Skip to main content
Severity: 8 patched CVEs

Remediation Priority Framework

Priority 1

Immediate

CVSS ≥9.0 — Critical severity, unauthenticated exploitation, active ransomware campaigns. Patch or isolate within 24–48 hours.

Priority 2

7 Days

CVSS 7.0–8.9 — High severity, exploitation requires minimal conditions. Part of CISA BOD requirements for federal agencies.

Priority 3

30 Days

CVSS 4.0–6.9 — Medium severity, requires privileges or user interaction. Still in KEV, so exploitation is confirmed.

Priority 4

90 Days

CVSS <4.0 — Low severity but still exploited. Address in next regular patch cycle.

Patches Available

8 CVEs

No patched CVEs match your search.

CVE-2024-1708 Critical Patched
Patch within: Immediate View guide →
CVE-2026-20182 Critical Patched

CVE-2026-20182: Cisco Catalyst SD-WAN Authentication Bypass — Unauthenticated Admin Access

Cisco ·Catalyst SD-WAN Controller & Manager ·CVSS 9.8 ·
Patch within: Immediate View guide →
CVE-2026-41940 Critical Patched
Patch within: Immediate View guide →
CVE-2026-0300 Critical Patched

CVE-2026-0300: Palo Alto PAN-OS Out-of-Bounds Write Leads to Root RCE on Firewalls

Palo Alto Networks ·PAN-OS ·CVSS 9.8 ·
Patch within: Immediate View guide →
CVE-2026-31431 High Patched
Patch within: 7 Days View guide →
CVE-2026-42208 High Patched
Patch within: 7 Days View guide →
CVE-2026-6973 High Patched

CVE-2026-6973: Ivanti EPMM Improper Input Validation Enables Authenticated RCE

Ivanti ·Endpoint Manager Mobile (EPMM) ·CVSS 7.2 ·
Patch within: 7 Days View guide →
CVE-2026-42897 High Patched

CVE-2026-42897: Microsoft Exchange Server XSS in Outlook Web Access

Microsoft ·Exchange Server ·CVSS 8 ·
Patch within: 7 Days View guide →