Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
Filter and search through 200,071 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-4309 | Missing Authorization vulnerability in NEC Platforms, Ltd. Aterm Series allows a attacker to get a specific device information and change the settings... | 0.0 | 0 | Neutral | No |
| No |
| CVE-2026-4266 | An Insecure Deserialization vulnerability in WatchGuard Fireware OS allows an attacker that has obtained write access to the local filesystem through ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4263 | Vulnerability of incorrect authorization in HiJiffy Chatbot allows an attacker to download private messages from other users via the parameter 'visit... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4262 | Vulnerability of incorrect authorization in HiJiffy Chatbot allows an attacker to download private messages from other users via the parameter 'ID' in... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4255 | A DLL search order hijacking vulnerability in Thermalright TR-VISION HOME on Windows (64-bit) allows a local attacker to escalate privileges via DLL s... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4224 | When an Expat parser with a registered ElementDeclHandler parses an inline document type definition containing a deeply nested content model a C stack... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-4208 | The extension fails to properly reset the generated MFA code after successful authentication. This leads to a possible MFA bypass for future login att... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-4202 | The extension fails to verify, if an authenticated user has permissions to access to redirects resulting in exposure of redirect records when editing ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-4159 | 1-byte OOB heap read in wc_PKCS7_DecodeEnvelopedData via zero-length encrypted content. A vulnerability existed in wolfSSL 5.8.4 and earlier, where a ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-4158 | This vulnerability allows local attackers to escalate privileges on affected installations of KeePassXC. An attacker must first obtain the ability to ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4157 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex devices. Authenticat... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4156 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex EV chargers. Authent... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4155 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of ChargePoint Home Flex charging stations. Aut... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4154 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this v... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4153 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this v... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4152 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this v... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4151 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this v... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4150 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this v... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-4092 | Path Traversal in Clasp impacting versions < 3.2.0 allows a remote attacker to perform remote code execution via a malicious Google Apps Script projec... | 0.0 | 0 | Neutral | Yes | Yes |
| CVE-2026-3999 | A broken access control may allow an authenticated user to perform a horizontal privilege escalation. The vulnerability only impacts specific config... | 0.0 | 0 | Neutral | No | No |