Total CVEs
5736
last 30 days
Avg Priority
34.0
of max 220
KEV
6
actively exploited
POC
775
public exploits
Unpatched
1588
CRIT/HIGH without patch
How is Priority Score calculated?
Priority Score is a composite risk metric (0-220) combining multiple real-world threat signals:
KEV +50
CISA Known Exploited Vulnerability — confirmed active exploitation in the wild
EPSS x100
Exploit Prediction Scoring System — probability of exploitation in next 30 days (0-100)
CVSS x5
Common Vulnerability Scoring System — technical severity (0-50)
POC +20
Public exploit code exists — lowers barrier for attackers
0-40 Low
40-80 Medium
80-120 High
120+ Critical
Patch Now — Known Exploited Vulnerabilities
124
CVE-2026-35616
A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an
119
CVE-2026-5281
Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had co
117
CVE-2026-33634
Trivy is a security scanner. On March 19, 2026, a threat actor used compromised credentials to publi
117
CVE-2026-33017
## Summary
The `POST /api/v1/build_public_tmp/{flow_id}/flow` endpoint allows building public flows
117
CVE-2026-3055
Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP l
109
CVE-2026-3502
TrueConf Client downloads application update code and applies it without performing verification. An
Priority Distribution
| Priority | CVE |
|---|---|
| 124 |
CVE-2026-35616
A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through
|
| 117 |
CVE-2026-33017
## Summary
The `POST /api/v1/build_public_tmp/{flow_id}/flow` endpoint allows b
|
| 117 |
CVE-2026-3055
Insufficient input validation in NetScaler ADC and NetScaler Gateway when config
|
| 69 |
CVE-2026-4585
A vulnerability has been found in Tiandy Easy7 Integrated Management Platform up
|
| 69 |
CVE-2026-4170
A weakness has been identified in Topsec TopACM 3.0. Affected by this vulnerabil
|
| 69 |
CVE-2016-20026
ZKTeco ZKBioSecurity 3.0 contains hardcoded credentials in the bundled Apache To
|
| 69 |
CVE-2026-4182
A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unkn
|
| 69 |
CVE-2026-4183
A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected
|
| 69 |
CVE-2026-4184
A vulnerability was detected in D-Link DIR-816 1.10CNB05. Affected by this vulne
|
| 69 |
CVE-2016-20024
ZKTeco ZKTime.Net 3.0.1.6 contains an insecure file permissions vulnerability th
|
| 69 |
CVE-2016-20030
ZKTeco ZKBioSecurity 3.0 contains a user enumeration vulnerability that allows u
|
| 69 |
CVE-2017-20223
Telesquare SKT LTE Router SDT-CS3B1 firmware version 1.2.0 contains an insecure
|
| 69 |
CVE-2026-21992
Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware
|
| 69 |
CVE-2026-30533
A SQL Injection vulnerability exists in SourceCodester Online Food Ordering Syst
|
| 69 |
CVE-2026-30532
A SQL Injection vulnerability exists in SourceCodester Online Food Ordering Syst
|
| 69 |
CVE-2026-30530
A SQL Injection vulnerability exists in SourceCodester Online Food Ordering Syst
|
| 68 |
CVE-2026-34205
Home Assistant is open source home automation software that puts local control a
|
| 67 |
CVE-2026-23696
Windmill CE and EE versions 1.276.0 through 1.603.2 contain an SQL injection vul
|
| 67 |
CVE-2025-71275
A critical security vulnerability exists in Zimbra Collaboration Suite (ZCS) Pos
|
| 67 |
CVE-2026-29014
MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code injec
|
| 67 |
CVE-2026-30562
A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sa
|
| 67 |
CVE-2025-60949
Census CSWeb 8.0.1 allows "app/config" to be reachable via HTTP in some deployme
|
| 66 |
CVE-2026-22679
Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthentica
|
| 66 |
CVE-2026-35022
Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection v
|
| 66 |
CVE-2026-25769
Wazuh is a free and open source platform used for threat prevention, detection,
|
| 66 |
CVE-2026-2701
Authenticated user can upload a malicious file to the server and execute it, whi
|
| 66 |
CVE-2026-33475
Langflow is a tool for building and deploying AI-powered agents and workflows. A
|
| 57 |
CVE-2026-25192
WebSocket endpoints lack proper authentication mechanisms, enabling attackers to
|
| 57 |
CVE-2026-29796
WebSocket endpoints lack proper authentication mechanisms, enabling attackers to
|
| 57 |
CVE-2026-2417
A Missing Authentication for Critical Function vulnerability in Pharos Controls
|
| 57 |
CVE-2026-1579
The MAVLink communication protocol does not require cryptographic
authenticatio
|
| 57 |
CVE-2025-13926
An attacker could use data obtained by sniffing the network traffic to
forge pa
|
| 57 |
CVE-2026-3356
The MS27102A Remote Spectrum Monitor is vulnerable to an authentication bypass t
|
| 56 |
CVE-2025-14816
Cleartext Storage of Sensitive Information in GUI vulnerability in Mitsubishi El
|
| 56 |
CVE-2025-14815
Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric
|
| 56 |
CVE-2026-24060
Service information is not encrypted when transmitted as BACnet packets
over th
|
| 51 |
CVE-2026-4149
Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Execution Vulnerabil
|
| 50 |
CVE-2026-30302
The command auto-approval module in CodeRider-Kilo contains an OS Command Inject
|
| 50 |
CVE-2025-15060
claude-hovercraft executeClaudeCode Command Injection Remote Code Execution Vuln
|
| 50 |
CVE-2026-39337
ChurchCRM is an open-source church management system. Prior to 7.1.0, critical p
|
| 50 |
CVE-2026-5128
A sensitive information exposure vulnerability exists in ArthurFiorette steam-tr
|
| 50 |
CVE-2026-34162
FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, the FastGPT
|
| 50 |
CVE-2026-3587
An unauthenticated remote attacker can exploit a hidden function in the CLI prom
|
| 50 |
CVE-2026-32169
Server-side request forgery (ssrf) in Azure Cloud Shell allows an unauthorized a
|
| 50 |
CVE-2025-54328
An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor,
|
| 50 |
CVE-2026-32213
Improper authorization in Azure AI Foundry allows an unauthorized attacker to el
|
| 50 |
CVE-2026-33107
Server-side request forgery (ssrf) in Azure Databricks allows an unauthorized at
|
| 50 |
CVE-2026-33105
Improper authorization in Microsoft Azure Kubernetes Service allows an unauthori
|
| 50 |
CVE-2026-22557
A malicious actor with access to the network could exploit a Path Traversal vuln
|
| 50 |
CVE-2026-4606
GV Edge Recording Manager (ERM) v2.3.1 improperly runs application components wi
|
| 50 |
CVE-2026-5059
aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability. Th
|
| 50 |
CVE-2026-5058
aws-mcp-server Command Injection Remote Code Execution Vulnerability. This vulne
|
| 50 |
CVE-2026-34838
Group-Office is an enterprise customer relationship management and groupware too
|
| 50 |
CVE-2026-34612
Kestra is an open-source, event-driven orchestration platform. Prior to version
|
| 50 |
CVE-2026-32938
SiYuan is a personal knowledge management system. In versions 3.6.0 and below, t
|
| 50 |
CVE-2026-26137
Server-side request forgery (ssrf) in Microsoft 365 Copilot's Business Chat allo
|
| 50 |
CVE-2026-27044
Improper Control of Generation of Code ('Code Injection') vulnerability in Total
|
| 50 |
CVE-2026-25366
Improper Control of Generation of Code ('Code Injection') vulnerability in Theme
|
| 50 |
CVE-2026-32525
Improper Control of Generation of Code ('Code Injection') vulnerability in jetmo
|
| 50 |
CVE-2026-34717
OpenProject is an open-source, web-based project management software. Prior to v
|
| 50 |
CVE-2026-32536
Unrestricted Upload of File with Dangerous Type vulnerability in halfdata Green
|
| 50 |
CVE-2026-25212
An issue was discovered in Percona PMM before 3.7. Because an internal database
|
| 50 |
CVE-2026-39355
Genealogy is a family tree PHP application. Prior to 5.9.1, a critical broken ac
|
| 50 |
CVE-2026-25345
Improper Validation of Specified Quantity in Input vulnerability in GalleryCreat
|
| 50 |
CVE-2026-25413
Unrestricted Upload of File with Dangerous Type vulnerability in iqonicdesign WP
|
| 50 |
CVE-2026-32523
Unrestricted Upload of File with Dangerous Type vulnerability in denishua WPJAM
|
| 50 |
CVE-2026-32482
Unrestricted Upload of File with Dangerous Type vulnerability in deothemes Ona o
|
| 50 |
CVE-2026-33396
OneUptime is an open-source monitoring and observability platform. Prior to vers
|
| 50 |
CVE-2026-40089
Sonicverse is a Self-hosted Docker Compose stack for live radio streaming. The S
|
| 49 |
CVE-2026-4003
The Users manager - PN plugin for WordPress is vulnerable to Privilege Escalatio
|
| 49 |
CVE-2026-32985
Xerte Online Toolkits versions 3.14 and earlier contain an unauthenticated arbit
|
| 49 |
CVE-2026-30303
The command auto-approval module in Axon Code contains an OS Command Injection v
|
| 49 |
CVE-2026-30402
An issue in wgcloud v.2.3.7 and before allows a remote attacker to execute arbit
|
| 49 |
CVE-2026-3535
The DSGVO Google Web Fonts GDPR plugin for WordPress is vulnerable to arbitrary
|
| 49 |
CVE-2017-20224
Telesquare SKT LTE Router SDT-CS3B1 version 1.2.0 contains an arbitrary file upl
|
| 49 |
CVE-2026-26830
pdf-image (npm package) through version 2.0.0 allows OS command injection via th
|
| 49 |
CVE-2026-34243
#### Summary
A GitHub Actions workflow uses untrusted user input from `issue_co
|
| 49 |
CVE-2026-4257
The Contact Form by Supsystic plugin for WordPress is vulnerable to Server-Side
|
| 49 |
CVE-2026-3300
The Everest Forms Pro plugin for WordPress is vulnerable to Remote Code Executio
|
| 49 |
CVE-2026-3584
The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in al
|
| 49 |
CVE-2026-26832
node-tesseract-ocr is an npm package that provides a Node.js wrapper for Tessera
|
| 49 |
CVE-2026-1830
The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution
|
| 49 |
CVE-2026-20160
A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) could allo
|
| 49 |
CVE-2026-30313
DSAI-Cline's command auto-approval module contains a critical OS command injecti
|
| 49 |
CVE-2026-30312
DSAI-Cline's command auto-approval module contains a critical OS command injecti
|
| 49 |
CVE-2026-31027
TOTOlink A3600R v5.9c.4959 contains a buffer overflow vulnerability in the setAp
|
| 49 |
CVE-2026-28430
Chamilo LMS is a learning management system. Prior to version 1.11.34, there is
|
| 49 |
CVE-2026-4001
The Woocommerce Custom Product Addons Pro plugin for WordPress is vulnerable to
|
| 49 |
CVE-2026-30311
Ridvay Code's command auto-approval module contains a critical OS command inject
|
| 49 |
CVE-2026-30307
Roo Code's command auto-approval module contains a critical OS command injection
|
Oldest Unpatched Critical/High CVEs
| CVE | Severity | CVSS | Priority | Days Open |
|---|---|---|---|---|
| CVE-2024-3400 | CRITICAL | 10.0 | 224 | 730d |
| CVE-2019-19781 | CRITICAL | 9.8 | 223 | 2298d |
| CVE-2020-5902 | CRITICAL | 9.8 | 223 | 2111d |
| CVE-2021-35464 | CRITICAL | 9.8 | 223 | 1725d |
| CVE-2020-10189 | CRITICAL | 9.8 | 223 | 2228d |
| CVE-2012-4681 | CRITICAL | 9.8 | 223 | 4975d |
| CVE-2022-42475 | CRITICAL | 9.8 | 223 | 1196d |
| CVE-2023-3519 | CRITICAL | 9.8 | 223 | 998d |
| CVE-2015-7450 | CRITICAL | 9.8 | 222 | 3752d |
| CVE-2023-34048 | CRITICAL | 9.8 | 222 | 900d |
1 / 4
Next