Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
Filter and search through 206,396 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-35392 | ### Summary * PUT upload has no path sanitization | `httpserver/updown.go:20-69` This finding affects the default configuration, no flags or authenti... | 0.0 | 0 | Neutral | No |
| No |
| CVE-2026-35213 | All versions of `@hapi/content` through 6.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via crafted HTTP header values. Three reg... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-35209 | ### Impact Applications that pass unsanitized user input (e.g. parsed JSON request bodies, database records, or config files from untrusted sources) ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-35200 | ### Impact A file can be uploaded with a filename extension that passes the file extension allowlist (e.g., `.txt`) but with a `Content-Type` header ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-35187 | ## Vulnerability Details **CWE-918**: Server-Side Request Forgery (SSRF) The `parse_urls` API function in `src/pyload/core/api/__init__.py` (line 55... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-35181 | **Severity:** Medium **CWE:** CWE-352 (Cross-Site Request Forgery) ## Summary The player skin configuration endpoint at `admin/playerUpdate.json.php... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-35179 | ## Summary The SocialMediaPublisher plugin exposes a `publishInstagram.json.php` endpoint that acts as an unauthenticated proxy to the Facebook/Insta... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-35175 | ### Impact An authenticated user (using the `auth_users` plugin authentication method) could install a custom package even if this user is not superu... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-35171 | ### Impact This is a **critical Remote Code Execution (RCE)** vulnerability caused by unsafe use of `logging.config.dictConfig()` with user-controlle... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-35167 | ### Impact The `_get_versioned_path()` method in kedro/io/core.py constructs filesystem paths by directly interpolating user-supplied version strings ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-35166 | ### Impact Links and image links in the default markdown to HTML renderer are not properly escaped. Hugo users who trust their Markdown content or hav... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-35053 | OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, the Worker service's ManualAPI exposes workflow execution... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-35052 | ### Impact Users hosting D-Tale publicly while using a redis or shelf storage layer could be vulnerable to remote code execution allowing attackers to... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-35045 | No description available | 0.0 | 0 | Neutral | Yes | No |
| CVE-2026-35044 | ## Summary The Dockerfile generation function `generate_containerfile()` in `src/bentoml/_internal/container/generate.py` uses an unsandboxed `jinja2... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-35043 | Commit ce53491 (March 24) fixed command injection via `system_packages` in Dockerfile templates and `images.py` by adding `shlex.quote`. However, the ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-35042 | ## Summary `fast-jwt` does not validate the `crit` (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a `crit` array ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-35039 | ## Impact Setting up a custom cacheKeyBuilder method which does not properly create unique keys for different tokens can lead to cache collisions. Th... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-35038 | ## Summary The /signalk/v1/applicationData/... JSON-patch endpoint allows users to modify stored application data. To prevent Prototype Pollution, t... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-35037 | ## Summary The `GET /api/website/title` endpoint accepts an arbitrary URL via the `website_url` query parameter and makes a server-side HTTP request ... | 0.0 | 0 | Neutral | No | No |