Live disclosure tracker · updated continuously

Technology & Software Data Breaches

SaaS platforms, cloud providers, developer tooling, and app-layer infrastructure are concentrated attack surfaces. One tech vendor breach can expose thousands of downstream customers. Below is every tech-sector breach LeakTrace has indexed.

98B+
Records Exposed
1095
Incidents
94+
Countries
+104%
Breach Velocity YoY
Browse by sector
All breaches Healthcare Finance Government Technology Retail Education Legal
Browse by year
2024 2025 2026

Technology & Software Data Breaches (1095 indexed)

high · tech · Feb 25, 2026

Cisco SD-WAN

Cisco SD-WAN Path Traversal Vulnerability — Cisco SD-WAN CLI contains a path traversal vulnerability that could allow an authenticated local attacker to gain elevated privileges via improper access controls on commands w

View incident → Original disclosure Indexed 1 month, 2 weeks ago
high · tech · Feb 24, 2026

Soliton Systems K.K FileZen

Soliton Systems K.K FileZen OS Command Injection Vulnerability — Soliton Systems K.K FileZen contains an OS command injection vulnerability when an user logs-in to the affected product and sends a specially crafted HTTP

View incident → Original disclosure Indexed 1 month, 2 weeks ago
high · tech · Feb 20, 2026

Roundcube Webmail

RoundCube Webmail Cross-site Scripting Vulnerability — RoundCube Webmail contains a cross-site scripting vulnerability via the animate tag in an SVG document.

View incident → Original disclosure Indexed 1 month, 3 weeks ago
high · tech · Feb 20, 2026

Roundcube Webmail

RoundCube Webmail Deserialization of Untrusted Data Vulnerability — RoundCube Webmail contains a deserialization of untrusted data vulnerability that allows remote code execution by authenticated users because the _from

View incident → Original disclosure Indexed 1 month, 3 weeks ago
high · tech · Feb 18, 2026

GitLab GitLab

GitLab Server-Side Request Forgery (SSRF) Vulnerability — GitLab contains a server-side request forgery (SSRF) vulnerability when requests to the internal network for webhooks are enabled.

View incident → Original disclosure Indexed 1 month, 3 weeks ago
high · tech · Feb 17, 2026

Google Chromium

Google Chromium CSS Use-After-Free Vulnerability — Google Chromium CSS contains a use-after-free vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulne

View incident → Original disclosure Indexed 1 month, 3 weeks ago
high · tech · Feb 17, 2026

Microsoft Windows

Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability — Microsoft Windows Video ActiveX Control contains a remote code execution vulnerability. An attacker could exploit the vulnerability by constr

View incident → Original disclosure Indexed 1 month, 3 weeks ago
high · tech · Feb 12, 2026

Apple Multiple Products

Apple Multiple Buffer Overflow Vulnerability — Apple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker w

View incident → Original disclosure Indexed 1 month, 4 weeks ago
high · tech · Feb 12, 2026

Notepad++ Notepad++

Notepad++ Download of Code Without Integrity Check Vulnerability — Notepad++ when using the WinGUp updater, contains a download of code without integrity check vulnerability that could allow an attacker to intercept or r

View incident → Original disclosure Indexed 1 month, 4 weeks ago
high · tech · Feb 12, 2026

Microsoft Configuration Manager

Microsoft Configuration Manager SQL Injection Vulnerability — Microsoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially cra

View incident → Original disclosure Indexed 1 month, 4 weeks ago