Security Dashboard

Total CVEs
16287
last 90 days
Avg Priority
36.7
of max 220
KEV
42
actively exploited
POC
3308
public exploits
Unpatched
4708
CRIT/HIGH without patch
How is Priority Score calculated?

Priority Score is a composite risk metric (0-220) combining multiple real-world threat signals:

KEV +50
CISA Known Exploited Vulnerability — confirmed active exploitation in the wild
EPSS x100
Exploit Prediction Scoring System — probability of exploitation in next 30 days (0-100)
CVSS x5
Common Vulnerability Scoring System — technical severity (0-50)
POC +20
Public exploit code exists — lowers barrier for attackers
0-40 Low 40-80 Medium 80-120 High 120+ Critical
Priority CVE
39 CVE-2026-24291
Incorrect permission assignment for critical resource in Windows Accessibility I
39 CVE-2026-26160
Missing authentication for critical function in Windows Remote Desktop Licensing
39 CVE-2025-15062
Trimble SketchUp SKP File Parsing Use-After-Free Remote Code Execution Vulnerabi
39 CVE-2026-24294
Improper authentication in Windows SMB Server allows an authorized attacker to e
39 CVE-2026-26183
Improper access control in Windows RPC API allows an authorized attacker to elev
39 CVE-2026-26159
Missing authentication for critical function in Windows Remote Desktop Licensing
39 CVE-2026-24165
NVIDIA BioNeMo contains a vulnerability where a user could cause a deserializati
39 CVE-2026-25190
Untrusted search path in Windows GDI allows an unauthorized attacker to execute
39 CVE-2026-26738
Buffer Overflow vulnerability in Uderzo Software SpaceSniffer v.2.0.5.18 allows
39 CVE-2026-26181
Use after free in Microsoft Brokering File System allows an authorized attacker
39 CVE-2026-32183
Improper neutralization of special elements used in a command ('command injectio
39 CVE-2026-20930
Concurrent execution using shared resource with improper synchronization ('race
39 CVE-2026-26168
Concurrent execution using shared resource with improper synchronization ('race
39 CVE-2026-30309
InfCode's terminal auto-execution module contains a critical command filtering v
39 CVE-2024-56808
A command injection vulnerability has been reported to affect Media Streaming ad
39 CVE-2026-2034
Sante DICOM Viewer Pro DCM File Parsing Buffer Overflow Remote Code Execution Vu
39 CVE-2026-5496
Labcenter Electronics Proteus PDSPRJ File Parsing Type Confusion Remote Code Exe
39 CVE-2026-5493
Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Cod
39 CVE-2026-5494
Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Cod
39 CVE-2026-5495
Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Cod
39 CVE-2026-25175
Out-of-bounds read in Windows NTFS allows an authorized attacker to elevate priv
39 CVE-2026-23665
Heap-based buffer overflow in Azure Linux Virtual Machines allows an authorized
39 CVE-2026-24292
Use after free in Connected Devices Platform Service (Cdpsvc) allows an authoriz
39 CVE-2026-24293
Null pointer dereference in Windows Ancillary Function Driver for WinSock allows
39 CVE-2026-25165
Null pointer dereference in Windows Performance Counters allows an authorized at
39 CVE-2026-25174
Out-of-bounds read in Windows Extensible File Allocation allows an authorized at
39 CVE-2026-33098
Use after free in Windows Container Isolation FS Filter Driver allows an authori
39 CVE-2026-33101
Use after free in Windows Print Spooler Components allows an authorized attacker
39 CVE-2026-32155
Use after free in Desktop Window Manager allows an authorized attacker to elevat
39 CVE-2026-32078
Use after free in Windows Projected File System allows an authorized attacker to
39 CVE-2026-32077
Untrusted pointer dereference in Windows Universal Plug and Play (UPnP) Device H
39 CVE-2026-32076
Out-of-bounds read in Windows Storage Spaces Controller allows an authorized att
39 CVE-2026-32074
Double free in Windows Projected File System allows an authorized attacker to el
39 CVE-2026-32069
Double free in Windows Projected File System allows an authorized attacker to el
39 CVE-2026-27923
Use after free in Desktop Window Manager allows an authorized attacker to elevat
39 CVE-2026-27920
Untrusted pointer dereference in Windows Universal Plug and Play (UPnP) Device H
39 CVE-2026-27916
Use after free in Windows Universal Plug and Play (UPnP) Device Host allows an a
39 CVE-2026-32222
Untrusted pointer dereference in Windows Win32K - ICOMP allows an authorized att
39 CVE-2026-32154
Use after free in Desktop Window Manager allows an authorized attacker to elevat
39 CVE-2026-32152
Use after free in Desktop Window Manager allows an authorized attacker to elevat
39 CVE-2026-27924
Use after free in Desktop Window Manager allows an authorized attacker to elevat
39 CVE-2026-27919
Untrusted pointer dereference in Windows Universal Plug and Play (UPnP) Device H
39 CVE-2026-27915
Use after free in Windows Universal Plug and Play (UPnP) Device Host allows an a
39 CVE-2026-27749
Avira Internet Security contains a deserialization of untrusted data vulnerabili
39 CVE-2026-25189
Use after free in Windows DWM Core Library allows an authorized attacker to elev
39 CVE-2026-23672
Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege V
39 CVE-2026-23074
In the Linux kernel, the following vulnerability has been resolved: net/sched:
39 CVE-2026-23078
In the Linux kernel, the following vulnerability has been resolved: ALSA: scarl
39 CVE-2026-25176
Improper access control in Windows Ancillary Function Driver for WinSock allows
39 CVE-2026-23660
Improper access control in Azure Portal Windows Admin Center allows an authorize
39 CVE-2026-26131
Incorrect default permissions in .NET allows an authorized attacker to elevate p
39 CVE-2026-29139
SEPPmail Secure Email Gateway before version 15.0.3 allows account takeover by a
39 CVE-2026-30232
Chartbrew is an open-source web application that can connect directly to databas
39 CVE-2026-33298
llama.cpp is an inference of several LLM models in C/C++. Prior to b7824, an int
39 CVE-2026-26141
Improper authentication in Azure Arc allows an authorized attacker to elevate pr
39 CVE-2026-27927
Concurrent execution using shared resource with improper synchronization ('race
39 CVE-2026-26117
Authentication bypass using an alternate path or channel in Azure Windows Virtua
39 CVE-2026-32153
Use after free in Microsoft Windows Speech allows an authorized attacker to elev
39 CVE-2026-27918
Concurrent execution using shared resource with improper synchronization ('race
39 CVE-2026-32090
Concurrent execution using shared resource with improper synchronization ('race
39 CVE-2026-32089
Use after free in Windows Speech Brokered Api allows an authorized attacker to e
39 CVE-2026-26128
Improper authentication in Windows SMB Server allows an authorized attacker to e
39 CVE-2026-24290
Improper access control in Windows Projected File System allows an authorized at
39 CVE-2026-32857
Firecrawl version 2.8.0 and prior contain a server-side request forgery (SSRF) p
39 CVE-2026-20610
This issue was addressed with improved handling of symlinks. This issue is fixed
39 CVE-2026-32165
Use after free in Windows User Interface Core allows an authorized attacker to e
39 CVE-2026-32163
Concurrent execution using shared resource with improper synchronization ('race
39 CVE-2026-27911
Concurrent execution using shared resource with improper synchronization ('race
39 CVE-2026-32164
Concurrent execution using shared resource with improper synchronization ('race
39 CVE-2026-23083
In the Linux kernel, the following vulnerability has been resolved: fou: Don't
39 CVE-2026-23073
In the Linux kernel, the following vulnerability has been resolved: wifi: rsi:
39 CVE-2025-33246
NVIDIA NeMo Framework for all platforms contains a vulnerability in the ASR Eval
39 CVE-2026-23089
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-a
39 CVE-2026-23103
In the Linux kernel, the following vulnerability has been resolved: ipvlan: Mak
39 CVE-2026-23105
In the Linux kernel, the following vulnerability has been resolved: net/sched:
39 CVE-2026-21352
DNG SDK versions 1.7.1 2410 and earlier are affected by an out-of-bounds write v
39 CVE-2026-21349
Lightroom Desktop versions 15.1 and earlier are affected by an out-of-bounds wri
39 CVE-2026-21346
Bridge versions 15.1.3, 16.0.1 and earlier are affected by an out-of-bounds writ
39 CVE-2026-21341
Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds
39 CVE-2026-27278
Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are
39 CVE-2026-27292
Adobe Framemaker versions 2022.8 and earlier are affected by a Use After Free vu
39 CVE-2026-27220
Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are
39 CVE-2026-27309
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free
39 CVE-2026-27276
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free
39 CVE-2026-27277
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free
39 CVE-2026-27283
InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Use After F
39 CVE-2026-23216
In the Linux kernel, the following vulnerability has been resolved: scsi: targe
39 CVE-2026-23221
In the Linux kernel, the following vulnerability has been resolved: bus: fsl-mc
39 CVE-2026-23222
In the Linux kernel, the following vulnerability has been resolved: crypto: oma
39 CVE-2026-23111
In the Linux kernel, the following vulnerability has been resolved: netfilter:

Oldest Unpatched Critical/High CVEs

CVE Severity CVSS Priority Days Open
CVE-2024-3400 CRITICAL 10.0 224 738d
CVE-2019-19781 CRITICAL 9.8 223 2306d
CVE-2020-5902 CRITICAL 9.8 223 2119d
CVE-2021-35464 CRITICAL 9.8 223 1733d
CVE-2020-10189 CRITICAL 9.8 223 2236d
CVE-2012-4681 CRITICAL 9.8 223 4983d
CVE-2022-42475 CRITICAL 9.8 223 1204d
CVE-2023-3519 CRITICAL 9.8 223 1006d
CVE-2015-7450 CRITICAL 9.8 222 3760d
CVE-2023-34048 CRITICAL 9.8 222 908d
Prev 40 / 68 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy