| 298466 | BentoML < 1.4.34 Path Traversal | medium |
| 298465 | OpenClaw / Clawdbot / Moltbot < 2026.1.20 Command Injection (GHSA-g55j-c2v4-pjcg) | high |
| 298450 | OpenClaw / Clawdbot / Moltbot < 2026.1.30 Path Traversal (GHSA-r8g4-86fx-92mq) | medium |
| 297816 | OpenClaw / Clawdbot / Moltbot < 2026.1.29 Multiple Vulnerabilities | high |
| 297108 | Molty Clawdbot/Moltbot Installed | info |
| 271839 | Figma Developer MCP < 0.6.3 RCE (GHSA-gxw4-4fc5-9gr5) | high |
| 271266 | MCP JSON Config Detected (Windows) | info |
| 270574 | Cursor < 1.7 RCE (GHSA-xcwh-rrwj-gxc7) | high |
| 265760 | Google Gemini CLI Installed (macOS) | info |
| 265759 | Google Gemini CLI Installed (Windows) | info |
| 265758 | Google Gemini CLI Installed (Linux/UNIX) | info |
| 252964 | MCP JSON Config Detected (macOS) | info |
| 250293 | Ollama <= 0.9.6 Cross-Domain Token Exposure | medium |
| 250292 | Ollama <= 0.3.3 DoS | high |
| 243972 | Cursor < 1.2.4 RCE (GHSA-24mc-g4xr-4395) | high |
| 243971 | Cursor <= 1.2.1 RCE (GHSA-4cxx-hrm3-49rm) | high |
| 243280 | MCP Server using Server Sent Events Detected | info |
| 241433 | Model Context Protocol (MCP) Python Library Detection | info |
| 241432 | NuGet Package 'ModelContextProtocol' Detection | info |
| 235353 | BentoML 1.x < 1.4.8 Arbitrary Code Execution | critical |
| 233770 | Ollama Installed (Windows) | info |
| 233434 | Ollama <= 0.3.14 Multiple Vulnerabilities | high |
| 233180 | Ollama Installed (Linux) | info |
| 232290 | Gradio UI Detection | info |
| 214856 | Granola Installed (macOS) | info |
| 213711 | Gradio < 4.19.2 CSRF | medium |
| 213710 | Gradio Detection | info |
| 213709 | Gradio < 4.13.0 Local File Access | high |
| 213708 | Gradio < 4.19.2 Vulnerability - CVE-2024-1728 | high |
| 213707 | Gradio < 4.18.0 Vulnerability - CVE-2024-2206 | medium |
| 213706 | Gradio < 4.42.0 SSRF | medium |
| 213567 | LangChain < 0.2.5 DoS | medium |
| 213566 | LangChain < 0.2.5 Arbitrary File Write | critical |
| 213565 | LangChain < 0.1.35 XXE | medium |
| 213564 | LangChain < 0.0.27 SSRF | medium |
| 213563 | LangChain < 0.2.5 SQLi through Prompt Injection | critical |
| 213562 | LangChain < 0.1.0 SSRF | high |
| 213561 | LangChain < 0.2.9 Vulnerability - CVE-2024-5998 | high |
| 213560 | LangChain < 0.1.5 SSRF | high |
| 213559 | LangChain < 0.2.5 SQLi through Prompt Injection | critical |
| 213485 | ZenML < 0.57.1 DoS (CVE-2024-4460) | medium |
| 213484 | ZenML < 0.57.0 Password Reset Brute Force (CVE-2024-4311) | medium |
| 213483 | ZenML < 0.56.3 Unpatched Session Expiration Exposure (CVE-2024-4680) | high |
| 213482 | ZenML < 0.55.5 Vulnerability - CVE-2024-2032 | low |
| 213481 | ZenML < 0.56.3 Vulnerability - CVE-2024-2383 | medium |
| 213480 | ZenML < 0.56.2 Vulnerability - CVE-2024-2035 | medium |
| 213479 | ZenML < 0.58.0 XSS | medium |
| 213478 | ZenML < 0.56.3 Vulnerability - CVE-2024-2213 | low |
| 213477 | ZenML < 0.55.5 Arbitrary File Upload | high |
| 213476 | ZenML < 0.56.2 Vulnerability - CVE-2024-2171 | medium |