Total CVEs
5799
last 30 days
Avg Priority
34.0
of max 220
KEV
6
actively exploited
POC
807
public exploits
Unpatched
1589
CRIT/HIGH without patch
How is Priority Score calculated?
Priority Score is a composite risk metric (0-220) combining multiple real-world threat signals:
KEV +50
CISA Known Exploited Vulnerability — confirmed active exploitation in the wild
EPSS x100
Exploit Prediction Scoring System — probability of exploitation in next 30 days (0-100)
CVSS x5
Common Vulnerability Scoring System — technical severity (0-50)
POC +20
Public exploit code exists — lowers barrier for attackers
0-40 Low
40-80 Medium
80-120 High
120+ Critical
Patch Now — Known Exploited Vulnerabilities
124
CVE-2026-35616
A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an
119
CVE-2026-5281
Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had co
117
CVE-2026-33634
Trivy is a security scanner. On March 19, 2026, a threat actor used compromised credentials to publi
117
CVE-2026-33017
## Summary
The `POST /api/v1/build_public_tmp/{flow_id}/flow` endpoint allows building public flows
117
CVE-2026-3055
Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP l
109
CVE-2026-3502
TrueConf Client downloads application update code and applies it without performing verification. An
Priority Distribution
| Priority | CVE |
|---|---|
| 38 |
CVE-2026-33485
## Summary
The RTMP `on_publish` callback at `plugin/Live/on_publish.php` is ac
|
| 38 |
CVE-2026-4157
ChargePoint Home Flex revssh Service Command Injection Remote Code Execution Vul
|
| 38 |
CVE-2026-34070
## Summary
Multiple functions in `langchain_core.prompts.loading` read files fr
|
| 38 |
CVE-2026-30653
An issue in Free5GC v.4.2.0 and before allows a remote attacker to cause a denia
|
| 38 |
CVE-2026-1376
IBM i 7.6 could allow a remote attacker to cause a denial of service using faile
|
| 38 |
CVE-2026-33483
## Summary
The `aVideoEncoderChunk.json.php` endpoint is a completely standalon
|
| 38 |
CVE-2026-4424
A flaw was found in libarchive. This heap out-of-bounds read vulnerability exist
|
| 38 |
CVE-2026-0560
A Server-Side Request Forgery (SSRF) vulnerability exists in parisneo/lollms ver
|
| 38 |
CVE-2026-22179
OpenClaw versions prior to 2026.2.22 in macOS node-host system.run contain an al
|
| 38 |
CVE-2026-32241
Flannel is a network fabric for containers, designed for Kubernetes. The Flannel
|
| 38 |
CVE-2026-33218
### Background
NATS.io is a high performance open source pub-sub distributed co
|
| 38 |
CVE-2026-4645
A flaw was found in the `github.com/antchfx/xpath` component. A remote attacker
|
| 38 |
CVE-2026-32537
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
|
| 38 |
CVE-2026-32969
An unauthenticated remote attacker can exploit a Pre-Auth blind SQL Injection vu
|
| 38 |
CVE-2026-35523
Strawberry up until version `0.312.3` is vulnerable to an authentication bypass
|
| 38 |
CVE-2026-4373
The JetFormBuilder plugin for WordPress is vulnerable to arbitrary file read via
|
| 38 |
CVE-2026-3360
The Tutor LMS - eLearning and online course solution plugin for WordPress is vul
|
| 38 |
CVE-2026-33203
## Summary
The SiYuan kernel WebSocket server accepts unauthenticated connection
|
| 38 |
CVE-2026-33012
`DefaultHtmlErrorResponseBodyProvider` in `io.micronaut:micronaut-http-server` s
|
| 38 |
CVE-2026-39312
SoftEtherVPN is a an open-source cross-platform multi-protocol VPN Program. In 5
|
| 38 |
CVE-2026-5201
A flaw was found in the gdk-pixbuf library. This heap-based buffer overflow vuln
|
| 38 |
CVE-2026-3396
WCAPF - WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL I
|
| 38 |
CVE-2026-28461
OpenClaw versions prior to 2026.3.1 contain an unbounded memory growth vulnerabi
|
| 38 |
CVE-2026-30637
Server-Side Request Forgery (SSRF) vulnerability exists in the AnnounContent of
|
| 38 |
CVE-2026-35464
## Summary
The fix for CVE-2026-33509 (GHSA-r7mc-x6x7-cqxx) added an `ADMIN_ONL
|
| 38 |
CVE-2026-3509
An unauthenticated remote attacker may be able to control the format string of m
|
| 38 |
CVE-2026-4662
The JetEngine plugin for WordPress is vulnerable to SQL Injection via the `listi
|
| 38 |
CVE-2026-1800
The Fonts Manager | Custom Fonts plugin for WordPress is vulnerable to time-base
|
| 38 |
CVE-2026-2511
The JS Help Desk - AI-Powered Support & Ticketing System plugin for WordPress is
|
| 38 |
CVE-2026-3658
The Appointment Booking Calendar - Simply Schedule Appointments Booking Plugin p
|
| 38 |
CVE-2026-30405
An issue in GoBGP gobgpd v.4.2.0 allows a remote attacker to cause a denial of s
|
| 38 |
CVE-2026-29785
### Background
NATS.io is a high performance open source pub-sub distributed co
|
| 38 |
CVE-2026-4987
The SureForms - Contact Form, Payment Form & Other Custom Form Builder plugin fo
|
| 38 |
CVE-2026-4156
ChargePoint Home Flex OCPP getpreq Stack-based Buffer Overflow Remote Code Execu
|
| 38 |
CVE-2026-27889
### Background
NATS.io is a high performance open source pub-sub distributed co
|
| 38 |
CVE-2026-2580
The WP Maps - Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory &
|
| 38 |
CVE-2026-4306
The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'r
|
| 38 |
CVE-2025-66687
Doom Launcher 3.8.1.0 is vulnerable to Directory Traversal due to missing file p
|
| 38 |
CVE-2025-14287
A command injection vulnerability exists in mlflow/mlflow versions before v3.7.0
|
| 38 |
CVE-2026-2579
The WowStore - Store Builder & Product Blocks for WooCommerce plugin for WordPre
|
| 38 |
CVE-2026-32596
### Summary
Glances web server runs without authentication by default when start
|
| 38 |
CVE-2026-2468
The Quentn WP plugin for WordPress is vulnerable to SQL Injection via the 'qntn_
|
| 38 |
CVE-2026-4634
A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulne
|
| 38 |
CVE-2026-23536
A security issue was discovered in the Feast Feature Server's `/read-document` e
|
| 38 |
CVE-2025-14031
IBM Sterling B2B Integrator and and IBM Sterling File Gateway 6.1.0.0 through 6.
|
| 38 |
CVE-2026-4640
Vitals ESP developed by Galaxy Software Services has a Missing Authentication vu
|
| 38 |
CVE-2026-4427
A flaw was found in pgproto3. A malicious or compromised PostgreSQL server can e
|
| 38 |
CVE-2026-34731
WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AV
|
| 38 |
CVE-2026-33509
## Summary
The `set_config_value()` API endpoint allows users with the non-admi
|
| 38 |
CVE-2026-34381
Admidio is an open-source user management solution. From version 5.0.0 to before
|
| 38 |
CVE-2026-34874
An issue was discovered in Mbed TLS through 3.6.5 and 4.x through 4.0.0. There i
|
| 38 |
CVE-2026-30078
OpenAirInterface V2.2.0 AMF crashes when it receives an NGAP message with invali
|
| 38 |
CVE-2025-59032
ManageSieve AUTHENTICATE command crashes when using literal as SASL initial resp
|
| 38 |
CVE-2026-30077
OpenAirInterface V2.2.0 AMF crashes when it fails to decode the message. Not all
|
| 38 |
CVE-2026-35092
A flaw was found in Corosync. An integer overflow vulnerability in Corosync's jo
|
| 38 |
CVE-2025-70952
pf4j before 20c2f80 has a path traversal vulnerability in the extract() function
|
| 38 |
CVE-2026-32025
OpenClaw versions prior to 2026.2.25 contain an authentication hardening gap in
|
| 38 |
CVE-2026-39623
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
|
| 38 |
CVE-2026-39611
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
|
| 38 |
CVE-2026-25667
ASP.NET Core Kestrel in Microsoft .NET 8.0 before 8.0.22 and .NET 9.0 before 9.0
|
| 38 |
CVE-2026-39684
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
|
| 38 |
CVE-2026-28874
The issue was addressed with improved checks. This issue is fixed in iOS 26.4 an
|
| 38 |
CVE-2026-39613
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
|
| 38 |
CVE-2026-32701
Qwik is a performance-focused JavaScript framework. Versions prior to 1.19.2 imp
|
| 38 |
CVE-2026-32805
## Summary
The `sanitizeArchivePath` function in `webserver/api/v1/decoder.go`
|
| 38 |
CVE-2026-28894
A denial-of-service issue was addressed with improved input validation. This iss
|
| 38 |
CVE-2026-4020
The Gravity SMTP plugin for WordPress is vulnerable to Sensitive Information Exp
|
| 38 |
CVE-2026-33040
### Summary
The Rust libp2p Gossipsub implementation accepts attacker-controlled
|
| 38 |
CVE-2026-5032
The W3 Total Cache plugin for WordPress is vulnerable to information exposure in
|
| 38 |
CVE-2026-32609
## Summary
The GHSA-gh4x fix (commit 5d3de60) addressed unauthenticated configu
|
| 38 |
CVE-2026-33427
Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late
|
| 38 |
CVE-2026-33616
An unauthenticated remote attacker can exploit an unauthenticated blind SQL Inje
|
| 38 |
CVE-2026-28875
A buffer overflow was addressed with improved bounds checking. This issue is fix
|
| 38 |
CVE-2026-33614
An unauthenticated remote attacker can exploit an unauthenticated SQL Injection
|
| 38 |
CVE-2026-32874
#### Summary
ujson 5.4.0 to 5.11.0 inclusive contain an accumulating memory lea
|
| 38 |
CVE-2026-4269
A missing S3 ownership verification in the Bedrock AgentCore Starter Toolkit bef
|
| 38 |
CVE-2026-27858
Attacker can send a specifically crafted message before authentication that caus
|
| 38 |
CVE-2026-33416
LIBPNG is a reference library for use in applications that read, create, and man
|
| 38 |
CVE-2026-31931
Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before vers
|
| 38 |
CVE-2026-28865
An authentication issue was addressed with improved state management. This issue
|
| 38 |
CVE-2026-26027
GLPI is a free asset and IT management software package. From 11.0.0 to before 1
|
| 38 |
CVE-2026-26209
cbor2 provides encoding and decoding for the Concise Binary Object Representatio
|
| 38 |
CVE-2026-29871
A path traversal vulnerability exists in the awesome-llm-apps project in commit
|
| 38 |
CVE-2026-33154
### Summary
Dynaconf is vulnerable to Server-Side Template Injection (SSTI) due
|
| 38 |
CVE-2025-69768
SQL Injection vulnerability in Chyrp v.2.5.2 and before allows a remote attacker
|
| 38 |
CVE-2026-35526
Strawberry GraphQL's WebSocket subscription handlers for both the `graphql-trans
|
| 38 |
CVE-2026-33204
## Summary
An unauthenticated attacker can perform a Denial of Service via JWE
|
| 38 |
CVE-2026-1233
The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulner
|
| 38 |
CVE-2026-33418
## Summary
The `ensureSize()` function in `@dicebear/converter` used a regex-ba
|
| 38 |
CVE-2026-33285
### Summary
LiquidJS's `memoryLimit` security mechanism can be completely bypas
|
Oldest Unpatched Critical/High CVEs
| CVE | Severity | CVSS | Priority | Days Open |
|---|---|---|---|---|
| CVE-2024-3400 | CRITICAL | 10.0 | 224 | 731d |
| CVE-2019-19781 | CRITICAL | 9.8 | 223 | 2299d |
| CVE-2020-5902 | CRITICAL | 9.8 | 223 | 2111d |
| CVE-2021-35464 | CRITICAL | 9.8 | 223 | 1725d |
| CVE-2020-10189 | CRITICAL | 9.8 | 223 | 2228d |
| CVE-2012-4681 | CRITICAL | 9.8 | 223 | 4976d |
| CVE-2022-42475 | CRITICAL | 9.8 | 223 | 1197d |
| CVE-2023-3519 | CRITICAL | 9.8 | 223 | 998d |
| CVE-2015-7450 | CRITICAL | 9.8 | 222 | 3753d |
| CVE-2023-34048 | CRITICAL | 9.8 | 222 | 900d |