Total CVEs
16423
last 90 days
Avg Priority
36.8
of max 220
KEV
39
actively exploited
POC
3348
public exploits
Unpatched
4819
CRIT/HIGH without patch
How is Priority Score calculated?
Priority Score is a composite risk metric (0-220) combining multiple real-world threat signals:
KEV +50
CISA Known Exploited Vulnerability — confirmed active exploitation in the wild
EPSS x100
Exploit Prediction Scoring System — probability of exploitation in next 30 days (0-100)
CVSS x5
Common Vulnerability Scoring System — technical severity (0-50)
POC +20
Public exploit code exists — lowers barrier for attackers
0-40 Low
40-80 Medium
80-120 High
120+ Critical
Patch Now — Known Exploited Vulnerabilities
194
CVE-2026-24061
telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for t
185
CVE-2026-1731
BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain
184
CVE-2026-23760
SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability
180
CVE-2025-40551
SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerabil
170
CVE-2026-1340
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated rem
164
CVE-2026-1281
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated rem
160
CVE-2025-40536
SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that
141
CVE-2026-20131
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FM
137
CVE-2026-1603
An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthen
134
CVE-2026-22769
Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credentia
Priority Distribution
| Priority | CVE |
|---|---|
| 33 |
CVE-2026-2317
Inappropriate implementation in Animation in Google Chrome prior to 145.0.7632.4
|
| 33 |
CVE-2026-3571
The Pie Register - User Registration, Profiles & Content Restriction plugin for
|
| 33 |
CVE-2026-1495
The vulnerability, if exploited, could allow an attacker with Event Log Reader (
|
| 33 |
CVE-2026-5903
Policy bypass in IFrameSandbox in Google Chrome prior to 147.0.7727.55 allowed a
|
| 33 |
CVE-2025-15317
Tanium addressed an uncontrolled resource consumption vulnerability in Tanium Se
|
| 33 |
CVE-2026-3934
Insufficient policy enforcement in ChromeDriver in Google Chrome prior to 146.0.
|
| 33 |
CVE-2026-5881
Policy bypass in LocalNetworkAccess in Google Chrome prior to 147.0.7727.55 allo
|
| 33 |
CVE-2026-33903
## Summary
Ella Core panics when processing a specially crafted NGAP LocationRe
|
| 33 |
CVE-2026-23481
Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, there
|
| 33 |
CVE-2025-47384
Transient DOS when MAC configures config id greater than supported maximum value
|
| 33 |
CVE-2026-34538
Apache Airflow versions 3.0.0 through 3.1.8 DagRun wait endpoint returns XCom re
|
| 33 |
CVE-2026-3255
HTTP::Session2 versions before 1.12 for Perl for Perl may generate weak session
|
| 33 |
CVE-2026-20110
A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated
|
| 33 |
CVE-2025-27904
IBM DB2 Recovery Expert for LUW 5.5 Interim Fix 002 IBM Db2 Recovery Expert for
|
| 33 |
CVE-2025-36018
IBM Concert 1.0.0 through 2.1.0 for Z hub component is vulnerable to cross-site
|
| 33 |
CVE-2026-33281
## Summary
Ella Core panics when processing NGAP messages with invalid PDU Sess
|
| 33 |
CVE-2026-33215
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native me
|
| 33 |
CVE-2026-1235
The WP eCommerce WordPress plugin through 3.15.1 unserializes user input via aja
|
| 33 |
CVE-2026-24324
SAP BusinessObjects Business Intelligence Platform (AdminTools) allows an authen
|
| 33 |
CVE-2026-25957
Cube is a semantic layer for building data applications. From 1.1.17 to before 1
|
| 33 |
CVE-2025-70050
An issue pertaining to CWE-312: Cleartext Storage of Sensitive Information was d
|
| 33 |
CVE-2024-50555
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-3846
Same-origin policy bypass in the CSS Parsing and Computation component. This vul
|
| 33 |
CVE-2025-59819
This vulnerability allows authenticated attackers to read an arbitrary file by c
|
| 33 |
CVE-2025-70311
JEEWMS 1.0 is vulnerable to SQL Injection. Attackers can inject malicious SQL st
|
| 33 |
CVE-2026-35492
### Impact
PartitionedDataset in kedro-datasets was vulnerable to path traversa
|
| 33 |
CVE-2026-32598
OneUptime is a solution for monitoring and managing online services. Prior to 10
|
| 33 |
CVE-2026-4749
NVD-CWE-noinfo vulnerability in albfan miraclecast.This issue affects miraclecas
|
| 33 |
CVE-2026-6080
The Tutor LMS plugin for WordPress is vulnerable to SQL Injection in versions up
|
| 33 |
CVE-2022-50980
A unauthenticated adjacent attacker could potentially disrupt operations by swit
|
| 33 |
CVE-2022-50979
An unauthenticated adjacent attacker could potentially disrupt operations by swi
|
| 33 |
CVE-2026-28522
arduino-TuyaOpen before version 1.2.1 contains a null pointer dereference vulner
|
| 33 |
CVE-2026-23564
A vulnerability in TeamViewer DEX Client (former 1E Client) - Content Distributi
|
| 33 |
CVE-2025-14559
A flaw was found in the keycloak-services component of Keycloak. This vulnerabil
|
| 33 |
CVE-2025-47374
Memory Corruption when accessing freed memory due to concurrent fence deregistra
|
| 33 |
CVE-2026-28863
A permissions issue was addressed with additional restrictions. This issue is fi
|
| 33 |
CVE-2026-34613
WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AV
|
| 33 |
CVE-2026-26994
uTLS is a fork of crypto/tls, created to customize ClientHello for fingerprintin
|
| 33 |
CVE-2026-26203
PJSIP is a free and open source multimedia communication library. Versions prior
|
| 33 |
CVE-2026-34611
WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AV
|
| 33 |
CVE-2026-24447
If a malformed data is input to the affected product, a CSV file downloaded from
|
| 33 |
CVE-2026-39366
WWBN AVideo is an open source video platform. In versions 26.0 and prior, the Pa
|
| 33 |
CVE-2026-24984
Missing Authorization vulnerability in Brecht Visual Link Preview visual-link-pr
|
| 33 |
CVE-2025-36375
IBM DataPower Gateway 10.6CD 10.6.1.0 through 10.6.5.0 and IBM DataPower Gateway
|
| 33 |
CVE-2026-25792
Greenshot is an open source Windows screenshot utility. Versions 1.3.312 and bel
|
| 33 |
CVE-2026-20419
In wlan AP/STA firmware, there is a possible system becoming irresponsive due to
|
| 33 |
CVE-2026-25627
NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. Prior to v
|
| 33 |
CVE-2026-33123
### Impact
An attacker who uses this vulnerability can craft a PDF which leads t
|
| 33 |
CVE-2026-0683
The SupportCandy - Helpdesk & Customer Support Ticket System plugin for WordPres
|
| 33 |
CVE-2026-33904
## Summary
A deadlock in the AMF's SCTP notification handler causes the entire
|
| 33 |
CVE-2025-30508
Improper authorization in the Intel(R) Quick Assist Technology for some Intel(R)
|
| 33 |
CVE-2026-28375
A testdata data-source can be used to trigger out-of-memory crashes in Grafana.
|
| 33 |
CVE-2026-27879
A resample query can be used to trigger out-of-memory crashes in Grafana.
|
| 33 |
CVE-2026-33375
The Grafana MSSQL data source plugin contains a logic flaw that allows a low-pri
|
| 33 |
CVE-2025-69196
While testing the OAuth Proxy implementation, it was noticed that the server doe
|
| 33 |
CVE-2025-68911
Missing Authorization vulnerability in solacewp Solace solace allows Exploiting
|
| 33 |
CVE-2025-68900
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
|
| 33 |
CVE-2026-23704
A non-administrative user can upload malicious files. When an administrator or t
|
| 33 |
CVE-2026-28282
Discourse is an open-source discussion platform. Versions prior to 2026.3.0-late
|
| 33 |
CVE-2025-53847
A missing authentication for critical function vulnerability in Fortinet FortiOS
|
| 33 |
CVE-2026-25036
Missing Authorization vulnerability in WP Chill Passster content-protector allow
|
| 33 |
CVE-2026-4666
The wpForo Forum plugin for WordPress is vulnerable to unauthorized modification
|
| 33 |
CVE-2026-3822
Taipower APP for Andorid developed by Taipower has an Improper Certificate Valid
|
| 33 |
CVE-2026-1672
The BEAR - Bulk Editor and Products Manager Professional for WooCommerce by Plug
|
| 33 |
CVE-2026-3119
Under certain conditions, `named` may crash when processing a correctly signed q
|
| 33 |
CVE-2026-20680
The issue was addressed with additional restrictions on the observability of app
|
| 33 |
CVE-2026-20800
Gitea's notification API does not re-validate repository access permissions when
|
| 33 |
CVE-2025-15341
Tanium addressed an incorrect default permissions vulnerability in Benchmark.
|
| 33 |
CVE-2025-15339
Tanium addressed an incorrect default permissions vulnerability in Discover.
|
| 33 |
CVE-2025-15338
Tanium addressed an incorrect default permissions vulnerability in Partner Integ
|
| 33 |
CVE-2025-14150
IBM webMethods Integration (on prem) - Integration Server 10.15 through IS_10.15
|
| 33 |
CVE-2025-12736
in OpenHarmony v5.0.3 and prior versions allow a local attacker case sensitive i
|
| 33 |
CVE-2026-1344
Tanium addressed an insecure file permissions vulnerability in Enforce Recovery
|
| 33 |
CVE-2026-20904
Gitea does not properly validate ownership when toggling OpenID URI visibility.
|
| 33 |
CVE-2026-20883
Gitea's stopwatch API does not re-validate repository access permissions. After
|
| 33 |
CVE-2026-25219
The `access_key` and `connection_string` connection properties were not marked a
|
| 33 |
CVE-2026-25565
WeKan versions prior to 8.19 contain an authorization vulnerability where certai
|
| 33 |
CVE-2026-27877
When using public dashboards and direct data-sources, all direct data-sources' p
|
| 33 |
CVE-2026-3125
A Server-Side Request Forgery (SSRF) vulnerability was identified in the @openne
|
| 33 |
CVE-2026-3861
LINE client for iOS versions prior to 26.3.0 contains a vulnerability in the in-
|
| 33 |
CVE-2025-48023
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa
|
| 33 |
CVE-2025-48022
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa
|
| 33 |
CVE-2025-48021
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa
|
| 33 |
CVE-2025-48020
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa
|
| 33 |
CVE-2025-48019
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa
|
| 33 |
CVE-2026-26012
vaultwarden is an unofficial Bitwarden compatible server written in Rust, former
|
| 33 |
CVE-2025-15400
The Pix para Woocommerce WordPress plugin through 2.13.3 allows any authenticat
|
| 33 |
CVE-2026-33345
solidtime is an open-source time-tracking app. Prior to version 0.11.6, the proj
|
| 33 |
CVE-2026-0484
Due to missing authorization check in SAP NetWeaver Application Server ABAP and
|
| 33 |
CVE-2025-12131
A truncated 802.15.4 packet can lead to an assert, resulting in a denial of serv
|
Oldest Unpatched Critical/High CVEs
| CVE | Severity | CVSS | Priority | Days Open |
|---|---|---|---|---|
| CVE-2024-3400 | CRITICAL | 10.0 | 224 | 735d |
| CVE-2019-19781 | CRITICAL | 9.8 | 223 | 2303d |
| CVE-2020-5902 | CRITICAL | 9.8 | 223 | 2116d |
| CVE-2021-35464 | CRITICAL | 9.8 | 223 | 1730d |
| CVE-2020-10189 | CRITICAL | 9.8 | 223 | 2233d |
| CVE-2012-4681 | CRITICAL | 9.8 | 223 | 4981d |
| CVE-2022-42475 | CRITICAL | 9.8 | 223 | 1201d |
| CVE-2023-3519 | CRITICAL | 9.8 | 223 | 1003d |
| CVE-2015-7450 | CRITICAL | 9.8 | 222 | 3758d |
| CVE-2023-34048 | CRITICAL | 9.8 | 222 | 905d |