Total CVEs
16360
last 90 days
Avg Priority
36.3
of max 220
KEV
40
actively exploited
POC
3235
public exploits
Unpatched
4336
CRIT/HIGH without patch
How is Priority Score calculated?
Priority Score is a composite risk metric (0-220) combining multiple real-world threat signals:
KEV +50
CISA Known Exploited Vulnerability — confirmed active exploitation in the wild
EPSS x100
Exploit Prediction Scoring System — probability of exploitation in next 30 days (0-100)
CVSS x5
Common Vulnerability Scoring System — technical severity (0-50)
POC +20
Public exploit code exists — lowers barrier for attackers
0-40 Low
40-80 Medium
80-120 High
120+ Critical
Patch Now — Known Exploited Vulnerabilities
185
CVE-2026-1731
BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain
180
CVE-2025-40551
SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerabil
170
CVE-2026-1340
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated rem
164
CVE-2026-1281
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated rem
160
CVE-2025-40536
SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that
141
CVE-2026-20131
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FM
137
CVE-2026-1603
An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthen
134
CVE-2026-22769
Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credentia
129
CVE-2026-33825
Insufficient granularity of access control in Microsoft Defender allows an authorized attacker to el
128
CVE-2026-24423
SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code executi
Priority Distribution
| Priority | CVE |
|---|---|
| 38 |
CVE-2026-22754
Vulnerability in Spring Spring Security. If an application uses <sec:intercept-u
|
| 38 |
CVE-2026-33894
## Summary
RSASSA PKCS#1 v1.5 signature verification accepts forged signatures f
|
| 38 |
CVE-2026-33870
## Summary
Netty incorrectly parses quoted strings in HTTP/1.1 chunked transfer
|
| 38 |
CVE-2026-28389
Issue summary: During processing of a crafted CMS EnvelopedData message
with Key
|
| 38 |
CVE-2026-6782
Information disclosure in the IP Protection component. This vulnerability was fi
|
| 38 |
CVE-2026-31830
sigstore-ruby is a pure Ruby implementation of the sigstore verify command from
|
| 38 |
CVE-2026-23782
An issue was discovered in BMC Control-M/MFT 9.0.20 through 9.0.22. An API manag
|
| 38 |
CVE-2026-30244
Plane is an an open-source project management tool. Prior to version 1.2.2, unau
|
| 38 |
CVE-2026-3124
The Download Monitor plugin for WordPress is vulnerable to Insecure Direct Objec
|
| 38 |
CVE-2026-28876
A parsing issue in the handling of directory paths was addressed with improved p
|
| 38 |
CVE-2026-25312
Missing Authorization vulnerability in EventPrime allows Exploiting Incorrectly
|
| 38 |
CVE-2026-32546
Missing Authorization vulnerability in StellarWP Restrict Content restrict-conte
|
| 38 |
CVE-2026-6372
Missing Authorization vulnerability in Plisio Accept Cryptocurrencies with Plisi
|
| 38 |
CVE-2026-40869
### Impact
The vulnerability allows any registered and authenticated user to acc
|
| 38 |
CVE-2026-1947
The NEX-Forms - Ultimate Forms Plugin for WordPress plugin for WordPress is vuln
|
| 38 |
CVE-2026-2285
CrewAI contains a arbitrary local file read vulnerability in the JSON loader too
|
| 38 |
CVE-2026-20649
A logging issue was addressed with improved data redaction. This issue is fixed
|
| 38 |
CVE-2025-70954
A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM)
|
| 38 |
CVE-2026-33540
Distribution is a toolkit to pack, ship, store, and deliver container content. P
|
| 38 |
CVE-2026-2319
Race in DevTools in Google Chrome prior to 145.0.7632.45 allowed a remote attack
|
| 38 |
CVE-2026-32297
The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary
|
| 38 |
CVE-2026-3338
Improper signature validation in PKCS7_verify() in AWS-LC allows an unauthentica
|
| 38 |
CVE-2026-34209
### Impact
The `tempo/session` cooperative close handler validated the close vo
|
| 38 |
CVE-2026-25397
Path Traversal: '.../...//' vulnerability in Snowray Software File Uploader for
|
| 38 |
CVE-2026-5756
Unauthenticated Configuration File Modification Vulnerability in DRC Central Off
|
| 38 |
CVE-2026-4748
A regression in the way hashes were calculated caused rules containing the addre
|
| 38 |
CVE-2026-33034
An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4
|
| 38 |
CVE-2026-26315
go-ethereum (Geth) is a golang execution layer implementation of the Ethereum pr
|
| 38 |
CVE-2026-3029
A path traversal and arbitrary file write vulnerability exist in the embedded ge
|
| 38 |
CVE-2026-33143
### Summary
The WhatsApp POST webhook handler (`/notification/whatsapp/webhook`
|
| 38 |
CVE-2026-24735
Exposure of Private Personal Information to an Unauthorized Actor vulnerability
|
| 38 |
CVE-2026-2093
Docpedia developed by Flowring has a SQL Injection vulnerability, allowing unaut
|
| 38 |
CVE-2026-23242
In the Linux kernel, the following vulnerability has been resolved:
RDMA/siw: F
|
| 38 |
CVE-2025-22453
Improper input validation for some Server Firmware Update Utility(SysFwUpdt) bef
|
| 38 |
CVE-2026-25002
Authentication Bypass Using an Alternate Path or Channel vulnerability in ThimPr
|
| 38 |
CVE-2026-24372
Authentication Bypass by Spoofing vulnerability in WP Swings Subscriptions for W
|
| 38 |
CVE-2026-25998
strongMan is a management interface for strongSwan, an OpenSource IPsec-based VP
|
| 38 |
CVE-2026-2328
An unauthenticated remote attacker can exploit insufficient input validation to
|
| 38 |
CVE-2025-69654
A crafted JavaScript input executed with the QuickJS release 2025-09-13, fixed i
|
| 38 |
CVE-2026-2428
The Fluent Forms Pro Add On Pack plugin for WordPress is vulnerable to Insuffici
|
| 38 |
CVE-2025-70955
A Stack Overflow vulnerability was discovered in the TON Virtual Machine (TVM) b
|
| 38 |
CVE-2026-23136
In the Linux kernel, the following vulnerability has been resolved:
libceph: re
|
| 38 |
CVE-2026-34824
### Summary
An uncontrolled resource consumption vulnerability exists in the Web
|
| 38 |
CVE-2026-5440
A memory exhaustion vulnerability exists in the HTTP server due to unbounded use
|
| 38 |
CVE-2026-3588
A server-side request forgery (SSRF) vulnerability in IKEA Dirigera v2.866.4 all
|
| 38 |
CVE-2026-30910
Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overf
|
| 38 |
CVE-2026-23148
In the Linux kernel, the following vulnerability has been resolved:
nvmet: fix
|
| 38 |
CVE-2025-70029
An issue in Sunbird-Ed SunbirdEd-portal v1.13.4 allows attackers to obtain sensi
|
| 38 |
CVE-2026-1368
The Video Conferencing with Zoom WordPress plugin before 4.6.6 contains an AJAX
|
| 38 |
CVE-2025-65753
An issue in the TLS certification mechanism of Guardian Gryphon v01.06.0006.22 a
|
| 38 |
CVE-2025-12664
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.0
|
| 38 |
CVE-2026-25751
FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An inf
|
| 38 |
CVE-2026-22866
Ethereum Name Service (ENS) is a distributed, open, and extensible naming system
|
| 38 |
CVE-2026-24455
The embedded web interface of the device does not support HTTPS/TLS for
authent
|
| 38 |
CVE-2025-67853
A flaw was found in Moodle. A remote attacker could exploit a lack of proper rat
|
| 38 |
CVE-2026-30791
Use of a Broken or Risky Cryptographic Algorithm vulnerability in rustdesk-clien
|
| 38 |
CVE-2026-1616
The $uri$args concatenation in nginx configuration file present in Open Security
|
| 38 |
CVE-2026-4258
All versions of the package sjcl are vulnerable to Improper Verification of Cryp
|
| 38 |
CVE-2026-32274
Black is the uncompromising Python code formatter. Prior to 26.3.1, Black writes
|
| 38 |
CVE-2026-22448
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v
|
| 38 |
CVE-2026-32614
## Overview
The current SM9 decryption implementation contains an infinity-poin
|
| 38 |
CVE-2026-1069
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.9
|
| 38 |
CVE-2025-62601
Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard
|
| 38 |
CVE-2025-59439
An issue was discovered in Samsung Mobile Processor, Wearable Processor and Mode
|
| 38 |
CVE-2026-33487
goxmlsig provides XML Digital Signatures implemented in Go. Prior to version 1.6
|
| 38 |
CVE-2026-2673
Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected
pref
|
| 38 |
CVE-2025-70048
An issue pertaining to CWE-319: Cleartext Transmission of Sensitive Information
|
| 38 |
CVE-2025-62602
Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard
|
| 38 |
CVE-2025-69240
Raytha CMS allows an attacker to spoof `X-Forwarded-Host` or `Host` headers to a
|
| 38 |
CVE-2026-28498
## 1. Executive Summary
A critical library-level vulnerability was identified i
|
| 38 |
CVE-2026-25223
Fastify is a fast and low overhead web framework, for Node.js. Prior to version
|
| 38 |
CVE-2026-4652
On a system exposing an NVMe/TCP target, a remote client can trigger a kernel pa
|
| 38 |
CVE-2026-22260
Suricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and pri
|
| 38 |
CVE-2026-29784
Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, in
|
| 38 |
CVE-2026-33242
### Details
A Path Traversal and Access Control Bypass vulnerability was discov
|
| 38 |
CVE-2026-33813
Parsing a WEBP image with an invalid, large size panics on 32-bit platforms.
|
| 38 |
CVE-2026-24308
Improper handling of configuration values in ZKConfig in Apache ZooKeeper 3.8.5
|
| 38 |
CVE-2026-4685
Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerab
|
| 38 |
CVE-2025-67841
Nordic Semiconductor IronSide SE for nRF54H20 before 23.0.2+17 has an Algorithmi
|
| 38 |
CVE-2026-4686
Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerab
|
| 38 |
CVE-2026-4693
Incorrect boundary conditions in the Audio/Video: Playback component. This vulne
|
| 38 |
CVE-2026-4699
Incorrect boundary conditions in the Layout: Text and Fonts component. This vuln
|
| 38 |
CVE-2026-4706
Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerab
|
| 38 |
CVE-2026-29146
Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default
|
| 38 |
CVE-2026-4707
Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerab
|
| 38 |
CVE-2026-4709
Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerabil
|
| 38 |
CVE-2026-28779
Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is
|
| 38 |
CVE-2026-6756
Mitigation bypass in Firefox for Android. This vulnerability was fixed in Firefo
|
| 38 |
CVE-2026-34483
Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve
|
| 38 |
CVE-2026-23948
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0
|
Oldest Unpatched Critical/High CVEs
| CVE | Severity | CVSS | Priority | Days Open |
|---|---|---|---|---|
| CVE-2024-3400 | CRITICAL | 10.0 | 224 | 741d |
| CVE-2019-19781 | CRITICAL | 9.8 | 223 | 2309d |
| CVE-2020-5902 | CRITICAL | 9.8 | 223 | 2121d |
| CVE-2021-35464 | CRITICAL | 9.8 | 223 | 1735d |
| CVE-2020-10189 | CRITICAL | 9.8 | 223 | 2238d |
| CVE-2012-4681 | CRITICAL | 9.8 | 223 | 4986d |
| CVE-2022-42475 | CRITICAL | 9.8 | 223 | 1207d |
| CVE-2023-3519 | CRITICAL | 9.8 | 223 | 1008d |
| CVE-2015-7450 | CRITICAL | 9.8 | 222 | 3763d |
| CVE-2023-34048 | CRITICAL | 9.8 | 222 | 910d |