Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
Filter and search through 205,907 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-25412 | Missing Authorization vulnerability in mdempfle Advanced iFrame advanced-iframe allows Exploiting Incorrectly Configured Access Control Security Level... | 0.0 | 0 | Neutral | No |
| Yes |
| CVE-2026-2541 | The Micca KE700 system relies on a 6-bit portion of an identifier for authentication within rolling codes, providing only 64 possible combinations. Th... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-2540 | The Micca KE700 system contains flawed resynchronization logic and is vulnerable to replay attacks. This attack requires sending two previously captur... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-2539 | The RF communication protocol in the Micca KE700 car alarm system does not encrypt its data frames. An attacker with a radio interception tool (e.g., ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-25369 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Flexmls Flexmls® IDX allows Reflected XSS.This i... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-25312 | Missing Authorization vulnerability in EventPrime allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects EventPrim... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-25251 | Rejected reason: This has been moved to the REJECTED state because the information source is under review. If circumstances change, it is possible tha... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-25198 | web2py versions 2.27.1-stable+timestamp.2023.11.16.08.03.57 and prior contain an Open Redirect vulnerability. If this vulnerability is exploited, the ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-25191 | The installer of FinalCode Client provided by Digital Arts Inc. contains an issue with the DLL search path. If a user is directed to place a malicious... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-2514 | In Progress Flowmon ADS versions prior to 12.5.5 and 13.0.3, a vulnerability exists whereby an adversary with access to Flowmon monitoring ports may c... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-2513 | A vulnerability exists in Progress Flowmon ADS versions prior to 12.5.5 and 13.0.3, whereby an administrator who clicks a malicious link provided by a... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-25118 | immich is a high performance self-hosted photo and video management solution. Prior to version 2.6.0, the Immich application is vulnerable to credenti... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-25117 | pwn.college DOJO is an education platform for learning cybersecurity. Prior to commit e33da14449a5abcff507e554f66e2141d6683b0a, missing sandboxing on ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-25097 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-25096 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-25095 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-25094 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-25093 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-25092 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-25091 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |