Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
Filter and search through 206,127 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-28722 | Local privilege escalation due to improper soft link handling. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41... | 0.0 | 0 | Neutral | No |
| Yes |
| CVE-2026-28721 | Local privilege escalation due to improper soft link handling. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-28720 | Unauthorized modification of settings due to insufficient authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-28719 | Unauthorized resource manipulation due to improper authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-28717 | Local privilege escalation due to improper directory permissions. The following products are affected: Acronis Cyber Protect 17 (Windows) before build... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-28716 | Information disclosure and manipulation due to improper authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, Wi... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-28714 | Unnecessary transmission of sensitive cryptographic material. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before bu... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-28713 | Default credentials set for local privileged user in Virtual Appliance. The following products are affected: Acronis Cyber Protect Cloud Agent (VMware... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-28712 | Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-28711 | Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-28529 | cryptodev-linux version 1.14 and prior contain a page reference handling flaw in the get_userbuf function of the /dev/crypto device driver that allows... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-28484 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 0.0 | 0 | Neutral | No | No |
| CVE-2026-28483 | ### Summary ZIP extraction in OpenClaw could be raced into writing outside the intended destination directory via parent-directory symlink rebind betw... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-28455 | Rejected reason: This CVE ID has been rejected. | 0.0 | 0 | Neutral | No | No |
| CVE-2026-28427 | OpenDeck is Linux software for your Elgato Stream Deck. Prior to 2.8.1, the service listening on port 57118 serves static files for installed plugins ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-28384 | An improper sanitization of the compression_algorithm parameter in Canonical LXD allows an authenticated, unprivileged user to execute commands as the... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-28355 | Canarytokens help track activity and actions on a network. Versions prior to `sha-7ff0e12` have a Self Cross-Site Scripting vulnerability in the "PWA"... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-28353 | Trivy Vulnerability Scanner is a VS Code extension that helps find vulnerabilities. In Trivy VSCode Extension version 1.8.12, which was distributed vi... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-2832 | Certain Samsung MultiXpress Multifunction Printers may be vulnerable to information disclosure, potentially exposing address book entries and other de... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-28267 | Multiple i-フィルター products are configured with improper file access permission settings. Files may be created or overwritten in the system directory or... | 0.0 | 0 | Neutral | No | No |