26.P2.amzn2.13.6 amzn:2 1 May 2024
  • L
Integer Overflow or Wraparound
java-17-amazon-corretto-jmods <1:17.0.11+9-1.amzn2.1 amzn:2 1 May 2024
  • L
Integer Overflow or Wraparound
java-11-amazon-corretto-headless <1:11.0.23+9-1.amzn2 amzn:2 1 May 2024
  • L
Reliance on Reverse DNS Resolution for a Security-Critical Action
java-17-amazon-corretto-headless <1:17.0.11+9-1.amzn2.1 amzn:2 1 May 2024
  • L
Integer Overflow or Wraparound
java-17-amazon-corretto <1:17.0.11+9-1.amzn2.1 amzn:2 1 May 2024
  • M
CVE-2024-2193
python-perf <0:4.14.336-257.568.amzn2 amzn:2 1 May 2024
  • M
CVE-2024-26602
python-perf-debuginfo <0:4.14.336-257.568.amzn2 amzn:2 1 May 2024
  • M
CVE-2024-2193
kernel-tools-devel <0:4.14.336-257.568.amzn2 amzn:2 1 May 2024
  • M
CVE-2024-2193
kernel-tools-debuginfo <0:4.14.336-257.568.amzn2 amzn:2 1 May 2024
  • H
Buffer Overflow
qt5-qtbase-common <0:5.9.2-3.amzn2.0.14 amzn:2 1 May 2024
  • M
Improper Input Validation
mod_ldap <0:2.4.59-1.amzn2 amzn:2 1 May 2024
  • M
Resource Exhaustion
jose-debuginfo <0:10-1.amzn2.0.1 amzn:2 1 May 2024
  • M
Information Exposure
rubygem-bigdecimal <0:1.2.0-36.amzn2.0.9 amzn:2 1 May 2024
  • H
Resource Exhaustion
bind-pkcs11-devel <32:9.11.4-26.P2.amzn2.13.6 amzn:2 1 May 2024
  • H
Resource Exhaustion
bind-pkcs11-libs <32:9.11.4-26.P2.amzn2.13.6 amzn:2 1 May 2024
  • H
Resource Exhaustion
bind-sdb <32:9.11.4-26.P2.amzn2.13.6 amzn:2 1 May 2024
  • L
Reliance on Reverse DNS Resolution for a Security-Critical Action
java-17-amazon-corretto-jmods <1:17.0.11+9-1.amzn2.1 amzn:2 1 May 2024
  • L
Out-of-bounds Write
java-11-amazon-corretto-headless <1:11.0.23+9-1.amzn2 amzn:2 1 May 2024
  • L
Reliance on Reverse DNS Resolution for a Security-Critical Action
java-11-amazon-corretto-headless <1:11.0.23+9-1.amzn2 amzn:2 1 May 2024
  • M
CVE-2024-2193
kernel-livepatch-4.14.336-257.568 <0:1.0-0.amzn2 amzn:2 1 May 2024
  • M
CVE-2024-2193
kernel-debuginfo-common-x86_64 <0:4.14.336-257.568.amzn2 amzn:2 1 May 2024
  • L
Out-of-bounds Write
java-17-amazon-corretto <1:17.0.11+9-1.amzn2.1 amzn:2 1 May 2024
  • L
Improper Output Neutralization for Logs
java-11-amazon-corretto-javadoc <1:11.0.23+9-1.amzn2 amzn:2 1 May 2024
  • M
Information Exposure
ruby-tcltk <0:2.0.0.648-36.amzn2.0.9 amzn:2 1 May 2024
  • M
Missing Release of Resource after Effective Lifetime
curl-debuginfo <0:8.3.0-1.amzn2.0.7 amzn:2 1 May 2024
  • M
CVE-2024-26602
kernel-tools-devel <0:4.14.336-257.568.amzn2 amzn:2 1 May 2024