SECMONS SECMONS
Dashboard Vulnerabilities Threat Actors Malware Attack Techniques Breaches Scams Research Guides News Glossary
SECMONS
Dashboard Vulnerabilities Threat Actors Malware Attack Techniques Breaches Scams Research Guides News Glossary
Home / Zero-Day Tracker — Active & Recently Disclosed Zero-Day Vulnerabilities | SECMONS

Zero-Day Tracker — Active & Recently Disclosed Zero-Day Vulnerabilities | SECMONS

The SECMONS Zero-Day Tracker monitors publicly disclosed zero-day vulnerabilities and confirmed in-the-wild exploitation events. This tracker provides structured, verified intelligence for defenders.

Zero-Day Tracker at SECMONS

The Zero-Day Tracker monitors publicly disclosed vulnerabilities that were exploited before a patch was available — or were confirmed as actively exploited at the time of disclosure.

This tracker is designed for:

  • Security operations teams
  • Vulnerability management teams
  • Incident responders
  • Security leadership
  • Risk owners

It provides structured intelligence — not speculation.

For foundational definitions, see:

  • /glossary/zero-day/
  • /glossary/exploited-in-the-wild/
  • /glossary/cve/

What SECMONS Means by “Zero-Day”

A vulnerability is treated as zero-day when:

  • Exploitation occurred before a patch was available, OR
  • The vendor confirmed active exploitation at disclosure, OR
  • A government advisory identified it as exploited at disclosure

We do not classify vulnerabilities as zero-day based on rumor or unverified claims.

Absence from this tracker does not imply absence of exploitation.


What This Tracker Is Not ️

SECMONS:

  • Does not claim access to undisclosed vulnerabilities
  • Does not publish private exploit details
  • Does not disclose sensitive technical information
  • Does not provide exploit code
  • Does not provide weaponization instructions

All entries are based on publicly available, verifiable information.

Governance references:

  • /vulnerability-policy/
  • /editorial-policy/
  • /methodology/
  • /disclaimer/

How Entries Are Added

An entry may be added when:

  • A vendor confirms exploitation at disclosure
  • A national authority lists it as actively exploited
  • Credible research confirms in-the-wild activity
  • Public evidence demonstrates pre-patch exploitation

Each entry links to a full vulnerability record under:

  • /vulnerabilities/

That record includes:

  • CVE metadata
  • Patch information
  • Affected versions
  • Timeline
  • Risk interpretation
  • Defensive guidance

Why Zero-Day Tracking Matters

Zero-day exploitation significantly increases risk because:

  • Patching lag creates exposure windows
  • Detection signatures may not yet exist
  • Threat actors often chain exploits rapidly
  • Campaign acceleration is common

Zero-days frequently correlate with:

  • Targeted campaigns
  • High-value infrastructure targeting
  • Credential harvesting operations
  • Privilege escalation chains

See related:

  • /attack-techniques/
  • /threat-actors/
  • /research/
  • /breaches/

How to Use This Tracker

For Vulnerability Management Teams ️

  • Prioritize patch deployment
  • Identify exposed internet-facing services
  • Validate patch enforcement and restart requirements

For SOC Teams ️

  • Increase monitoring around affected services
  • Hunt for post-exploitation behavior
  • Correlate suspicious authentication activity

For Security Leadership

  • Assess exposure window risk
  • Communicate urgency to stakeholders
  • Align remediation timelines with real-world exploitation

Update & Review Policy

Zero-day entries may be updated to reflect:

  • Patch release changes
  • Exploitation status clarification
  • Government advisory inclusion
  • Additional confirmed targeting

The lastmod field reflects editorial update.

Historical state preservation is not guaranteed unless explicitly archived.


Browse Active & Historical Zero-Days

Explore detailed records in:

  • /vulnerabilities/
  • Filter by exploited status
  • Review campaign context in /research/
  • Map associated actors under /threat-actors/

For alerts and ongoing updates:

  • /news/
zero-day exploited-in-the-wild vulnerability-tracking security-alerts defensive-intelligence
CVE-2026-20127 — Cisco SD-WAN Zero-Day Tracker CRITICAL
Tracking entry for CVE-2026-20127, a critical Cisco Catalyst SD-WAN authentication bypass vulnerability actively exploited and requiring immediate mitigation.
CVE-2026-25108 — FileZen Zero-Day Tracker CRITICAL
Tracking entry for CVE-2026-25108, an actively exploited FileZen OS command injection vulnerability enabling remote attackers to execute arbitrary commands on exposed systems.
Facts
Created 2026-02-24
Updated 2026-02-24
Category zero-day-tracker
Reading time 2 min
Sponsored
Advertisement space reserved.
Tags
zero-day exploited-in-the-wild vulnerability-tracking security-alerts defensive-intelligence
Connected Intel
  • Cisco SD-WAN Zero-Day Response Playbook Guide
  • CISA Directive 26-03 Targets Cisco SD-WAN Flaws
  • CVE-2026-20127 — Cisco SD-WAN Zero-Day Tracker
  • Exploitation Velocity in Modern Campaigns — A Practical Defense Model for Enterprises
  • CVE-2026-25108 — FileZen Zero-Day Tracker
Related
  • Exploited in the Wild — What It Means, How It’s Confirmed, and Why It Changes Risk
  • Zero-Day Vulnerability — What It Means, How It’s Used, and Why It’s High Risk
  • Cisco SD-WAN Zero-Day Response Playbook Guide
  • CISA Directive 26-03 Targets Cisco SD-WAN Flaws
  • CVE-2026-20127 — Cisco SD-WAN Zero-Day Tracker
Latest Intel
  • Cyber Threat Landscape Analysis for March 2026
  • API Abuse and Data Extraction Techniques 2026
  • SaaS Account Takeover Patterns and Risks 2026
  • GitHub Abuse for Malware Delivery in 2026
  • Infostealer Logs Economy and Abuse in 2026
Follow Updates
  • RSS Feed
  • Subscribe

Legal & Policies

  • Terms of Service (TOS)
  • Privacy Policy
  • Cookie Policy
  • Disclaimer
  • Affiliate Disclosure

Governance

  • Vulnerability Policy
  • Editorial Policy
  • Ethics & Governance
  • Methodology

Research & Intelligence

  • Research
  • Threat Actors
  • Zero-Day Tracker
  • Exploit Database
  • Reports

Resources

  • Resources
  • Sitemap
  • RSS

Company

  • Meet the Experts / Authors
  • About Us
  • Contact & Press
  • Careers / Join Us
© 2026 SECMONS. All rights reserved.
CtrlK
Search the site.
    Privacy & Analytics

    SECMONS uses optional analytics and advertising-related consent settings to improve measurement and prepare future services. Essential site functionality remains available either way.

    Cookie Policy · Privacy Policy
    Essential
    Required for core site functionality and security.
    Always active
    Analytics
    Measurement of page usage and content performance.
    Ad storage
    Storage related to advertising functionality and attribution.
    Ad user data
    Consent for sending advertising-related user data to Google.
    Ad personalization
    Consent for personalized advertising features in the future.