Daily vulnerability intelligence for defenders – fresh CVEs with exploitability signals, patch status, and action-oriented priorities from 17 sources.

CVEs published

Track vulnerabilities that matter to your stack

Personalized alerts, dashboards, and weekly digests – free.

Trending Now
Critical Watch
Upcoming Zero-Day Disclosures 367 337 overdue
View all

to view ZDI disclosures

Attack Technique Trend
Prediction based on ZDI Disclosures & CVE data · 30 days
Analytics
Vendor Today – Quick Filter
Techniques
results
Sort:
Base Score
Vector String
Attack Vector (AV)
Attack Complexity (AC)
Privileges Required (PR)
User Interaction (UI)
Scope (S)
Confidentiality (C)
Integrity (I)
Availability (A)
0 | 3.9| 6.9| 8.9| 10
NONE LOW MEDIUM HIGH CRITICAL
CVSS Filter CVEs match

No CVEs match the selected criteria

Loading...
ZDI Disclosures – Apr 22 4 5d
View all
ZDI-CAN-27843 7.8
HIGH Delta Electronics

Delta Electronics, a major industrial automation and power management company, has a high-severity local vulnerability (CVSS 7.8) that requires user interaction but no authentication to exploit, potentially allowing attackers with local access to compromise confidentiality, integrity, and availability. The vulnerability can be triggered through user interaction on a local system without elevated privileges, making it particularly dangerous in shared or compromised environments. Security teams should monitor for this advisory through April 2026 and prioritize patching once the vendor releases fixes, especially for systems in critical infrastructure environments where Delta products are commonly deployed.

Industrial IoT Scada
ZDI-CAN-28054 7.8
HIGH Microsoft

Microsoft has a high-severity local privilege escalation vulnerability (CVSS 7.8) that requires user interaction but no authentication to exploit, potentially allowing attackers to gain complete control over confidentiality, integrity, and availability of affected systems. The vulnerability can only be exploited locally by an unauthenticated user who tricks a legitimate user into performing a specific action. Security teams should prepare for patching when the vendor deadline of April 22, 2026 arrives and monitor for any proof-of-concept exploits in the interim.

Microsoft Potential RCE Potential Privilege Escalation
ZDI-CAN-28205 7.0
HIGH Microsoft

Microsoft has a high-severity vulnerability (CVSS 7.0) that requires local access and low-level user privileges to exploit, but once compromised delivers significant impact across confidentiality, integrity, and availability. The attack is not remotely exploitable and does not require user interaction, meaning an authenticated local attacker can directly execute the exploit. Security teams should prioritize patching Microsoft products when the vendor deadline passes in April 2026 and monitor for suspicious local privilege escalation attempts in the interim.

Microsoft Potential Privilege Escalation Potential Information Disclosure
ZDI-CAN-27465 7.8
HIGH Oumi

A high-severity vulnerability (CVSS 7.8) has been discovered in Oumi's product that allows local attackers to achieve significant compromise without authentication or user interaction. The attack requires local access to the system but can result in confidentiality, integrity, and availability breaches once exploited. Security teams should monitor for patch availability by the April 2026 deadline and prioritize systems where untrusted local users have access to Oumi software.

AI / ML Potential RCE Potential Privilege Escalation
Live Feed auto-refresh 60s

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy