Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
Filter and search through 200,242 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-5724 | The frontend gRPC server's streaming interceptor chain did not include the authorization interceptor. When a ClaimMapper and Authorizer are configured... | 0.0 | 0 | Neutral | Yes |
| Yes |
| CVE-2026-5720 | miniupnpd contains an integer underflow vulnerability in SOAPAction header parsing that allows remote attackers to cause a denial of service or inform... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-5713 | The "profiling.sampling" module (Python 3.15+) and "asyncio introspection capabilities" (3.14+, "python -m asyncio ps" and "python -m asyncio pstree")... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-5664 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2026-30078. Reason: This candidate is a reservation duplicate of CVE-2... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-5599 | A user with API access and "manage users" permission in any venueless world is able to trigger deletion of user accounts in other worlds. | 0.0 | 0 | Neutral | No | No |
| CVE-2026-5598 | Covert timing channel vulnerability in Legion of the Bouncy Castle Inc. BC-JAVA core on all (core modules). Non-constant time comparisons risk privat... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-5588 | : Use of a Broken or Risky Cryptographic Algorithm vulnerability in Legion of the Bouncy Castle Inc. BC-JAVA bcpkix on all (pkix modules). PKIX draf... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-5496 | Labcenter Electronics Proteus PDSPRJ File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to ex... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-5495 | Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-5494 | Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-5493 | Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-5492 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of DriveLock. Authentication is required to exp... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-5491 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of DriveLock. Authentication is not required to... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-5490 | This vulnerability allows remote attackers to escalate privileges on affected installations of DriveLock. Authentication is required to exploit this v... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-5489 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of DriveLock. Authentication is not required to... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-5487 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of DriveLock. Authentication is not required to... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-5424 | This vulnerability allows local attackers to escalate privileges on affected installations of Avast Premium Security. An attacker must first obtain th... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-5394 | An authenticated administrative user who can import or save DataObject class definitions can inject attacker-controlled composite index metadata and t... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-5387 | The vulnerability, if exploited, could allow an unauthenticated miscreant to perform operations intended only for Simulator Instructor or Simulator De... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-5363 | Inadequate Encryption Strength vulnerability in TP-Link Archer C7 v5 and v5.8 (uhttpd modules) allows Password Recovery Exploitation. The web interfac... | 0.0 | 0 | Neutral | No | No |