Security Dashboard

Total CVEs
16360
last 90 days
Avg Priority
36.3
of max 220
KEV
40
actively exploited
POC
3235
public exploits
Unpatched
4336
CRIT/HIGH without patch
How is Priority Score calculated?

Priority Score is a composite risk metric (0-220) combining multiple real-world threat signals:

KEV +50
CISA Known Exploited Vulnerability — confirmed active exploitation in the wild
EPSS x100
Exploit Prediction Scoring System — probability of exploitation in next 30 days (0-100)
CVSS x5
Common Vulnerability Scoring System — technical severity (0-50)
POC +20
Public exploit code exists — lowers barrier for attackers
0-40 Low 40-80 Medium 80-120 High 120+ Critical
Priority CVE
38 CVE-2026-22754
Vulnerability in Spring Spring Security. If an application uses <sec:intercept-u
38 CVE-2026-33894
## Summary RSASSA PKCS#1 v1.5 signature verification accepts forged signatures f
38 CVE-2026-33870
## Summary Netty incorrectly parses quoted strings in HTTP/1.1 chunked transfer
38 CVE-2026-28389
Issue summary: During processing of a crafted CMS EnvelopedData message with Key
38 CVE-2026-6782
Information disclosure in the IP Protection component. This vulnerability was fi
38 CVE-2026-31830
sigstore-ruby is a pure Ruby implementation of the sigstore verify command from
38 CVE-2026-23782
An issue was discovered in BMC Control-M/MFT 9.0.20 through 9.0.22. An API manag
38 CVE-2026-30244
Plane is an an open-source project management tool. Prior to version 1.2.2, unau
38 CVE-2026-3124
The Download Monitor plugin for WordPress is vulnerable to Insecure Direct Objec
38 CVE-2026-28876
A parsing issue in the handling of directory paths was addressed with improved p
38 CVE-2026-25312
Missing Authorization vulnerability in EventPrime allows Exploiting Incorrectly
38 CVE-2026-32546
Missing Authorization vulnerability in StellarWP Restrict Content restrict-conte
38 CVE-2026-6372
Missing Authorization vulnerability in Plisio Accept Cryptocurrencies with Plisi
38 CVE-2026-40869
### Impact The vulnerability allows any registered and authenticated user to acc
38 CVE-2026-1947
The NEX-Forms - Ultimate Forms Plugin for WordPress plugin for WordPress is vuln
38 CVE-2026-2285
CrewAI contains a arbitrary local file read vulnerability in the JSON loader too
38 CVE-2026-20649
A logging issue was addressed with improved data redaction. This issue is fixed
38 CVE-2025-70954
A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM)
38 CVE-2026-33540
Distribution is a toolkit to pack, ship, store, and deliver container content. P
38 CVE-2026-2319
Race in DevTools in Google Chrome prior to 145.0.7632.45 allowed a remote attack
38 CVE-2026-32297
The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary
38 CVE-2026-3338
Improper signature validation in PKCS7_verify() in AWS-LC allows an unauthentica
38 CVE-2026-34209
### Impact The `tempo/session` cooperative close handler validated the close vo
38 CVE-2026-25397
Path Traversal: '.../...//' vulnerability in Snowray Software File Uploader for
38 CVE-2026-5756
Unauthenticated Configuration File Modification Vulnerability in DRC Central Off
38 CVE-2026-4748
A regression in the way hashes were calculated caused rules containing the addre
38 CVE-2026-33034
An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4
38 CVE-2026-26315
go-ethereum (Geth) is a golang execution layer implementation of the Ethereum pr
38 CVE-2026-3029
A path traversal and arbitrary file write vulnerability exist in the embedded ge
38 CVE-2026-33143
### Summary The WhatsApp POST webhook handler (`/notification/whatsapp/webhook`
38 CVE-2026-24735
Exposure of Private Personal Information to an Unauthorized Actor vulnerability
38 CVE-2026-2093
Docpedia developed by Flowring has a SQL Injection vulnerability, allowing unaut
38 CVE-2026-23242
In the Linux kernel, the following vulnerability has been resolved: RDMA/siw: F
38 CVE-2025-22453
Improper input validation for some Server Firmware Update Utility(SysFwUpdt) bef
38 CVE-2026-25002
Authentication Bypass Using an Alternate Path or Channel vulnerability in ThimPr
38 CVE-2026-24372
Authentication Bypass by Spoofing vulnerability in WP Swings Subscriptions for W
38 CVE-2026-25998
strongMan is a management interface for strongSwan, an OpenSource IPsec-based VP
38 CVE-2026-2328
An unauthenticated remote attacker can exploit insufficient input validation to
38 CVE-2025-69654
A crafted JavaScript input executed with the QuickJS release 2025-09-13, fixed i
38 CVE-2026-2428
The Fluent Forms Pro Add On Pack plugin for WordPress is vulnerable to Insuffici
38 CVE-2025-70955
A Stack Overflow vulnerability was discovered in the TON Virtual Machine (TVM) b
38 CVE-2026-23136
In the Linux kernel, the following vulnerability has been resolved: libceph: re
38 CVE-2026-34824
### Summary An uncontrolled resource consumption vulnerability exists in the Web
38 CVE-2026-5440
A memory exhaustion vulnerability exists in the HTTP server due to unbounded use
38 CVE-2026-3588
A server-side request forgery (SSRF) vulnerability in IKEA Dirigera v2.866.4 all
38 CVE-2026-30910
Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overf
38 CVE-2026-23148
In the Linux kernel, the following vulnerability has been resolved: nvmet: fix
38 CVE-2025-70029
An issue in Sunbird-Ed SunbirdEd-portal v1.13.4 allows attackers to obtain sensi
38 CVE-2026-1368
The Video Conferencing with Zoom WordPress plugin before 4.6.6 contains an AJAX
38 CVE-2025-65753
An issue in the TLS certification mechanism of Guardian Gryphon v01.06.0006.22 a
38 CVE-2025-12664
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.0
38 CVE-2026-25751
FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An inf
38 CVE-2026-22866
Ethereum Name Service (ENS) is a distributed, open, and extensible naming system
38 CVE-2026-24455
The embedded web interface of the device does not support HTTPS/TLS for authent
38 CVE-2025-67853
A flaw was found in Moodle. A remote attacker could exploit a lack of proper rat
38 CVE-2026-30791
Use of a Broken or Risky Cryptographic Algorithm vulnerability in rustdesk-clien
38 CVE-2026-1616
The $uri$args concatenation in nginx configuration file present in Open Security
38 CVE-2026-4258
All versions of the package sjcl are vulnerable to Improper Verification of Cryp
38 CVE-2026-32274
Black is the uncompromising Python code formatter. Prior to 26.3.1, Black writes
38 CVE-2026-22448
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v
38 CVE-2026-32614
## Overview The current SM9 decryption implementation contains an infinity-poin
38 CVE-2026-1069
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.9
38 CVE-2025-62601
Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard
38 CVE-2025-59439
An issue was discovered in Samsung Mobile Processor, Wearable Processor and Mode
38 CVE-2026-33487
goxmlsig provides XML Digital Signatures implemented in Go. Prior to version 1.6
38 CVE-2026-2673
Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected pref
38 CVE-2025-70048
An issue pertaining to CWE-319: Cleartext Transmission of Sensitive Information
38 CVE-2025-62602
Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard
38 CVE-2025-69240
Raytha CMS allows an attacker to spoof `X-Forwarded-Host` or `Host` headers to a
38 CVE-2026-28498
## 1. Executive Summary A critical library-level vulnerability was identified i
38 CVE-2026-25223
Fastify is a fast and low overhead web framework, for Node.js. Prior to version
38 CVE-2026-4652
On a system exposing an NVMe/TCP target, a remote client can trigger a kernel pa
38 CVE-2026-22260
Suricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and pri
38 CVE-2026-29784
Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, in
38 CVE-2026-33242
### Details A Path Traversal and Access Control Bypass vulnerability was discov
38 CVE-2026-33813
Parsing a WEBP image with an invalid, large size panics on 32-bit platforms.
38 CVE-2026-24308
Improper handling of configuration values in ZKConfig in Apache ZooKeeper 3.8.5
38 CVE-2026-4685
Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerab
38 CVE-2025-67841
Nordic Semiconductor IronSide SE for nRF54H20 before 23.0.2+17 has an Algorithmi
38 CVE-2026-4686
Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerab
38 CVE-2026-4693
Incorrect boundary conditions in the Audio/Video: Playback component. This vulne
38 CVE-2026-4699
Incorrect boundary conditions in the Layout: Text and Fonts component. This vuln
38 CVE-2026-4706
Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerab
38 CVE-2026-29146
Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default
38 CVE-2026-4707
Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerab
38 CVE-2026-4709
Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerabil
38 CVE-2026-28779
Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is
38 CVE-2026-6756
Mitigation bypass in Firefox for Android. This vulnerability was fixed in Firefo
38 CVE-2026-34483
Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve
38 CVE-2026-23948
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0

Oldest Unpatched Critical/High CVEs

CVE Severity CVSS Priority Days Open
CVE-2024-3400 CRITICAL 10.0 224 741d
CVE-2019-19781 CRITICAL 9.8 223 2309d
CVE-2020-5902 CRITICAL 9.8 223 2121d
CVE-2021-35464 CRITICAL 9.8 223 1735d
CVE-2020-10189 CRITICAL 9.8 223 2238d
CVE-2012-4681 CRITICAL 9.8 223 4986d
CVE-2022-42475 CRITICAL 9.8 223 1207d
CVE-2023-3519 CRITICAL 9.8 223 1008d
CVE-2015-7450 CRITICAL 9.8 222 3763d
CVE-2023-34048 CRITICAL 9.8 222 910d
Prev 53 / 67 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy