Operations Dashboard
Real-time network intelligence and threat monitoring.
Exposed Surface — Shodan
LIVE • Shodan InternetDB
External Dependency Health
LIVE • GitHub Status APILive Malicious URL Stream
LIVE • abuse.ch URLhausCritical CVE Ticker
LIVE • NVD CVE 2.0Public Event Throughput
LIVE • GitHub Events APIMalicious Infra by Country
LIVE • URLhaus + ip-api.comLoading geo data…
Malware URL Activity
LIVE • abuse.ch URLhausEPSS Top Exploit Risk
LIVE • FIRST.org EPSSActive Exploit Queue
LIVE • CISA KEV catalogLatest Exploited Vulnerabilities — CISA KEV
Live • CISA + NVD- ExploitedCISA KEV • 1d ago
CVE-2026-9082 — Drupal Core: Drupal Core SQL Injection Vulnerability
Drupal Core contains a SQL injection vulnerability that could allow for privilege escalation and remote code execution via specially crafted requests sent with the database abstraction API.
- ExploitedCISA KEV • 2d ago
CVE-2026-34926 — Trend Micro Apex One: Trend Micro Apex One (On-Premise) Directory Traversal Vulnerability
Trend Micro Apex One (on-premise) contains a directory traversal vulnerability that could allow a pre-authenticated local attacker to modify a key table on the server to inject malicious code to deploy to agents on affected installations.
- ExploitedCISA KEV • 2d ago
CVE-2025-34291 — Langflow Langflow: Langflow Origin Validation Error Vulnerability
Langflow contains an origin validation error vulnerability in which an overly permissive CORS configuration combined with a refresh token cookie configured as SameSite=None allows a malicious webpage to perform cross-origin requests that include credentials and successfully call the refresh endpoint. This could allow the attacker to execute arbitrary code and achieve full system compromise via obtained tokens that permit access to authenticated endpoints.
- ExploitedCISA KEV • 3d ago
CVE-2026-45498 — Microsoft Defender: Microsoft Defender Denial of Service Vulnerability
Microsoft Defender contains an unspecified vulnerability that allows for denial of service.
- ExploitedCISA KEV • 3d ago
CVE-2026-41091 — Microsoft Defender: Microsoft Defender Link Following Vulnerability
Microsoft Defender contains a link following vulnerability that allows an authorized attacker to elevate privileges locally.
- ExploitedCISA KEV • 3d ago
CVE-2010-0806 — Microsoft Internet Explorer: Microsoft Internet Explorer Use-After-Free Vulnerability
Microsoft Internet Explorer contains an use-after-free vulnerability that could allow remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.
- ExploitedCISA KEV • 3d ago
CVE-2010-0249 — Microsoft Internet Explorer: Microsoft Internet Explorer Use-After-Free Vulnerability
Microsoft Internet Explorer contains an use-after-free vulnerability that could allow remote attackers to execute arbitrary code by accessing a pointer associated with a deleted object. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.
- ExploitedCISA KEV • 3d ago
CVE-2009-3459 — Adobe Acrobat and Reader: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
Adobe Acrobat and Reader contain a heap-based buffer overflow vulnerability which could allow remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption.
Live Surface & Malware Intelligence
Exposed Infrastructure — Shodan
5 hosts scannedRecent Malicious URLs — URLhaus
0 liveURLhaus 401