Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
Filter and search through 206,165 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-3086 | GStreamer H.266 Codec Parser Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary ... | 0.0 | 0 | Neutral | No |
| Yes |
| CVE-2026-3085 | GStreamer rtpqdm2depay Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-30840 | Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.6.2, there is a server-side request forgery vulnerability in... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-3084 | GStreamer H.266 Codec Parser Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary co... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-3083 | GStreamer rtpqdm2depay Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code o... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-30823 | ### Summary The Flowise platform has a critical Insecure Direct Object Reference (IDOR) vulnerability combined with a Business Logic Flaw in the PUT /... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-30822 | ## Summary **A Mass Assignment vulnerability in the `/api/v1/leads` endpoint allows any unauthenticated user to control internal entity fields (`id`,... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-3082 | GStreamer JPEG Parser Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-3081 | GStreamer H.266 Codec Parser Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute ar... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-30762 | Subject: Security Vulnerability Report Hardcoded JWT Secret (CVE-2026-30762) Hi HKUDS team, I'm writing to report a security vulnerability I discove... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-3076 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2026-2363. Reason: This candidate is a reservation duplicate of CVE-20... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-30613 | An information disclosure vulnerability exists in AZIOT 1 Node Smart Switch (16amp)- WiFi/Bluetooth Enabled Software Version: 1.1.9 due to improper ac... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-30498 | No description available | 0.0 | 0 | Neutral | Yes | No |
| CVE-2026-30407 | Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: none. Reason: This record was withdrawn by its CNA. Further investigation showed that it was ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-30231 | Flare is a Next.js-based, self-hostable file sharing platform that integrates with screenshot tools. Prior to version 1.7.2, the raw and direct file r... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-30230 | Flare is a Next.js-based, self-hostable file sharing platform that integrates with screenshot tools. Prior to version 1.7.2, the thumbnail endpoint do... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-3020 | Identity based authorization bypass vulnerability (IDOR) that allows an attacker to modify the data of a legitimate user account, such as changing the... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-3013 | Coppermine Photo Gallery in versions 1.6.09 through 1.6.27 is vulnerable to path traversal. Unauthenticated remote attacker is able to exploit a vulne... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-30081 | No description available | 0.0 | 0 | Neutral | Yes | No |
| CVE-2026-30039 | No description available | 0.0 | 0 | Neutral | Yes | No |