Security Dashboard

Total CVEs
16507
last 90 days
Avg Priority
36.9
of max 220
KEV
38
actively exploited
POC
3236
public exploits
Unpatched
4334
CRIT/HIGH without patch
How is Priority Score calculated?

Priority Score is a composite risk metric (0-220) combining multiple real-world threat signals:

KEV +50
CISA Known Exploited Vulnerability — confirmed active exploitation in the wild
EPSS x100
Exploit Prediction Scoring System — probability of exploitation in next 30 days (0-100)
CVSS x5
Common Vulnerability Scoring System — technical severity (0-50)
POC +20
Public exploit code exists — lowers barrier for attackers
0-40 Low 40-80 Medium 80-120 High 120+ Critical
Priority CVE
28 CVE-2025-15491
The Post Slides WordPress plugin through 1.0.1 does not validate some shortcode
28 CVE-2026-23431
In the Linux kernel, the following vulnerability has been resolved: spi: amlogi
28 CVE-2026-23430
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx:
28 CVE-2026-31632
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix
28 CVE-2026-23423
In the Linux kernel, the following vulnerability has been resolved: btrfs: free
28 CVE-2026-23421
In the Linux kernel, the following vulnerability has been resolved: drm/xe/conf
28 CVE-2026-23418
In the Linux kernel, the following vulnerability has been resolved: drm/xe/reg_
28 CVE-2026-40915
A flaw was found in GIMP. A remote attacker could exploit an integer overflow vu
28 CVE-2026-31472
In the Linux kernel, the following vulnerability has been resolved: xfrm: iptfs
28 CVE-2026-23345
In the Linux kernel, the following vulnerability has been resolved: arm64: gcs:
28 CVE-2026-23346
In the Linux kernel, the following vulnerability has been resolved: arm64: io:
28 CVE-2026-23999
Fleet is open source device management software. In versions prior to 4.80.1, Fl
28 CVE-2026-23416
In the Linux kernel, the following vulnerability has been resolved: mm/mseal: u
28 CVE-2026-20633
This issue was addressed with improved handling of symlinks. This issue is fixed
28 CVE-2026-23349
In the Linux kernel, the following vulnerability has been resolved: HID: pidff:
28 CVE-2026-23400
In the Linux kernel, the following vulnerability has been resolved: rust_binder
28 CVE-2026-28831
An authorization issue was addressed with improved state management. This issue
28 CVE-2026-23358
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu:
28 CVE-2026-31653
In the Linux kernel, the following vulnerability has been resolved: mm/damon/sy
28 CVE-2026-23385
In the Linux kernel, the following vulnerability has been resolved: netfilter:
28 CVE-2026-23384
In the Linux kernel, the following vulnerability has been resolved: RDMA/ionic:
28 CVE-2026-23366
In the Linux kernel, the following vulnerability has been resolved: drm/client:
28 CVE-2026-23376
In the Linux kernel, the following vulnerability has been resolved: nvmet-fcloo
28 CVE-2025-58343
An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wear
28 CVE-2026-20669
A parsing issue in the handling of directory paths was addressed with improved p
28 CVE-2026-40159
PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI’s MCP (Mode
28 CVE-2026-24427
Shenzhen Tenda AC7 firmware version V03.03.03.01_cn and prior expose sensitive i
28 CVE-2026-3777
The application does not properly validate the lifetime and validity of internal
28 CVE-2025-71190
In the Linux kernel, the following vulnerability has been resolved: dmaengine:
28 CVE-2026-20653
A parsing issue in the handling of directory paths was addressed with improved p
28 CVE-2025-71182
In the Linux kernel, the following vulnerability has been resolved: can: j1939:
28 CVE-2026-25122
apko allows users to build and publish OCI container images built from apk packa
28 CVE-2025-33237
NVIDIA HD Audio Driver for Windows contains a vulnerability where an attacker co
28 CVE-2025-62815
An issue was discovered in Samsung Mobile Processor Exynos 1380, 1480, 2400, 158
28 CVE-2026-2717
The HTTP Headers plugin for WordPress is vulnerable to CRLF Injection in all ver
28 CVE-2026-40311
ImageMagick is free and open-source software used for editing and manipulating d
28 CVE-2026-5939
A crafted XFA PDF can trigger a use-after-free condition during calculate event
28 CVE-2026-5938
Improper control flow management allows a crafted document action chain to cause
28 CVE-2025-71183
In the Linux kernel, the following vulnerability has been resolved: btrfs: alwa
28 CVE-2025-43417
A path handling issue was addressed with improved logic. This issue is fixed in
28 CVE-2026-20648
A privacy issue was addressed by moving sensitive data to a protected location.
28 CVE-2026-27816
EVerest is an EV charging software stack. Prior to versions to 2026.02.0, ISO151
28 CVE-2026-27828
EVerest is an EV charging software stack. Prior to versions to 2026.02.0, ISO151
28 CVE-2026-20647
This issue was addressed with improved data protection. This issue is fixed in m
28 CVE-2026-30986
iccDEV provides a set of libraries and tools for working with ICC color manageme
28 CVE-2026-27815
EVerest is an EV charging software stack. Prior to versions to 2026.02.0, ISO151
28 CVE-2026-20638
A logic issue was addressed with improved checks. This issue is fixed in iOS 26.
28 CVE-2026-28829
A permissions issue was addressed with additional restrictions. This issue is fi
28 CVE-2026-28725
Sensitive information disclosure due to improper configuration of a headless bro
28 CVE-2024-56807
An out-of-bounds read vulnerability has been reported to affect Media Streaming
28 CVE-2025-32735
Improper conditions check in some firmware for some Intel(R) NPU Drivers within
28 CVE-2026-27003
OpenClaw is a personal AI assistant. Telegram bot tokens can appear in error mes
28 CVE-2025-14876
A flaw was found in the virtio-crypto device of QEMU. A malicious guest operatin
28 CVE-2024-36316
The integer overflow vulnerability within AMD Graphics driver could allow an att
28 CVE-2025-69645
Binutils objdump contains a denial-of-service vulnerability when processing a cr
28 CVE-2026-28892
A permissions issue was addressed by removing the vulnerable code. This issue is
28 CVE-2025-69646
Binutils objdump contains a denial-of-service vulnerability when processing a cr
28 CVE-2026-20623
A permissions issue was addressed by removing the vulnerable code. This issue is
28 CVE-2026-3776
The application does not validate the presence of required appearance (AP) data
28 CVE-2026-20618
An issue was addressed with improved handling of temporary files. This issue is
28 CVE-2026-33853
NULL Pointer Dereference vulnerability in MolotovCherry Android-ImageMagick7.Thi
28 CVE-2026-31961
Quill provides simple mac binary signing and notarization from any platform. Qui
28 CVE-2025-54149
An uncontrolled resource consumption vulnerability has been reported to affect Q
28 CVE-2026-31826
pypdf is a free and open-source pure-python PDF library. Prior to 6.8.0, an atta
28 CVE-2025-54150
An uncontrolled resource consumption vulnerability has been reported to affect Q
28 CVE-2025-54151
An uncontrolled resource consumption vulnerability has been reported to affect Q
28 CVE-2026-35348
The sort utility in uutils coreutils is vulnerable to a process panic when using
28 CVE-2026-5600
A new API endpoint introduced in pretix 2025 that is supposed to return all che
28 CVE-2026-40918
A flaw was found in GIMP. Processing a specially crafted PVR image file with lar
28 CVE-2026-26099
Uncontrolled Search Path Element in Owl opds 2.2.0.4 allows Leveraging/Manipulat
28 CVE-2026-6840
Missing bounds validation for operator could allow out of range operator-code l
28 CVE-2026-21991
A DTrace component, dtprobed, allows arbitrary file creation through crafted USD
28 CVE-2026-20629
A privacy issue was addressed with improved handling of temporary files. This is
28 CVE-2026-26949
Dell Device Management Agent (DDMA), versions prior to 26.02, contain an Incorre
28 CVE-2026-26100
Incorrect Permission Assignment for Critical Resource in Owl opds 2.2.0.4 allows
28 CVE-2026-26095
Incorrect Permission Assignment for Critical Resource in Owl opds 2.2.0.4 allows
28 CVE-2026-6844
A flaw was found in the `readelf` utility of the binutils package. A local attac
28 CVE-2025-65116
Buffer Overflow Vulnerability in JP1/IT Desktop Management 2 - Manager on Window
28 CVE-2026-26096
Incorrect Permission Assignment for Critical Resource in Owl opds 2.2.0.4 allows
28 CVE-2026-5745
A flaw was found in libarchive. A NULL pointer dereference vulnerability exists
28 CVE-2026-25918
unity-cli is a command line utility for the Unity Game Engine. Prior to 1.8.2 ,
28 CVE-2026-33855
Integer Overflow or Wraparound vulnerability in MolotovCherry Android-ImageMagic
28 CVE-2026-20608
This issue was addressed through improved state management. This issue is fixed
28 CVE-2026-4270
Improper Protection of Alternate Path exists in the no-access and workdir featur
28 CVE-2026-20675
The issue was addressed with improved bounds checks. This issue is fixed in watc
28 CVE-2026-4897
A flaw was found in polkit. A local user can exploit this by providing a special
28 CVE-2026-6843
A flaw was found in nano. A local user could exploit a format string vulnerabili
28 CVE-2026-1653
A potential divide by zero vulnerability was reported in the Lenovo Virtual Bus
28 CVE-2026-20666
An authorization issue was addressed with improved state management. This issue
28 CVE-2026-30936
ImageMagick is free and open-source software used for editing and manipulating d

Oldest Unpatched Critical/High CVEs

CVE Severity CVSS Priority Days Open
CVE-2024-3400 CRITICAL 10.0 224 745d
CVE-2019-19781 CRITICAL 9.8 223 2313d
CVE-2020-5902 CRITICAL 9.8 223 2126d
CVE-2021-35464 CRITICAL 9.8 223 1740d
CVE-2020-10189 CRITICAL 9.8 223 2243d
CVE-2012-4681 CRITICAL 9.8 223 4991d
CVE-2022-42475 CRITICAL 9.8 223 1211d
CVE-2023-3519 CRITICAL 9.8 223 1013d
CVE-2015-7450 CRITICAL 9.8 222 3768d
CVE-2023-34048 CRITICAL 9.8 222 915d
Prev 139 / 184 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy