Pilot Configuration
Pilot Phase (Scoped Evaluation)
Up to 12 weeksTypical scope: multi-country, weekly updates, multiple categories
- Real data from real sources
- Live dashboards or export feeds
- Validate scope, refresh cadence, quality
- Fixed price, no ongoing commitment
Most teams start here to validate fit before expanding.
Now, schedule a short call below to confirm scope and start the pilot, or build something new.
or email us at paul@jsonify.co
Data sources are the websites and apps where information will be collected from. These can be changed or expanded at any time. This is turned into data rows.
| id | Source | CVE_ID | Product | Severity | CVSSv3 | Exploitability | Published | Affected_Versions | Patch_Available | Notes | ||
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1 |
|
CVE-2026-0123 | OpenSSL | High |
|
Exploitation observed in wild (proof-of-concept) | Jan 31, 2026 | 1.1.1k - 1.1.1z | Buffer overflow in TLS handshake; vendor hotfix released; mitigations: disable legacy ciphers | |||
| 2 |
|
CVE-2026-0456 | Apache HTTP Server | Critical |
|
Active exploit seen in targeted campaigns | Feb 2, 2026 | 2.4.0 - 2.4.55 | Critical path traversal allowing remote code execution; apply 2.4.56 immediately | |||
| 3 |
|
CVE-2026-0789 | FortiGate (Fortinet) | Critical |
|
Public exploit code available | Feb 3, 2026 | v6.4.0 - v7.0.5 | Authentication bypass in SSL VPN; hotfix and workaround documented by vendor | |||
| 4 |
|
CVE-2026-1020 | VMware ESXi | High |
|
Proof-of-concept published on forums | Feb 1, 2026 | ESXi 7.0 U3 - 8.0 GA | Guest-to-host escape vulnerability; patch and ESXi lockdown recommended | |||
| 5 |
|
CVE-2026-1135 | Microsoft Exchange Server | Critical |
|
Exploit chains observed in ransomware incidents | Feb 2, 2026 | 2016, 2019, 2022 CU1 | Pre-auth remote code execution via malformed e-mail processing; emergency updates released | |||
| 6 |
|
CVE-2026-1212 | OpenVPN | Medium |
|
Limited proof-of-concept | Feb 3, 2026 | 2.4.0 - 2.5.5 | UDP fragmentation handling leads to DoS; maintainers published patch and advisory | |||
| 7 |
|
CVE-2026-1301 | Drupal CMS | High |
|
Exploit scripts circulating on dark web | Feb 4, 2026 | 8.x, 9.x | SQLi in search module; update recommended and review logs for suspicious queries | |||
| 8 |
|
CVE-2026-1400 | Cisco ASA | High |
|
Proof-of-concept published | Feb 2, 2026 | 9.8 - 9.18 | Management interface buffer overflow; apply recommended firmware and restrict access | |||
| 9 |
|
CVE-2026-1502 | SAP NetWeaver | Critical |
|
Targeted attacks reported | Jan 30, 2026 | 7.5 - 7.7 | Business logic bypass exposing financial data; SAP notes emergency patching required | |||
| 10 |
|
CVE-2026-1533 | WordPress Plugin: FileManager | Critical |
|
Active mass-exploitation observed | Feb 3, 2026 |
|
Unauthenticated upload and RCE; remove plugin if unpatched | |||
| 11 |
|
CVE-2026-1607 | Jenkins | High |
|
Exploit scripts available publicly | Feb 1, 2026 | 2.346 - 2.370 | CSRF combined with privilege escalation in pipeline plugin | |||
| 12 |
|
CVE-2026-1678 | Samba | High |
|
Proof-of-concept reported | Feb 4, 2026 | 4.9 - 4.15 | Improper validation in RPC leads to RCE on file servers | |||
| 13 |
|
CVE-2026-1750 | Zoho ManageEngine | Critical |
|
Exploit observed in active campaigns | Feb 2, 2026 | <= 12.4 | Unauthenticated remote code execution in web console; immediate patching required | |||
| 14 |
|
CVE-2026-1803 | ElasticSearch | High |
|
Public PoC | Feb 3, 2026 | 7.10 - 8.0.1 | Unauthenticated access to snapshots; ensure network restrictions and patch | |||
| 15 |
|
CVE-2026-1904 | Pulse Secure | Critical |
|
Exploit kits integrated by threat actors | Feb 1, 2026 | 8.0 - 9.1 | Auth bypass in VPN appliances; vendors released hotfix and recommended mitigations | |||
| 16 |
|
CVE-2026-2005 | Chromium | High |
|
Active exploitation in targeted phishing | Feb 4, 2026 | < 118.0.5993 | Renderer sandbox escape; update browser to latest stable | |||
| 17 |
|
CVE-2026-2099 | Adobe Acrobat Reader | Medium |
|
Limited PoC | Jan 30, 2026 | <= 2025.012.20014 | Use-after-free in PDF parsing; upgrade to vendor patch | |||
| 18 |
|
CVE-2026-2150 | Atlassian Confluence | High |
|
Exploit chains observed | Feb 2, 2026 |
|
Server-side template injection leading to RCE; patch and review access logs | |||
| 19 |
|
CVE-2026-2201 | Microsoft Teams (desktop) | Medium |
|
PoC limited to lab conditions | Feb 3, 2026 | < 1.6.00 | Elevation of privilege via local IPC handling; update application | |||
| 20 |
|
CVE-2026-2277 | Oracle WebLogic | Critical |
|
Exploit code publicly available | Feb 1, 2026 | 12.2.1.4 - 14.1.1.0 | Remote RCE through XML parser; apply CPU patch and isolate consoles | |||
| 21 |
|
CVE-2026-2355 | Trend Micro Apex One | High |
|
Limited exploits reported | Feb 4, 2026 | < 2025.4.1 | Agent privilege escalation via update mechanism; update endpoint agents | |||
| 22 |
|
CVE-2026-2429 | HAProxy | Medium |
|
PoC available | Feb 2, 2026 | 1.8 - 2.5 | HTTP/2 frame handling bug causes DoS; upgrade to fixed release | |||
| 23 |
|
CVE-2026-2500 | Red Hat Satellite | High |
|
Targeted exploitation reported | Feb 3, 2026 | 6.10 - 6.12 | Privilege escalation in lifecycle management; apply errata | |||
| 24 |
|
CVE-2026-2588 | SQLite | Medium |
|
PoC in research repo | Jan 31, 2026 | 3.36.0 - 3.41.0 | Integer overflow in B-tree module; downstream apps should update embedded libraries | |||
| 25 |
|
CVE-2026-2671 | Google Kubernetes Engine (GKE) component | High |
|
Exploit demonstrated in proof-of-concept | Feb 4, 2026 | kubelet v1.25 - v1.27 | Container escape via misconfigured admission controller; patch and enforce RBAC | |||
| 26 |
|
CVE-2026-2750 | Nginx | High |
|
Exploit modules circulating | Feb 2, 2026 | 1.18 - 1.24 | HTTP/2 header parsing leads to RCE in certain modules; update and audit third-party modules | |||
| 27 |
|
CVE-2026-2833 | Splunk Enterprise | High |
|
Exploit code in closed research, limited public PoC | Feb 1, 2026 | 8.2 - 9.0 | Auth bypass via malformed payloads in REST API; apply patches and rotate credentials | |||
| 28 |
|
CVE-2026-2900 | BIND DNS Server | Medium |
|
PoC in community mailing list | Feb 3, 2026 | 9.10 - 9.18 | Cache poisoning variant under specific conditions; update DNS servers and enable DNSSEC | |||
| Looking for more? Great news − this is just a small sample. Jsonify production workflows process anywhere from tens of thousands to millions of real data rows per run! | ||||||||||||
Filters
Total Active Vulnerabilities
Vulnerability Types Distribution
Key Vulnerability Intelligence Insights
New Vulnerabilities Identified Today
Emerging Threat Indicators
Historical CVE Reports Over Time
Vulnerability Trends Over Last 30 Days
Recent Threat Reports
| Source | Report Title | Vulnerability Type | Date | Severity |
|---|---|---|---|---|
|
|
CVE-2026-12345: Remote Code Execution Vulnerability | Remote Code Execution | 2026-01-10 | Critical |
|
|
CVE-2026-67890: SQL Injection Flaw in Web Applications | SQL Injection | 2026-01-08 | High |
|
|
New Malware Strain Targeting IoT Devices | Malware | 2026-01-09 | Medium |
|
|
Data Breach: 1.2 million accounts compromised | Data Breach | 2026-01-11 | High |
|
|
Emerging Phishing Techniques Observed in the Wild | Phishing | 2026-01-05 | Medium |
|
|
New Regulations on Data Protection in EU | Regulatory Change | 2026-01-12 | N/A |
|
|
Analysis of Dark Web Activity Related to Ransomware | Ransomware | 2026-01-07 | N/A |
Sources of Threat Intelligence
Top 5 CVEs by Severity
New Regulatory Compliance Changes
| Date | Source | Regulation | Impact | Details |
|---|---|---|---|---|
| 2026-01-05 |
|
GDPR Amendment | High | Changes in data processing consent requirements. |
| 2026-01-10 |
|
CIS Controls Update | Medium | Refinements to security controls for cloud environments. |
| 2026-01-08 |
|
CCPA Enhancement | High | Increased penalties for non-compliance with consumer data requests. |
| 2026-01-11 |
|
PCI DSS Version 4.0 | Medium | New requirements for enhanced encryption standards. |
| 2026-01-07 |
|
HIPAA Changes | Medium | Clarifications on patient data access rights. |
| 2026-01-12 |
|
ISO 27001 Update | High | Introduction of new risk assessment guidelines. |
| 2026-01-09 |
|
FISMA Revision | Low | Updates to federal information security management framework. |
| 2026-01-04 |
|
Data Breach Notification Law | High | Mandatory notification period reduced to 30 days. |
Total Data Breaches Reported
Loading...
Loading...
Radar continuously monitors your selected web sources and alerts you the moment something changes.
+7
Data connections determine where the collected data will be delivered. You can add, remove, or change connections at any time.