Security Dashboard

Total CVEs
16301
last 90 days
Avg Priority
36.5
of max 220
KEV
40
actively exploited
POC
3198
public exploits
Unpatched
4330
CRIT/HIGH without patch
How is Priority Score calculated?

Priority Score is a composite risk metric (0-220) combining multiple real-world threat signals:

KEV +50
CISA Known Exploited Vulnerability — confirmed active exploitation in the wild
EPSS x100
Exploit Prediction Scoring System — probability of exploitation in next 30 days (0-100)
CVSS x5
Common Vulnerability Scoring System — technical severity (0-50)
POC +20
Public exploit code exists — lowers barrier for attackers
0-40 Low 40-80 Medium 80-120 High 120+ Critical
Priority CVE
35 CVE-2026-33515
Squid is a caching proxy for the Web. Prior to version 7.5, due to improper inpu
35 CVE-2026-5974
A vulnerability was determined in FoundationAgents MetaGPT up to 0.8.1. The affe
35 CVE-2026-39907
Unisys WebPerfect Image Suite versions 3.0.3960.22810 and 3.0.3960.22604 expose
35 CVE-2026-25087
Use After Free vulnerability in Apache Arrow C++. This issue affects Apache Arr
35 CVE-2026-20994
URL redirection in Samsung Account prior to version 15.5.01.1 allows remote atta
35 CVE-2026-4400
Insecure Direct Object Reference (IDOR) vulnerability in 1millionbot Millie chat
35 CVE-2026-39906
Unisys WebPerfect Image Suite versions 3.0.3960.22810 and 3.0.3960.22604 expose
35 CVE-2026-26152
Insecure storage of sensitive information in Windows Cryptographic Services allo
35 CVE-2026-27908
Use after free in Windows TDI Translation Driver (tdx.sys) allows an authorized
35 CVE-2026-2426
The WP-DownloadManager plugin for WordPress is vulnerable to Path Traversal in a
35 CVE-2026-5026
The '/api/v1/files/images/{flow_id}/{file_name}' endpoint serves SVG files with
35 CVE-2026-33409
### Impact An authentication bypass vulnerability allows an attacker to log in
35 CVE-2026-27896
The Go MCP SDK used Go's standard encoding/json.Unmarshal for JSON-RPC and MCP p
35 CVE-2026-24285
Use after free in Windows Win32K allows an authorized attacker to elevate privil
35 CVE-2026-21417
Dell CloudBoost Virtual Appliance, versions prior to 19.14.0.0, contains a Plain
35 CVE-2026-26177
Use after free in Windows Ancillary Function Driver for WinSock allows an author
35 CVE-2026-26182
Use after free in Windows Ancillary Function Driver for WinSock allows an author
35 CVE-2026-26165
Use after free in Windows Shell allows an authorized attacker to elevate privile
35 CVE-2026-26166
Double free in Windows Shell allows an authorized attacker to elevate privileges
35 CVE-2026-32979
OpenClaw before 2026.3.11 contains an approval integrity vulnerability allowing
35 CVE-2026-26174
Concurrent execution using shared resource with improper synchronization ('race
35 CVE-2026-26173
Concurrent execution using shared resource with improper synchronization ('race
35 CVE-2026-27921
Concurrent execution using shared resource with improper synchronization ('race
35 CVE-2026-40875
mailcow: dockerized is an open source groupware/email suite based on docker. In
35 CVE-2026-25179
Improper validation of specified type of input in Windows Ancillary Function Dri
35 CVE-2026-32073
Use after free in Windows Ancillary Function Driver for WinSock allows an author
35 CVE-2026-32075
Use after free in Windows Universal Plug and Play (UPnP) Device Host allows an a
35 CVE-2026-32224
Use after free in Windows Server Update Service allows an authorized attacker to
35 CVE-2026-27922
Use after free in Windows Ancillary Function Driver for WinSock allows an author
35 CVE-2026-27917
Use after free in Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) allow
35 CVE-2026-33100
Use after free in Windows Ancillary Function Driver for WinSock allows an author
35 CVE-2026-33099
Use after free in Windows Ancillary Function Driver for WinSock allows an author
35 CVE-2026-32080
Use after free in Windows WalletService allows an authorized attacker to elevate
35 CVE-2026-4483
An exposed IOCTL with an  insufficient access control vulnerability has been ide
35 CVE-2026-32219
Double free in Microsoft Brokering File System allows an authorized attacker to
35 CVE-2026-32083
Concurrent execution using shared resource with improper synchronization ('race
35 CVE-2026-33104
Concurrent execution using shared resource with improper synchronization ('race
35 CVE-2026-27926
Concurrent execution using shared resource with improper synchronization ('race
35 CVE-2026-27929
Time-of-check time-of-use (toctou) race condition in Windows LUAFV allows an aut
35 CVE-2026-35572
ChurchCRM is an open-source church management system. Prior to 6.5.3, it is poss
35 CVE-2026-32068
Concurrent execution using shared resource with improper synchronization ('race
35 CVE-2026-32082
Concurrent execution using shared resource with improper synchronization ('race
35 CVE-2026-21621
Incorrect Authorization vulnerability in hexpm hexpm/hexpm ('Elixir.HexpmWeb.API
35 CVE-2026-23668
Concurrent execution using shared resource with improper synchronization ('race
35 CVE-2026-26074
EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a dat
35 CVE-2026-25170
Use after free in Windows Hyper-V allows an authorized attacker to elevate privi
35 CVE-2026-25171
Use after free in Windows Authentication Methods allows an authorized attacker t
35 CVE-2025-13914
A Key Exchange without Entity Authentication vulnerability in the SSH implementa
35 CVE-2026-25178
Use after free in Windows Ancillary Function Driver for WinSock allows an author
35 CVE-2026-23180
In the Linux kernel, the following vulnerability has been resolved: dpaa2-switc
35 CVE-2026-21508
Improper authentication in Windows Storage allows an authorized attacker to elev
35 CVE-2026-23667
Use after free in Broadcast DVR allows an authorized attacker to elevate privile
35 CVE-2026-24295
Concurrent execution using shared resource with improper synchronization ('race
35 CVE-2026-23671
Concurrent execution using shared resource with improper synchronization ('race
35 CVE-2026-24296
Concurrent execution using shared resource with improper synchronization ('race
35 CVE-2026-23013
In the Linux kernel, the following vulnerability has been resolved: net: octeon
35 CVE-2026-23195
In the Linux kernel, the following vulnerability has been resolved: cgroup/dmem
35 CVE-2026-23175
In the Linux kernel, the following vulnerability has been resolved: net: cpsw:
35 CVE-2025-71221
In the Linux kernel, the following vulnerability has been resolved: dmaengine:
35 CVE-2026-3457
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
35 CVE-2025-71203
In the Linux kernel, the following vulnerability has been resolved: riscv: Sani
35 CVE-2026-33201
Digital Photo Frame GH-WDF10A provided by GREEN HOUSE CO., LTD. contains an acti
35 CVE-2026-21253
Use after free in Mailslot File System allows an authorized attacker to elevate
35 CVE-2026-21242
Use after free in Windows Subsystem for Linux allows an authorized attacker to e
35 CVE-2026-5263
URI nameConstraints from constrained intermediate CAs are parsed but not enforce
35 CVE-2026-4786
Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mi
35 CVE-2026-21237
Concurrent execution using shared resource with improper synchronization ('race
35 CVE-2026-21234
Concurrent execution using shared resource with improper synchronization ('race
35 CVE-2026-40458
PAC4J is vulnerable to Cross-Site Request Forgery (CSRF). A malicious attacker c
35 CVE-2026-30901
Improper Input Validation in Zoom Rooms for Windows before 6.6.5 in Kiosk Mode m
35 CVE-2025-54601
An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor amd Wear
35 CVE-2026-32608
## Summary The Glances action system allows administrators to configure shell c
35 CVE-2026-23294
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix ra
35 CVE-2025-10279
In mlflow version 2.20.3, the temporary directory used for creating Python virtu
35 CVE-2026-2492
TensorFlow HDF5 Library Uncontrolled Search Path Element Local Privilege Escalat
35 CVE-2026-23941
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerab
35 CVE-2026-34770
### Impact Apps that use the `powerMonitor` module may be vulnerable to a use-af
35 CVE-2026-33018
libsixel is a SIXEL encoder/decoder implementation derived from kmiya's sixel. V
35 CVE-2025-14859
The Semtech LR11xx LoRa transceivers implement secure boot functionality using d
35 CVE-2026-21241
Use after free in Windows Ancillary Function Driver for WinSock allows an author
35 CVE-2025-13917
WSS Agent, prior to 9.8.5, may be susceptible to a Elevation of Privilege vulner
35 CVE-2026-21000
Improper access control in Galaxy Store prior to version 4.6.03.8 allows local a
35 CVE-2026-4519
The webbrowser.open() API would accept leading dashes in the URL which could be
35 CVE-2026-4134
During an internal security assessment, a potential vulnerability was discovered
35 CVE-2025-68119
Downloading and building modules with malicious version strings can cause local
35 CVE-2026-2538
A security flaw has been discovered in Flos Freeware Notepad2 4.2.22/4.2.23/4.2.
35 CVE-2026-21916
A UNIX Symbolic Link (Symlink) Following vulnerability in the CLI of Juniper Net
35 CVE-2025-54602
An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wear
35 CVE-2026-2542
A weakness has been identified in Total VPN 0.5.29.0 on Windows. Affected by thi
35 CVE-2025-15569
A flaw has been found in Artifex MuPDF up to 1.26.1 on Windows. The impacted ele

Oldest Unpatched Critical/High CVEs

CVE Severity CVSS Priority Days Open
CVE-2024-3400 CRITICAL 10.0 224 742d
CVE-2019-19781 CRITICAL 9.8 223 2309d
CVE-2020-5902 CRITICAL 9.8 223 2122d
CVE-2021-35464 CRITICAL 9.8 223 1736d
CVE-2020-10189 CRITICAL 9.8 223 2239d
CVE-2012-4681 CRITICAL 9.8 223 4987d
CVE-2022-42475 CRITICAL 9.8 223 1208d
CVE-2023-3519 CRITICAL 9.8 223 1009d
CVE-2015-7450 CRITICAL 9.8 222 3764d
CVE-2023-34048 CRITICAL 9.8 222 911d
Prev 101 / 182 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy