Daily vulnerability intelligence for defenders – fresh CVEs with exploitability signals, patch status, and action-oriented priorities from 17 sources.

CVEs published

Track vulnerabilities that matter to your stack

Personalized alerts, dashboards, and weekly digests – free.

Trending Now
Critical Watch
Upcoming Zero-Day Disclosures 361 331 overdue
View all

to view ZDI disclosures

Attack Technique Trend
Prediction based on ZDI Disclosures & CVE data · 30 days
Analytics
Vendor Today – Quick Filter
Techniques
results
Sort:
Base Score
Vector String
Attack Vector (AV)
Attack Complexity (AC)
Privileges Required (PR)
User Interaction (UI)
Scope (S)
Confidentiality (C)
Integrity (I)
Availability (A)
0 | 3.9| 6.9| 8.9| 10
NONE LOW MEDIUM HIGH CRITICAL
CVSS Filter CVEs match

No CVEs match the selected criteria

Loading...
ZDI Disclosures – Apr 17 6 1d
View all
ZDI-CAN-28708 4.9
MEDIUM Cisco

This vulnerability affects Cisco, a major networking and cybersecurity infrastructure vendor. The flaw has a medium severity rating and can be exploited remotely by authenticated attackers with high privileges, resulting in confidentiality compromise but no integrity or availability impact. Security teams should monitor for this advisory's resolution by the April 2026 deadline and ensure privileged account access controls are strictly enforced on affected Cisco systems.

Cisco Potential RCE Potential Privilege Escalation
ZDI-CAN-28593 7.8
HIGH X.Org

X.Org is the open-source organization responsible for the X Window System, the fundamental display server used in most Linux and Unix environments. This vulnerability has a CVSS score of 7.8 (HIGH) and requires local access with low-privilege user authentication to exploit, but once successful, it grants an attacker high-level compromises to confidentiality, integrity, and availability with no user interaction needed. Security teams should prioritize patching X.Org systems after the April 17, 2026 vendor deadline and monitor for any suspicious local privilege escalation attempts on systems still running vulnerable versions.

Linux Potential RCE Potential Privilege Escalation
ZDI-CAN-28157 3.5
LOW Microsoft

Microsoft has patched a low-severity information disclosure vulnerability (CVSS 3.5) that requires adjacent network access and user interaction to exploit, with no authentication needed but only allowing limited confidentiality impact. The vulnerability cannot be exploited remotely and causes no integrity or availability damage, making it a relatively contained risk. Security teams should monitor for this advisory's official patch release and prioritize it as a low-priority update unless it affects critical systems handling sensitive data.

Windows Microsoft Potential Privilege Escalation
ZDI-CAN-28709 7.2
HIGH Cisco

Cisco, a major networking and cybersecurity equipment manufacturer, has a high-severity vulnerability (CVSS 7.2) that can be exploited remotely over the network by an authenticated attacker with high privileges, potentially compromising confidentiality, integrity, and availability of affected systems. The attack requires no user interaction and impacts only the vulnerable system itself. Security teams should monitor for this vulnerability across their Cisco infrastructure and prepare for patching once Cisco releases fixes by the April 2026 deadline.

Cisco Potential RCE Potential Privilege Escalation
ZDI-CAN-28624 7.2
HIGH LiteLLM

LiteLLM, a popular open-source library that provides a unified interface for multiple large language models, has a high-severity vulnerability (CVSS 7.2) that can be exploited remotely by authenticated users with high privileges to achieve complete compromise of confidentiality, integrity, and authenticity. The attack requires network access and high-level permissions but no user interaction, making it a significant risk in environments where LiteLLM is deployed with administrative access. Security teams should monitor for patches after the April 2026 vendor deadline and assess whether their implementations expose LiteLLM to trusted internal users who could potentially abuse elevated privileges.

Python AI / ML Potential RCE
ZDI-CAN-28115 7.8
HIGH Bosch Rexroth

Bosch Rexroth is a major industrial automation and hydraulics manufacturer whose products are widely deployed in manufacturing and infrastructure environments. This high-severity local vulnerability (CVSS 7.8) requires no authentication and user interaction to execute, allowing an attacker with local access to achieve complete compromise including confidentiality, integrity, and availability impacts on affected systems. Security teams should monitor for exploitation attempts targeting Bosch Rexroth industrial control systems and ensure local access controls are strictly enforced until patches become available after April 2026.

Industrial Scada Potential Privilege Escalation
Live Feed auto-refresh 60s

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy