Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
Filter and search through 206,047 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-2645 | In wolfSSL 5.8.2 and earlier, a logic flaw existed in the TLS 1.2 server state machine implementation. The server could incorrectly accept the Certifi... | 0.0 | 0 | Neutral | No |
| Yes |
| CVE-2026-26370 | WordPress Plugin "Survey Maker" versions 5.1.7.7 and prior contain a cross-site scripting vulnerability. If this vulnerability is exploited, an arbitr... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-2637 | iBoysoft NTFS for Mac contains a local privilege escalation vulnerability in its privileged helper daemon ntfshelperd. The daemon exposes an NSConnect... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26364 | This vulnerability allows local attackers to escalate privileges on affected installations of Array Networks MotionPro. An attacker must first obtain ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-2635 | This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit thi... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-26306 | The installer for OM Workspace (Windows Edition) Ver 2.4 and earlier insecurely loads Dynamic Link Libraries (DLLs), which could allow an attacker to ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26303 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26302 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26301 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26300 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26299 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26298 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26297 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26296 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26295 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26273 | ### Summary A Critical Broken Authentication vulnerability exists in Known 1.6.2. The application leaks the password reset token within a hidden HTML ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-26257 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26256 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26255 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26254 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |