{"page":1,"per_page":25,"total_vulns":1577,"total_pages":64,"vulnerabilities":[{"_id":"69dd3179a77fe194a6a23e1f","cveID":"CVE-2026-34621","dateAdded":"2026-04-13","dueDate":"2026-04-27","notes":"https://helpx.adobe.com/security/products/acrobat/apsb26-43.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-34621","product":"Acrobat and Reader","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Adobe Acrobat and Reader contain a prototype pollution vulnerability that allows for arbitrary code execution.","vendorProject":"Adobe","vulnerabilityName":"Adobe Acrobat and Reader Prototype Pollution Vulnerability","nvdData":{},"githubPocs":{},"openThreatData":{},"knownRansomwareCampaignUse":"Unknown"},{"_id":"69dd3179a77fe194a6a23e1e","cveID":"CVE-2026-21643","dateAdded":"2026-04-13","dueDate":"2026-04-16","notes":"https://fortiguard.fortinet.com/psirt/FG-IR-25-1142 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21643","product":"FortiClient EMS","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Fortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.","vendorProject":"Fortinet","vulnerabilityName":"Fortinet SQL Injection Vulnerability","nvdData":{},"githubPocs":{},"openThreatData":{},"knownRansomwareCampaignUse":"Unknown"},{"_id":"69dd3179a77fe194a6a23e1d","cveID":"CVE-2020-9715","dateAdded":"2026-04-13","dueDate":"2026-04-27","notes":"https://helpx.adobe.com/security/products/acrobat/apsb20-48.html ; https://nvd.nist.gov/vuln/detail/CVE-2020-9715","product":"Acrobat","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Adobe Acrobat contains a use-after-free vulnerability that allows for code execution","vendorProject":"Adobe","vulnerabilityName":"Adobe Acrobat Use-After-Free Vulnerability","nvdData":{},"githubPocs":{},"openThreatData":{},"knownRansomwareCampaignUse":"Unknown"},{"_id":"69dd3179a77fe194a6a23e1c","cveID":"CVE-2023-36424","dateAdded":"2026-04-13","dueDate":"2026-04-27","notes":"https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-36424 ; https://nvd.nist.gov/vuln/detail/CVE-2023-36424","product":"Windows","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Windows Common Log File System Driver contains an out-of-bounds read vulnerability that could allow a threat actor for privileges escalation","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Windows Out-of-Bounds Read Vulnerability","nvdData":{},"githubPocs":{},"openThreatData":{},"knownRansomwareCampaignUse":"Unknown"},{"_id":"69dd3179a77fe194a6a23e1b","cveID":"CVE-2023-21529","dateAdded":"2026-04-13","dueDate":"2026-04-27","notes":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21529 ; https://nvd.nist.gov/vuln/detail/CVE-2023-21529","product":"Exchange Server","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Exchange Server contains a deserialization of untrusted data that allows an authenticated attacker to achieve remote code execution.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability","nvdData":{},"githubPocs":{},"openThreatData":{},"knownRansomwareCampaignUse":"Unknown"},{"_id":"69dd3179a77fe194a6a23e1a","cveID":"CVE-2025-60710","dateAdded":"2026-04-13","dueDate":"2026-04-27","notes":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60710 ; https://nvd.nist.gov/vuln/detail/CVE-2025-60710","product":"Windows","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Windows contains a link following vulnerability that allows for privilege escalation","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Windows Link Following Vulnerability","nvdData":{},"githubPocs":{},"openThreatData":{},"knownRansomwareCampaignUse":"Unknown"},{"_id":"69dd3179a77fe194a6a23e19","cveID":"CVE-2012-1854","dateAdded":"2026-04-13","dueDate":"2026-04-27","notes":"https://learn.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-046 ; https://nvd.nist.gov/vuln/detail/CVE-2012-1854","product":"Visual Basic for Applications (VBA)","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Visual Basic for Applications (VBA) contains an insecure library loading vulnerability that could allow for remote code execution.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability","nvdData":{},"githubPocs":{},"openThreatData":{},"knownRansomwareCampaignUse":"Unknown"},{"_id":"69d699f9dfe26029866b76a5","cveID":"CVE-2026-1340","dateAdded":"2026-04-08","dueDate":"2026-04-11","notes":"Please adhere to Ivanti's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Ivanti products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as possible. For more information please see: https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US ; https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0S-5.noarch.rpm ; https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0L-5.noarch.rpm ; https://nvd.nist.gov/vuln/detail/CVE-2026-1340","product":"Endpoint Manager Mobile (EPMM)","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution.","vendorProject":"Ivanti","vulnerabilityName":"Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"CRITICAL","exploitabilityScore":3.9,"baseScore":9.8,"nvdReferences":[{"url":"https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340","source":"3c1d8aa1-5a33-4ea4-8992-aadd6440af75","tags":["Vendor Advisory"]}],"vulnStatus":"Analyzed"}],"githubPocs":[],"openThreatData":[{"adversaries":["Prometei"],"malwareFamiles":["Prometei"],"affectedIndustries":["Construction","Government","Manufacturing","Healthcare","Technology"],"communityAdversaries":["APT27","Prometei","DKnife, Supply chain attack targeting dYdX, RCtea Botnet, ClawHavoc, CrashFix, Prometei","Cephalus Ransomware, Transparent Tribe, CRESCENTHARVEST, Keenadu, Cloudflare Pages \"Continue Read\" R","Threat"],"communityMalwareFamilies":["Beyondtrust","Prometei","Lumma","Php","Tesla","Ninja browser","Threat","Shinyhunters"],"communityAffectedIndustries":["Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in","Construction","Government","Manufacturing","Healthcare","Technology"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69d3dad95bb1bb2de526433e","cveID":"CVE-2026-35616","dateAdded":"2026-04-06","dueDate":"2026-04-09","notes":"Please adhere to Fortinet's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Fortinet products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: https://fortiguard.fortinet.com/psirt/FG-IR-26-099 ; https://nvd.nist.gov/vuln/detail/CVE-2026-35616","product":"FortiClient EMS","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Fortinet FortiClient EMS contains an improper access control vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.","vendorProject":"Fortinet","vulnerabilityName":"Fortinet FortiClient EMS Improper Access Control Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"CRITICAL","exploitabilityScore":3.9,"baseScore":9.8,"nvdReferences":[{"url":"https://fortiguard.fortinet.com/psirt/FG-IR-26-099","source":"psirt@fortinet.com","tags":["Vendor Advisory","Patch"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-35616","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":["https://github.com/0xBlackash/CVE-2026-35616","https://github.com/fevar54/CVE-2026-35616-detector.py"],"openThreatData":[{"adversaries":["Bitter"],"malwareFamiles":["Dracarys","Tospy","Prospy"],"affectedIndustries":["Government","Media"],"communityAdversaries":["APT41, Floki, Cifrat, LucidRook, Lumma Stealer, Winnti ELF Backdoor, Delphi, Infiniti Stealer","Bitter"],"communityMalwareFamilies":["Dracarys","Tospy","Prospy"],"communityAffectedIndustries":["Government","Media"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69cedb2952148e000768a47f","cveID":"CVE-2026-3502","dateAdded":"2026-04-02","dueDate":"2026-04-16","notes":"https://trueconf.com/blog/update/trueconf-8-5 ; https://trueconf.com/downloads/windows.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-3502","product":"Client","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"TrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.","vendorProject":"TrueConf","vulnerabilityName":"TrueConf Client Download of Code Without Integrity Check Vulnerability","nvdData":[{"attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":1.2,"baseScore":7.8,"nvdReferences":[{"url":"https://trueconf.com/blog/update/trueconf-8-5","source":"cve@checkpoint.com","tags":["Product","Release Notes"]},{"url":"https://research.checkpoint.com/2026/operation-truechaos-0-day-exploitation-against-southeast-asian-government-targets/","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Third Party Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-3502","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":["https://github.com/fevar54/CVE-2026-3502-Scanner---TrueConf-Vulnerability-Detection-Tool","https://github.com/fevar54/CVE-2026-3502---TrueConf-Client-Update-Hijacking-PoC"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69cd7b996777aea49d6c5d1c","cveID":"CVE-2026-5281","dateAdded":"2026-04-01","dueDate":"2026-04-15","notes":"This vulnerability affects an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-5281 ","product":"Dawn","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Google Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. This vulnerability could affect multiple Chromium-based products including, but not limited to, Google Chrome, Microsoft Edge, and Opera.","vendorProject":"Google","vulnerabilityName":"Google Dawn Use-After-Free Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":2.8,"baseScore":8.8,"nvdReferences":[{"url":"https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","source":"chrome-cve-admin@google.com","tags":["Vendor Advisory"]},{"url":"https://issues.chromium.org/issues/491518608","source":"chrome-cve-admin@google.com","tags":["Issue Tracking","Permissions Required"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-5281","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":["https://github.com/umair-aziz025/CVE-2026-5281-Research-Toolkit","https://github.com/TheMalwareGuardian/CVE-2026-5281"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69cad899b27caf90a1b0e5e3","cveID":"CVE-2026-3055","dateAdded":"2026-03-30","dueDate":"2026-04-02","notes":"https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300&articleURL=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2026_3055_and_CVE_2026_4368 ; https://nvd.nist.gov/vuln/detail/CVE-2026-3055","product":"NetScaler","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Citrix NetScaler ADC (formerly Citrix ADC), NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC FIPS and NDcPP contain an out-of-bounds reads vulnerability when configured as a SAML IDP leading to memory overread.","vendorProject":"Citrix","vulnerabilityName":"Citrix NetScaler Out-of-Bounds Read Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"CRITICAL","exploitabilityScore":3.9,"baseScore":9.8,"nvdReferences":[{"url":"https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300","source":"50a63c94-1ea7-4568-8c11-eb79e7c5a2b5","tags":["Vendor Advisory"]},{"url":"https://labs.watchtowr.com/please-we-beg-just-one-weekend-free-of-appliances-citrix-netscaler-cve-2026-3055-memory-overread-part-2/","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-3055","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":["https://github.com/0xBlackash/CVE-2026-3055","https://github.com/l0lsec/check-cve-2026-3055-netscaler","https://github.com/fevar54/CVE-2026-3055-Scanner---Herramienta-de-Detecci-n","https://github.com/fevar54/CVE-2026-3055---Citrix-NetScaler-Memory-Overread-PoC"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69c6e419d021e4af7ea5d062","cveID":"CVE-2025-53521","dateAdded":"2026-03-27","dueDate":"2026-03-30","notes":"Please adhere to F5’s guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible F5 products affected by this vulnerability. For more information please see: https://my.f5.com/manage/s/article/K000156741 ; https://my.f5.com/manage/s/article/K000160486 ; https://my.f5.com/manage/s/article/K11438344 ; https://nvd.nist.gov/vuln/detail/CVE-2025-53521","product":"BIG-IP","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"F5 BIG-IP AMP contains an unspecified vulnerability that could allow a threat actor to achieve remote code execution.","vendorProject":"F5","vulnerabilityName":"F5 BIG-IP Unspecified Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"CRITICAL","exploitabilityScore":3.9,"baseScore":9.8,"nvdReferences":[{"url":"https://my.f5.com/manage/s/article/K000156741","source":"f5sirt@f5.com","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-53521","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":[],"openThreatData":[{"adversaries":["UTA0178"],"malwareFamiles":["Brickstorm"],"affectedIndustries":["Technology","Government"],"communityAdversaries":["UNC5221","TeamPCP"],"communityMalwareFamilies":["Brickstorm"],"communityAffectedIndustries":["Technology","Finance","Government","Empresarial"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69c57679310a8ca0647fc47d","cveID":"CVE-2026-33634","dateAdded":"2026-03-26","dueDate":"2026-04-09","notes":"This vulnerability involves a supply‑chain compromise in a product that may be used across multiple products and environments. Additional vendor‑provided guidance must be followed to ensure full remediation. For more information, please see: https://github.com/advisories/GHSA-69fq-xp46-6x23 ; https://nvd.nist.gov/vuln/detail/CVE-2026-33634","product":"Trivy","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Aquasecurity Trivy contains an embedded malicious code vulnerability that could allow an attacker to gain access to everything in the CI/CD environment, including all tokens, SSH keys, cloud credentials, database passwords, and any sensitive configuration in memory.","vendorProject":"Aquasecurity","vulnerabilityName":"Aquasecurity Trivy Embedded Malicious Code Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":2.8,"baseScore":8.8,"nvdReferences":[{"url":"https://futuresearch.ai/blog/litellm-pypi-supply-chain-attack","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/BerriAI/litellm/issues/24518","source":"security-advisories@github.com","tags":["Issue Tracking","Mitigation","Third Party Advisory"]},{"url":"https://github.com/aquasecurity/trivy/discussions/10425","source":"security-advisories@github.com","tags":["Issue Tracking","Vendor Advisory"]},{"url":"https://github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23","source":"security-advisories@github.com","tags":["Exploit","Mitigation","Vendor Advisory"]},{"url":"https://github.com/pypa/advisory-database/tree/main/vulns/litellm/PYSEC-2026-2.yaml","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://inspector.pypi.io/project/litellm/1.82.7/packages/79/5f/b6998d42c6ccd32d36e12661f2734602e72a576d52a51f4245aef0b20b4d/litellm-1.82.7-py3-none-any.whl/litellm/proxy/proxy_server.py#line.130","source":"security-advisories@github.com","tags":["Broken Link"]},{"url":"https://inspector.pypi.io/project/litellm/1.82.8/packages/f6/2c/731b614e6cee0bca1e010a36fd381fba69ee836fe3cb6753ba23ef2b9601/litellm-1.82.8.tar.gz/litellm-1.82.8/litellm_init.pth#line.1","source":"security-advisories@github.com","tags":["Broken Link"]},{"url":"https://www.wiz.io/blog/teampcp-attack-kics-github-action","source":"security-advisories@github.com","tags":["Not Applicable"]},{"url":"https://github.com/BerriAI/litellm/issues/24518#issuecomment-4127436387","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Issue Tracking","Mitigation","Third Party Advisory"]},{"url":"https://rosesecurity.dev/2026/03/20/typosquatting-trivy.html","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-33634","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]},{"url":"https://www.microsoft.com/en-us/security/blog/2026/03/24/detecting-investigating-defending-against-trivy-supply-chain-compromise/","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Technical Description"]}],"vulnStatus":"Analyzed"}],"githubPocs":["https://github.com/ugurrates/teampcp-supply-chain-attack","https://github.com/Unit221B/teampcp-tools","https://github.com/AshleyT3/docker-socket-risk-demos","https://github.com/fevar54/CVE-2026-33634-Scanner"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69c424f95e7a6a46a86af8a0","cveID":"CVE-2026-33017","dateAdded":"2026-03-25","dueDate":"2026-04-08","notes":"https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx ; https://nvd.nist.gov/vuln/detail/CVE-2026-33017","product":"Langflow","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Langflow contains a code injection vulnerability that could allow building public flows without requiring authentication.","vendorProject":"Langflow","vulnerabilityName":"Langflow Code Injection Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"CRITICAL","exploitabilityScore":3.9,"baseScore":9.8,"nvdReferences":[{"url":"https://github.com/advisories/GHSA-rvqx-wpfh-mfx7","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/langflow-ai/langflow/commit/73b6612e3ef25fdae0a752d75b0fabd47328d4f0","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory","Mitigation"]},{"url":"https://github.com/langflow-ai/langflow/releases/tag/1.8.2","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Release Notes"]},{"url":"https://medium.com/@aviral23/cve-2026-33017-how-i-found-an-unauthenticated-rce-in-langflow-by-reading-the-code-they-already-dc96cdce5896","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-33017","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]},{"url":"https://www.sysdig.com/blog/cve-2026-33017-how-attackers-compromised-langflow-ai-pipelines-in-20-hours","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Press/Media Coverage"]}],"vulnStatus":"Analyzed"}],"githubPocs":["https://github.com/SimoesCTT/Sovereign-Echo-33017","https://github.com/omer-efe-curkus/CVE-2026-33017-Langflow-RCE-PoC","https://github.com/MaxMnMl/langflow-CVE-2026-33017-poc","https://github.com/z4yd3/PoC-CVE-2026-33017","https://github.com/oscarmine/CVE-2026-33017-Exploit","https://github.com/masterwok/CVE-2026-33017-Langflow-POC"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69bd7159298f0f05e89eecc4","cveID":"CVE-2025-31277","dateAdded":"2026-03-20","dueDate":"2026-04-03","notes":"https://support.apple.com/en-us/124147 ; https://support.apple.com/en-us/124149 ; https://support.apple.com/en-us/124152 ; https://support.apple.com/en-us/124153 ; https://support.apple.com/en-us/124155 ; https://nvd.nist.gov/vuln/detail/CVE-2025-31277","product":"Multiple Products","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Apple Safari, iOS, watchOS, visionOS, iPadOS, macOS, and tvOS contain a buffer overflow vulnerability that could allow the processing of maliciously crafted web content which may lead to memory corruption.","vendorProject":"Apple","vulnerabilityName":"Apple Multiple Products Buffer Overflow Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":2.8,"baseScore":8.8,"nvdReferences":[{"url":"https://support.apple.com/en-us/124147","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/124149","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/124152","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/124153","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/124154","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/124155","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"http://seclists.org/fulldisclosure/2025/Aug/0","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://seclists.org/fulldisclosure/2025/Jul/30","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://seclists.org/fulldisclosure/2025/Jul/32","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://seclists.org/fulldisclosure/2025/Jul/36","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain/","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Technical Description"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-31277","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":["https://github.com/stationedK-06/DarkSword_analysis"],"openThreatData":[{"adversaries":[],"malwareFamiles":["Ghostblade","Ghostsaber","Ghostknife"],"affectedIndustries":["Government"],"communityAdversaries":["Operation GhostMail, CastleRAT, UNK_NightOwl, Fake Shipment Tracking Scams in MEA, Fake Claude Code ","Unc6353"],"communityMalwareFamilies":["Ghostblade","Ghostsaber","Ghostknife"],"communityAffectedIndustries":["Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in","Government","Healthcare"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69bd7159298f0f05e89eecc3","cveID":"CVE-2025-43520","dateAdded":"2026-03-20","dueDate":"2026-04-03","notes":"https://support.apple.com/en-us/125632 ; https://support.apple.com/en-us/125633 ; https://support.apple.com/en-us/125634 ; https://support.apple.com/en-us/125635 ; https://support.apple.com/en-us/125636 ; https://support.apple.com/en-us/125637 ; https://support.apple.com/en-us/125638 ; https://support.apple.com/en-us/125639 ; https://nvd.nist.gov/vuln/detail/CVE-2025-43520","product":"Multiple Products","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Apple watchOS, iOS, iPadOS, macOS, visionOS, tvOS, and iPadOS contain a classic buffer overflow vulnerability which could allow a malicious application to cause unexpected system termination or write kernel memory.","vendorProject":"Apple","vulnerabilityName":"Apple Multiple Products Classic Buffer Overflow Vulnerability","nvdData":[{"attackVector":"LOCAL","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":1.8,"baseScore":7.1,"nvdReferences":[{"url":"https://support.apple.com/en-us/125632","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/125633","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/125634","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/125635","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/125636","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/125637","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/125638","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/125639","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain/","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Technical Description"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43520","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":["Ghostsaber","Ghostblade","Ghostknife"],"affectedIndustries":["Government"],"communityAdversaries":["Operation GhostMail, CastleRAT, UNK_NightOwl, Fake Shipment Tracking Scams in MEA, Fake Claude Code ","Unc6353"],"communityMalwareFamilies":["Ghostsaber","Ghostblade","Ghostknife"],"communityAffectedIndustries":["Government","Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in","Healthcare"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69bd7159298f0f05e89eecc2","cveID":"CVE-2025-43510","dateAdded":"2026-03-20","dueDate":"2026-04-03","notes":"https://support.apple.com/en-us/125632 ; https://support.apple.com/en-us/125633 ; https://support.apple.com/en-us/125634 ; https://support.apple.com/en-us/125635 ; https://support.apple.com/en-us/125636 ; https://support.apple.com/en-us/125637 ; https://support.apple.com/en-us/125638 ; https://support.apple.com/en-us/125639 ; https://nvd.nist.gov/vuln/detail/CVE-2025-43510","product":"Multiple Products","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability that could allow a malicious application to cause unexpected changes in memory shared between processes.","vendorProject":"Apple","vulnerabilityName":"Apple Multiple Products Improper Locking Vulnerability","nvdData":[{"attackVector":"LOCAL","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":1.8,"baseScore":7.8,"nvdReferences":[{"url":"https://support.apple.com/en-us/125632","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/125633","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/125634","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/125635","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/125636","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/125637","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/125638","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/125639","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain/","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Technical Description"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43510","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":["Ghostknife","Ghostblade","Ghostsaber"],"affectedIndustries":["Government"],"communityAdversaries":["Unc6353","Operation GhostMail, CastleRAT, UNK_NightOwl, Fake Shipment Tracking Scams in MEA, Fake Claude Code "],"communityMalwareFamilies":["Ghostknife","Ghostblade","Ghostsaber"],"communityAffectedIndustries":["Government","Healthcare","Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69bd7159298f0f05e89eecc1","cveID":"CVE-2025-54068","dateAdded":"2026-03-20","dueDate":"2026-04-03","notes":"https://github.com/livewire/livewire/security/advisories/GHSA-29cq-5w36-x7w3 ; https://github.com/livewire/livewire/commit/ef04be759da41b14d2d129e670533180a44987dc ; https://nvd.nist.gov/vuln/detail/CVE-2025-54068","product":"Livewire","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Laravel Livewire contain a code injection vulnerability that could allow unauthenticated attackers to achieve remote command execution in specific scenarios.","vendorProject":"Laravel","vulnerabilityName":"Laravel Livewire Code Injection Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"CRITICAL","exploitabilityScore":3.9,"baseScore":9.8,"nvdReferences":[{"url":"https://github.com/livewire/livewire/commit/ef04be759da41b14d2d129e670533180a44987dc","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/livewire/livewire/releases/tag/v3.6.4","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/livewire/livewire/security/advisories/GHSA-29cq-5w36-x7w3","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-54068","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"},{"url":"https://www.threathunter.ai/blog/iranian-threat-actor-tools-techniques-iocs-ioas/","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":["https://github.com/haxorstars/CVE-2025-54068","https://github.com/z0d131482700x/Livewire2025CVE","https://github.com/synacktiv/Livepyre"],"openThreatData":[{"adversaries":["MuddyWater"],"malwareFamiles":["Keyc2","Arenac2","Tsundere botnet","Persianc2"],"affectedIndustries":["Healthcare","Transportation","Defense","Technology","Finance","Government"],"communityAdversaries":["MuddyWater"],"communityMalwareFamilies":["Keyc2","Arenac2","Tsundere botnet","Persianc2"],"communityAffectedIndustries":["Healthcare","Transportation","Defense","Technology","Finance","Government"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69bd7159298f0f05e89eecc0","cveID":"CVE-2025-32432","dateAdded":"2026-03-20","dueDate":"2026-04-03","notes":"https://craftcms.com/knowledge-base/craft-cms-cve-2025-32432 ; https://github.com/craftcms/cms/security/advisories/GHSA-f3gw-9ww9-jmc3 ; https://nvd.nist.gov/vuln/detail/CVE-2025-32432","product":"Craft CMS","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Craft CMS contains a code injection vulnerability that allows a remote attacker to execute arbitrary code.","vendorProject":"Craft CMS","vulnerabilityName":"Craft CMS Code Injection Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"CRITICAL","exploitabilityScore":3.9,"baseScore":10.0,"nvdReferences":[{"url":"https://github.com/craftcms/cms/blob/3.x/CHANGELOG.md#3915---2025-04-10-critical","source":"security-advisories@github.com","tags":["Broken Link"]},{"url":"https://github.com/craftcms/cms/blob/4.x/CHANGELOG.md#41415---2025-04-10-critical","source":"security-advisories@github.com","tags":["Product"]},{"url":"https://github.com/craftcms/cms/blob/5.x/CHANGELOG.md#5617---2025-04-10-critical","source":"security-advisories@github.com","tags":["Product"]},{"url":"https://github.com/craftcms/cms/commit/e1c85441fa47eeb7c688c2053f25419bc0547b47","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/craftcms/cms/security/advisories/GHSA-f3gw-9ww9-jmc3","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://sensepost.com/blog/2025/investigating-an-in-the-wild-campaign-using-rce-in-craftcms/","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Press/Media Coverage"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32432","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":["https://github.com/bambooqj/CVE-2025-32432","https://github.com/B1ack4sh/Blackash-CVE-2025-32432","https://github.com/ibrahimsql/CVE-2025-32432","https://github.com/Sachinart/CVE-2025-32432","https://github.com/Chocapikk/CVE-2025-32432"],"openThreatData":[{"adversaries":["Hezb"],"malwareFamiles":["Minus ransomware","Iproyal","Xmrig"],"affectedIndustries":[],"communityAdversaries":["Insikt","Mimo"],"communityMalwareFamilies":["Mimus","Xmrig","Insikt","Iproyal","Cases prevent","Minus ransomware","Minus","Mimo"],"communityAffectedIndustries":["Financial"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69bc1fd99748b2da67004964","cveID":"CVE-2026-20131","dateAdded":"2026-03-19","dueDate":"2026-03-22","notes":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh ; https://nvd.nist.gov/vuln/detail/CVE-2026-20131","product":"Secure Firewall Management Center (FMC)","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management contain a deserialization of untrusted data vulnerability in the web-based management interface that could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device.","vendorProject":"Cisco","vulnerabilityName":"Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"CRITICAL","exploitabilityScore":3.9,"baseScore":10.0,"nvdReferences":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://aws.amazon.com/blogs/security/amazon-threat-intelligence-teams-identify-interlock-ransomware-campaign-targeting-enterprise-firewalls/","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Technical Description"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-20131","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":["https://github.com/Sushilsin/CVE-2026-20131","https://github.com/Hassan-Pouladi/Cisco-FMC-honeypot"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":["Interlock"],"communityAffectedIndustries":["Education","Industrial","Construction","Government","Manufacturing","Healthcare"]}],"knownRansomwareCampaignUse":"Known"},{"_id":"69bb0699cb1203cd35ca09a2","cveID":"CVE-2026-20963","dateAdded":"2026-03-18","dueDate":"2026-03-21","notes":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20963 ; https://nvd.nist.gov/vuln/detail/CVE-2026-20963","product":"SharePoint","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft SharePoint contains a deserialization of untrusted data vulnerability that allows an unauthorized attacker to execute code over a network.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft SharePoint Deserialization of Untrusted Data Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":2.8,"baseScore":8.8,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20963","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-20963","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":["Macsync","Shub","Infiniti stealer"],"affectedIndustries":[],"communityAdversaries":["Silver Fox, Powercat, BRUSHWORM and BRUSHLOGGER, Blank Grabber, Infiniti Stealer"],"communityMalwareFamilies":["Macsync","Shub","Infiniti stealer"],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69baea7aedb4463ed7c8276f","cveID":"CVE-2025-66376","dateAdded":"2026-03-18","dueDate":"2026-04-01","notes":"https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories ; https://nvd.nist.gov/vuln/detail/CVE-2025-66376","product":"Zimbra Collaboration Suite (ZCS)","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability in the Classic UI where attackers could abuse Cascading Style Sheets (CSS) @import directives in email HTML.","vendorProject":"Synacor","vulnerabilityName":"Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":3.9,"baseScore":7.2,"nvdReferences":[{"url":"https://wiki.zimbra.com/wiki/Security_Center","source":"cve@mitre.org","tags":["Release Notes","Vendor Advisory"]},{"url":"https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.18#Security_Fixes","source":"cve@mitre.org","tags":["Release Notes"]},{"url":"https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.13#Security_Fixes","source":"cve@mitre.org","tags":["Release Notes"]},{"url":"https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy","source":"cve@mitre.org","tags":["Product"]},{"url":"https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-66376","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":[],"openThreatData":[{"adversaries":["APT28"],"malwareFamiles":["Spypress.zimbra"],"affectedIndustries":["Government"],"communityAdversaries":["APT28","Operation GhostMail, CastleRAT, UNK_NightOwl, Fake Shipment Tracking Scams in MEA, Fake Claude Code "],"communityMalwareFamilies":["Spypress.zimbra"],"communityAffectedIndustries":["Government"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69b847796f7ad6eb258ad0b0","cveID":"CVE-2025-47813","dateAdded":"2026-03-16","dueDate":"2026-03-30","notes":"https://www.wftpserver.com/serverhistory.htm ; https://nvd.nist.gov/vuln/detail/CVE-2025-47813","product":"Wing FTP Server","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Wing FTP Server contains a generation of error message containing sensitive information vulnerability when using a long value in the UID cookie.","vendorProject":"Wing FTP Server","vulnerabilityName":"Wing FTP Server Information Disclosure Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"MEDIUM","exploitabilityScore":2.8,"baseScore":4.3,"nvdReferences":[{"url":"https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2025-47813.txt","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.wftpserver.com","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-47813","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69b444e9cef7ac5351727a87","cveID":"CVE-2026-3909","dateAdded":"2026-03-13","dueDate":"2026-03-27","notes":"This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_12.html#:~:text=Google%20is%20aware ; https://nvd.nist.gov/vuln/detail/CVE-2026-3909","product":"Skia","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Google Skia contains an out-of-bounds write vulnerability that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products.","vendorProject":"Google","vulnerabilityName":"Google Skia Out-of-Bounds Write Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":2.8,"baseScore":8.8,"nvdReferences":[{"url":"https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_12.html","source":"chrome-cve-admin@google.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://issues.chromium.org/issues/491421267","source":"chrome-cve-admin@google.com","tags":["Permissions Required"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-3909","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"}]}