Total CVEs
6023
last 30 days
Avg Priority
35.1
of max 220
KEV
8
actively exploited
POC
728
public exploits
Unpatched
1183
CRIT/HIGH without patch
How is Priority Score calculated?
Priority Score is a composite risk metric (0-220) combining multiple real-world threat signals:
KEV +50
CISA Known Exploited Vulnerability — confirmed active exploitation in the wild
EPSS x100
Exploit Prediction Scoring System — probability of exploitation in next 30 days (0-100)
CVSS x5
Common Vulnerability Scoring System — technical severity (0-50)
POC +20
Public exploit code exists — lowers barrier for attackers
0-40 Low
40-80 Medium
80-120 High
120+ Critical
Patch Now — Known Exploited Vulnerabilities
124
CVE-2026-35616
A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an
119
CVE-2026-5281
Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had co
118
CVE-2026-34621
Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Control
117
CVE-2026-33634
Trivy is a security scanner. On March 19, 2026, a threat actor used compromised credentials to publi
117
CVE-2026-3055
Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP l
114
CVE-2026-34197
Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability i
109
CVE-2026-3502
TrueConf Client downloads application update code and applies it without performing verification. An
109
CVE-2026-32201
Improper input validation in Microsoft Office SharePoint allows an unauthorized attacker to perform
Priority Distribution
| Priority | CVE |
|---|---|
| 0 |
CVE-2026-31392
In the Linux kernel, the following vulnerability has been resolved:
smb: client
|
| 0 |
CVE-2026-31393
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth:
|
| 0 |
CVE-2026-31394
In the Linux kernel, the following vulnerability has been resolved:
mac80211: f
|
| 0 |
CVE-2026-6757
Invalid pointer in the JavaScript: WebAssembly component. This vulnerability was
|
| 0 |
CVE-2026-31395
In the Linux kernel, the following vulnerability has been resolved:
bnxt_en: fi
|
| 0 |
CVE-2026-31396
In the Linux kernel, the following vulnerability has been resolved:
net: macb:
|
| 0 |
CVE-2026-31397
In the Linux kernel, the following vulnerability has been resolved:
mm/huge_mem
|
| 0 |
CVE-2026-31398
In the Linux kernel, the following vulnerability has been resolved:
mm/rmap: fi
|
| 0 |
CVE-2026-31399
In the Linux kernel, the following vulnerability has been resolved:
nvdimm/bus:
|
| 0 |
CVE-2026-31400
In the Linux kernel, the following vulnerability has been resolved:
sunrpc: fix
|
| 0 |
CVE-2026-31401
In the Linux kernel, the following vulnerability has been resolved:
HID: bpf: p
|
| 0 |
CVE-2026-31402
In the Linux kernel, the following vulnerability has been resolved:
nfsd: fix h
|
| 0 |
CVE-2026-31403
In the Linux kernel, the following vulnerability has been resolved:
NFSD: Hold
|
| 0 |
CVE-2026-31404
In the Linux kernel, the following vulnerability has been resolved:
NFSD: Defer
|
| 0 |
CVE-2025-65134
In manikandan580 School-management-system 1.0, a reflected cross-site scripting
|
| 0 |
CVE-2026-6762
Spoofing issue in the DOM: Core & HTML component. This vulnerability was fixed i
|
| 0 |
CVE-2026-23400
In the Linux kernel, the following vulnerability has been resolved:
rust_binder
|
| 0 |
CVE-2026-30452
Textpattern CMS 4.9.0 contains a Broken Access Control vulnerability in the arti
|
| 0 |
CVE-2026-38835
Tenda W30E V2.0 V16.01.0.21 was found to contain a command injection vulnerabili
|
| 0 |
CVE-2026-4114
Improper handling of Unicode encoding in SonicWall SMA1000 series appliances all
|
| 0 |
CVE-2026-41144
F´ (F Prime) is a framework that enables development and deployment of spaceflig
|
| 0 |
CVE-2026-6753
Incorrect boundary conditions in the WebRTC component. This vulnerability was fi
|
| 0 |
CVE-2026-23451
In the Linux kernel, the following vulnerability has been resolved:
bonding: pr
|
| 0 |
CVE-2026-23450
In the Linux kernel, the following vulnerability has been resolved:
net/smc: fi
|
| 0 |
CVE-2026-23449
In the Linux kernel, the following vulnerability has been resolved:
net/sched:
|
| 0 |
CVE-2026-23448
In the Linux kernel, the following vulnerability has been resolved:
net: usb: c
|
| 0 |
CVE-2026-23447
In the Linux kernel, the following vulnerability has been resolved:
net: usb: c
|
| 0 |
CVE-2026-23446
In the Linux kernel, the following vulnerability has been resolved:
net: usb: a
|
| 0 |
CVE-2026-23445
In the Linux kernel, the following vulnerability has been resolved:
igc: fix pa
|
| 0 |
CVE-2026-23444
In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80
|
| 0 |
CVE-2026-23443
In the Linux kernel, the following vulnerability has been resolved:
ACPI: proce
|
| 0 |
CVE-2026-23442
In the Linux kernel, the following vulnerability has been resolved:
ipv6: add N
|
| 0 |
CVE-2026-23441
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e:
|
| 0 |
CVE-2026-23440
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e:
|
| 0 |
CVE-2026-23439
In the Linux kernel, the following vulnerability has been resolved:
udp_tunnel:
|
| 0 |
CVE-2026-23438
In the Linux kernel, the following vulnerability has been resolved:
net: mvpp2:
|
| 0 |
CVE-2026-23437
In the Linux kernel, the following vulnerability has been resolved:
net: shaper
|
| 0 |
CVE-2026-23436
In the Linux kernel, the following vulnerability has been resolved:
net: shaper
|
| 0 |
CVE-2026-23452
In the Linux kernel, the following vulnerability has been resolved:
PM: runtime
|
| 0 |
CVE-2026-23453
In the Linux kernel, the following vulnerability has been resolved:
net: ti: ic
|
| 0 |
CVE-2026-23435
In the Linux kernel, the following vulnerability has been resolved:
perf/x86: M
|
| 0 |
CVE-2026-23454
In the Linux kernel, the following vulnerability has been resolved:
net: mana:
|
| 0 |
CVE-2026-23434
In the Linux kernel, the following vulnerability has been resolved:
mtd: rawnan
|
| 0 |
CVE-2026-23433
In the Linux kernel, the following vulnerability has been resolved:
arm_mpam: F
|
| 0 |
CVE-2026-23432
In the Linux kernel, the following vulnerability has been resolved:
mshv: Fix u
|
| 0 |
CVE-2026-23431
In the Linux kernel, the following vulnerability has been resolved:
spi: amlogi
|
| 0 |
CVE-2026-23429
In the Linux kernel, the following vulnerability has been resolved:
iommu/sva:
|
| 0 |
CVE-2026-23430
In the Linux kernel, the following vulnerability has been resolved:
drm/vmwgfx:
|
| 0 |
CVE-2026-23428
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix
|
| 0 |
CVE-2026-23427
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix
|
| 0 |
CVE-2026-23426
In the Linux kernel, the following vulnerability has been resolved:
drm/logicvc
|
| 0 |
CVE-2026-41264
## Abstract
Trend Micro's Zero Day Initiative has identified a vulnerability af
|
| 0 |
CVE-2026-23425
In the Linux kernel, the following vulnerability has been resolved:
KVM: arm64:
|
| 0 |
CVE-2026-23424
In the Linux kernel, the following vulnerability has been resolved:
accel/amdxd
|
| 0 |
CVE-2026-23423
In the Linux kernel, the following vulnerability has been resolved:
btrfs: free
|
| 0 |
CVE-2026-23422
In the Linux kernel, the following vulnerability has been resolved:
dpaa2-switc
|
| 0 |
CVE-2026-23421
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/conf
|
| 0 |
CVE-2026-23420
In the Linux kernel, the following vulnerability has been resolved:
wifi: wlcor
|
| 0 |
CVE-2026-31411
In the Linux kernel, the following vulnerability has been resolved:
net: atm: f
|
| 0 |
CVE-2026-23419
In the Linux kernel, the following vulnerability has been resolved:
net/rds: Fi
|
| 0 |
CVE-2026-23418
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/reg_
|
| 0 |
CVE-2026-41197
## Description
Noir programs can invoke external functions through foreign call
|
| 0 |
CVE-2025-2535
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering
|
| 0 |
CVE-2026-6760
Mitigation bypass in the Networking: Cookies component. This vulnerability was f
|
| 0 |
CVE-2026-23455
In the Linux kernel, the following vulnerability has been resolved:
netfilter:
|
| 0 |
CVE-2025-70420
A SQL injection vulnerability exists in Genesys Latitude v25.1.0.420 that allows
|
| 0 |
CVE-2026-23456
In the Linux kernel, the following vulnerability has been resolved:
netfilter:
|
| 0 |
CVE-2026-31280
An issue in the Bluetooth RFCOMM service of Parani M10 Motorcycle Intercom v2.1.
|
| 0 |
CVE-2026-23457
In the Linux kernel, the following vulnerability has been resolved:
netfilter:
|
| 0 |
CVE-2026-23458
In the Linux kernel, the following vulnerability has been resolved:
netfilter:
|
| 0 |
CVE-2026-39398
## Affected
openclaw-claude-bridge v1.1.0
## Issue
v1.1.0 spawns the Claude C
|
| 0 |
CVE-2026-5398
The implementation of TIOCNOTTY failed to clear a back-pointer from the structur
|
| 0 |
CVE-2026-23459
In the Linux kernel, the following vulnerability has been resolved:
ip_tunnel:
|
| 0 |
CVE-2026-23460
In the Linux kernel, the following vulnerability has been resolved:
net/rose: f
|
| 0 |
CVE-2026-23461
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth:
|
| 0 |
CVE-2026-31789
Issue summary: Converting an excessively large OCTET STRING value to
a hexadecim
|
| 0 |
CVE-2026-23462
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth:
|
| 0 |
CVE-2026-6386
In order to apply a particular protection key to an address range, the kernel mu
|
| 0 |
CVE-2026-28387
Issue summary: An uncommon configuration of clients performing DANE TLSA-based
s
|
| 0 |
CVE-2026-23463
In the Linux kernel, the following vulnerability has been resolved:
soc: fsl: q
|
| 0 |
CVE-2026-33813
Parsing a WEBP image with an invalid, large size panics on 32-bit platforms.
|
| 0 |
CVE-2026-23464
In the Linux kernel, the following vulnerability has been resolved:
soc: microc
|
| 0 |
CVE-2026-4112
Improper neutralization of special elements used in an SQL command (“SQL Injecti
|
Oldest Unpatched Critical/High CVEs
| CVE | Severity | CVSS | Priority | Days Open |
|---|---|---|---|---|
| CVE-2024-3400 | CRITICAL | 10.0 | 224 | 739d |
| CVE-2019-19781 | CRITICAL | 9.8 | 223 | 2307d |
| CVE-2020-5902 | CRITICAL | 9.8 | 223 | 2120d |
| CVE-2021-35464 | CRITICAL | 9.8 | 223 | 1734d |
| CVE-2020-10189 | CRITICAL | 9.8 | 223 | 2237d |
| CVE-2012-4681 | CRITICAL | 9.8 | 223 | 4985d |
| CVE-2022-42475 | CRITICAL | 9.8 | 223 | 1205d |
| CVE-2023-3519 | CRITICAL | 9.8 | 223 | 1007d |
| CVE-2015-7450 | CRITICAL | 9.8 | 222 | 3762d |
| CVE-2023-34048 | CRITICAL | 9.8 | 222 | 909d |
Prev
67 / 67