Total CVEs
16507
last 90 days
Avg Priority
36.9
of max 220
KEV
38
actively exploited
POC
3236
public exploits
Unpatched
4334
CRIT/HIGH without patch
How is Priority Score calculated?
Priority Score is a composite risk metric (0-220) combining multiple real-world threat signals:
KEV +50
CISA Known Exploited Vulnerability — confirmed active exploitation in the wild
EPSS x100
Exploit Prediction Scoring System — probability of exploitation in next 30 days (0-100)
CVSS x5
Common Vulnerability Scoring System — technical severity (0-50)
POC +20
Public exploit code exists — lowers barrier for attackers
0-40 Low
40-80 Medium
80-120 High
120+ Critical
Patch Now — Known Exploited Vulnerabilities
185
CVE-2026-1731
BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain
180
CVE-2025-40551
SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerabil
170
CVE-2026-1340
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated rem
164
CVE-2026-1281
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated rem
160
CVE-2025-40536
SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that
141
CVE-2026-20131
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FM
137
CVE-2026-1603
An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthen
134
CVE-2026-22769
Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credentia
129
CVE-2026-33825
Insufficient granularity of access control in Microsoft Defender allows an authorized attacker to el
124
CVE-2026-21643
An improper neutralization of special elements used in an sql command ('sql injection') vulnerabilit
Priority Distribution
| Priority | CVE |
|---|---|
| 28 |
CVE-2025-15491
The Post Slides WordPress plugin through 1.0.1 does not validate some shortcode
|
| 28 |
CVE-2026-23431
In the Linux kernel, the following vulnerability has been resolved:
spi: amlogi
|
| 28 |
CVE-2026-23430
In the Linux kernel, the following vulnerability has been resolved:
drm/vmwgfx:
|
| 28 |
CVE-2026-31632
In the Linux kernel, the following vulnerability has been resolved:
rxrpc: Fix
|
| 28 |
CVE-2026-23423
In the Linux kernel, the following vulnerability has been resolved:
btrfs: free
|
| 28 |
CVE-2026-23421
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/conf
|
| 28 |
CVE-2026-23418
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/reg_
|
| 28 |
CVE-2026-40915
A flaw was found in GIMP. A remote attacker could exploit an integer overflow vu
|
| 28 |
CVE-2026-31472
In the Linux kernel, the following vulnerability has been resolved:
xfrm: iptfs
|
| 28 |
CVE-2026-23345
In the Linux kernel, the following vulnerability has been resolved:
arm64: gcs:
|
| 28 |
CVE-2026-23346
In the Linux kernel, the following vulnerability has been resolved:
arm64: io:
|
| 28 |
CVE-2026-23999
Fleet is open source device management software. In versions prior to 4.80.1, Fl
|
| 28 |
CVE-2026-23416
In the Linux kernel, the following vulnerability has been resolved:
mm/mseal: u
|
| 28 |
CVE-2026-20633
This issue was addressed with improved handling of symlinks. This issue is fixed
|
| 28 |
CVE-2026-23349
In the Linux kernel, the following vulnerability has been resolved:
HID: pidff:
|
| 28 |
CVE-2026-23400
In the Linux kernel, the following vulnerability has been resolved:
rust_binder
|
| 28 |
CVE-2026-28831
An authorization issue was addressed with improved state management. This issue
|
| 28 |
CVE-2026-23358
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu:
|
| 28 |
CVE-2026-31653
In the Linux kernel, the following vulnerability has been resolved:
mm/damon/sy
|
| 28 |
CVE-2026-23385
In the Linux kernel, the following vulnerability has been resolved:
netfilter:
|
| 28 |
CVE-2026-23384
In the Linux kernel, the following vulnerability has been resolved:
RDMA/ionic:
|
| 28 |
CVE-2026-23366
In the Linux kernel, the following vulnerability has been resolved:
drm/client:
|
| 28 |
CVE-2026-23376
In the Linux kernel, the following vulnerability has been resolved:
nvmet-fcloo
|
| 28 |
CVE-2025-58343
An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wear
|
| 28 |
CVE-2026-20669
A parsing issue in the handling of directory paths was addressed with improved p
|
| 28 |
CVE-2026-40159
PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI’s MCP (Mode
|
| 28 |
CVE-2026-24427
Shenzhen Tenda AC7 firmware version V03.03.03.01_cn and prior expose sensitive i
|
| 28 |
CVE-2026-3777
The application does not properly validate the lifetime and validity of internal
|
| 28 |
CVE-2025-71190
In the Linux kernel, the following vulnerability has been resolved:
dmaengine:
|
| 28 |
CVE-2026-20653
A parsing issue in the handling of directory paths was addressed with improved p
|
| 28 |
CVE-2025-71182
In the Linux kernel, the following vulnerability has been resolved:
can: j1939:
|
| 28 |
CVE-2026-25122
apko allows users to build and publish OCI container images built from apk packa
|
| 28 |
CVE-2025-33237
NVIDIA HD Audio Driver for Windows contains a vulnerability where an attacker co
|
| 28 |
CVE-2025-62815
An issue was discovered in Samsung Mobile Processor Exynos 1380, 1480, 2400, 158
|
| 28 |
CVE-2026-2717
The HTTP Headers plugin for WordPress is vulnerable to CRLF Injection in all ver
|
| 28 |
CVE-2026-40311
ImageMagick is free and open-source software used for editing and manipulating d
|
| 28 |
CVE-2026-5939
A crafted XFA PDF can trigger a use-after-free condition during calculate event
|
| 28 |
CVE-2026-5938
Improper control flow management allows a crafted document action chain to cause
|
| 28 |
CVE-2025-71183
In the Linux kernel, the following vulnerability has been resolved:
btrfs: alwa
|
| 28 |
CVE-2025-43417
A path handling issue was addressed with improved logic. This issue is fixed in
|
| 28 |
CVE-2026-20648
A privacy issue was addressed by moving sensitive data to a protected location.
|
| 28 |
CVE-2026-27816
EVerest is an EV charging software stack. Prior to versions to 2026.02.0, ISO151
|
| 28 |
CVE-2026-27828
EVerest is an EV charging software stack. Prior to versions to 2026.02.0, ISO151
|
| 28 |
CVE-2026-20647
This issue was addressed with improved data protection. This issue is fixed in m
|
| 28 |
CVE-2026-30986
iccDEV provides a set of libraries and tools for working with ICC color manageme
|
| 28 |
CVE-2026-27815
EVerest is an EV charging software stack. Prior to versions to 2026.02.0, ISO151
|
| 28 |
CVE-2026-20638
A logic issue was addressed with improved checks. This issue is fixed in iOS 26.
|
| 28 |
CVE-2026-28829
A permissions issue was addressed with additional restrictions. This issue is fi
|
| 28 |
CVE-2026-28725
Sensitive information disclosure due to improper configuration of a headless bro
|
| 28 |
CVE-2024-56807
An out-of-bounds read vulnerability has been reported to affect Media Streaming
|
| 28 |
CVE-2025-32735
Improper conditions check in some firmware for some Intel(R) NPU Drivers within
|
| 28 |
CVE-2026-27003
OpenClaw is a personal AI assistant. Telegram bot tokens can appear in error mes
|
| 28 |
CVE-2025-14876
A flaw was found in the virtio-crypto device of QEMU. A malicious guest operatin
|
| 28 |
CVE-2024-36316
The integer overflow vulnerability within AMD Graphics driver could allow an att
|
| 28 |
CVE-2025-69645
Binutils objdump contains a denial-of-service vulnerability when processing a cr
|
| 28 |
CVE-2026-28892
A permissions issue was addressed by removing the vulnerable code. This issue is
|
| 28 |
CVE-2025-69646
Binutils objdump contains a denial-of-service vulnerability when processing a cr
|
| 28 |
CVE-2026-20623
A permissions issue was addressed by removing the vulnerable code. This issue is
|
| 28 |
CVE-2026-3776
The application does not validate the presence of required appearance (AP) data
|
| 28 |
CVE-2026-20618
An issue was addressed with improved handling of temporary files. This issue is
|
| 28 |
CVE-2026-33853
NULL Pointer Dereference vulnerability in MolotovCherry Android-ImageMagick7.Thi
|
| 28 |
CVE-2026-31961
Quill provides simple mac binary signing and notarization from any platform. Qui
|
| 28 |
CVE-2025-54149
An uncontrolled resource consumption vulnerability has been reported to affect Q
|
| 28 |
CVE-2026-31826
pypdf is a free and open-source pure-python PDF library. Prior to 6.8.0, an atta
|
| 28 |
CVE-2025-54150
An uncontrolled resource consumption vulnerability has been reported to affect Q
|
| 28 |
CVE-2025-54151
An uncontrolled resource consumption vulnerability has been reported to affect Q
|
| 28 |
CVE-2026-35348
The sort utility in uutils coreutils is vulnerable to a process panic when using
|
| 28 |
CVE-2026-5600
A new API endpoint introduced in pretix 2025 that is supposed to
return all che
|
| 28 |
CVE-2026-40918
A flaw was found in GIMP. Processing a specially crafted PVR image file with lar
|
| 28 |
CVE-2026-26099
Uncontrolled Search Path Element in Owl opds 2.2.0.4 allows Leveraging/Manipulat
|
| 28 |
CVE-2026-6840
Missing bounds validation for operator could allow out of range operator-code l
|
| 28 |
CVE-2026-21991
A DTrace component, dtprobed, allows arbitrary file creation through crafted USD
|
| 28 |
CVE-2026-20629
A privacy issue was addressed with improved handling of temporary files. This is
|
| 28 |
CVE-2026-26949
Dell Device Management Agent (DDMA), versions prior to 26.02, contain an Incorre
|
| 28 |
CVE-2026-26100
Incorrect Permission Assignment for Critical Resource in Owl opds 2.2.0.4 allows
|
| 28 |
CVE-2026-26095
Incorrect Permission Assignment for Critical Resource in Owl opds 2.2.0.4 allows
|
| 28 |
CVE-2026-6844
A flaw was found in the `readelf` utility of the binutils package. A local attac
|
| 28 |
CVE-2025-65116
Buffer Overflow Vulnerability in JP1/IT Desktop Management 2 - Manager on Window
|
| 28 |
CVE-2026-26096
Incorrect Permission Assignment for Critical Resource in Owl opds 2.2.0.4 allows
|
| 28 |
CVE-2026-5745
A flaw was found in libarchive. A NULL pointer dereference vulnerability exists
|
| 28 |
CVE-2026-25918
unity-cli is a command line utility for the Unity Game Engine. Prior to 1.8.2 ,
|
| 28 |
CVE-2026-33855
Integer Overflow or Wraparound vulnerability in MolotovCherry Android-ImageMagic
|
| 28 |
CVE-2026-20608
This issue was addressed through improved state management. This issue is fixed
|
| 28 |
CVE-2026-4270
Improper Protection of Alternate Path exists in the no-access and workdir featur
|
| 28 |
CVE-2026-20675
The issue was addressed with improved bounds checks. This issue is fixed in watc
|
| 28 |
CVE-2026-4897
A flaw was found in polkit. A local user can exploit this by providing a special
|
| 28 |
CVE-2026-6843
A flaw was found in nano. A local user could exploit a format string vulnerabili
|
| 28 |
CVE-2026-1653
A potential divide by zero vulnerability was reported in the Lenovo Virtual Bus
|
| 28 |
CVE-2026-20666
An authorization issue was addressed with improved state management. This issue
|
| 28 |
CVE-2026-30936
ImageMagick is free and open-source software used for editing and manipulating d
|
Oldest Unpatched Critical/High CVEs
| CVE | Severity | CVSS | Priority | Days Open |
|---|---|---|---|---|
| CVE-2024-3400 | CRITICAL | 10.0 | 224 | 745d |
| CVE-2019-19781 | CRITICAL | 9.8 | 223 | 2313d |
| CVE-2020-5902 | CRITICAL | 9.8 | 223 | 2126d |
| CVE-2021-35464 | CRITICAL | 9.8 | 223 | 1740d |
| CVE-2020-10189 | CRITICAL | 9.8 | 223 | 2243d |
| CVE-2012-4681 | CRITICAL | 9.8 | 223 | 4991d |
| CVE-2022-42475 | CRITICAL | 9.8 | 223 | 1211d |
| CVE-2023-3519 | CRITICAL | 9.8 | 223 | 1013d |
| CVE-2015-7450 | CRITICAL | 9.8 | 222 | 3768d |
| CVE-2023-34048 | CRITICAL | 9.8 | 222 | 915d |