255
CVEs
21
Critical
71
High
1
KEV
1
PoC
80
Unpatched C/H
14.1%
Patch Rate
0.1%
Avg EPSS
Severity Breakdown
CRITICAL
21
HIGH
71
MEDIUM
145
LOW
16
Monthly CVE Trend
Affected Products (30)
macOS
390
iOS
240
Memory Corruption
81
Ipados
78
Iphone Os
73
Windows
46
Safari
36
Android
34
Open Redirect
32
Ios Xe
31
Visionos
26
Use After Free
23
Tvos
23
Watchos
23
Command Injection
19
Firefox
17
Race Condition
15
Ios Xr
13
Null Pointer Dereference
12
Python
9
Node.js
8
Docker
8
Integer Overflow
7
Jwt Attack
7
PHP
7
Chrome
7
Linux Kernel
7
Ubuntu
6
Virtual Appliance Host
5
Virtual Appliance Application
5
Top Risky CVEs
| CVE | Summary | Severity | CVSS | EPSS | Priority | Signals |
|---|---|---|---|---|---|---|
| CVE-2026-20700 | Apple's kernel across all platforms (iOS, macOS, watchOS, visionOS, tvOS) contains a memory corruption vulnerability (CVE-2026-20700, CVSS 7.8) that allows attackers with memory write capability to execute arbitrary code at the kernel level. KEV-listed with Apple confirming reports of sophisticated in-the-wild exploitation, this represents an active zero-day targeting the Apple ecosystem at its most fundamental security boundary. | HIGH | 7.8 | 0.4% | 109 |
KEV
PoC
No patch
|
| CVE-2026-31852 | Arbitrary code execution in Jellyfin iOS GitHub Actions workflow. CVSS 10.0. | CRITICAL | 10.0 | 0.1% | 50 |
No patch
|
| CVE-2026-2634 | Address bar spoofing in Firefox before 148 allows malicious scripts to desynchronize the displayed URL from actual web content before receiving a response, enabling phishing attacks. | CRITICAL | 9.8 | 0.1% | 49 |
No patch
|
| CVE-2026-28858 | Insufficient bounds checking in Apple iOS and iPadOS 26.4 allows unauthenticated remote attackers to trigger buffer overflow conditions that corrupt kernel memory or cause system crashes without user interaction. This critical vulnerability affects all devices running the affected OS versions and has no available patch. An attacker can exploit this flaw over the network to achieve denial of service or potentially escalate privileges through kernel memory corruption. | CRITICAL | 9.8 | 0.0% | 49 |
No patch
|
| CVE-2026-33976 | Remote code execution via stored XSS in Notesnook Web Clipper affects all platforms prior to version 3.3.11 (Web/Desktop) and 3.3.17 (Android/iOS). Attackers can inject malicious HTML attributes into clipped web content that execute JavaScript in the application's security context when victims open the clip. On Electron desktop builds, unsafe Node.js integration (nodeIntegration: true, contextIsolation: false) escalates this XSS to full RCE with system-level access. CVSS 9.6 (Critical) reflects network-based attack requiring no authentication but user interaction. No public exploit identified at time of analysis, though attack methodology is detailed in vendor advisory. | CRITICAL | 9.6 | 0.1% | 48 |
No patch
|
| CVE-2026-28373 | Stackfield Desktop App before version 1.10.2 for macOS and Windows allows arbitrary file writes to the filesystem through a path traversal vulnerability in its decryption functionality when processing the filePath property. A malicious export file can enable attackers to overwrite critical system or application files, potentially leading to code execution or application compromise without requiring user interaction beyond opening the malicious export. | CRITICAL | 9.6 | 0.0% | 48 |
No patch
|
| CVE-2026-33439 | Remote code execution in OpenIdentityPlatform OpenAM 16.0.5 and earlier allows unauthenticated attackers to execute arbitrary OS commands via unsafe Java deserialization of the jato.clientSession HTTP parameter. This bypass exploits an unpatched deserialization sink in JATO's ClientSession.deserializeAttributes() that was overlooked when CVE-2021-35464 was mitigated. Attackers can target any JATO ViewBean endpoint with <jato:form> tags (commonly found in password reset pages) using a PriorityQueue→TemplatesImpl gadget chain with libraries bundled in OpenAM's WAR file. Vendor-released patch available in version 16.0.6 (GitHub commit 014007c). No public exploit code identified at time of analysis, but detailed technical writeup with gadget chain specifics has been published. | CRITICAL | 9.3 | 0.1% | 47 |
|
| CVE-2026-30797 | Security vulnerability in RustDesk remote desktop client/server. One of 6+ critical CVEs affecting the open-source remote access platform. | CRITICAL | 9.3 | 0.1% | 47 |
No patch
|
| CVE-2026-30790 | Security vulnerability in RustDesk remote desktop client/server. One of 6+ critical CVEs affecting the open-source remote access platform. | CRITICAL | 9.3 | 0.0% | 47 |
No patch
|
| CVE-2026-30789 | Security vulnerability in RustDesk remote desktop client/server. One of 6+ critical CVEs affecting the open-source remote access platform. | CRITICAL | 9.3 | 0.0% | 47 |
No patch
|
| CVE-2026-30793 | Security vulnerability in RustDesk remote desktop client/server. One of 6+ critical CVEs affecting the open-source remote access platform. | CRITICAL | 9.3 | 0.0% | 47 |
No patch
|
| CVE-2026-28827 | Improper path validation in macOS (Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4) allows sandboxed applications to escape their sandbox restrictions through directory path traversal. A local attacker with the ability to run malicious apps can exploit this weakness to execute code outside sandbox boundaries with full system privileges. No patch is currently available for this critical vulnerability. | CRITICAL | 9.3 | 0.0% | 47 |
No patch
|
| CVE-2026-20688 | Sandbox escape vulnerability in Apple iOS, iPadOS, macOS, and visionOS allows local attackers to break out of application sandboxes through improper path validation, potentially enabling unauthorized access to system resources and data. An attacker with local access could leverage this flaw to execute arbitrary operations outside application boundaries and bypass security restrictions. No patch is currently available for this critical vulnerability affecting multiple Apple platforms. | CRITICAL | 9.3 | 0.0% | 47 |
No patch
|
| CVE-2026-33322 | JWT algorithm confusion in MinIO's OpenID Connect authentication enables attackers with knowledge of the OIDC ClientSecret to forge identity tokens and obtain S3 credentials with unrestricted IAM policies, including administrative access. Affected users can have their identities impersonated and their data accessed, modified, or deleted with 100% attack success rate. The vulnerability impacts MinIO deployments across Docker, Apple, and Microsoft platforms, with no patch currently available. | CRITICAL | 9.2 | 0.0% | 46 |
No patch
|
| CVE-2026-30792 | Security vulnerability in RustDesk remote desktop client/server. One of 6+ critical CVEs affecting the open-source remote access platform. | CRITICAL | 9.1 | 0.1% | 46 |
No patch
|