Exploit  List -  2024  2023  2021  2020  2019  2018

DATE

NAME

CATEGORY

WEB

29.12.23

Apache OFBiz RCE flaw exploited to find vulnerable Confluence serversExploit

BleepingComputer

27.12.23

Chinese Hackers Exploited New Zero-Day in Barracuda's ESG AppliancesExploitThe Hacker News

24.12.23

Google fixes 8th Chrome zero-day exploited in attacks this yearExploit

BleepingComputer

23.12.23

Hackers Exploiting MS Excel Vulnerability to Spread Agent Tesla MalwareExploitThe Hacker News

19.12.23

Beware: Experts Reveal New Details on Zero-Click Outlook RCE ExploitsExploitThe Hacker News

17.12.23

QNAP VioStor NVR vulnerability actively exploited by malware botnetExploit

BleepingComputer

14.12.23

Hackers are exploiting critical Apache Struts flaw using public PoCExploit

BleepingComputer

13.12.23

Microsoft Warns of Hackers Exploiting OAuth for Cryptocurrency Mining and PhishingExploitThe Hacker News

9.12.23

Privilege elevation exploits used in over 50% of insider attacksExploit

BleepingComputer

8.12.23

Hackers breach US govt agencies using Adobe ColdFusion exploitExploit

BleepingComputer

8.12.23

Russian hackers exploiting Outlook bug to hijack Exchange accountsExploit

BleepingComputer

8.12.23

Hacking the Human Mind: Exploiting Vulnerabilities in the 'First Line of Cyber Defense'Exploit

The Hacker News

2.12.23

Hackers start exploiting critical ownCloud flaw, patch nowExploit

BleepingComputer

29.11.23

Iranian Hackers Exploit PLCs in Attack on Water Authority in U.S.Exploit

The Hacker News

28.11.23

Hackers Can Exploit 'Forced Authentication' to Steal Windows NTLM TokensExploitThe Hacker News

21.11.23

Kinsing malware exploits Apache ActiveMQ RCE to plant rootkitsExploit

BleepingComputer

21.11.23

Russian hackers use Ngrok feature and WinRAR exploit to attack embassiesExploit

BleepingComputer

20.11.23

Randstorm Exploit: Bitcoin Wallets Created b/w 2011-2015 Vulnerable to HackingExploit

The Hacker News

19.11.23

Exploit for CrushFTP RCE chain released, patch nowExploit

BleepingComputer

19.11.23

Google: Hackers exploited Zimbra zero-day in attacks on govt orgsExploit

BleepingComputer

19.11.23

CISA warns of actively exploited Windows, Sophos, and Oracle bugsExploit

BleepingComputer

14.11.23

CISA warns of actively exploited Juniper pre-auth RCE exploit chainExploit

BleepingComputer

10.11.23Hackers exploit Looney Tunables Linux bug, steal cloud credsExploitBleepingComputer
10.11.23Zero-Day Alert: Lace Tempest Exploits SysAid IT Support Software VulnerabilityExploitThe Hacker News
9.11.23CISA Alerts: High-Severity SLP Vulnerability Now Under Active ExploitationExploitThe Hacker News
4.11.23New Microsoft Exchange zero-days allow RCE, data theft attacksExploitBleepingComputer
3.11.23Atlassian warns of exploit for Confluence data wiping bug, get patchingExploitBleepingComputer
3.11.233,000 Apache ActiveMQ servers vulnerable to RCE attacks exposed onlineExploit

BleepingComputer

3.11.23Hackers exploit recent F5 BIG-IP flaws in stealthy attacksExploitBleepingComputer
31.10.23Exploit released for critical Cisco IOS XE flaw, many hosts still hackedExploitBleepingComputer
31.10.23RCE exploit for Wyze Cam v3 publicly released, patch nowExploit

BleepingComputer

27.10.23Citrix Bleed exploit lets hackers hijack NetScaler accountsExploitBleepingComputer
27.10.23iLeakage: New Safari Exploit Impacts Apple iPhones and Macs with A- and M-Series CPUsExploitThe Hacker News
26.10.23Nation State Hackers Exploiting Zero-Day in Roundcube Webmail SoftwareExploitThe Hacker News
21.10.23Cisco discloses new IOS XE zero-day exploited to deploy malware implantExploitBleepingComputer
21.10.23Cisco Zero-Day Exploited to Implant Malicious Lua Backdoor on Thousands of DevicesExploitThe Hacker News

19.10.23

North Korean hackers exploit critical TeamCity flaw to breach networksExploit

BleepingComputer

19.10.23

Recently patched Citrix NetScaler bug exploited as zero-day since AugustExploit

BleepingComputer

19.10.23

Hackers exploit critical flaw in WordPress Royal Elementor pluginExploitBleepingComputer

19.10.23

Cisco warns of new IOS XE zero-day actively exploited in attacksExploit

BleepingComputer

19.10.23

Microsoft Warns of North Korean Attacks Exploiting JetBrains TeamCity FlawExploitThe Hacker News

19.10.23

Google TAG Detects State-Backed Threat Actors Exploiting WinRAR FlawExploitThe Hacker News

19.10.23

Critical Citrix NetScaler Flaw Exploited to Target from Government, Tech FirmsExploitThe Hacker News

16.10.23

Binance's Smart Chain Exploited in New 'EtherHiding' Malware CampaignExploitThe Hacker News
14.10.23Microsoft: State hackers exploiting Confluence zero-day since SeptemberExploit

BleepingComputer

11.10.23Microsoft Warns of Nation-State Hackers Exploiting Critical Atlassian Confluence VulnerabilityExploitThe Hacker News
10.10.23Citrix Devices Under Attack: NetScaler Flaw Exploited to Capture User CredentialsExploitThe Hacker News
7.10.23Exploits released for Linux flaw giving root on major distrosExploit

BleepingComputer

7.10.23Qualcomm says hackers exploit 3 zero-days in its GPU, DSP driversExploit

BleepingComputer

7.10.23Exploit available for critical WS_FTP bug exploited in attacksExploit

BleepingComputer

7.10.23Arm warns of Mali GPU flaws likely exploited in targeted attacksExploit

BleepingComputer

5.10.23CISA Warns of Active Exploitation of JetBrains and Windows VulnerabilitiesExploitThe Hacker News
5.10.23Atlassian Confluence Hit by New Actively Exploited Zero-Day – Patch NowExploitThe Hacker News
4.10.23Qualcomm Releases Patch for 3 new Zero-Days Under Active ExploitationExploitThe Hacker News
3.10.23Arm Issues Patch for Mali GPU Kernel Driver Vulnerability Amidst Ongoing ExploitationExploitThe Hacker News
1.10.23Millions of Exim mail servers exposed to zero-day RCE attacksExploit

BleepingComputer

1.10.23Exploit released for Microsoft SharePoint Server auth bypass flawExploit

BleepingComputer

1.10.23Hackers actively exploiting Openfire flaw to encrypt serversExploit

BleepingComputer

30.9.23Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation AttemptsExploitThe Hacker News
30.9.23Critical libwebp Vulnerability Under Active Exploitation - Gets Maximum CVSS ScoreExploitThe Hacker News

23.9.23

Trend Micro addresses actively exploited zero-day in Apex One and other security ProductsExploitSecurityaffairs

16.9.23

Windows 11 ‘ThemeBleed’ RCE bug gets proof-of-concept exploitExploit

BleepingComputer

14.9.23

Mozilla patches Firefox, Thunderbird against zero-day exploited in attacksExploit

BleepingComputer

13.9.23

Microsoft Releases Patch for Two New Actively Exploited Zero-Days FlawsExploitThe Hacker News

13.9.23

Update Adobe Acrobat and Reader to Patch Actively Exploited VulnerabilityExploitThe Hacker News

13.9.23

Mozilla Rushes to Patch WebP Critical Zero-Day Exploit in Firefox and ThunderbirdExploitThe Hacker News

12.9.23

Google Rushes to Patch Critical Chrome Vulnerability Exploited in the Wild - Update NowExploitThe Hacker News

10.9.23

US CISA added critical Apache RocketMQ flaw to its Known Exploited Vulnerabilities catalogExploitSecurityaffairs

8.9.23

Cisco warns of VPN zero-day exploited by ransomware gangsExploit

BleepingComputer

8.9.23

CISA warns of critical Apache RocketMQ bug exploited in attacksExploit

BleepingComputer

8.9.23

North Korean Hackers Exploit Zero-Day Bug to Target Cybersecurity ResearchersExploitThe Hacker News

8.9.23

CISA Warning: Nation-State Hackers Exploit Fortinet and Zoho VulnerabilitiesExploitThe Hacker News

7.9.23

Google addressed an actively exploited zero-day in Android

Exploit

Securityaffairs

7.9.23

Zero-Day Alert: Latest Android Patch Update Includes Fix for Newly Actively Exploited FlawExploitThe Hacker News

6.9.23

Publicly available Evil_MinIO exploit used in attacks on MinIO Storage SystemsExploit

Securityaffairs

6.9.23

Hackers exploit MinIO storage system to breach corporate networksExploit

BleepingComputer

5.9.23

Hackers Exploit MinIO Storage System Vulnerabilities to Compromise ServersExploitThe Hacker News

4.9.23

PoC exploit code released for CVE-2023-34039 bug in VMware Aria Operations for NetworksExploit

Securityaffairs

3.9.23PoC Exploit Released for Critical VMware Aria's SSH Auth Bypass VulnerabilityExploitThe Hacker News
31.8.23

Hackers Can Exploit Windows Container Isolation Framework to Bypass Endpoint Security

ExploitThe Hacker News
30.8.23Researchers published PoC exploit code for Juniper SRX firewall flawsExploitSecurityaffairs
30.8.23Hackers exploit critical Juniper RCE bug chain after PoC releaseExploitBleepingComputer
30.8.23Alert: Juniper Firewalls, Openfire, and Apache RocketMQ Under Attack from New ExploitsExploitThe Hacker News
30.8.23Chinese Hacking Group Exploits Barracuda Zero-Day to Target Government, Military, and TelecomExploitThe Hacker News
29.8.23Exploit released for Juniper firewall bugs allowing RCE attacksExploitBleepingComputer
28.8.23Experts Uncover How Cybercriminals Could Exploit Microsoft Entra ID for Elevated PrivilegeExploitThe Hacker News
26.8.23Researchers released PoC exploit for Ivanti Sentry flaw CVE-2023-38035ExploitSecurityaffairs
26.8.23More than 3,000 Openfire servers exposed to attacks using a new exploitExploitSecurityaffairs
25.8.23Exploit released for Ivanti Sentry bug abused as zero-day in attacksExploitBleepingComputer
25.8.23Hackers use public ManageEngine exploit to breach internet orgExploitBleepingComputer
20.8.23Hacking ATMs by exploiting flaws in ScrutisWeb ATM fleet softwareExploitSecurityaffairs
11.8.23Hackers use open source Merlin post-exploitation toolkit in attacksExploitBleepingComputer
10.8.23

Emerging Attacker Exploit: Microsoft Cross-Tenant Synchronization

ExploitThe Hacker News
4.8.23Rapid7 found a bypass for the recently patched actively exploited Ivanti EPMM bugExploitSecurityaffairs
4.8.23FBI, CISA, and NSA reveal top exploited vulnerabilities of 2022ExploitBleepingComputer
4.8.23Major Cybersecurity Agencies Collaborate to Unveil 2022's Most Exploited VulnerabilitiesExploitThe Hacker News
1.8.23Hackers exploit BleedingPipe RCE to target Minecraft servers, playersExploitBleepingComputer
31.7.23In 2022, more than 40% of zero-day exploits used in the wild were variations of previous issuesExploitSecurityaffairs
28.7.23Cybersecurity Agencies Warn Against IDOR Bugs Exploited for Data BreachesExploitThe Hacker News

23.7.23

Over 15K Citrix servers likely vulnerable to CVE-2023-3519 attacksExploit

BleepingComputer

22.7.23

Netscaler ADC bug exploited to breach US critical infrastructure org

Exploit

BleepingComputer

19.7.23Citrix warns of actively exploited zero-day in ADC and GatewayExploit

Securityaffairs

19.7.23New critical Citrix ADC and Gateway flaw exploited as zero-dayExploit

BleepingComputer

19.7.23Zero-Day Attacks Exploited Critical Vulnerability in Citrix ADC and GatewayExploitThe Hacker News
18.7.23Adobe warns customers of a critical ColdFusion RCE exploited in attacksExploit

Securityaffairs

18.7.23Hackers exploiting critical WordPress WooCommerce Payments bugExploit

BleepingComputer

18.7.23Critical ColdFusion flaws exploited in attacks to drop webshellsExploit

BleepingComputer

18.7.23Cybercriminals Exploiting WooCommerce Payments Plugin Flaw to Hijack WebsitesExploit

The Hacker News

18.7.23Hackers Exploit WebAPK to Deceive Android Users into Installing Malicious AppsExploit

The Hacker News

17.7.23Gamaredon hackers start stealing data 30 minutes after a breachExploit

BleepingComputer

17.7.23Cybercriminals Exploit Microsoft Word Vulnerabilities to Deploy LokiBot MalwareExploit

The Hacker News

15.7.23Zimbra urges customers to manually fix actively exploited zero-day reported by Google TAGExploit

Securityaffairs

15.7.23Experts released PoC exploit for Ubiquiti EdgeRouter flawExploit

Securityaffairs

15.7.23Rockwell warns of new APT RCE exploit targeting critical infrastructureExploit

BleepingComputer

13.7.23Hackers exploit Windows policy to load malicious kernel driversExploitBleepingComputer
12.7.23Hackers Exploit Windows Policy Loophole to Forge Kernel-Mode Driver SignaturesExploit

The Hacker News

1.7.23Experts published PoC exploits for Arcserve UDP authentication bypass issueExploitSecurityaffairs
1.7.23Hackers exploit zero-day in Ultimate Member WordPress plugin with 200K installsExploitBleepingComputer
30.6.23Exploit released for new Arcserve UDP auth bypass vulnerabilityExploitBleepingComputer
23.6.23PoC Exploit Published for Cisco AnyConnect Secure VulnerabilityExploit

Securityweek

22.6.23Exploit released for Cisco AnyConnect bug giving SYSTEM privilegesExploitBleepingComputer
22.6.23ScarCruft Hackers Exploit Ably Service for Stealthy Wiretapping AttacksExploitThe Hacker News

17.6.23

In Other News: Linux Kernel Exploits, Update on BEC Losses, Cybersecurity Awareness Act

Exploit

Securityweek

4.5.23Researchers Uncover New Exploit for PaperCut Vulnerability That Can Bypass DetectionExploitThe Hacker News
2.5.23Alert: Active Exploitation of TP-Link, Apache, and Oracle Vulnerabilities DetectedExploitThe Hacker News
24.4.23Hackers Exploit Outdated WordPress Plugin to Backdoor Thousands of WordPress SitesExploitThe Hacker News
24.4.23Russian Hackers Suspected in Ongoing Exploitation of Unpatched PaperCut ServersExploitThe Hacker News
22.4.23CISA Adds 3 Actively Exploited Flaws to KEV Catalog, including Critical PaperCut BugExploitThe Hacker News
20.4.23Fortra Sheds Light on GoAnywhere MFT Zero-Day Exploit Used in Ransomware AttacksExploitThe Hacker News
10.4.23CISA Warns of 5 Actively Exploited Security Flaws: Urgent Action RequiredExploitThe Hacker News
5.4.23Hackers Using Self-Extracting Archives Exploit for Stealthy Backdoor AttacksExploitThe Hacker News
21.3.23Chinese Hackers Exploit Fortinet Zero-Day Flaw for Cyber Espionage AttackExploit

The Hacker News

17.3.23New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS AttacksExploit

The Hacker News

16.3.23

Multiple Hacker Groups Exploit 3-Year-Old Vulnerability to Breach U.S. Federal AgencyExploit

The Hacker News

16.3.23

Critical Microsoft Outlook bug PoC shows how easy it is to exploitExploit

Bleepingcomputer

16.3.23

Microsoft fixes Windows zero-day exploited in ransomware attacksExploit

Bleepingcomputer

16.3.23

Cybercriminals exploit SVB collapse to steal money and dataExploit

Bleepingcomputer

12.3.23

CISA warns of actively exploited Plex bug after LastPass breach

Exploit

Bleepingcomputer

2.3.23Hackers Exploit Containerized Environments to Steals Proprietary Data and SoftwareExploit

The Hacker News

28.2.23

CISA Issues Warning on Active Exploitation of ZK Java Web Framework VulnerabilityExploit

The Hacker News

28.2.23

Researchers Share New Insights Into RIG Exploit Kit Malware's OperationsExploit

The Hacker News

22.2.23

Threat Actors Adopt Havoc Framework for Post-Exploitation in Targeted AttacksExploitThe Hacker News
7.2.23Hackers Exploit Vulnerabilities in Sunlogin to Deploy Sliver C2 FrameworkExploitThe Hacker News
6.2.23Warning: Hackers Actively Exploiting Zero-Day in Fortra's GoAnywhere MFTExploitThe Hacker News
1.2.23

New SH1MMER Exploit for Chromebook Unenrolls Managed ChromeOS Devices

ExploitThe Hacker News
26.1.23Researchers Release PoC Exploit for Windows CryptoAPI Bug Discovered by NSAExploitThe Hacker News
20.1.23Chinese Hackers Exploited Recent Fortinet Flaw as 0-Day to Drop MalwareExploitThe Hacker News
17.1.23Zoho ManageEngine PoC Exploit to be Released Soon - Patch Before It's Too Late!ExploitThe Hacker News