Total CVEs
16492
last 90 days
Avg Priority
36.3
of max 220
KEV
39
actively exploited
POC
3208
public exploits
Unpatched
4320
CRIT/HIGH without patch
How is Priority Score calculated?
Priority Score is a composite risk metric (0-220) combining multiple real-world threat signals:
KEV +50
CISA Known Exploited Vulnerability — confirmed active exploitation in the wild
EPSS x100
Exploit Prediction Scoring System — probability of exploitation in next 30 days (0-100)
CVSS x5
Common Vulnerability Scoring System — technical severity (0-50)
POC +20
Public exploit code exists — lowers barrier for attackers
0-40 Low
40-80 Medium
80-120 High
120+ Critical
Patch Now — Known Exploited Vulnerabilities
185
CVE-2026-1731
BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain
180
CVE-2025-40551
SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerabil
170
CVE-2026-1340
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated rem
164
CVE-2026-1281
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated rem
160
CVE-2025-40536
SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that
141
CVE-2026-20131
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FM
137
CVE-2026-1603
An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthen
134
CVE-2026-22769
Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credentia
129
CVE-2026-33825
Insufficient granularity of access control in Microsoft Defender allows an authorized attacker to el
124
CVE-2026-21643
An improper neutralization of special elements used in an sql command ('sql injection') vulnerabilit
Priority Distribution
| Priority | CVE |
|---|---|
| 33 |
CVE-2026-27793
Seerr is an open-source media request and discovery manager for Jellyfin, Plex,
|
| 33 |
CVE-2026-1307
The Ninja Forms - The Contact Form Builder That Grows With You plugin for WordPr
|
| 33 |
CVE-2026-20164
In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.9, and 9.3.10, and Splun
|
| 33 |
CVE-2026-34264
During authorization checks in SAP Human Capital Management for SAP S/4HANA, the
|
| 33 |
CVE-2026-34299
Vulnerability in the PeopleSoft Enterprise FIN Maintenance Management product of
|
| 33 |
CVE-2026-31885
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0
|
| 33 |
CVE-2026-28424
Statmatic is a Laravel and Git powered content management system (CMS). Prior to
|
| 33 |
CVE-2026-39377
The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various oth
|
| 33 |
CVE-2026-30962
Parse Server is an open source backend that can be deployed to any infrastructur
|
| 33 |
CVE-2026-31820
Sylius is an Open Source eCommerce Framework on Symfony. An authenticated Insecu
|
| 33 |
CVE-2026-34295
Vulnerability in the PeopleSoft Enterprise SCM Purchasing product of Oracle Peop
|
| 33 |
CVE-2026-34300
Vulnerability in the PeopleSoft Enterprise FIN Contracts product of Oracle Peopl
|
| 33 |
CVE-2026-29108
SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C
|
| 33 |
CVE-2026-34313
Vulnerability in the Oracle Financial Services Analytical Applications Infrastru
|
| 33 |
CVE-2026-41319
MailKit is a cross-platform mail client library built on top of MimeKit. A START
|
| 33 |
CVE-2026-33355
Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late
|
| 33 |
CVE-2026-30847
Wekan is an open source kanban tool built with Meteor. In versions 8.31.0 throug
|
| 33 |
CVE-2026-28271
Kiteworks is a private data network (PDN). Prior to version 9.2.0, a vulnerabili
|
| 33 |
CVE-2026-3079
The LearnDash LMS plugin for WordPress is vulnerable to blind time-based SQL Inj
|
| 33 |
CVE-2026-2351
The Task Manager plugin for WordPress is vulnerable to Arbitrary File Read in al
|
| 33 |
CVE-2026-4087
The Pre* Party Resource Hints plugin for WordPress is vulnerable to SQL Injectio
|
| 33 |
CVE-2026-33058
Kanboard is project management software focused on Kanban methodology. Versions
|
| 33 |
CVE-2026-23635
Kiteworks is a private data network (PDN). In Kiteworks Secure Data Forms prior
|
| 33 |
CVE-2026-33417
Wallos is an open-source, self-hostable personal subscription tracker. Prior to
|
| 33 |
CVE-2026-31865
### Impact
Elysia cookie can be overridden by prototype pollution , eg. `__proto
|
| 33 |
CVE-2025-71242
SPIP before 4.3.6, 4.2.17, and 4.1.20 allows unauthorized content disclosure in
|
| 33 |
CVE-2026-3021
Non-relational SQL injection vulnerability (NoSQLi) in the Wakyma web applicatio
|
| 33 |
CVE-2026-33130
Uptime Kuma is an open source, self-hosted monitoring tool. In versions 1.23.0 t
|
| 33 |
CVE-2025-65995
When a DAG failed during parsing, Airflow’s error-reporting in the UI could incl
|
| 33 |
CVE-2026-1942
The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vuln
|
| 33 |
CVE-2026-25768
LavinMQ is a high-performance message queue & streaming server. Before 2.6.6, an
|
| 33 |
CVE-2026-39696
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-39702
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-32411
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-2363
The WP-Members Membership Plugin plugin for WordPress is vulnerable to SQL Injec
|
| 33 |
CVE-2026-39703
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-32449
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-22350
Missing Authorization vulnerability in add-ons.org PDF for Elementor Forms + Dra
|
| 33 |
CVE-2026-32450
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-32448
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-39575
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-39708
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2025-68837
Missing Authorization vulnerability in ELEXtensions ELEX WordPress HelpDesk & Cu
|
| 33 |
CVE-2026-32460
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-23817
A vulnerability in the web-based management interface of AOS-CX Switches could a
|
| 33 |
CVE-2026-32424
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2025-68042
Missing Authorization vulnerability in Travelpayouts Travelpayouts travelpayouts
|
| 33 |
CVE-2025-68534
Missing Authorization vulnerability in add-ons.org PDF for WPForms pdf-for-wpfor
|
| 33 |
CVE-2026-23900
Various stored XSS vulnerabilities in the maps- and icon rendering logic in Phoc
|
| 33 |
CVE-2026-1674
The Gutena Forms - Contact Form, Survey Form, Feedback Form, Booking Form, and C
|
| 33 |
CVE-2025-67975
Missing Authorization vulnerability in aDirectory aDirectory adirectory allows E
|
| 33 |
CVE-2026-39482
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-40888
Frappe HR is an open-source human resources management solution (HRMS). Prior to
|
| 33 |
CVE-2025-68000
Missing Authorization vulnerability in PickPlugins Testimonial Slider testimonia
|
| 33 |
CVE-2026-37100
An issue in the Bluetooth Low Energy (BLE) control interface of the Yamaha SR-B3
|
| 33 |
CVE-2026-25542
Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style
|
| 33 |
CVE-2026-40734
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-28038
Missing Authorization vulnerability in Brainstorm_Force Ultimate Addons for WPBa
|
| 33 |
CVE-2026-39517
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-32361
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-32431
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-32352
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-23799
Missing Authorization vulnerability in Themeum Tutor LMS tutor allows Exploiting
|
| 33 |
CVE-2026-39508
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-1639
The Taskbuilder - WordPress Project Management & Task Management plugin for Word
|
| 33 |
CVE-2025-68514
Authorization Bypass Through User-Controlled Key vulnerability in Cozmoslabs Pai
|
| 33 |
CVE-2026-27705
Plane is an an open-source project management tool. Prior to version 1.2.2, the
|
| 33 |
CVE-2026-32430
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-32356
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-26328
OpenClaw is a personal AI assistant. Prior to version 2026.2.14, under iMessage
|
| 33 |
CVE-2026-32359
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-25372
Missing Authorization vulnerability in Kodezen LLC Academy LMS academy allows Ex
|
| 33 |
CVE-2026-31918
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2025-13431
The SlimStat Analytics plugin for WordPress is vulnerable to time-based SQL Inje
|
| 33 |
CVE-2025-12801
A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-util
|
| 33 |
CVE-2026-39500
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-34315
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
| 33 |
CVE-2026-2893
The Page and Post Clone plugin for WordPress is vulnerable to SQL Injection via
|
| 33 |
CVE-2026-39646
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-32403
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-39483
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-1317
The WP Import - Ultimate CSV XML Importer for WordPress plugin for WordPress is
|
| 33 |
CVE-2026-32008
OpenClaw versions prior to 2026.2.21 contain an improper URL scheme validation v
|
| 33 |
CVE-2026-39665
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-39666
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-32455
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-20064
A vulnerability in of Cisco Secure Firewall Threat Defense (FTD) Software could
|
| 33 |
CVE-2026-32454
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-39674
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2025-68005
Missing Authorization vulnerability in themewant Easy Hotel Booking easy-hotel a
|
Oldest Unpatched Critical/High CVEs
| CVE | Severity | CVSS | Priority | Days Open |
|---|---|---|---|---|
| CVE-2024-3400 | CRITICAL | 10.0 | 224 | 744d |
| CVE-2019-19781 | CRITICAL | 9.8 | 223 | 2312d |
| CVE-2020-5902 | CRITICAL | 9.8 | 223 | 2125d |
| CVE-2021-35464 | CRITICAL | 9.8 | 223 | 1739d |
| CVE-2020-10189 | CRITICAL | 9.8 | 223 | 2242d |
| CVE-2012-4681 | CRITICAL | 9.8 | 223 | 4989d |
| CVE-2022-42475 | CRITICAL | 9.8 | 223 | 1210d |
| CVE-2023-3519 | CRITICAL | 9.8 | 223 | 1012d |
| CVE-2015-7450 | CRITICAL | 9.8 | 222 | 3766d |
| CVE-2023-34048 | CRITICAL | 9.8 | 222 | 914d |