Jsonify Configuration Template
Data sources are the websites and apps where information will be collected from. These can be changed or expanded at any time. This is turned into data rows.
| id | Source | CVE | Product | Version | Severity | CVSSv3 | Exploitability | Published | PatchAvailable | PatchURL | Notes | ||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1 |
|
CVE-2026-0451 | OpenSSL |
|
Critical |
|
Public PoC reported | Feb 2, 2026 |
|
NULL pointer deref in TLS 1.3 session resumption; CVSS ties to remote code execution in certain configs ... show all |
|||
| 2 |
|
CVE-2026-1020 | Apache HTTP Server |
|
High |
|
Exploit code circulating | Feb 3, 2026 |
|
mod_proxy mis-parsing headers allows request smuggling leading to RCE in proxied apps | |||
| 3 |
|
CVE-2026-1107 | Microsoft Exchange | 2019 CU12 | Critical |
|
Active exploitation observed | Feb 1, 2026 |
|
Auth bypass in OWA leading to privilege escalation; attackers leveraging web shells | |||
| 4 |
|
CVE-2026-2134 | VMware vCenter |
|
Critical |
|
Exploit PoC public | Feb 2, 2026 |
|
vCenter server SSRF chaining to RCE; appliances should be isolated until patch applied | |||
| 5 |
|
CVE-2026-0078 | Google Chrome |
|
High |
|
In-the-wild exploit reported | Feb 3, 2026 |
|
Type confusion in V8 leading to arbitrary code execution via crafted web content | |||
| 6 |
|
CVE-2026-3301 | Fortinet FortiOS |
|
Critical |
|
Weaponized exploit kits | Feb 2, 2026 |
|
Authentication bypass in SSL VPN; multiple campaigns exploiting default configs | |||
| 7 |
|
CVE-2026-2420 | Cisco IOS XE |
|
High |
|
PoC published | Feb 1, 2026 |
|
Buffer overflow in SNMP processing leading to remote code execution on routers | |||
| 8 |
|
CVE-2026-4005 | WordPress Plugin: WP Fast Cache |
|
Medium |
|
Exploit script on DB | Feb 2, 2026 |
|
Unauthenticated file upload allowing webshells if uploads not sanitized | |||
| 9 |
|
CVE-2026-5012 | Trend Micro Apex One |
|
High |
|
Proof-of-concept | Feb 3, 2026 |
|
Privilege escalation via agent upgrade mechanism; recommended emergency update | |||
| 10 |
|
CVE-2026-6009 | Sophos Firewall |
|
Critical |
|
Active exploitation reported | Feb 1, 2026 |
|
Admin auth bypass in REST API; attackers deploying ransomware post-compromise | |||
| 11 |
|
CVE-2026-7100 | Pulse Secure |
|
Critical |
|
Exploit code public | Feb 3, 2026 |
|
Unauthenticated RCE in VPN portal; nation-state actors scanning widely | |||
| 12 |
|
CVE-2026-8123 | Docker Engine |
|
High |
|
Local exploit available | Feb 2, 2026 |
|
Container escape via mis-handled user namespaces; apply update on hosts running untrusted containers | |||
| 13 |
|
CVE-2026-9011 | Adobe Reader |
|
High |
|
In-the-wild | Feb 3, 2026 |
|
Heap overflow in PDF parsing used in targeted phishing | |||
| 14 |
|
CVE-2026-9802 | JetBrains TeamCity |
|
Medium |
|
PoC posted | Feb 1, 2026 |
|
SSRF leading to credential exposure when CI agents accept untrusted callbacks | |||
| 15 |
|
CVE-2026-0377 | Juniper Junos |
|
High |
|
Exploit PoC | Feb 2, 2026 |
|
Management plane buffer overflow exploitable via crafted NETCONF payloads | |||
| 16 |
|
CVE-2026-1575 | Redis |
|
Medium |
|
PoC disclosed | Feb 3, 2026 |
|
Lua VM sandbox bypass in certain eval contexts; risk for multi-tenant setups | |||
| 17 |
|
CVE-2026-2446 | phpMyAdmin |
|
High |
|
Exploit code available | Feb 1, 2026 |
|
CSRF + privilege escalation chain allowing DB dump retrieval | |||
| 18 |
|
CVE-2026-3010 | Microsoft Windows Print Spooler | Service: Spooler | Critical |
|
Active exploits | Feb 2, 2026 |
|
New PrintNightmare variant enabling system-level code execution | |||
| 19 |
|
CVE-2026-4422 | Magento (Adobe Commerce) |
|
High |
|
Exploit kits observed | Feb 3, 2026 |
|
Checkout module SQL injection abused for mass skimming attacks | |||
| 20 |
|
CVE-2026-5533 | ElasticSearch |
|
High |
|
PoC circulated | Feb 1, 2026 |
|
Insecure deserialization in ingest pipelines leading to RCE if dynamic scripting enabled | |||
| 21 |
|
CVE-2026-6644 | SAP NetWeaver |
|
Critical |
|
Mass exploitation reported | Feb 2, 2026 |
|
ISAPI module vulnerability enabling remote code execution on exposed SAP systems | |||
| 22 |
|
CVE-2026-7707 | Zimbra Collaboration |
|
Medium |
|
Exploit PoC | Feb 3, 2026 |
|
Stored XSS plus CSRF leading to admin session hijack in default installs | |||
| 23 |
|
CVE-2026-8808 | Samba |
|
High |
|
Public exploit available | Feb 1, 2026 |
|
SMBv3 session key handling flaw allows lateral movement and AD credential leakage | |||
| 24 |
|
CVE-2026-9910 | Citrix ADC |
|
Critical |
|
Active in-the-wild | Feb 3, 2026 |
|
Improper input validation in management interface yielding RCE; patch urgently required | |||
| 25 |
|
CVE-2026-1029 | Grafana |
|
Medium |
|
PoC exists | Feb 2, 2026 |
|
Dashboard JSON parsing bug can lead to token disclosure in some setups | |||
| 26 |
|
CVE-2026-1174 | LibreOffice |
|
Medium |
|
Exploit code published | Feb 1, 2026 |
|
Formula parser remote code execution via crafted ODT files | |||
| 27 |
|
CVE-2026-1288 | ZeroTier One |
|
High |
|
PoC available | Feb 3, 2026 |
|
Peer authentication bypass in certain NAT scenarios allowing tunnel hijack | |||
| 28 |
|
CVE-2026-1399 | HPE iLO |
|
Critical |
|
Exploit toolkit published | Feb 2, 2026 |
|
Remote firmware update vulnerability enabling persistent backdoor installation | |||
| 29 |
|
CVE-2026-1501 | OpenSSH |
|
Medium |
|
PoC reported | Feb 3, 2026 |
|
kex negotiation downgrade leads to information disclosure in some client-server combos | |||
| Looking for more? Great news − this is just a small sample. Jsonify production workflows process anywhere from tens of thousands to millions of real data rows per run! | |||||||||||||
Filters
Total Active Vulnerabilities
Vulnerability Type Distribution
Vulnerabilities Disclosed Over Time
New Zero-Day Exploits This Month
Most Common Vulnerabilities (CVEs)
Key Cyber Threat Observations
Emerging Cyber Threat Trends Over Time
Recent Zero-Day Exploits
| Date | Vulnerability ID | Affected Product | Severity | Source |
|---|---|---|---|---|
| 2026-01-31 | CVE-2026-0123 | Windows 10 | Critical |
|
| 2026-01-28 | CVE-2026-0117 | Apache HTTP Server | High |
|
| 2026-01-26 | CVE-2026-0105 | MySQL | Medium |
|
| 2026-01-25 | CVE-2026-0099 | Linux Kernel | Critical |
|
| 2026-01-24 | CVE-2026-0085 | Adobe Flash | High |
|
| 2026-01-20 | CVE-2026-0078 | Cisco Webex | Medium |
|
| 2026-01-18 | CVE-2026-0064 | WordPress | Critical |
|
| 2026-01-15 | CVE-2026-0051 | Zoom | High |
|
Total CVEs Reported This Year
Top Sources of Cyber Threat Information
Latest Cybersecurity Blog Insights
| Date | Source | Threat Type | Description | Severity |
|---|---|---|---|---|
| 2026-02-01 |
|
Zero-Day Exploit | New zero-day exploit discovered in major email client. | Critical |
| 2026-02-01 |
|
Vulnerability | Critical vulnerability found in popular web framework, patch available. | High |
| 2026-01-30 |
|
Emerging Threat | Rise in phishing attacks targeting remote workers reported. | Medium |
| 2026-01-29 |
|
Vulnerability | SQL injection vulnerability found in e-commerce platform. | High |
| 2026-01-28 |
|
Zero-Day Exploit | Exploited zero-day in widely-used CMS, exploitation attempts on the rise. | Critical |
| 2026-01-27 |
|
Threat Report | Increasing ransomware attacks reported in healthcare sector. | Critical |
| 2026-01-26 |
|
Exploit | Exploit code published for recent vulnerability in IoT devices. | Medium |
Vulnerability Severity Trends
Loading...
Loading...
Radar continuously monitors your selected web sources and alerts you the moment something changes.
+7
Data connections determine where the collected data will be delivered. You can add, remove, or change connections at any time.