Total CVEs
5736
last 30 days
Avg Priority
34.0
of max 220
KEV
6
actively exploited
POC
775
public exploits
Unpatched
1588
CRIT/HIGH without patch
How is Priority Score calculated?
Priority Score is a composite risk metric (0-220) combining multiple real-world threat signals:
KEV +50
CISA Known Exploited Vulnerability — confirmed active exploitation in the wild
EPSS x100
Exploit Prediction Scoring System — probability of exploitation in next 30 days (0-100)
CVSS x5
Common Vulnerability Scoring System — technical severity (0-50)
POC +20
Public exploit code exists — lowers barrier for attackers
0-40 Low
40-80 Medium
80-120 High
120+ Critical
Patch Now — Known Exploited Vulnerabilities
124
CVE-2026-35616
A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an
119
CVE-2026-5281
Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had co
117
CVE-2026-33634
Trivy is a security scanner. On March 19, 2026, a threat actor used compromised credentials to publi
117
CVE-2026-33017
## Summary
The `POST /api/v1/build_public_tmp/{flow_id}/flow` endpoint allows building public flows
117
CVE-2026-3055
Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP l
109
CVE-2026-3502
TrueConf Client downloads application update code and applies it without performing verification. An
Priority Distribution
| Priority | CVE |
|---|---|
| 124 |
CVE-2026-35616
A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through
|
| 117 |
CVE-2026-33634
Trivy is a security scanner. On March 19, 2026, a threat actor used compromised
|
| 117 |
CVE-2026-33017
## Summary
The `POST /api/v1/build_public_tmp/{flow_id}/flow` endpoint allows b
|
| 117 |
CVE-2026-3055
Insufficient input validation in NetScaler ADC and NetScaler Gateway when config
|
| 70 |
CVE-2026-33309
### Summary
While reviewing the recent patch for **CVE-2025-68478** (External C
|
| 69 |
CVE-2026-2699
Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthentica
|
| 69 |
CVE-2026-4164
A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is the function Del
|
| 69 |
CVE-2026-4163
A vulnerability was detected in Wavlink WL-WN579A3 220323. This issue affects th
|
| 69 |
CVE-2026-4585
A vulnerability has been found in Tiandy Easy7 Integrated Management Platform up
|
| 69 |
CVE-2026-4170
A weakness has been identified in Topsec TopACM 3.0. Affected by this vulnerabil
|
| 69 |
CVE-2026-25873
OmniGen2-RL contains an unauthenticated remote code execution vulnerability in t
|
| 69 |
CVE-2016-20026
ZKTeco ZKBioSecurity 3.0 contains hardcoded credentials in the bundled Apache To
|
| 69 |
CVE-2026-34935
### Summary
The `--mcp` CLI argument is passed directly to `shlex.split()` and
|
| 69 |
CVE-2026-4184
A vulnerability was detected in D-Link DIR-816 1.10CNB05. Affected by this vulne
|
| 69 |
CVE-2026-4183
A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected
|
| 69 |
CVE-2026-4182
A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unkn
|
| 69 |
CVE-2016-20030
ZKTeco ZKBioSecurity 3.0 contains a user enumeration vulnerability that allows u
|
| 69 |
CVE-2016-20024
ZKTeco ZKTime.Net 3.0.1.6 contains an insecure file permissions vulnerability th
|
| 69 |
CVE-2017-20223
Telesquare SKT LTE Router SDT-CS3B1 firmware version 1.2.0 contains an insecure
|
| 69 |
CVE-2026-32640
### Impact
If the objects passed in as `names` to SimpleEval have modules or oth
|
| 69 |
CVE-2026-21992
Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware
|
| 69 |
CVE-2026-32760
## Summary
Any unauthenticated visitor can register a full administrator account
|
| 69 |
CVE-2026-30533
A SQL Injection vulnerability exists in SourceCodester Online Food Ordering Syst
|
| 69 |
CVE-2026-30532
A SQL Injection vulnerability exists in SourceCodester Online Food Ordering Syst
|
| 69 |
CVE-2026-30530
A SQL Injection vulnerability exists in SourceCodester Online Food Ordering Syst
|
| 68 |
CVE-2026-34205
Home Assistant is open source home automation software that puts local control a
|
| 67 |
CVE-2026-33696
n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.
|
| 67 |
CVE-2026-33660
n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.
|
| 67 |
CVE-2026-23696
Windmill CE and EE versions 1.276.0 through 1.603.2 contain an SQL injection vul
|
| 67 |
CVE-2026-33579
OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /
|
| 67 |
CVE-2025-71275
A critical security vulnerability exists in Zimbra Collaboration Suite (ZCS) Pos
|
| 67 |
CVE-2026-29014
MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code injec
|
| 67 |
CVE-2026-30562
A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sa
|
| 67 |
CVE-2025-60949
Census CSWeb 8.0.1 allows "app/config" to be reachable via HTTP in some deployme
|
| 66 |
CVE-2026-35022
Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection v
|
| 66 |
CVE-2026-22679
Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthentica
|
| 66 |
CVE-2026-25769
Wazuh is a free and open source platform used for threat prevention, detection,
|
| 66 |
CVE-2026-2701
Authenticated user can upload a malicious file to the server and execute it, whi
|
| 66 |
CVE-2026-33475
Langflow is a tool for building and deploying AI-powered agents and workflows. A
|
| 66 |
CVE-2026-39912
V2Board 1.6.1 through 1.7.4 and Xboard through 0.1.9 expose authentication token
|
| 50 |
CVE-2026-4689
Sandbox escape due to incorrect boundary conditions, integer overflow in the XPC
|
| 49 |
CVE-2026-3584
The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in al
|
| 49 |
CVE-2026-20093
A vulnerability in the change password functionality of Cisco Integrated Managem
|
| 47 |
CVE-2026-4681
A critical remote code execution (RCE) vulnerability has been reported in PTC Wi
|
Oldest Unpatched Critical/High CVEs
| CVE | Severity | CVSS | Priority | Days Open |
|---|---|---|---|---|
| CVE-2024-3400 | CRITICAL | 10.0 | 224 | 730d |
| CVE-2019-19781 | CRITICAL | 9.8 | 223 | 2298d |
| CVE-2020-5902 | CRITICAL | 9.8 | 223 | 2111d |
| CVE-2021-35464 | CRITICAL | 9.8 | 223 | 1725d |
| CVE-2020-10189 | CRITICAL | 9.8 | 223 | 2228d |
| CVE-2012-4681 | CRITICAL | 9.8 | 223 | 4975d |
| CVE-2022-42475 | CRITICAL | 9.8 | 223 | 1196d |
| CVE-2023-3519 | CRITICAL | 9.8 | 223 | 998d |
| CVE-2015-7450 | CRITICAL | 9.8 | 222 | 3752d |
| CVE-2023-34048 | CRITICAL | 9.8 | 222 | 900d |