Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
Filter and search through 200,031 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-3548 | Two buffer overflow vulnerabilities existed in the wolfSSL CRL parser when parsing CRL numbers: a heap-based buffer overflow could occur when improper... | 0.0 | 0 | Neutral | No |
| Yes |
| CVE-2026-35099 | No description available | 0.0 | 0 | Neutral | No | No |
| CVE-2026-35094 | No description available | 0.0 | 0 | Neutral | No | No |
| CVE-2026-35093 | No description available | 0.0 | 0 | Neutral | No | No |
| CVE-2026-35092 | No description available | 0.0 | 0 | Neutral | No | No |
| CVE-2026-35091 | No description available | 0.0 | 0 | Neutral | No | No |
| CVE-2026-3503 | Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physic... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-34999 | No description available | 0.0 | 0 | Neutral | No | No |
| CVE-2026-3497 | Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various Linu... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-34889 | No description available | 0.0 | 0 | Neutral | No | No |
| CVE-2026-3479 | pkgutil.get_data() did not validate the resource argument as documented, allowing path traversals. | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-34784 | Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.71 and 9.7.1-alpha.1, fi... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-34605 | SiYuan is a personal knowledge management system. From version 3.6.0 to before version 3.6.2, the SanitizeSVG function introduced in version 3.6.0 to ... | 0.0 | 0 | Neutral | Yes | No |
| CVE-2026-34604 | ## Summary `@tinacms/graphql` uses string-based path containment checks in `FilesystemBridge`: - `path.resolve(path.join(baseDir, filepath))` - `sta... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-34603 | ## Summary `@tinacms/cli` recently added lexical path-traversal checks to the dev media routes, but the implementation still validates only the path ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-34601 | ## Summary `@xmldom/xmldom` allows attacker-controlled strings containing the CDATA terminator `]]>` to be inserted into a `CDATASection` node. Durin... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-34598 | ### Summary A stored and blind XSS vulnerability exists in the form title field. A malicious attacker can inject JavaScript without any authentication... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-34595 | Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.70 and 9.7.0-alpha.18, a... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-34593 | ## Summary `Ash.Type.Module.cast_input/2` unconditionally creates a new Erlang atom via `Module.concat([value])` for any user-supplied binary string ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-34574 | Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.69 and 9.7.0-alpha.14, a... | 0.0 | 0 | Neutral | No | No |