Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
Filter and search through 408,611 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-99999 | No description available | 0.0 | 0 | Neutral | Yes |
| No |
| CVE-2026-7731 | No description available | 0.0 | 0 | Neutral | Yes | No |
| CVE-2026-6878 | A vulnerability was identified in ByteDance verl up to 0.7.0. Affected is the function math_equal of the file prime_math/grader.py. The manipulation l... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-6874 | A vulnerability was determined in ericc-ch copilot-api up to 0.7.0. This impacts an unknown function of the file /token of the component Header Handle... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-6862 | A flaw was found in libefiboot, a component of efivar. The device path node parser in libefiboot fails to validate that each node's Length field is at... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-6861 | A flaw was found in GNU Emacs. This vulnerability, a memory corruption issue, occurs when Emacs processes specially crafted SVG (Scalable Vector Graph... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-6859 | A flaw was found in InstructLab. The `linux_train.py` script hardcodes `trust_remote_code=True` when loading models from HuggingFace. This allows a re... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-6857 | A flaw was found in camel-infinispan. This vulnerability involves unsafe deserialization in the ProtoStream remote aggregation repository. A remote at... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-6855 | A flaw was found in InstructLab. A local attacker could exploit a path traversal vulnerability in the chat session handler by manipulating the `logs_d... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-6849 | No description available | 0.0 | 0 | Neutral | Yes | No |
| CVE-2026-6848 | A flaw was found in Red Hat Quay. When Red Hat Quay requests password re-verification for sensitive operations, such as token generation or robot acco... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-6846 | A flaw was found in binutils. A heap-buffer-overflow vulnerability exists when processing a specially crafted XCOFF (Extended Common Object File Forma... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-6845 | A flaw was found in binutils, specifically within the `readelf` utility. This vulnerability allows a local attacker to cause a Denial of Service (DoS)... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-6844 | A flaw was found in the `readelf` utility of the binutils package. A local attacker could exploit two Denial of Service (DoS) vulnerabilities by provi... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-6843 | A flaw was found in nano. A local user could exploit a format string vulnerability in the `statusline()` function. By creating a directory with a name... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-6842 | A flaw was found in nano. In environments with permissive umask settings, a local attacker can exploit incorrect directory permissions (0777 instead o... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-6840 | Missing bounds validation for operator could allow out of range operator-code lookup during model loading Affected version is prior to commit 1.30.0... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-6839 | Improper validation of STRING tensor offsets could allows malformed string metadata to trigger out of bounds access during constant tensor import in S... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-6835 | The a+HCM developed by aEnrich has an Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload arbitrary files to any ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-6834 | The a+HRD developed by aEnrich has a Missing Authorization vulnerability, allowing authenticated remote attackers to arbitrarily read database content... | 0.0 | 0 | Neutral | No | No |