A comprehensive vulnerability catalog with exploitability metrics and signals and available fixes
| CVE ID | Severity | Exploit Maturity | Resolved Security Fix |
|---|---|---|---|
| CVE-2024-4367 |
High
|
Proof of concept
|
Available |
| CVE-2014-0114 |
None
|
Proof of concept
|
Available |
| CVE-2017-16082 |
Critical
|
Proof of concept
|
Available |
| CVE-2019-10768 |
High
|
No known exploit
|
Available |
| CVE-2025-48734 |
High
|
No known exploit
|
Available |
| CVE-2025-29927 |
Critical
|
Proof of concept
|
Available |
| CVE-2024-24549 |
High
|
Proof of concept
|
Available |
| CVE-2018-11307 |
Critical
|
No known exploit
|
Available |
| CVE-2025-7783 |
Critical
|
Proof of concept
|
Available |
| CVE-2019-10744 |
Critical
|
No known exploit
|
Available |
| CVE-2020-10650 |
High
|
No known exploit
|
Available |
| CVE-2024-27348 |
Critical
|
High confidence exploit
|
|
| CVE-2019-14893 |
Critical
|
No known exploit
|
Available |
| CVE-2024-45337 |
Critical
|
Proof of concept
|
Available |
| CVE-2018-25031 |
Medium
|
Proof of concept
|
Available |
| CVE-2020-8840 |
Critical
|
Proof of concept
|
Available |
| CVE-2023-26136 |
Critical
|
Proof of concept
|
Available |
| CVE-2022-32149 |
High
|
No known exploit
|
Available |
| CVE-2024-23334 |
High
|
High confidence exploit
|
Available |
| CVE-2025-30065 |
Critical
|
Proof of concept
|