862
CVEs
19
Critical
181
High
0
KEV
28
PoC
42
Unpatched C/H
68.3%
Patch Rate
0.0%
Avg EPSS
Severity Breakdown
CRITICAL
19
HIGH
181
MEDIUM
299
LOW
8
Monthly CVE Trend
Affected Products (30)
Linux Kernel
3414
Ubuntu
725
Null Pointer Dereference
606
Debian Linux
535
Memory Corruption
453
Use After Free
376
Race Condition
132
Windows
86
Integer Overflow
50
Db2
20
Android
13
Windows Server 2025
12
Windows 11 24h2
11
macOS
11
Windows 11 25h2
10
Exynos 1330 Firmware
10
Exynos 1480 Firmware
10
Windows Server 2022 23h2
10
Windows Server 2022
10
Dx Netops Spectrum
10
Exynos 1380 Firmware
10
Exynos 1580 Firmware
10
Exynos 1280 Firmware
9
Exynos 850 Firmware
9
Exynos W1000 Firmware
9
Exynos W930 Firmware
9
Exynos 1080 Firmware
9
Windows 11 23h2
9
Exynos W920 Firmware
9
Exynos 980 Firmware
9
Top Risky CVEs
| CVE | Summary | Severity | CVSS | EPSS | Priority | Signals |
|---|---|---|---|---|---|---|
| CVE-2026-26068 | Command injection in emp3r0r C2 framework before 3.21.1. Untrusted agent metadata (Transport, Hostname) injected into commands. PoC and patch available. EPSS 0.61%. | CRITICAL | 9.9 | 0.6% | 70 |
PoC
|
| CVE-2026-29128 | Plaintext daemon credentials in IDC SFX2100 routing config files (zebra, bgpd, ospfd, ripd). CVSS 10.0. PoC available. | CRITICAL | 10.0 | 0.0% | 70 |
PoC
No patch
|
| CVE-2021-47796 | Denver SHC-150 Smart WiFi Camera has hardcoded telnet credentials on port 23, providing unauthenticated root shell access. PoC available. | CRITICAL | 9.8 | 0.1% | 69 |
PoC
No patch
|
| CVE-2026-23873 | HUSTOJ online judge system has a CSV injection vulnerability in all versions that allows code execution through crafted submissions exported to spreadsheets. | CRITICAL | 9.0 | 0.0% | 65 |
PoC
No patch
|
| CVE-2026-27212 | Prototype pollution in Swiper versions 6.5.1 through 12.1.1 allows local authenticated attackers to manipulate Object.prototype through improperly validated user input, enabling authentication bypass, denial of service, and remote code execution. Public exploit code exists for this vulnerability, which affects applications on Linux and Windows using Node.js or Bun runtimes. A patch is available and should be applied immediately to affected systems processing untrusted input. | HIGH | 7.8 | 0.1% | 59 |
PoC
|
| CVE-2026-23233 | F2FS swapfile memory corruption in Linux kernel 6.6+ allows local attackers with user privileges to cause data corruption through improper physical block mapping when using fragmented swapfiles smaller than the F2FS section size. Public exploit code exists for this vulnerability, and attackers can trigger dm-verity corruption errors or F2FS node corruption leading to system crashes and data loss. No patch is currently available. | HIGH | 7.8 | 0.0% | 59 |
PoC
|
| CVE-2025-70616 | A stack buffer overflow vulnerability exists in the Wincor Nixdorf wnBios64.sys kernel driver (version 1.2.0.0) in the IOCTL handler for code 0x80102058. [CVSS 7.8 HIGH] | HIGH | 7.8 | 0.0% | 59 |
PoC
No patch
|
| CVE-2026-29123 | Local privilege escalation in IDC SFX2100 firmware affects Linux systems through a SUID binary vulnerable to PATH hijacking, symlink abuse, and shared object hijacking. A local attacker can exploit this to gain root-level privileges, and public exploit code is available. No patch is currently available to address this HIGH severity vulnerability. | HIGH | 7.8 | 0.0% | 59 |
PoC
No patch
|
| CVE-2020-37041 | OpenCTI 3.3.1 is vulnerable to a directory traversal attack via the static/css endpoint. An unauthenticated attacker can read arbitrary files from the filesystem by sending crafted GET requests with path traversal sequences (e.g., '../') in the URL. [CVSS 7.5 HIGH] | HIGH | 7.5 | 0.4% | 58 |
PoC
No patch
|
| CVE-2026-26201 | emp3r0r C2 framework versions prior to 3.21.2 crash due to unsynchronized concurrent map access in Go goroutines, allowing attackers with network access to trigger denial of service against the C2 infrastructure. Public exploit code exists for this vulnerability. The issue is resolved in version 3.21.2 and later. | HIGH | 7.5 | 0.0% | 58 |
PoC
|
| CVE-2026-30798 | RustDesk Client through version 1.4.5 fails to properly verify data authenticity in its heartbeat synchronization loop, allowing remote attackers to manipulate the protocol and cause denial of service without authentication. Public exploit code exists for this vulnerability, and no patch is currently available. The flaw affects Windows, macOS, Linux, Android, and iOS deployments. | HIGH | 7.5 | 0.0% | 58 |
PoC
No patch
|
| CVE-2021-47789 | Yenkee Hornet Gaming Mouse driver GM312Fltr.sys contains a buffer overrun vulnerability that allows attackers to crash the system by sending oversized input. Attackers can exploit the driver by sending a 2000-byte buffer through DeviceIoControl to trigger a kernel-level system crash. [CVSS 7.5 HIGH] | HIGH | 7.5 | 0.0% | 58 |
PoC
No patch
|
| CVE-2021-47786 | Redragon Gaming Mouse driver contains a kernel-level vulnerability that allows attackers to trigger a denial of service by sending malformed IOCTL requests. Attackers can send a crafted 2000-byte buffer with specific byte patterns to the REDRAGON_MOUSE device to crash the kernel driver. [CVSS 7.5 HIGH] | HIGH | 7.5 | 0.0% | 58 |
PoC
No patch
|
| CVE-2026-28372 | Inetutils versions up to 2.7 is affected by inclusion of functionality from untrusted control sphere (CVSS 7.4). | HIGH | 7.4 | 0.0% | 57 |
PoC
|
| CVE-2025-67246 | A local information disclosure vulnerability exists in the Ludashi driver before 5.1025 due to a lack of access control in the IOCTL handler. This driver exposes a device interface accessible to a normal user and handles attacker-controlled structures containing the lower 4GB of physical addresses. [CVSS 7.3 HIGH] | HIGH | 7.3 | 0.0% | 57 |
PoC
No patch
|