Total CVEs
6150
last 30 days
Avg Priority
35.1
of max 220
KEV
8
actively exploited
POC
753
public exploits
Unpatched
1231
CRIT/HIGH without patch
How is Priority Score calculated?
Priority Score is a composite risk metric (0-220) combining multiple real-world threat signals:
KEV +50
CISA Known Exploited Vulnerability — confirmed active exploitation in the wild
EPSS x100
Exploit Prediction Scoring System — probability of exploitation in next 30 days (0-100)
CVSS x5
Common Vulnerability Scoring System — technical severity (0-50)
POC +20
Public exploit code exists — lowers barrier for attackers
0-40 Low
40-80 Medium
80-120 High
120+ Critical
Patch Now — Known Exploited Vulnerabilities
124
CVE-2026-35616
A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an
119
CVE-2026-5281
Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had co
118
CVE-2026-34621
Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Control
117
CVE-2026-33634
Trivy is a security scanner. On March 19, 2026, a threat actor used compromised credentials to publi
117
CVE-2026-3055
Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP l
114
CVE-2026-34197
Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability i
109
CVE-2026-3502
TrueConf Client downloads application update code and applies it without performing verification. An
109
CVE-2026-32201
Improper input validation in Microsoft Office SharePoint allows an unauthorized attacker to perform
Priority Distribution
| Priority | CVE |
|---|---|
| 38 |
CVE-2026-2511
The JS Help Desk - AI-Powered Support & Ticketing System plugin for WordPress is
|
| 38 |
CVE-2026-3658
The Appointment Booking Calendar - Simply Schedule Appointments Booking Plugin p
|
| 38 |
CVE-2026-1800
The Fonts Manager | Custom Fonts plugin for WordPress is vulnerable to time-base
|
| 38 |
CVE-2026-33096
Out-of-bounds read in Windows HTTP.sys allows an unauthorized attacker to deny s
|
| 38 |
CVE-2025-5804
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
|
| 38 |
CVE-2026-4987
The SureForms - Contact Form, Payment Form & Other Custom Form Builder plugin fo
|
| 38 |
CVE-2026-29785
### Background
NATS.io is a high performance open source pub-sub distributed co
|
| 38 |
CVE-2026-4156
ChargePoint Home Flex OCPP getpreq Stack-based Buffer Overflow Remote Code Execu
|
| 38 |
CVE-2026-27889
### Background
NATS.io is a high performance open source pub-sub distributed co
|
| 38 |
CVE-2026-4306
The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'r
|
| 38 |
CVE-2026-2580
The WP Maps - Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory &
|
| 38 |
CVE-2026-2468
The Quentn WP plugin for WordPress is vulnerable to SQL Injection via the 'qntn_
|
| 38 |
CVE-2026-23536
A security issue was discovered in the Feast Feature Server's `/read-document` e
|
| 38 |
CVE-2026-4634
A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulne
|
| 38 |
CVE-2026-4427
A flaw was found in pgproto3. A malicious or compromised PostgreSQL server can e
|
| 38 |
CVE-2026-4352
The JetEngine plugin for WordPress is vulnerable to SQL Injection via the Custom
|
| 38 |
CVE-2026-34731
WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AV
|
| 38 |
CVE-2026-3489
The DirectoryPress - Business Directory And Classified Ad Listing plugin for Wor
|
| 38 |
CVE-2026-33509
## Summary
The `set_config_value()` API endpoint allows users with the non-admi
|
| 38 |
CVE-2026-23708
A improper authentication vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through
|
| 38 |
CVE-2026-34381
Admidio is an open-source user management solution. From version 5.0.0 to before
|
| 38 |
CVE-2026-30656
A NULL pointer dereference vulnerability exists in fio (Flexible I/O Tester) v3.
|
| 38 |
CVE-2026-34874
An issue was discovered in Mbed TLS through 3.6.5 and 4.x through 4.0.0. There i
|
| 38 |
CVE-2026-30078
OpenAirInterface V2.2.0 AMF crashes when it receives an NGAP message with invali
|
| 38 |
CVE-2026-30077
OpenAirInterface V2.2.0 AMF crashes when it fails to decode the message. Not all
|
| 38 |
CVE-2025-59032
ManageSieve AUTHENTICATE command crashes when using literal as SASL initial resp
|
| 38 |
CVE-2026-35092
A flaw was found in Corosync. An integer overflow vulnerability in Corosync's jo
|
| 38 |
CVE-2026-6067
A heap buffer overflow vulnerability exists in the Netwide Assembler (NASM) due
|
| 38 |
CVE-2025-70952
pf4j before 20c2f80 has a path traversal vulnerability in the extract() function
|
| 38 |
CVE-2026-32025
OpenClaw versions prior to 2026.2.25 contain an authentication hardening gap in
|
| 38 |
CVE-2026-39684
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
|
| 38 |
CVE-2026-39681
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
|
| 38 |
CVE-2026-39677
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
|
| 38 |
CVE-2026-39679
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
|
| 38 |
CVE-2026-32701
Qwik is a performance-focused JavaScript framework. Versions prior to 1.19.2 imp
|
| 38 |
CVE-2026-39613
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
|
| 38 |
CVE-2026-39623
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
|
| 38 |
CVE-2026-39611
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
|
| 38 |
CVE-2026-39538
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
|
| 38 |
CVE-2026-39544
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
|
| 38 |
CVE-2026-28874
The issue was addressed with improved checks. This issue is fixed in iOS 26.4 an
|
| 38 |
CVE-2026-5121
A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerabi
|
| 38 |
CVE-2026-25667
ASP.NET Core Kestrel in Microsoft .NET 8.0 before 8.0.22 and .NET 9.0 before 9.0
|
| 38 |
CVE-2026-4020
The Gravity SMTP plugin for WordPress is vulnerable to Sensitive Information Exp
|
| 38 |
CVE-2026-28894
A denial-of-service issue was addressed with improved input validation. This iss
|
| 38 |
CVE-2026-5032
The W3 Total Cache plugin for WordPress is vulnerable to information exposure in
|
| 38 |
CVE-2026-33427
Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late
|
| 38 |
CVE-2026-33616
An unauthenticated remote attacker can exploit an unauthenticated blind SQL Inje
|
| 38 |
CVE-2026-33614
An unauthenticated remote attacker can exploit an unauthenticated SQL Injection
|
| 38 |
CVE-2026-28875
A buffer overflow was addressed with improved bounds checking. This issue is fix
|
| 38 |
CVE-2026-33416
LIBPNG is a reference library for use in applications that read, create, and man
|
| 38 |
CVE-2026-27858
Attacker can send a specifically crafted message before authentication that caus
|
| 38 |
CVE-2026-28865
An authentication issue was addressed with improved state management. This issue
|
| 38 |
CVE-2026-31931
Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before vers
|
| 38 |
CVE-2026-26027
GLPI is a free asset and IT management software package. From 11.0.0 to before 1
|
| 38 |
CVE-2026-26209
cbor2 provides encoding and decoding for the Concise Binary Object Representatio
|
| 38 |
CVE-2026-29871
A path traversal vulnerability exists in the awesome-llm-apps project in commit
|
| 38 |
CVE-2026-33418
## Summary
The `ensureSize()` function in `@dicebear/converter` used a regex-ba
|
| 38 |
CVE-2025-57834
An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Mod
|
| 38 |
CVE-2026-35526
Strawberry GraphQL's WebSocket subscription handlers for both the `graphql-trans
|
| 38 |
CVE-2026-33287
### Summary
The `replace_first` filter in LiquidJS uses JavaScript's `String.pro
|
| 38 |
CVE-2026-33285
### Summary
LiquidJS's `memoryLimit` security mechanism can be completely bypas
|
| 38 |
CVE-2026-30994
Incorrect access control in the config.php component of Slah v1.5.0 and below al
|
| 38 |
CVE-2026-1233
The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulner
|
| 38 |
CVE-2026-27833
Piwigo is an open source photo gallery application for the web. Prior to version
|
| 38 |
CVE-2026-33806
Impact:
Fastify applications using schema.body.content for per-content-type bod
|
| 38 |
CVE-2026-32605
nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake pro
|
| 38 |
CVE-2026-33164
libde265 is an open source implementation of the h.265 video codec. Prior to ver
|
| 38 |
CVE-2026-33554
ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response
|
| 38 |
CVE-2026-33069
PJSIP is a free and open source multimedia communication library written in C. V
|
| 38 |
CVE-2026-4598
Versions of the package jsrsasign before 11.1.1 are vulnerable to Infinite loop
|
| 38 |
CVE-2026-4602
Versions of the package jsrsasign before 11.1.1 are vulnerable to Incorrect Conv
|
| 38 |
CVE-2026-33184
nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake pro
|
| 38 |
CVE-2025-66236
Before Airflow 3.2.0, it was unclear that secure Airflow deployments require the
|
| 38 |
CVE-2026-34829
Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, a
|
| 38 |
CVE-2026-34827
Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before
|
| 38 |
CVE-2026-30999
A heap buffer overflow in the av_bprint_finalize() function of FFmpeg v8.0.1 all
|
| 38 |
CVE-2026-34601
## Summary
`@xmldom/xmldom` allows attacker-controlled strings containing the C
|
| 38 |
CVE-2026-32933
AutoMapper is a convention-based object-object mapper in .NET. Versions prior to
|
| 38 |
CVE-2026-34376
PdfDing is a selfhosted PDF manager, viewer and editor offering a seamless user
|
| 38 |
CVE-2026-33231
### Summary
`nltk.app.wordnet_app` allows unauthenticated remote shutdown of the
|
| 38 |
CVE-2026-33908
ImageMagick is free and open-source software used for editing and manipulating d
|
| 38 |
CVE-2026-25443
Missing Authorization vulnerability in Dotstore Fraud Prevention For Woocommerce
|
| 38 |
CVE-2026-22743
Spring AI's spring-ai-neo4j-store contains a Cypher injection vulnerability in N
|
| 38 |
CVE-2026-33891
## Summary
A Denial of Service (DoS) vulnerability exists in the node-forge lib
|
| 38 |
CVE-2026-31937
Suricata is a network IDS, IPS and NSM engine. Prior to version 7.0.15, ineffici
|
| 38 |
CVE-2026-34148
Fedify is a TypeScript library for building federated server apps powered by Act
|
| 38 |
CVE-2026-33852
Missing Release of Memory after Effective Lifetime vulnerability in MolotovCherr
|
| 38 |
CVE-2026-31935
Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.
|
| 38 |
CVE-2026-33856
Missing Release of Memory after Effective Lifetime vulnerability in MolotovCherr
|
Oldest Unpatched Critical/High CVEs
| CVE | Severity | CVSS | Priority | Days Open |
|---|---|---|---|---|
| CVE-2024-3400 | CRITICAL | 10.0 | 224 | 735d |
| CVE-2019-19781 | CRITICAL | 9.8 | 223 | 2303d |
| CVE-2020-5902 | CRITICAL | 9.8 | 223 | 2116d |
| CVE-2021-35464 | CRITICAL | 9.8 | 223 | 1730d |
| CVE-2020-10189 | CRITICAL | 9.8 | 223 | 2233d |
| CVE-2012-4681 | CRITICAL | 9.8 | 223 | 4980d |
| CVE-2022-42475 | CRITICAL | 9.8 | 223 | 1201d |
| CVE-2023-3519 | CRITICAL | 9.8 | 223 | 1003d |
| CVE-2015-7450 | CRITICAL | 9.8 | 222 | 3758d |
| CVE-2023-34048 | CRITICAL | 9.8 | 222 | 905d |