Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
Filter and search through 206,027 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-26253 | Rejected reason: Not used | 0.0 | 0 | Neutral | No |
| No |
| CVE-2026-26252 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26251 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26250 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26249 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26226 | beautiful-mermaid versions prior to 0.1.3 contain an SVG attribute injection issue that can lead to cross-site scripting (XSS) when rendering attacker... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-26225 | Intego Personal Backup, a macOS backup utility that allows users to create scheduled backups and bootable system clones, contains a local privilege es... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26224 | Intego Log Reporter, a macOS diagnostic utility bundled with Intego security products that collects system and application logs for support analysis, ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26221 | Hyland OnBase contains an unauthenticated .NET Remoting exposure in the OnBase Workflow Timer Service (Hyland.Core.Workflow.NTService.exe). An attacke... | 0.0 | 0 | Neutral | Yes | No |
| CVE-2026-26220 | LightLLM version 1.1.0 and prior contain an unauthenticated remote code execution vulnerability in PD (prefill-decode) disaggregation mode. The PD mas... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26215 | manga-image-translator version beta-0.3 and prior in shared API mode contains an unsafe deserialization vulnerability that can lead to unauthenticated... | 0.0 | 0 | Neutral | Yes | No |
| CVE-2026-26213 | thingino-firmware versions up to the firmware-2026-03-16 release contains an unauthenticated os command injection vulnerability in the WiFi captive po... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-26209 | ### Summary - The `cbor2` library is vulnerable to a Denial of Service (DoS) attack caused by uncontrolled recursion when decoding deeply nested CBOR... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-26205 | A security vulnerability has been discovered in how the `input.parsed_path` field is constructed. HTTP request paths are treated as full URIs when par... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-26092 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26091 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26090 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26089 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26088 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26087 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |