Total CVEs
16542
last 90 days
Avg Priority
36.3
of max 220
KEV
40
actively exploited
POC
3199
public exploits
Unpatched
4325
CRIT/HIGH without patch
How is Priority Score calculated?
Priority Score is a composite risk metric (0-220) combining multiple real-world threat signals:
KEV +50
CISA Known Exploited Vulnerability — confirmed active exploitation in the wild
EPSS x100
Exploit Prediction Scoring System — probability of exploitation in next 30 days (0-100)
CVSS x5
Common Vulnerability Scoring System — technical severity (0-50)
POC +20
Public exploit code exists — lowers barrier for attackers
0-40 Low
40-80 Medium
80-120 High
120+ Critical
Patch Now — Known Exploited Vulnerabilities
185
CVE-2026-1731
BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain
180
CVE-2025-40551
SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerabil
170
CVE-2026-1340
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated rem
164
CVE-2026-1281
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated rem
160
CVE-2025-40536
SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that
141
CVE-2026-20131
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FM
137
CVE-2026-1603
An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthen
134
CVE-2026-22769
Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credentia
129
CVE-2026-33825
Insufficient granularity of access control in Microsoft Defender allows an authorized attacker to el
124
CVE-2026-21643
An improper neutralization of special elements used in an sql command ('sql injection') vulnerabilit
Priority Distribution
| Priority | CVE |
|---|---|
| 35 |
CVE-2026-25179
Improper validation of specified type of input in Windows Ancillary Function Dri
|
| 35 |
CVE-2026-27917
Use after free in Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) allow
|
| 35 |
CVE-2026-27922
Use after free in Windows Ancillary Function Driver for WinSock allows an author
|
| 35 |
CVE-2026-32224
Use after free in Windows Server Update Service allows an authorized attacker to
|
| 35 |
CVE-2026-32080
Use after free in Windows WalletService allows an authorized attacker to elevate
|
| 35 |
CVE-2026-32073
Use after free in Windows Ancillary Function Driver for WinSock allows an author
|
| 35 |
CVE-2026-33099
Use after free in Windows Ancillary Function Driver for WinSock allows an author
|
| 35 |
CVE-2026-33100
Use after free in Windows Ancillary Function Driver for WinSock allows an author
|
| 35 |
CVE-2026-32075
Use after free in Windows Universal Plug and Play (UPnP) Device Host allows an a
|
| 35 |
CVE-2026-4483
An exposed IOCTL with an insufficient access control vulnerability has been ide
|
| 35 |
CVE-2026-32083
Concurrent execution using shared resource with improper synchronization ('race
|
| 35 |
CVE-2026-27926
Concurrent execution using shared resource with improper synchronization ('race
|
| 35 |
CVE-2026-33104
Concurrent execution using shared resource with improper synchronization ('race
|
| 35 |
CVE-2026-41166
### Summary
A user who has `write:admin` in one Keycloak realm can call the Mana
|
| 35 |
CVE-2026-27929
Time-of-check time-of-use (toctou) race condition in Windows LUAFV allows an aut
|
| 35 |
CVE-2026-32068
Concurrent execution using shared resource with improper synchronization ('race
|
| 35 |
CVE-2026-32219
Double free in Microsoft Brokering File System allows an authorized attacker to
|
| 35 |
CVE-2026-32082
Concurrent execution using shared resource with improper synchronization ('race
|
| 35 |
CVE-2026-35572
ChurchCRM is an open-source church management system. Prior to 6.5.3, it is poss
|
| 35 |
CVE-2026-21621
Incorrect Authorization vulnerability in hexpm hexpm/hexpm ('Elixir.HexpmWeb.API
|
| 35 |
CVE-2026-23668
Concurrent execution using shared resource with improper synchronization ('race
|
| 35 |
CVE-2026-26074
EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a dat
|
| 35 |
CVE-2026-25170
Use after free in Windows Hyper-V allows an authorized attacker to elevate privi
|
| 35 |
CVE-2026-25171
Use after free in Windows Authentication Methods allows an authorized attacker t
|
| 35 |
CVE-2026-25178
Use after free in Windows Ancillary Function Driver for WinSock allows an author
|
| 35 |
CVE-2026-23180
In the Linux kernel, the following vulnerability has been resolved:
dpaa2-switc
|
| 35 |
CVE-2025-13914
A Key Exchange without Entity Authentication vulnerability in the SSH implementa
|
| 35 |
CVE-2026-21508
Improper authentication in Windows Storage allows an authorized attacker to elev
|
| 35 |
CVE-2026-23667
Use after free in Broadcast DVR allows an authorized attacker to elevate privile
|
| 35 |
CVE-2026-23671
Concurrent execution using shared resource with improper synchronization ('race
|
| 35 |
CVE-2026-24296
Concurrent execution using shared resource with improper synchronization ('race
|
| 35 |
CVE-2026-24295
Concurrent execution using shared resource with improper synchronization ('race
|
| 35 |
CVE-2026-23195
In the Linux kernel, the following vulnerability has been resolved:
cgroup/dmem
|
| 35 |
CVE-2026-23175
In the Linux kernel, the following vulnerability has been resolved:
net: cpsw:
|
| 35 |
CVE-2025-71221
In the Linux kernel, the following vulnerability has been resolved:
dmaengine:
|
| 35 |
CVE-2026-3457
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
|
| 35 |
CVE-2025-71203
In the Linux kernel, the following vulnerability has been resolved:
riscv: Sani
|
| 35 |
CVE-2026-33201
Digital Photo Frame GH-WDF10A provided by GREEN HOUSE CO., LTD. contains an acti
|
| 35 |
CVE-2026-21242
Use after free in Windows Subsystem for Linux allows an authorized attacker to e
|
| 35 |
CVE-2026-21253
Use after free in Mailslot File System allows an authorized attacker to elevate
|
| 35 |
CVE-2026-4786
Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mi
|
| 35 |
CVE-2026-5263
URI nameConstraints from constrained intermediate CAs are parsed but not enforce
|
| 35 |
CVE-2026-21237
Concurrent execution using shared resource with improper synchronization ('race
|
| 35 |
CVE-2026-21234
Concurrent execution using shared resource with improper synchronization ('race
|
| 35 |
CVE-2026-40458
PAC4J is vulnerable to Cross-Site Request Forgery (CSRF). A malicious attacker c
|
| 35 |
CVE-2026-30901
Improper Input Validation in Zoom Rooms for Windows before 6.6.5 in Kiosk Mode m
|
| 35 |
CVE-2025-54601
An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor amd Wear
|
| 35 |
CVE-2026-32608
## Summary
The Glances action system allows administrators to configure shell c
|
| 35 |
CVE-2026-23294
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix ra
|
| 35 |
CVE-2025-10279
In mlflow version 2.20.3, the temporary directory used for creating Python virtu
|
| 35 |
CVE-2026-2492
TensorFlow HDF5 Library Uncontrolled Search Path Element Local Privilege Escalat
|
| 35 |
CVE-2026-23941
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerab
|
| 35 |
CVE-2025-13917
WSS Agent, prior to 9.8.5, may be susceptible to a Elevation of Privilege vulner
|
| 35 |
CVE-2026-34770
### Impact
Apps that use the `powerMonitor` module may be vulnerable to a use-af
|
| 35 |
CVE-2026-33018
libsixel is a SIXEL encoder/decoder implementation derived from kmiya's sixel. V
|
| 35 |
CVE-2026-21241
Use after free in Windows Ancillary Function Driver for WinSock allows an author
|
| 35 |
CVE-2025-14859
The Semtech LR11xx LoRa transceivers implement secure boot functionality using d
|
| 35 |
CVE-2026-4134
During an internal security assessment, a potential vulnerability was discovered
|
| 35 |
CVE-2026-21000
Improper access control in Galaxy Store prior to version 4.6.03.8 allows local a
|
| 35 |
CVE-2026-4519
The webbrowser.open() API would accept leading dashes in the URL which
could be
|
| 35 |
CVE-2026-34488
IP Setting Software contains an issue with the DLL search path, which may lead t
|
| 35 |
CVE-2025-68119
Downloading and building modules with malicious version strings can cause local
|
| 35 |
CVE-2025-54602
An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wear
|
| 35 |
CVE-2026-2542
A weakness has been identified in Total VPN 0.5.29.0 on Windows. Affected by thi
|
| 35 |
CVE-2026-21916
A UNIX Symbolic Link (Symlink) Following vulnerability in the CLI of Juniper Net
|
| 35 |
CVE-2025-15569
A flaw has been found in Artifex MuPDF up to 1.26.1 on Windows. The impacted ele
|
| 35 |
CVE-2026-2538
A security flaw has been discovered in Flos Freeware Notepad2 4.2.22/4.2.23/4.2.
|
| 35 |
CVE-2026-4546
A weakness has been identified in Flos Freeware Notepad2 4.2.25. This impacts an
|
| 35 |
CVE-2026-20617
A race condition was addressed with improved state handling. This issue is fixed
|
| 35 |
CVE-2026-4545
A security flaw has been discovered in Flos Freeware Notepad2 4.2.25. This affec
|
| 35 |
CVE-2026-32611
## Summary
The GHSA-x46r fix (commit 39161f0) addressed SQL injection in the Ti
|
| 35 |
CVE-2026-35352
A Time-of-Check to Time-of-Use (TOCTOU) race condition exists in the mkfifo util
|
| 35 |
CVE-2026-24051
OpenTelemetry-Go is the Go implementation of OpenTelemetry. The OpenTelemetry Go
|
| 35 |
CVE-2026-3787
A weakness has been identified in UltraVNC 1.6.4.0 on Windows. This affects an u
|
| 35 |
CVE-2026-26158
A flaw was found in BusyBox. This vulnerability allows an attacker to modify fil
|
| 35 |
CVE-2025-48641
In multiple functions of Nfc.h, there is a possible use after free due to a race
|
| 35 |
CVE-2026-26157
A flaw was found in BusyBox. Incomplete path sanitization in its archive extract
|
| 35 |
CVE-2026-32294
JetKVM prior to 0.5.4 does not verify the authenticity of downloaded firmware fi
|
| 35 |
CVE-2026-32908
OpenClaw 2026.1.21 before 2026.2.19 contains a command injection vulnerability i
|
| 35 |
CVE-2026-6966
Improper verification of cryptographic signature uniqueness in delegated role va
|
| 0 |
CVE-2026-32728
### Impact
An attacker who is allowed to upload files can bypass the file exten
|
| 0 |
CVE-2026-32886
### Impact
Remote clients can crash the Parse Server process by calling a cloud
|
| 0 |
CVE-2026-40068
Claude Code used the git worktree `commondir` file when determining folder trust
|
| 0 |
CVE-2026-41644
### Impact
A server-side request forgery (SSRF) vulnerability in monetr's Lunch
|
| 0 |
CVE-2026-41486
# Remote Code Execution via Parquet Arrow Extension Type Deserialization
## Sum
|
| 0 |
CVE-2026-35051
## Summary
There is a high-severity authentication bypass vulnerability in Trae
|
| 0 |
CVE-2026-40912
## Summary
There is a high severity authentication bypass vulnerability in Trae
|
| 0 |
CVE-2026-41673
## Summary
Seven recursive traversals in `lib/dom.js` operate without a depth l
|
| 0 |
CVE-2026-41674
## Summary
The package serializes `DocumentType` node fields (`internalSubset`,
|
| 0 |
CVE-2026-41675
## Summary
The package allows attacker-controlled processing instruction data t
|
Oldest Unpatched Critical/High CVEs
| CVE | Severity | CVSS | Priority | Days Open |
|---|---|---|---|---|
| CVE-2024-3400 | CRITICAL | 10.0 | 224 | 744d |
| CVE-2019-19781 | CRITICAL | 9.8 | 223 | 2311d |
| CVE-2020-5902 | CRITICAL | 9.8 | 223 | 2124d |
| CVE-2021-35464 | CRITICAL | 9.8 | 223 | 1738d |
| CVE-2020-10189 | CRITICAL | 9.8 | 223 | 2241d |
| CVE-2012-4681 | CRITICAL | 9.8 | 223 | 4989d |
| CVE-2022-42475 | CRITICAL | 9.8 | 223 | 1209d |
| CVE-2023-3519 | CRITICAL | 9.8 | 223 | 1011d |
| CVE-2015-7450 | CRITICAL | 9.8 | 222 | 3766d |
| CVE-2023-34048 | CRITICAL | 9.8 | 222 | 913d |