Total CVEs
16300
last 90 days
Avg Priority
36.8
of max 220
KEV
42
actively exploited
POC
3306
public exploits
Unpatched
4707
CRIT/HIGH without patch
How is Priority Score calculated?
Priority Score is a composite risk metric (0-220) combining multiple real-world threat signals:
KEV +50
CISA Known Exploited Vulnerability — confirmed active exploitation in the wild
EPSS x100
Exploit Prediction Scoring System — probability of exploitation in next 30 days (0-100)
CVSS x5
Common Vulnerability Scoring System — technical severity (0-50)
POC +20
Public exploit code exists — lowers barrier for attackers
0-40 Low
40-80 Medium
80-120 High
120+ Critical
Patch Now — Known Exploited Vulnerabilities
194
CVE-2026-24061
telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for t
185
CVE-2026-1731
BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain
184
CVE-2026-23760
SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability
180
CVE-2025-40551
SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerabil
170
CVE-2026-1340
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated rem
164
CVE-2026-1281
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated rem
160
CVE-2025-40536
SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that
141
CVE-2026-20131
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FM
137
CVE-2026-1603
An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthen
134
CVE-2026-22769
Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credentia
Priority Distribution
| Priority | CVE |
|---|---|
| 28 |
CVE-2025-71150
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: Fix
|
| 28 |
CVE-2026-3777
The application does not properly validate the lifetime and validity of internal
|
| 28 |
CVE-2026-22989
In the Linux kernel, the following vulnerability has been resolved:
nfsd: check
|
| 28 |
CVE-2025-33237
NVIDIA HD Audio Driver for Windows contains a vulnerability where an attacker co
|
| 28 |
CVE-2026-22988
In the Linux kernel, the following vulnerability has been resolved:
arp: do not
|
| 28 |
CVE-2026-27003
OpenClaw is a personal AI assistant. Telegram bot tokens can appear in error mes
|
| 28 |
CVE-2026-28892
A permissions issue was addressed by removing the vulnerable code. This issue is
|
| 28 |
CVE-2026-30986
iccDEV provides a set of libraries and tools for working with ICC color manageme
|
| 28 |
CVE-2024-56807
An out-of-bounds read vulnerability has been reported to affect Media Streaming
|
| 28 |
CVE-2025-32735
Improper conditions check in some firmware for some Intel(R) NPU Drivers within
|
| 28 |
CVE-2025-69645
Binutils objdump contains a denial-of-service vulnerability when processing a cr
|
| 28 |
CVE-2024-36316
The integer overflow vulnerability within AMD Graphics driver could allow an att
|
| 28 |
CVE-2025-69646
Binutils objdump contains a denial-of-service vulnerability when processing a cr
|
| 28 |
CVE-2026-20618
An issue was addressed with improved handling of temporary files. This issue is
|
| 28 |
CVE-2026-28725
Sensitive information disclosure due to improper configuration of a headless bro
|
| 28 |
CVE-2026-27815
EVerest is an EV charging software stack. Prior to versions to 2026.02.0, ISO151
|
| 28 |
CVE-2026-27816
EVerest is an EV charging software stack. Prior to versions to 2026.02.0, ISO151
|
| 28 |
CVE-2026-27828
EVerest is an EV charging software stack. Prior to versions to 2026.02.0, ISO151
|
| 28 |
CVE-2026-23005
In the Linux kernel, the following vulnerability has been resolved:
x86/fpu: Cl
|
| 28 |
CVE-2025-43417
A path handling issue was addressed with improved logic. This issue is fixed in
|
| 28 |
CVE-2025-71183
In the Linux kernel, the following vulnerability has been resolved:
btrfs: alwa
|
| 28 |
CVE-2026-28829
A permissions issue was addressed with additional restrictions. This issue is fi
|
| 28 |
CVE-2026-3776
The application does not validate the presence of required appearance (AP) data
|
| 28 |
CVE-2026-32836
dr_libs version 0.13.3 and earlier contain an uncontrolled memory allocation vul
|
| 28 |
CVE-2026-20648
A privacy issue was addressed by moving sensitive data to a protected location.
|
| 28 |
CVE-2026-20647
This issue was addressed with improved data protection. This issue is fixed in m
|
| 28 |
CVE-2026-20638
A logic issue was addressed with improved checks. This issue is fixed in iOS 26.
|
| 28 |
CVE-2026-20623
A permissions issue was addressed by removing the vulnerable code. This issue is
|
| 28 |
CVE-2025-14876
A flaw was found in the virtio-crypto device of QEMU. A malicious guest operatin
|
| 28 |
CVE-2025-54149
An uncontrolled resource consumption vulnerability has been reported to affect Q
|
| 28 |
CVE-2026-33855
Integer Overflow or Wraparound vulnerability in MolotovCherry Android-ImageMagic
|
| 28 |
CVE-2026-21991
A DTrace component, dtprobed, allows arbitrary file creation through crafted USD
|
| 28 |
CVE-2025-65116
Buffer Overflow Vulnerability in JP1/IT Desktop Management 2 - Manager on Window
|
| 28 |
CVE-2026-26949
Dell Device Management Agent (DDMA), versions prior to 26.02, contain an Incorre
|
| 28 |
CVE-2026-20629
A privacy issue was addressed with improved handling of temporary files. This is
|
| 28 |
CVE-2026-4897
A flaw was found in polkit. A local user can exploit this by providing a special
|
| 28 |
CVE-2026-20666
An authorization issue was addressed with improved state management. This issue
|
| 28 |
CVE-2026-26097
Uncontrolled Search Path Element in Owl opds 2.2.0.4 allows Leveraging/Manipulat
|
| 28 |
CVE-2026-5745
A flaw was found in libarchive. A NULL pointer dereference vulnerability exists
|
| 28 |
CVE-2026-26096
Incorrect Permission Assignment for Critical Resource in Owl opds 2.2.0.4 allows
|
| 28 |
CVE-2026-1653
A potential divide by zero vulnerability was reported in the Lenovo Virtual Bus
|
| 28 |
CVE-2026-40918
A flaw was found in GIMP. Processing a specially crafted PVR image file with lar
|
| 28 |
CVE-2026-20608
This issue was addressed through improved state management. This issue is fixed
|
| 28 |
CVE-2026-26095
Incorrect Permission Assignment for Critical Resource in Owl opds 2.2.0.4 allows
|
| 28 |
CVE-2025-54151
An uncontrolled resource consumption vulnerability has been reported to affect Q
|
| 28 |
CVE-2026-25918
unity-cli is a command line utility for the Unity Game Engine. Prior to 1.8.2 ,
|
| 28 |
CVE-2025-54150
An uncontrolled resource consumption vulnerability has been reported to affect Q
|
| 28 |
CVE-2026-26099
Uncontrolled Search Path Element in Owl opds 2.2.0.4 allows Leveraging/Manipulat
|
| 28 |
CVE-2026-31961
Quill provides simple mac binary signing and notarization from any platform. Qui
|
| 28 |
CVE-2026-26100
Incorrect Permission Assignment for Critical Resource in Owl opds 2.2.0.4 allows
|
| 28 |
CVE-2026-26098
Uncontrolled Search Path Element in Owl opds 2.2.0.4 allows Leveraging/Manipulat
|
| 28 |
CVE-2026-4270
Improper Protection of Alternate Path exists in the no-access and workdir featur
|
| 28 |
CVE-2026-30936
ImageMagick is free and open-source software used for editing and manipulating d
|
| 28 |
CVE-2026-20675
The issue was addressed with improved bounds checks. This issue is fixed in watc
|
| 28 |
CVE-2026-33853
NULL Pointer Dereference vulnerability in MolotovCherry Android-ImageMagick7.Thi
|
| 28 |
CVE-2026-31826
pypdf is a free and open-source pure-python PDF library. Prior to 6.8.0, an atta
|
| 28 |
CVE-2026-27025
pypdf is a free and open-source pure-python PDF library. Prior to 6.7.1, an atta
|
| 28 |
CVE-2026-31794
iccDEV provides a set of libraries and tools for working with ICC color manageme
|
| 28 |
CVE-2026-31793
iccDEV provides a set of libraries and tools for working with ICC color manageme
|
| 28 |
CVE-2026-30980
iccDEV provides a set of libraries and tools for working with ICC color manageme
|
| 28 |
CVE-2026-34447
Open Neural Network Exchange (ONNX) is an open standard for machine learning int
|
| 28 |
CVE-2026-34933
Avahi is a system which facilitates service discovery on a local network via the
|
| 28 |
CVE-2026-28267
Multiple i-フィルター products are configured with improper file access permission se
|
| 28 |
CVE-2026-20602
The issue was addressed with improved handling of caches. This issue is fixed in
|
| 28 |
CVE-2026-33165
libde265 is an open source implementation of the h.265 video codec. Prior to ver
|
| 28 |
CVE-2025-9497
Use of Hard-coded Credentials vulnerability in Microchip Time Provider 4100 allo
|
| 28 |
CVE-2026-40310
ImageMagick is free and open-source software used for editing and manipulating d
|
| 28 |
CVE-2026-40183
ImageMagick is free and open-source software used for editing and manipulating d
|
| 28 |
CVE-2026-33905
ImageMagick is free and open-source software used for editing and manipulating d
|
| 28 |
CVE-2025-46306
The issue was addressed with improved bounds checks. This issue is fixed in macO
|
| 28 |
CVE-2026-20621
The issue was addressed with improved memory handling. This issue is fixed in ma
|
| 28 |
CVE-2026-2640
During an internal security assessment, a potential vulnerability was discovered
|
| 28 |
CVE-2026-20634
The issue was addressed with improved memory handling. This issue is fixed in wa
|
| 28 |
CVE-2025-52458
in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code e
|
| 28 |
CVE-2025-41432
in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code e
|
| 28 |
CVE-2026-20654
The issue was addressed with improved memory handling. This issue is fixed in wa
|
| 28 |
CVE-2026-33902
ImageMagick is free and open-source software used for editing and manipulating d
|
| 28 |
CVE-2026-27026
pypdf is a free and open-source pure-python PDF library. Prior to 6.7.1, an atta
|
| 28 |
CVE-2026-27024
pypdf is a free and open-source pure-python PDF library. Prior to 6.7.1, an atta
|
| 28 |
CVE-2025-61143
libtiff up to v4.7.1 was discovered to contain a NULL pointer dereference via th
|
| 28 |
CVE-2026-20624
An injection issue was addressed with improved validation. This issue is fixed i
|
| 28 |
CVE-2026-34730
### Summary
Copier's `_external_data` feature allows a template to load YAML fi
|
| 28 |
CVE-2026-23006
In the Linux kernel, the following vulnerability has been resolved:
ASoC: tlv32
|
| 28 |
CVE-2025-15313
Tanium addressed an arbitrary file deletion vulnerability in Tanium EUSS.
|
| 28 |
CVE-2025-43403
An authorization issue was addressed with improved state management. This issue
|
| 28 |
CVE-2026-20619
A logging issue was addressed with improved data redaction. This issue is fixed
|
| 28 |
CVE-2026-32810
Halloy is an IRC application written in Rust. In versions on \*nix and macOS pri
|
| 28 |
CVE-2026-20612
A privacy issue was addressed with improved checks. This issue is fixed in macOS
|
| 28 |
CVE-2026-20630
A permissions issue was addressed with additional restrictions. This issue is fi
|
| 28 |
CVE-2026-20678
An authorization issue was addressed with improved state management. This issue
|
Oldest Unpatched Critical/High CVEs
| CVE | Severity | CVSS | Priority | Days Open |
|---|---|---|---|---|
| CVE-2024-3400 | CRITICAL | 10.0 | 224 | 738d |
| CVE-2019-19781 | CRITICAL | 9.8 | 223 | 2306d |
| CVE-2020-5902 | CRITICAL | 9.8 | 223 | 2119d |
| CVE-2021-35464 | CRITICAL | 9.8 | 223 | 1733d |
| CVE-2020-10189 | CRITICAL | 9.8 | 223 | 2236d |
| CVE-2012-4681 | CRITICAL | 9.8 | 223 | 4984d |
| CVE-2022-42475 | CRITICAL | 9.8 | 223 | 1204d |
| CVE-2023-3519 | CRITICAL | 9.8 | 223 | 1006d |
| CVE-2015-7450 | CRITICAL | 9.8 | 222 | 3761d |
| CVE-2023-34048 | CRITICAL | 9.8 | 222 | 908d |