Total CVEs
5792
last 30 days
Avg Priority
34.0
of max 220
KEV
8
actively exploited
POC
777
public exploits
Unpatched
1600
CRIT/HIGH without patch
How is Priority Score calculated?
Priority Score is a composite risk metric (0-220) combining multiple real-world threat signals:
KEV +50
CISA Known Exploited Vulnerability — confirmed active exploitation in the wild
EPSS x100
Exploit Prediction Scoring System — probability of exploitation in next 30 days (0-100)
CVSS x5
Common Vulnerability Scoring System — technical severity (0-50)
POC +20
Public exploit code exists — lowers barrier for attackers
0-40 Low
40-80 Medium
80-120 High
120+ Critical
Patch Now — Known Exploited Vulnerabilities
124
CVE-2026-35616
A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an
119
CVE-2026-3910
Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allowed a remote attacker
119
CVE-2026-3909
Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to per
119
CVE-2026-5281
Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had co
117
CVE-2026-33634
Trivy is a security scanner. On March 19, 2026, a threat actor used compromised credentials to publi
117
CVE-2026-33017
## Summary
The `POST /api/v1/build_public_tmp/{flow_id}/flow` endpoint allows building public flows
117
CVE-2026-3055
Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP l
109
CVE-2026-3502
TrueConf Client downloads application update code and applies it without performing verification. An
Priority Distribution
| Priority | CVE |
|---|---|
| 124 |
CVE-2026-35616
A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through
|
| 117 |
CVE-2026-33634
Trivy is a security scanner. On March 19, 2026, a threat actor used compromised
|
| 117 |
CVE-2026-33017
## Summary
The `POST /api/v1/build_public_tmp/{flow_id}/flow` endpoint allows b
|
| 117 |
CVE-2026-3055
Insufficient input validation in NetScaler ADC and NetScaler Gateway when config
|
| 70 |
CVE-2026-33309
### Summary
While reviewing the recent patch for **CVE-2025-68478** (External C
|
| 69 |
CVE-2026-2699
Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthentica
|
| 69 |
CVE-2026-4164
A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is the function Del
|
| 69 |
CVE-2026-4163
A vulnerability was detected in Wavlink WL-WN579A3 220323. This issue affects th
|
| 69 |
CVE-2026-4170
A weakness has been identified in Topsec TopACM 3.0. Affected by this vulnerabil
|
| 69 |
CVE-2026-4585
A vulnerability has been found in Tiandy Easy7 Integrated Management Platform up
|
| 69 |
CVE-2026-25873
OmniGen2-RL contains an unauthenticated remote code execution vulnerability in t
|
| 69 |
CVE-2016-20026
ZKTeco ZKBioSecurity 3.0 contains hardcoded credentials in the bundled Apache To
|
| 69 |
CVE-2026-34935
### Summary
The `--mcp` CLI argument is passed directly to `shlex.split()` and
|
| 69 |
CVE-2026-4184
A vulnerability was detected in D-Link DIR-816 1.10CNB05. Affected by this vulne
|
| 69 |
CVE-2026-4183
A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected
|
| 69 |
CVE-2026-4182
A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unkn
|
| 69 |
CVE-2016-20024
ZKTeco ZKTime.Net 3.0.1.6 contains an insecure file permissions vulnerability th
|
| 69 |
CVE-2016-20030
ZKTeco ZKBioSecurity 3.0 contains a user enumeration vulnerability that allows u
|
| 69 |
CVE-2017-20223
Telesquare SKT LTE Router SDT-CS3B1 firmware version 1.2.0 contains an insecure
|
| 69 |
CVE-2026-32640
### Impact
If the objects passed in as `names` to SimpleEval have modules or oth
|
| 69 |
CVE-2026-21992
Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware
|
| 69 |
CVE-2026-32760
## Summary
Any unauthenticated visitor can register a full administrator account
|
| 69 |
CVE-2026-30532
A SQL Injection vulnerability exists in SourceCodester Online Food Ordering Syst
|
| 69 |
CVE-2026-30533
A SQL Injection vulnerability exists in SourceCodester Online Food Ordering Syst
|
| 69 |
CVE-2026-30530
A SQL Injection vulnerability exists in SourceCodester Online Food Ordering Syst
|
| 68 |
CVE-2026-34205
Home Assistant is open source home automation software that puts local control a
|
| 67 |
CVE-2026-33696
n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.
|
| 67 |
CVE-2026-33660
n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.
|
| 67 |
CVE-2026-23696
Windmill CE and EE versions 1.276.0 through 1.603.2 contain an SQL injection vul
|
| 67 |
CVE-2026-33579
OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /
|
| 67 |
CVE-2025-71275
A critical security vulnerability exists in Zimbra Collaboration Suite (ZCS) Pos
|
| 67 |
CVE-2026-29014
MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code injec
|
| 67 |
CVE-2026-30562
A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sa
|
| 67 |
CVE-2025-60949
Census CSWeb 8.0.1 allows "app/config" to be reachable via HTTP in some deployme
|
| 66 |
CVE-2026-35022
Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection v
|
| 66 |
CVE-2026-22679
Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthentica
|
| 66 |
CVE-2026-25769
Wazuh is a free and open source platform used for threat prevention, detection,
|
| 66 |
CVE-2026-2701
Authenticated user can upload a malicious file to the server and execute it, whi
|
| 66 |
CVE-2026-33475
Langflow is a tool for building and deploying AI-powered agents and workflows. A
|
| 66 |
CVE-2026-39912
V2Board 1.6.1 through 1.7.4 and Xboard through 0.1.9 expose authentication token
|
| 59 |
CVE-2026-33352
### Summary
An unauthenticated SQL injection vulnerability exists in `objects/c
|
| 57 |
CVE-2026-25192
WebSocket endpoints lack proper authentication mechanisms, enabling attackers to
|
| 57 |
CVE-2026-29796
WebSocket endpoints lack proper authentication mechanisms, enabling attackers to
|
| 57 |
CVE-2026-2417
A Missing Authentication for Critical Function vulnerability in Pharos Controls
|
| 57 |
CVE-2026-1579
The MAVLink communication protocol does not require cryptographic
authenticatio
|
| 57 |
CVE-2025-13926
An attacker could use data obtained by sniffing the network traffic to
forge pa
|
| 57 |
CVE-2026-3356
The MS27102A Remote Spectrum Monitor is vulnerable to an authentication bypass t
|
| 56 |
CVE-2025-14816
Cleartext Storage of Sensitive Information in GUI vulnerability in Mitsubishi El
|
| 56 |
CVE-2025-14815
Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric
|
| 56 |
CVE-2026-24060
Service information is not encrypted when transmitted as BACnet packets
over th
|
| 55 |
CVE-2026-34156
`##` Summary
NocoBase's Workflow Script Node executes user-supplied JavaScript
|
| 53 |
CVE-2026-33478
## Summary
Multiple vulnerabilities in AVideo's CloneSite plugin chain together
|
| 51 |
CVE-2026-4149
Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Execution Vulnerabil
|
| 50 |
CVE-2026-30302
The command auto-approval module in CodeRider-Kilo contains an OS Command Inject
|
| 50 |
CVE-2025-15060
claude-hovercraft executeClaudeCode Command Injection Remote Code Execution Vuln
|
| 50 |
CVE-2026-39337
ChurchCRM is an open-source church management system. Prior to 7.1.0, critical p
|
| 50 |
CVE-2026-32871
## Technical Description
The `OpenAPIProvider` in FastMCP exposes internal APIs
|
| 50 |
CVE-2025-15379
A command injection vulnerability exists in MLflow's model serving container ini
|
| 50 |
CVE-2026-5128
A sensitive information exposure vulnerability exists in ArthurFiorette steam-tr
|
| 50 |
CVE-2026-34938
### Summary
`execute_code()` in `praisonai-agents` runs attacker-controlled Pyt
|
| 50 |
CVE-2026-34162
FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, the FastGPT
|
| 50 |
CVE-2026-3587
An unauthenticated remote attacker can exploit a hidden function in the CLI prom
|
| 50 |
CVE-2026-32169
Server-side request forgery (ssrf) in Azure Cloud Shell allows an unauthorized a
|
| 50 |
CVE-2026-32186
Microsoft Bing Elevation of Privilege Vulnerability
|
| 50 |
CVE-2026-34208
### Summary
SandboxJS blocks direct assignment to global objects (for example `M
|
| 50 |
CVE-2026-33054
#### Summary
A Path Traversal vulnerability allows any user (or attacker) supply
|
| 50 |
CVE-2025-54328
An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor,
|
| 50 |
CVE-2026-33105
Improper authorization in Microsoft Azure Kubernetes Service allows an unauthori
|
| 50 |
CVE-2026-32213
Improper authorization in Azure AI Foundry allows an unauthorized attacker to el
|
| 50 |
CVE-2026-33107
Server-side request forgery (ssrf) in Azure Databricks allows an unauthorized at
|
| 50 |
CVE-2026-4745
Improper Control of Generation of Code ('Code Injection') vulnerability in dendi
|
| 50 |
CVE-2026-22557
A malicious actor with access to the network could exploit a Path Traversal vuln
|
| 50 |
CVE-2026-4606
GV Edge Recording Manager (ERM) v2.3.1 improperly runs application components wi
|
| 50 |
CVE-2026-33494
## Description
Ory Oathkeeper is vulnerable to an authorization bypass via HTTP
|
| 50 |
CVE-2026-4746
Out-of-bounds Write vulnerability in timeplus-io proton (base/poco/Foundation/sr
|
| 50 |
CVE-2026-32737
### Impact
Due to a mis-written NetworkPolicy, a malicious actor can pivot from
|
| 50 |
CVE-2026-4370
A vulnerability was identified in Juju from version 3.2.0 until 3.6.19 and from
|
| 50 |
CVE-2026-34976
The `restoreTenant` admin mutation is missing from the authorization middleware
|
| 50 |
CVE-2026-4688
Sandbox escape due to use-after-free in the Disability Access APIs component. Th
|
| 50 |
CVE-2026-4725
Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This v
|
| 50 |
CVE-2026-5058
aws-mcp-server Command Injection Remote Code Execution Vulnerability. This vulne
|
| 50 |
CVE-2026-5059
aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability. Th
|
| 50 |
CVE-2026-4692
Sandbox escape in the Responsive Design Mode component. This vulnerability affec
|
| 50 |
CVE-2026-4689
Sandbox escape due to incorrect boundary conditions, integer overflow in the XPC
|
| 50 |
CVE-2026-30836
⚠️ **Limited Disclosure - Full Details Pending**
A critical security vulnerabil
|
| 50 |
CVE-2026-40175
Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.
|
| 50 |
CVE-2026-34838
Group-Office is an enterprise customer relationship management and groupware too
|
| 50 |
CVE-2026-32306
OneUptime is a solution for monitoring and managing online services. Prior to 10
|
| 50 |
CVE-2026-34612
Kestra is an open-source, event-driven orchestration platform. Prior to version
|
| 50 |
CVE-2026-32938
SiYuan is a personal knowledge management system. In versions 3.6.0 and below, t
|
Oldest Unpatched Critical/High CVEs
| CVE | Severity | CVSS | Priority | Days Open |
|---|---|---|---|---|
| CVE-2024-3400 | CRITICAL | 10.0 | 224 | 730d |
| CVE-2019-19781 | CRITICAL | 9.8 | 223 | 2298d |
| CVE-2020-5902 | CRITICAL | 9.8 | 223 | 2111d |
| CVE-2021-35464 | CRITICAL | 9.8 | 223 | 1724d |
| CVE-2020-10189 | CRITICAL | 9.8 | 223 | 2227d |
| CVE-2012-4681 | CRITICAL | 9.8 | 223 | 4975d |
| CVE-2022-42475 | CRITICAL | 9.8 | 223 | 1196d |
| CVE-2023-3519 | CRITICAL | 9.8 | 223 | 997d |
| CVE-2015-7450 | CRITICAL | 9.8 | 222 | 3752d |
| CVE-2023-34048 | CRITICAL | 9.8 | 222 | 899d |
1 / 6
Next