The public index of software end-of-life information

Is your stack
still supported?

endoflife.ai is the authoritative reference for software lifecycle dates. Check whether a dependency is outdated, unsupported, or a security risk — instantly and for free.

Data sourced from endoflife.date, NVD, CISA KEV, and official vendor lifecycle pages. How we source data →

Check a Product → Browse All Products
454+
Products Indexed
90%
Of Breaches Exploit Known Vulns
<7
Days to Exploit a New CVE
$0
Cost to Check
Windows 10 — EOL Oct 2025 CentOS 7 — EOL Jun 2024 AngularJS — EOL Dec 2021 MySQL 5.7 — EOL Oct 2023 PHP 8.1 — EOL Dec 2025 Node.js 20 — EOL Apr 2026 MySQL 8.0 — EOL Apr 2026 Python 3.10 — EOL Oct 2026 PostgreSQL 14 — EOL Nov 2026 Python 3.13 — Supported Node.js 22 LTS — Supported PostgreSQL 17 — Supported Ubuntu 24.04 LTS — Supported Kubernetes 1.33 — Supported
Free Tool

The EOL Checker

Instant lifecycle status for any software product. Paste in a product name and know your risk in seconds.

Product
Windows 10
EOL Date
Oct 14, 2025
Status
End of Life
CVE Blind Spot Detected. This product no longer receives security patches. Attackers diff new CVE fixes against your EOL build — your scanner won't alert you. They know. You don't.
Open Full EOL Checker — 454+ products →

Your scanner has a
blind spot.

CVE reporters only test supported software. When a vulnerability is discovered in code that also exists in your EOL version, they don't check — and neither does your scanner.

01
Incomplete CVE Reporting

Security researchers report vulnerabilities in supported versions only. EOL versions share the same vulnerable code but never appear in the advisory.

02
False Scanner Confidence

Your vulnerability scanner checks CVE affected version ranges. Your EOL version falls outside that range. No alert fires. You believe you're safe.

03
Attackers Know First

Threat actors read advisories and diff patches. They test EOL builds systematically. This isn't a zero-day — it's worse. They know. You don't.

Attack Chain — EOL Software
1
CVE Published
Vulnerability disclosed in supported versions only. Your EOL build has the same code.
2
Attacker reads the advisory
Diffs the patch. Tests against EOL builds. Confirms vulnerability present.
3
Your scanner runs
Checks CVE affected version range. EOL version not listed. No alert fires.
4
You believe you're clean
Dashboard shows green. Breach window is open.
endoflife.ai flags it first
EOL detected. CVE blind spot warning surfaced. Risk known before attacker acts.
Resource Hub

Lifecycle Intelligence

Guides, timelines, and analysis for security and engineering teams managing software lifecycles.

Security
The CVE Blind Spot: Why EOL Software Is More Dangerous Than a Zero-Day
With a zero-day, nobody knows. With EOL software, the attacker knows and you don't. Here's why that asymmetry is the most dangerous gap in enterprise security.
endoflife.ai Research · May 2026 · 8 minRead →
IT Security
Windows 10 End of Life: The Complete Migration Guide for IT Teams
Windows 10 reached EOL October 14, 2025. Millions of enterprise machines are running unpatched. Here is what you need to do now.
endoflife.ai Research · Apr 2026 · 9 minRead →
Open Source
The 2026 EOL Calendar: Every Major Runtime and Framework
Python, Node.js, PHP, Ruby, Java LTS — every major platform support window in one place, updated quarterly.
endoflife.ai Research · May 2026 · 5 minRead →
Enterprise
The Hidden Cost of Running EOL Software: A CISO's Risk Framework
Unsupported software is not just technical debt. It is a material security risk. Here is how to quantify it and present it to your board.
endoflife.ai Research · Feb 2026 · 10 minRead →
Hardware
EOSL for Enterprise Hardware: Cisco, HPE, Dell EMC Timelines
When your storage arrays and network gear hit end-of-service-life, the security clock starts. A vendor-by-vendor breakdown of critical dates.
endoflife.ai Research · Apr 2026 · 7 minRead →