Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
Filter and search through 205,879 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-25044 | **Location**: `packages/server/src/automations/steps/bash.ts` #### Description The bash automation step executes user-provided commands using `exec... | 0.0 | 0 | Neutral | No |
| Yes |
| CVE-2026-2493 | IceWarp collaboration Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive infor... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-2492 | TensorFlow HDF5 Library Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escala... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-2491 | Socomec DIRIS A-40 HTTP API Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affe... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-2490 | RustDesk Client for Windows Transfer File Link Following Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose s... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-24871 | Improper Control of Generation of Code ('Code Injection') vulnerability in pilgrimage233 Minecraft-Rcon-Manage.This issue affects Minecraft-Rcon-Manag... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-24867 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-24866 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-24865 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-24864 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-24863 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-24862 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-24861 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-24860 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-24859 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-24826 | Out-of-bounds Write, Divide By Zero, NULL Pointer Dereference, Use of Uninitialized Resource, Out-of-bounds Read, Reachable Assertion vulnerability in... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-24825 | Missing Release of Memory after Effective Lifetime vulnerability in ydb-platform ydb (contrib/libs/yajl modules). This vulnerability is associated wit... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-24824 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in yacy yacy_search_server (source/net/yacy/... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-24823 | Out-of-bounds Write, Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in FASTSHIFT X-TRACK (Software/X-Track/USER/... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-24822 | Out-of-bounds Write, Heap-based Buffer Overflow vulnerability in ttttupup wxhelper (src modules). This vulnerability is associated with program files ... | 0.0 | 0 | Neutral | No | No |