Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
Filter and search through 205,783 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-23943 | Improper Handling of Highly Compressed Data (Compression Bomb) vulnerability in Erlang OTP ssh (ssh_transport modules) allows Denial of Service via Re... | 0.0 | 0 | Neutral | No |
| Yes |
| CVE-2026-23942 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (ssh_sftpd module) allows Path Traversal. ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23941 | Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in Erlang OTP (inets httpd module) allows HTTP Request Smuggling... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-2394 | Buffer Over-read vulnerability in RTI Connext Professional (Core Libraries) allows Overread Buffers.This issue affects Connext Professional: from 7.4.... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23925 | An authenticated Zabbix user (User role) with template/host write permissions is able to create objects via the configuration.import API. This can lea... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23924 | Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_info' parameters when forwarding them to the Docker daemon. An attacker ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23923 | An unauthenticated attacker can exploit the Frontend 'validate' action to blindly instantiate arbitrary PHP classes. The impact depends on environment... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23921 | A low privilege Zabbix user with API access can exploit a blind SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrar... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23920 | Host and event action script input is validated with a regex (set by the administrator), but the validation runs in multiline mode. If ^ and $ anchors... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23919 | For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can l... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23917 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23916 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23915 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23914 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23913 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23912 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23911 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23910 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23909 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23899 | An improper access check allows unauthorized access to webservice endpoints. | 0.0 | 0 | Neutral | No | No |