Exploit  List -  2026  2025  2024  2023  2021  2020  2019  2018

DATE

NAME

Info

CATEG.

WEB

30.1.26 Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released Ivanti has rolled out security updates to address two security flaws impacting Ivanti Endpoint Manager Mobile (EPMM) that have been exploited in zero-day Exploit The Hacker News
28.1.26 Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088 Google on Tuesday revealed that multiple threat actors, including nation-state adversaries and financially motivated groups, are exploiting a now-patched Exploit The Hacker News
27.1.26 Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation Microsoft on Monday issued out-of-band security patches for a high-severity Microsoft Office zero-day vulnerability exploited in attacks. The vulnerability, Exploit The Hacker News
25.1.26 CISA confirms active exploitation of four enterprise software bugs The Cybersecurity and Infrastructure Security Agency (CISA) in the U.S. warned of active exploitation of four vulnerabilities impacting enterprise software from Versa and Zimbra, the Vite frontend tooling framework, and the Prettier code formatter. Exploit

BleepingComputer

25.1.26 Hackers exploit critical telnetd auth bypass flaw to get root A coordinated campaign has been observed targeting a recently disclosed critical-severity vulnerability that has been present in the GNU InetUtils telnetd server for 11 years. Exploit

BleepingComputer

25.1.26 SmarterMail auth bypass flaw now exploited to hijack admin accounts Hackers began exploiting an authentication bypass vulnerability in SmarterTools' SmarterMail email server and collaboration tool that allows resetting admin passwords. Exploit

BleepingComputer

25.1.26 Hackers exploit security testing apps to breach Fortune 500 firms Threat actors are exploiting misconfigured web applications used for security training and internal penetration testing, such as DVWA, OWASP Juice Shop, Hackazon, and bWAPP, to gain access to cloud environments of Fortune 500 companies and security vendors. Exploit

BleepingComputer

24.1.26 CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw affecting Broadcom VMware vCenter Server that Exploit The Hacker News
24.1.26 CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added four security flaws to its Known Exploited Vulnerabilities ( KEV ) catalog, Exploit The Hacker News
22.1.26 SmarterMail Auth Bypass Exploited in the Wild Two Days After Patch Release A new security flaw in SmarterTools SmarterMail email software has come under active exploitation in the wild, two days after the release of a patch. The Exploit The Hacker News
22.1.26 Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations Cybersecurity company Arctic Wolf has warned of a "new cluster of automated malicious activity" that involves unauthorized firewall configuration changes Exploit The Hacker News
18.1.26 Hackers now exploiting critical Fortinet FortiSIEM flaw in attacks Attackers are now exploiting a critical Fortinet FortiSIEM vulnerability with publicly available proof-of-concept exploit code. Exploit

BleepingComputer

18.1.26 Hackers exploit Modular DS WordPress plugin flaw for admin access Hackers are actively exploiting a maximum severity flaw in the Modular DS WordPress plugin that allows them to bypass authentication remotely and access the vulnerable sites with admin-level privileges. Exploit

BleepingComputer

18.1.26 Exploit code public for critical FortiSIEM command injection flaw Technical details and a public exploit have been published for a critical vulnerability affecting Fortinet's Security Information and Event Management (SIEM) solution that could be leveraged by a remote, unauthenticated attacker to execute commands or code. Exploit

BleepingComputer

17.1.26 CISA orders feds to patch Gogs RCE flaw exploited in zero-day attacks CISA has ordered government agencies to secure their systems against a high-severity Gogs vulnerability that was exploited in zero-day attacks. Exploit

BleepingComputer

16.1.26 Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways Cisco on Thursday released security updates for a maximum-severity security flaw impacting Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager, nearly a month after the company disclosed that it had been exploited as a zero-day by a China-nexus advanced persistent threat (APT) actor codenamed UAT-9686. Exploit The Hacker News
16.1.26 Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access A maximum-severity security flaw in a WordPress plugin called Modular DS has come under active exploitation in the wild, according to Patchstack. The vulnerability, tracked as CVE- Exploit The Hacker News
14.1.26 CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned of active exploitation of a high-severity security flaw impacting Gogs by adding it to its Known Exploit The Hacker News
10.1.26 VMware ESXi zero-days likely exploited a year before disclosure Chinese-speaking threat actors used a compromised SonicWall VPN appliance to deliver a VMware ESXi exploit toolkit that seems to have been developed more than a year before the targeted vulnerabilities became publicly known. Exploit

BleepingComputer

10.1.26 Cisco warns of Identity Service Engine flaw with exploit code Cisco has patched an ISE vulnerability with public proof-of-concept exploit code that can be abused by attackers with admin privileges. Exploit

BleepingComputer

10.1.26 CISA tags max severity HPE OneView flaw as actively exploited The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has flagged a maximum-severity HPE OneView vulnerability as actively exploited in attacks. Exploit

BleepingComputer

10.1.26 New D-Link flaw in legacy DSL routers actively exploited in attacks Threat actors are exploiting a recently discovered command injection vulnerability that affects multiple D-Link DSL gateway routers that went out of support years ago. Exploit

BleepingComputer

10.1.26 The Great VM Escape: ESXi Exploitation in the Wild Based on indicators we observed, including the workstation name the threat actor was operating from and other TTPs, the Huntress Tactical Response team assesses with high confidence that initial access occurred via SonicWall VPN. Exploit HUNTRESS
8.1.26 Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release Cisco has released updates to address a medium-severity security flaw in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) with a public proof-of-concept Exploit The Hacker News
7.1.26 CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting Microsoft Office and Hewlett Packard Enterprise (HPE) OneView to its Known Exploited Vulnerabilities ( KEV ) catalog, citing evidence of active exploitation. Exploit The Hacker News
4.1.26 Over 10K Fortinet firewalls exposed to actively exploited 2FA bypass Over 10,000 Internet-exposed Fortinet firewalls are still vulnerable to attacks exploiting a five-year-old two-factor authentication (2FA) bypass vulnerability. Exploit

BleepingComputer

3.1.26 CISA orders feds to patch MongoBleed flaw exploited in attacks CISA ordered U.S. federal agencies to patch an actively exploited MongoDB vulnerability (MongoBleed) that can be exploited to steal credentials, API keys, and other sensitive data. Exploit

BleepingComputer

3.1.26 CISA orders feds to patch MongoBleed flaw exploited in attacks CISA ordered U.S. federal agencies to patch an actively exploited MongoDB vulnerability (MongoBleed) that can be exploited to steal credentials, API keys, and other sensitive data. Exploit

BleepingComputer

3.1.26 Fortinet warns of 5-year-old FortiOS 2FA bypass still exploited in attacks Fortinet has warned customers that threat actors are still actively exploiting a critical FortiOS vulnerability that allows them to bypass two-factor authentication (2FA) when targeting vulnerable FortiGate firewalls. Exploit

BleepingComputer