Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
Filter and search through 206,377 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-4158 | This vulnerability allows local attackers to escalate privileges on affected installations of KeePassXC. An attacker must first obtain the ability to ... | 0.0 | 0 | Neutral | No |
| No |
| CVE-2026-4157 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex devices. Authenticat... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4156 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex EV chargers. Authent... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4155 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of ChargePoint Home Flex charging stations. Aut... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4154 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this v... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4153 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this v... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4152 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this v... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4151 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this v... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4150 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this v... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4092 | ### Impact Allows an attacker to perform a "Path Traversal" attack to modify files outside the projects directory, potentially allowing for running at... | 0.0 | 0 | Neutral | Yes | Yes |
| CVE-2026-3999 | A broken access control may allow an authenticated user to perform a horizontal privilege escalation. The vulnerability only impacts specific config... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-3987 | A path traversal vulnerability in the Fireware OS Web UI on WatchGuard Firebox systems may allow a privileged authenticated remote attacker to execute... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-3948 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 0.0 | 0 | Neutral | No | No |
| CVE-2026-3912 | Injection vulnerabilities due to validation/sanitisation of user-supplied input in ActiveMatrix BusinessWorks and Enterprise Administrator allows info... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-3882 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 0.0 | 0 | Neutral | No | No |
| CVE-2026-3862 | Cross-site Scripting (XSS) allows an attacker to submit specially crafted data to the application which is returned unaltered in the resulting web pag... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-3839 | Unraid Authentication Request Path Traversal Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-3838 | Unraid Update Request Path Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affe... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-3692 | In Progress Flowmon versions prior to 12.5.8, a vulnerability exists whereby an authenticated low-privileged user may craft a request during the repor... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-3691 | This vulnerability allows remote attackers to disclose stored credentials on affected installations of OpenClaw. User interaction is required to explo... | 0.0 | 0 | Neutral | No | No |