Total CVEs
16153
last 90 days
Avg Priority
36.7
of max 220
KEV
39
actively exploited
POC
3349
public exploits
Unpatched
4759
CRIT/HIGH without patch
How is Priority Score calculated?
Priority Score is a composite risk metric (0-220) combining multiple real-world threat signals:
KEV +50
CISA Known Exploited Vulnerability — confirmed active exploitation in the wild
EPSS x100
Exploit Prediction Scoring System — probability of exploitation in next 30 days (0-100)
CVSS x5
Common Vulnerability Scoring System — technical severity (0-50)
POC +20
Public exploit code exists — lowers barrier for attackers
0-40 Low
40-80 Medium
80-120 High
120+ Critical
Patch Now — Known Exploited Vulnerabilities
194
CVE-2026-24061
telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for t
185
CVE-2026-1731
BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain
184
CVE-2026-23760
SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability
180
CVE-2025-40551
SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerabil
170
CVE-2026-1340
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated rem
164
CVE-2026-1281
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated rem
160
CVE-2025-40536
SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that
141
CVE-2026-20131
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FM
137
CVE-2026-1603
An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthen
134
CVE-2026-22769
Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credentia
Priority Distribution
| Priority | CVE |
|---|---|
| 44 |
CVE-2026-26975
Music Assistant is an open-source media library manager that integrates streamin
|
| 44 |
CVE-2025-31413
Cross-Site Request Forgery (CSRF) vulnerability in bdthemes Element Pack Element
|
| 44 |
CVE-2022-50975
An unauthenticated remote attacker is able to use an existing session id of a lo
|
| 44 |
CVE-2026-4475
A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_201710241
|
| 44 |
CVE-2025-15602
Snipe-IT versions prior to 8.3.7 contain sensitive user attributes related to ac
|
| 44 |
CVE-2026-21255
Improper access control in Windows Hyper-V allows an authorized attacker to bypa
|
| 44 |
CVE-2025-69517
An HTML injection vulnerability in Amidaware Inc Tactical RMM v1.3.1 and earlier
|
| 44 |
CVE-2026-27040
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v
|
| 44 |
CVE-2026-25812
PlaciPy is a placement management system designed for educational institutions.
|
| 44 |
CVE-2026-34955
### Summary
`SubprocessSandbox` in all modes (BASIC, STRICT, NETWORK_ISOLATED)
|
| 44 |
CVE-2026-22273
Dell ECS, versions 3.8.1.0 through 3.8.1.7, and Dell ObjectScale versions prior
|
| 44 |
CVE-2026-33030
## Summary
Nginx-UI contains an Insecure Direct Object Reference (IDOR) vulnera
|
| 44 |
CVE-2025-14866
The Melapress Role Editor plugin for WordPress is vulnerable to Privilege Escala
|
| 44 |
CVE-2025-64175
Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, Gog
|
| 44 |
CVE-2025-51414
In Phpgurukul Online Course Registration v3.1, an arbitrary file upload vulnerab
|
| 44 |
CVE-2026-29839
DedeCMS v5.7.118 was discovered to contain a Cross-Site Request Forgery (CSRF) v
|
| 44 |
CVE-2026-22627
A buffer copy without checking size of input ('classic buffer overflow') vulnera
|
| 44 |
CVE-2025-70364
An issue was discovered in Kiamo before 8.4 allowing authenticated administrativ
|
| 44 |
CVE-2025-67260
The Terrapack software, from ASTER TEC / ASTER S.p.A., with the indicated compon
|
| 44 |
CVE-2026-3614
The AcyMailing plugin for WordPress is vulnerable to privilege escalation in all
|
| 44 |
CVE-2026-1486
A flaw was found in Keycloak. A vulnerability exists in the jwt-authorization-gr
|
| 44 |
CVE-2025-14868
The Career Section plugin for WordPress is vulnerable to Cross-Site Request Forg
|
| 44 |
CVE-2025-15100
The JAY Login & Register plugin for WordPress is vulnerable to Privilege Escalat
|
| 44 |
CVE-2026-20631
A logic issue was addressed with improved checks. This issue is fixed in macOS T
|
| 44 |
CVE-2026-23246
In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80
|
| 44 |
CVE-2023-43010
The issue was addressed with improved memory handling. This issue is fixed in iO
|
| 44 |
CVE-2025-55040
The import form CSRF vulnerability in MuraCMS through 10.1.10 allows attackers t
|
| 44 |
CVE-2025-67036
An issue was discovered in Lantronix EDS5000 2.1.0.0R3. The Log Info page allows
|
| 44 |
CVE-2026-24068
The VSL privileged helper does utilize NSXPC for IPC. The implementation of the
|
| 44 |
CVE-2025-67034
An issue was discovered in Lantronix EDS5000 2.1.0.0R3. An authenticated attacke
|
| 44 |
CVE-2025-70031
An issue pertaining to CWE-352: Cross-Site Request Forgery was discovered in Sun
|
| 44 |
CVE-2025-67037
An issue was discovered in Lantronix EDS5000 2.1.0.0R3. An authenticated attacke
|
| 44 |
CVE-2026-3499
The Product Feed PRO for WooCommerce by AdTribes - Product Feeds for WooCommerce
|
| 44 |
CVE-2026-25414
Incorrect Privilege Assignment vulnerability in iqonicdesign WPBookit Pro wpbook
|
| 44 |
CVE-2026-32530
Incorrect Privilege Assignment vulnerability in WPFunnels Creator LMS creatorlms
|
| 44 |
CVE-2025-55044
The Trash Restore CSRF vulnerability in MuraCMS through 10.1.10 allows attackers
|
| 44 |
CVE-2026-30460
Daylight Studio FuelCMS v1.5.2 was discovered to contain an authenticated remote
|
| 44 |
CVE-2025-15157
The Starfish Review Generation & Marketing for WordPress plugin for WordPress is
|
| 44 |
CVE-2026-20667
A logic issue was addressed with improved checks. This issue is fixed in watchOS
|
| 44 |
CVE-2026-4722
Privilege escalation in the IPC component. This vulnerability affects Firefox <
|
| 44 |
CVE-2026-25497
Craft is a platform for creating digital experiences. In Craft versions from 4.0
|
| 44 |
CVE-2025-10465
Unrestricted Upload of File with Dangerous Type vulnerability in Birtech Informa
|
| 44 |
CVE-2026-27018
### Impact
The fix introduced in version 8.1.0 for GHSA-rh2x-ccvw-q7r3 (CVE-202
|
| 44 |
CVE-2026-40308
My Calendar is a WordPress plugin for managing calendar events. In versions 3.7.
|
| 44 |
CVE-2025-58150
Shadow mode tracing code uses a set of per-CPU variables to avoid
cumbersome par
|
| 44 |
CVE-2026-28519
arduino-TuyaOpen before version 1.2.1 contains a heap-based buffer overflow vuln
|
| 44 |
CVE-2026-23687
SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated
|
| 44 |
CVE-2026-35093
A flaw was found in libinput. A local attacker who can place a specially crafted
|
| 44 |
CVE-2026-24572
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
|
| 44 |
CVE-2026-24532
Missing Authorization vulnerability in SiteLock SiteLock Security - WP Hardening
|
| 44 |
CVE-2026-29089
TimescaleDB is a time-series database for high-performance real-time analytics p
|
| 44 |
CVE-2025-49050
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
|
| 44 |
CVE-2025-49049
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
|
| 44 |
CVE-2026-27939
Statmatic is a Laravel and Git powered content management system (CMS). Starting
|
| 44 |
CVE-2026-30711
Devome GRR v4.5.0 was discovered to contain multiple authenticated SQL injection
|
| 44 |
CVE-2026-24778
Ghost is an open source content management system. In Ghost versions 5.43.0 thro
|
| 44 |
CVE-2026-24443
EventSentry versions prior to 6.0.1.20 contain an unverified password change vul
|
| 44 |
CVE-2025-15557
An Improper Certificate Validation vulnerability in TP-Link Tapo H100 v1 and Tap
|
| 44 |
CVE-2026-31979
Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune.
|
| 44 |
CVE-2026-30478
A Dynamic-link Library Injection vulnerability in GatewayGeo MapServer for Windo
|
| 44 |
CVE-2026-23226
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: add
|
| 44 |
CVE-2026-22822
External Secrets Operator reads information from a third-party service and autom
|
| 44 |
CVE-2026-23480
Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, there
|
| 44 |
CVE-2026-34040
## Summary
A security vulnerability has been detected that allows attackers to
|
| 44 |
CVE-2025-15547
By default, jailed processes cannot mount filesystems, including nullfs(4). How
|
| 44 |
CVE-2025-69784
A local, non-privileged attacker can abuse a vulnerable IOCTL interface exposed
|
| 44 |
CVE-2026-26794
GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a SQL injection vulnerabil
|
| 44 |
CVE-2026-0945
Privilege Defined With Unsafe Actions vulnerability in Drupal Role Delegation al
|
| 44 |
CVE-2025-43202
This issue was addressed with improved memory handling. This issue is fixed in i
|
| 44 |
CVE-2025-68623
In Microsoft DirectX End-User Runtime Web Installer 9.29.1974.0, a low-privilege
|
| 44 |
CVE-2026-21765
HCL BigFix Platform is affected by insecure permissions on private cryptographic
|
| 44 |
CVE-2026-5272
Heap buffer overflow in GPU in Google Chrome prior to 146.0.7680.178 allowed a r
|
| 44 |
CVE-2026-3919
Use after free in Extensions in Google Chrome prior to 146.0.7680.71 allowed an
|
| 44 |
CVE-2026-3539
Object lifecycle issue in DevTools in Google Chrome prior to 145.0.7632.159 allo
|
| 44 |
CVE-2026-27140
SWIG file names containing 'cgo' and well-crafted payloads could lead to code sm
|
| 44 |
CVE-2026-4458
Use after free in Extensions in Google Chrome prior to 146.0.7680.153 allowed an
|
| 44 |
CVE-2026-25922
authentik is an open-source identity provider. Prior to 2025.8.6, 2025.10.4, and
|
| 44 |
CVE-2026-5914
Type Confusion in CSS in Google Chrome prior to 147.0.7727.55 allowed an attacke
|
| 44 |
CVE-2026-0834
Logic vulnerability in TP-Link Archer C20 v6.0 and Archer AX53 v1.0 (TDDP module
|
| 44 |
CVE-2026-5904
Use after free in V8 in Google Chrome prior to 147.0.7727.55 allowed an attacker
|
| 44 |
CVE-2026-39621
Cross-Site Request Forgery (CSRF) vulnerability in spicethemes SpicePress spicep
|
| 44 |
CVE-2025-13399
A weakness in the web interface’s application layer encryption in VX800v v1.0 al
|
| 44 |
CVE-2024-36324
Improper input validation in AMD Graphics Driver could allow an attacker to supp
|
| 44 |
CVE-2025-10314
Incorrect Default Permissions vulnerability in Mitsubishi Electric Corporation F
|
| 44 |
CVE-2026-24502
Dell Command | Intel vPro Out of Band, versions prior to 4.7.0, contain an Uncon
|
| 44 |
CVE-2026-20408
In wlan, there is a possible out of bounds write due to a heap buffer overflow.
|
| 44 |
CVE-2025-47392
Memory corruption when decoding corrupted satellite data files with invalid sign
|
| 44 |
CVE-2026-33001
Jenkins 2.554 and earlier, LTS 2.541.2 and earlier does not safely handle symbol
|
| 44 |
CVE-2026-28193
In JetBrains YouTrack before 2025.3.121962 apps were able to send requests to th
|
| 44 |
CVE-2026-35582
### Summary
`Executrix.getCommand()` constructs shell commands by substituting
|
Oldest Unpatched Critical/High CVEs
| CVE | Severity | CVSS | Priority | Days Open |
|---|---|---|---|---|
| CVE-2024-3400 | CRITICAL | 10.0 | 224 | 735d |
| CVE-2019-19781 | CRITICAL | 9.8 | 223 | 2303d |
| CVE-2020-5902 | CRITICAL | 9.8 | 223 | 2116d |
| CVE-2021-35464 | CRITICAL | 9.8 | 223 | 1729d |
| CVE-2020-10189 | CRITICAL | 9.8 | 223 | 2232d |
| CVE-2012-4681 | CRITICAL | 9.8 | 223 | 4980d |
| CVE-2022-42475 | CRITICAL | 9.8 | 223 | 1201d |
| CVE-2023-3519 | CRITICAL | 9.8 | 223 | 1002d |
| CVE-2015-7450 | CRITICAL | 9.8 | 222 | 3757d |
| CVE-2023-34048 | CRITICAL | 9.8 | 222 | 904d |