Pilot Configuration
Pilot Phase (Scoped Evaluation)
Up to 12 weeksTypical scope: multi-country, weekly updates, multiple categories
- Real data from real sources
- Live dashboards or export feeds
- Validate scope, refresh cadence, quality
- Fixed price, no ongoing commitment
Most teams start here to validate fit before expanding.
Now, schedule a short call below to confirm scope and start the pilot, or build something new.
or email us at paul@jsonify.co
Data sources are the websites and apps where information will be collected from. These can be changed or expanded at any time. This is turned into data rows.
| id | Source | CVE | Product | Version | Severity | CVSSv3 | Exploitability | Published | PatchAvailable | PatchURL | Notes | ||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1 |
|
CVE-2026-0451 | OpenSSL |
|
Critical |
|
Public PoC reported | Feb 2, 2026 |
|
NULL pointer deref in TLS 1.3 session resumption; CVSS ties to remote code execution in certain configs ... show all |
|||
| 2 |
|
CVE-2026-1020 | Apache HTTP Server |
|
High |
|
Exploit code circulating | Feb 3, 2026 |
|
mod_proxy mis-parsing headers allows request smuggling leading to RCE in proxied apps | |||
| 3 |
|
CVE-2026-1107 | Microsoft Exchange | 2019 CU12 | Critical |
|
Active exploitation observed | Feb 1, 2026 |
|
Auth bypass in OWA leading to privilege escalation; attackers leveraging web shells | |||
| 4 |
|
CVE-2026-2134 | VMware vCenter |
|
Critical |
|
Exploit PoC public | Feb 2, 2026 |
|
vCenter server SSRF chaining to RCE; appliances should be isolated until patch applied | |||
| 5 |
|
CVE-2026-0078 | Google Chrome |
|
High |
|
In-the-wild exploit reported | Feb 3, 2026 |
|
Type confusion in V8 leading to arbitrary code execution via crafted web content | |||
| 6 |
|
CVE-2026-3301 | Fortinet FortiOS |
|
Critical |
|
Weaponized exploit kits | Feb 2, 2026 |
|
Authentication bypass in SSL VPN; multiple campaigns exploiting default configs | |||
| 7 |
|
CVE-2026-2420 | Cisco IOS XE |
|
High |
|
PoC published | Feb 1, 2026 |
|
Buffer overflow in SNMP processing leading to remote code execution on routers | |||
| 8 |
|
CVE-2026-4005 | WordPress Plugin: WP Fast Cache |
|
Medium |
|
Exploit script on DB | Feb 2, 2026 |
|
Unauthenticated file upload allowing webshells if uploads not sanitized | |||
| 9 |
|
CVE-2026-5012 | Trend Micro Apex One |
|
High |
|
Proof-of-concept | Feb 3, 2026 |
|
Privilege escalation via agent upgrade mechanism; recommended emergency update | |||
| 10 |
|
CVE-2026-6009 | Sophos Firewall |
|
Critical |
|
Active exploitation reported | Feb 1, 2026 |
|
Admin auth bypass in REST API; attackers deploying ransomware post-compromise | |||
| 11 |
|
CVE-2026-7100 | Pulse Secure |
|
Critical |
|
Exploit code public | Feb 3, 2026 |
|
Unauthenticated RCE in VPN portal; nation-state actors scanning widely | |||
| 12 |
|
CVE-2026-8123 | Docker Engine |
|
High |
|
Local exploit available | Feb 2, 2026 |
|
Container escape via mis-handled user namespaces; apply update on hosts running untrusted containers | |||
| 13 |
|
CVE-2026-9011 | Adobe Reader |
|
High |
|
In-the-wild | Feb 3, 2026 |
|
Heap overflow in PDF parsing used in targeted phishing | |||
| 14 |
|
CVE-2026-9802 | JetBrains TeamCity |
|
Medium |
|
PoC posted | Feb 1, 2026 |
|
SSRF leading to credential exposure when CI agents accept untrusted callbacks | |||
| 15 |
|
CVE-2026-0377 | Juniper Junos |
|
High |
|
Exploit PoC | Feb 2, 2026 |
|
Management plane buffer overflow exploitable via crafted NETCONF payloads | |||
| 16 |
|
CVE-2026-1575 | Redis |
|
Medium |
|
PoC disclosed | Feb 3, 2026 |
|
Lua VM sandbox bypass in certain eval contexts; risk for multi-tenant setups | |||
| 17 |
|
CVE-2026-2446 | phpMyAdmin |
|
High |
|
Exploit code available | Feb 1, 2026 |
|
CSRF + privilege escalation chain allowing DB dump retrieval | |||
| 18 |
|
CVE-2026-3010 | Microsoft Windows Print Spooler | Service: Spooler | Critical |
|
Active exploits | Feb 2, 2026 |
|
New PrintNightmare variant enabling system-level code execution | |||
| 19 |
|
CVE-2026-4422 | Magento (Adobe Commerce) |
|
High |
|
Exploit kits observed | Feb 3, 2026 |
|
Checkout module SQL injection abused for mass skimming attacks | |||
| 20 |
|
CVE-2026-5533 | ElasticSearch |
|
High |
|
PoC circulated | Feb 1, 2026 |
|
Insecure deserialization in ingest pipelines leading to RCE if dynamic scripting enabled | |||
| 21 |
|
CVE-2026-6644 | SAP NetWeaver |
|
Critical |
|
Mass exploitation reported | Feb 2, 2026 |
|
ISAPI module vulnerability enabling remote code execution on exposed SAP systems | |||
| 22 |
|
CVE-2026-7707 | Zimbra Collaboration |
|
Medium |
|
Exploit PoC | Feb 3, 2026 |
|
Stored XSS plus CSRF leading to admin session hijack in default installs | |||
| 23 |
|
CVE-2026-8808 | Samba |
|
High |
|
Public exploit available | Feb 1, 2026 |
|
SMBv3 session key handling flaw allows lateral movement and AD credential leakage | |||
| 24 |
|
CVE-2026-9910 | Citrix ADC |
|
Critical |
|
Active in-the-wild | Feb 3, 2026 |
|
Improper input validation in management interface yielding RCE; patch urgently required | |||
| 25 |
|
CVE-2026-1029 | Grafana |
|
Medium |
|
PoC exists | Feb 2, 2026 |
|
Dashboard JSON parsing bug can lead to token disclosure in some setups | |||
| 26 |
|
CVE-2026-1174 | LibreOffice |
|
Medium |
|
Exploit code published | Feb 1, 2026 |
|
Formula parser remote code execution via crafted ODT files | |||
| 27 |
|
CVE-2026-1288 | ZeroTier One |
|
High |
|
PoC available | Feb 3, 2026 |
|
Peer authentication bypass in certain NAT scenarios allowing tunnel hijack | |||
| 28 |
|
CVE-2026-1399 | HPE iLO |
|
Critical |
|
Exploit toolkit published | Feb 2, 2026 |
|
Remote firmware update vulnerability enabling persistent backdoor installation | |||
| 29 |
|
CVE-2026-1501 | OpenSSH |
|
Medium |
|
PoC reported | Feb 3, 2026 |
|
kex negotiation downgrade leads to information disclosure in some client-server combos | |||
| Looking for more? Great news − this is just a small sample. Jsonify production workflows process anywhere from tens of thousands to millions of real data rows per run! | |||||||||||||
Filters
Total Active Vulnerabilities
Vulnerability Type Distribution
Vulnerabilities Disclosed Over Time
New Zero-Day Exploits This Month
Most Common Vulnerabilities (CVEs)
Key Cyber Threat Observations
Emerging Cyber Threat Trends Over Time
Recent Zero-Day Exploits
| Date | Vulnerability ID | Affected Product | Severity | Source |
|---|---|---|---|---|
| 2026-01-31 | CVE-2026-0123 | Windows 10 | Critical |
|
| 2026-01-28 | CVE-2026-0117 | Apache HTTP Server | High |
|
| 2026-01-26 | CVE-2026-0105 | MySQL | Medium |
|
| 2026-01-25 | CVE-2026-0099 | Linux Kernel | Critical |
|
| 2026-01-24 | CVE-2026-0085 | Adobe Flash | High |
|
| 2026-01-20 | CVE-2026-0078 | Cisco Webex | Medium |
|
| 2026-01-18 | CVE-2026-0064 | WordPress | Critical |
|
| 2026-01-15 | CVE-2026-0051 | Zoom | High |
|
Total CVEs Reported This Year
Top Sources of Cyber Threat Information
Latest Cybersecurity Blog Insights
| Date | Source | Threat Type | Description | Severity |
|---|---|---|---|---|
| 2026-02-01 |
|
Zero-Day Exploit | New zero-day exploit discovered in major email client. | Critical |
| 2026-02-01 |
|
Vulnerability | Critical vulnerability found in popular web framework, patch available. | High |
| 2026-01-30 |
|
Emerging Threat | Rise in phishing attacks targeting remote workers reported. | Medium |
| 2026-01-29 |
|
Vulnerability | SQL injection vulnerability found in e-commerce platform. | High |
| 2026-01-28 |
|
Zero-Day Exploit | Exploited zero-day in widely-used CMS, exploitation attempts on the rise. | Critical |
| 2026-01-27 |
|
Threat Report | Increasing ransomware attacks reported in healthcare sector. | Critical |
| 2026-01-26 |
|
Exploit | Exploit code published for recent vulnerability in IoT devices. | Medium |
Vulnerability Severity Trends
Loading...
Loading...
Radar continuously monitors your selected web sources and alerts you the moment something changes.
+7
Data connections determine where the collected data will be delivered. You can add, remove, or change connections at any time.