{"page":1,"per_page":25,"total_vulns":368,"total_pages":15,"vulnerabilities":[{"_id":"69de82f92c5c1df9d4b24d23","cveID":"CVE-2026-32201","dateAdded":"2026-04-14","dueDate":"2026-04-28","notes":"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-32201 ; https://nvd.nist.gov/vuln/detail/CVE-2026-32201","product":"SharePoint Server","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft SharePoint Server contains an improper input validation vulnerability that allows an unauthorized attacker to perform spoofing over a network.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft SharePoint Server Improper Input Validation Vulnerability","nvdData":[{"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-32201","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Undergoing Analysis"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69de82f92c5c1df9d4b24d22","cveID":"CVE-2009-0238","dateAdded":"2026-04-14","dueDate":"2026-04-28","notes":"https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009 ; https://nvd.nist.gov/vuln/detail/CVE-2009-0238","product":"Office","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Office Excel contains a remote code execution vulnerability that could allow an attacker to take complete control of an affected system if a user opens a specially crafted Excel file that includes a malformed object.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Office Remote Code Execution","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":2.8,"baseScore":8.8,"nvdReferences":[{"url":"http://blogs.zdnet.com/security/?p=2658","source":"secure@microsoft.com"},{"url":"http://isc.sans.org/diary.html?storyid=5923","source":"secure@microsoft.com"},{"url":"http://securitytracker.com/id?1021744","source":"secure@microsoft.com"},{"url":"http://www.microsoft.com/technet/security/advisory/968272.mspx","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/33870","source":"secure@microsoft.com"},{"url":"http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-022310-4202-99","source":"secure@microsoft.com"},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-104A.html","source":"secure@microsoft.com","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2009/1023","source":"secure@microsoft.com"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009","source":"secure@microsoft.com"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/48875","source":"secure@microsoft.com"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5968","source":"secure@microsoft.com"},{"url":"http://blogs.zdnet.com/security/?p=2658","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://isc.sans.org/diary.html?storyid=5923","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://securitytracker.com/id?1021744","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.microsoft.com/technet/security/advisory/968272.mspx","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/33870","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-022310-4202-99","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-104A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2009/1023","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/48875","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5968","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2009-0238","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Deferred"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69dd3179a77fe194a6a23e1c","cveID":"CVE-2023-36424","dateAdded":"2026-04-13","dueDate":"2026-04-27","notes":"https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-36424 ; https://nvd.nist.gov/vuln/detail/CVE-2023-36424","product":"Windows","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Windows Common Log File System Driver contains an out-of-bounds read vulnerability that could allow a threat actor for privileges escalation","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Windows Out-of-Bounds Read Vulnerability","nvdData":[{"attackVector":"LOCAL","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":1.8,"baseScore":7.8,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36424","source":"secure@microsoft.com","tags":["Patch","Vendor Advisory"]},{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36424","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36424","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":["https://github.com/Nassim-Asrir/CVE-2023-36424"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69dd3179a77fe194a6a23e1b","cveID":"CVE-2023-21529","dateAdded":"2026-04-13","dueDate":"2026-04-27","notes":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21529 ; https://nvd.nist.gov/vuln/detail/CVE-2023-21529","product":"Exchange Server","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Exchange Server contains a deserialization of untrusted data that allows an authenticated attacker to achieve remote code execution.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":2.8,"baseScore":8.8,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21529","source":"secure@microsoft.com","tags":["Patch","Vendor Advisory"]},{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21529","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-21529","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"},{"url":"https://www.microsoft.com/en-us/security/blog/2026/04/06/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":[],"openThreatData":[{"adversaries":["Storm-1175"],"malwareFamiles":["Medusa"],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":["Parsecab"],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69dd3179a77fe194a6a23e1a","cveID":"CVE-2025-60710","dateAdded":"2026-04-13","dueDate":"2026-04-27","notes":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60710 ; https://nvd.nist.gov/vuln/detail/CVE-2025-60710","product":"Windows","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Windows contains a link following vulnerability that allows for privilege escalation","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Windows Link Following Vulnerability","nvdData":[{"attackVector":"LOCAL","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":1.8,"baseScore":7.8,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60710","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"https://www.vicarius.io/vsociety/posts/cve-2025-60710-detection-script-eop-vulnerability-in-host-process-for-windows-tasks","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.vicarius.io/vsociety/posts/cve-2025-60710-mitigation-script-eop-vulnerability-in-host-process-for-windows-tasks","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-60710","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69dd3179a77fe194a6a23e19","cveID":"CVE-2012-1854","dateAdded":"2026-04-13","dueDate":"2026-04-27","notes":"https://learn.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-046 ; https://nvd.nist.gov/vuln/detail/CVE-2012-1854","product":"Visual Basic for Applications (VBA)","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Visual Basic for Applications (VBA) contains an insecure library loading vulnerability that could allow for remote code execution.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability","nvdData":[{"attackVector":"LOCAL","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":1.8,"baseScore":7.8,"nvdReferences":[{"url":"http://www.us-cert.gov/cas/techalerts/TA12-192A.html","source":"secure@microsoft.com","tags":["US Government Resource"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-046","source":"secure@microsoft.com"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14950","source":"secure@microsoft.com"},{"url":"http://www.us-cert.gov/cas/techalerts/TA12-192A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-046","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14950","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2012/ms12-046","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2012-1854","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Deferred"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69bb0699cb1203cd35ca09a2","cveID":"CVE-2026-20963","dateAdded":"2026-03-18","dueDate":"2026-03-21","notes":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20963 ; https://nvd.nist.gov/vuln/detail/CVE-2026-20963","product":"SharePoint","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft SharePoint contains a deserialization of untrusted data vulnerability that allows an unauthorized attacker to execute code over a network.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft SharePoint Deserialization of Untrusted Data Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":2.8,"baseScore":8.8,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20963","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-20963","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":[],"openThreatData":[{"adversaries":["Interlock Ransomware Group"],"malwareFamiles":["Macsync","Plasmaloader","Ghostsaber","Shub","Infiniti stealer","Plasmagrid","Ghostblade","Ghostknife"],"affectedIndustries":[],"communityAdversaries":["Silver Fox, Powercat, BRUSHWORM and BRUSHLOGGER, Blank Grabber, Infiniti Stealer"],"communityMalwareFamilies":["Macsync","Shub","Infiniti stealer"],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"6994d929008952522ea3854c","cveID":"CVE-2008-0015","dateAdded":"2026-02-17","dueDate":"2026-03-10","notes":"https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015","product":"Windows","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Windows Video ActiveX Control contains a remote code execution vulnerability. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.","vendorProject":"Microsoft","vulnerabilityName":" Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":2.8,"baseScore":8.8,"nvdReferences":[{"url":"http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx","source":"cve@mitre.org"},{"url":"http://isc.sans.org/diary.html?storyid=6733","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://osvdb.org/55651","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/36187","source":"cve@mitre.org"},{"url":"http://www.csis.dk/dk/nyheder/nyheder.asp?tekstID=799","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.iss.net/threats/329.html","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.kb.cert.org/vuls/id/180513","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.microsoft.com/technet/security/advisory/972890.mspx","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/35558","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/35585","source":"cve@mitre.org"},{"url":"http://www.securitytracker.com/id?1022514","source":"cve@mitre.org"},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-187A.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-195A.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-223A.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2009/2232","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-032","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6333","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6363","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7436","source":"cve@mitre.org"},{"url":"http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://isc.sans.org/diary.html?storyid=6733","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://osvdb.org/55651","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/36187","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.csis.dk/dk/nyheder/nyheder.asp?tekstID=799","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.iss.net/threats/329.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.kb.cert.org/vuls/id/180513","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.microsoft.com/technet/security/advisory/972890.mspx","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/35558","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/35585","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id?1022514","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-187A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-195A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-223A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2009/2232","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-032","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6333","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6363","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7436","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2008-0015","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Deferred"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":["StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s"],"communityMalwareFamilies":["Md5 hash: f8add7e7161460ea2b1970cf4ca535bf","Malware family: stealthworker / gobrut"],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"698e2589951321aff5468da4","cveID":"CVE-2024-43468","dateAdded":"2026-02-12","dueDate":"2026-03-05","notes":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43468 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43468","product":"Configuration Manager","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and/or underlying database.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Configuration Manager SQL Injection Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"CRITICAL","exploitabilityScore":3.9,"baseScore":9.8,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43468","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-43468","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":["https://github.com/nikallass/CVE-2024-43468_mTLS_go"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":["Threat"],"communityMalwareFamilies":["Shinyhunters","Threat","Lumma","Ninja browser","Tesla"],"communityAffectedIndustries":["","Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"698b8289dcaa7b1d40c6ac9a","cveID":"CVE-2026-21514","dateAdded":"2026-02-10","dueDate":"2026-03-03","notes":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21514","product":"Office","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability","nvdData":[{"attackVector":"LOCAL","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":1.8,"baseScore":7.8,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21514","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":["Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"698b8289dcaa7b1d40c6ac99","cveID":"CVE-2026-21519","dateAdded":"2026-02-10","dueDate":"2026-03-03","notes":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21519","product":"Windows","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Windows Type Confusion Vulnerability","nvdData":[{"attackVector":"LOCAL","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":1.8,"baseScore":7.8,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21519","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":["","Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"698b8289dcaa7b1d40c6ac98","cveID":"CVE-2026-21533","dateAdded":"2026-02-10","dueDate":"2026-03-03","notes":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21533","product":"Windows","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Windows Improper Privilege Management Vulnerability","nvdData":[{"attackVector":"LOCAL","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":1.8,"baseScore":7.8,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21533","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":["https://github.com/Pairs34/RDPVulnarableCheck","https://github.com/fevar54/CVE-2026-21533_Scanner.py"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":["pi, pdfkit.net","Adversary Profile: Salt Typhoon Alignment The architectural gap identified by mudoSO mirrors the act","Tier-1 SaaS Reputation Parasitism Leveraging Wix Infrastructure"],"communityMalwareFamilies":["Nids","Alf:heraklezeval:trojan:win32/c2lop","Virtool:win32/vbinject.gen!jb","#exploit:win32/blofeldscat","Win.trojan.vb-83922","Et","#lowfi:hstr:pyinstaller_packaged_script","Spyfu","Unix.trojan.mirai-7646352-0","Tel:exploit:html/pswebkit"],"communityAffectedIndustries":["Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"698b8289dcaa7b1d40c6ac97","cveID":"CVE-2026-21510","dateAdded":"2026-02-10","dueDate":"2026-03-03","notes":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21510 ","product":"Windows","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network. ","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Windows Shell Protection Mechanism Failure Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":2.8,"baseScore":8.8,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21510","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":["https://github.com/andreassudo/CVE-2026-21510-CVSS-8.8-Important-Windows-Shell-security-feature-bypass"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":["pi, pdfkit.net","Adversary Profile: Salt Typhoon Alignment The architectural gap identified by mudoSO mirrors the act","Tier-1 SaaS Reputation Parasitism Leveraging Wix Infrastructure"],"communityMalwareFamilies":["Virtool:win32/vbinject.gen!jb","Alf:heraklezeval:trojan:win32/c2lop","#lowfi:hstr:pyinstaller_packaged_script","Et","Unix.trojan.mirai-7646352-0","Win.trojan.vb-83922","Tel:exploit:html/pswebkit","Spyfu","#exploit:win32/blofeldscat","Nids"],"communityAffectedIndustries":["Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"698b8289dcaa7b1d40c6ac96","cveID":"CVE-2026-21525","dateAdded":"2026-02-10","dueDate":"2026-03-03","notes":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21525","product":"Windows","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Windows NULL Pointer Dereference Vulnerability","nvdData":[{"attackVector":"LOCAL","attackComplexity":"LOW","baseSeverity":"MEDIUM","exploitabilityScore":2.5,"baseScore":6.2,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21525","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":["Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"698b8289dcaa7b1d40c6ac95","cveID":"CVE-2026-21513","dateAdded":"2026-02-10","dueDate":"2026-03-03","notes":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2026-21513 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21513","product":"Windows","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Internet Explorer Protection Mechanism Failure Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":2.8,"baseScore":8.8,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21513","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21513","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":["","Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"6977e6393d6e1ad80e1e49e3","cveID":"CVE-2026-21509","dateAdded":"2026-01-26","dueDate":"2026-02-16","notes":"Please adhere to Microsoft’s recommended guidelines to address this vulnerability. Implement all final mitigations provided by the vendor for Office 2021, and apply the interim corresponding mitigations for Office 2016 and Office 2019 until the final patch becomes available. For more information please see: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21509","product":"Office","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Office contains a security feature bypass vulnerability in which reliance on untrusted inputs in a security decision in Microsoft Office could allow an unauthorized attacker to bypass a security feature locally.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Office Security Feature Bypass Vulnerability","nvdData":[{"attackVector":"LOCAL","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":1.8,"baseScore":7.8,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21509","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":["https://github.com/Ashwesker/Ashwesker-CVE-2026-21509","https://github.com/SimoesCTT/SCTT-2026-33-0007-The-OLE-Vortex-Laminar-Bypass-","https://github.com/SimoesCTT/CTT-NFS-Vortex-RCE","https://github.com/ksk-itdk/KSK-ITDK-CVE-2026-21509-Mitigation","https://github.com/gavz/CVE-2026-21509-PoC","https://github.com/IncursioHack/CVE-2026-21509-PoC","https://github.com/nicole2ilodl/CVE-2026-21509-PoC","https://github.com/SimoesCTT/CTT-MICROSOFT-OFFICE-OLE-MANIFOLD-BYPASS-CVE-2026-21509","https://github.com/kimstars/Ashwesker-CVE-2026-21509","https://github.com/decalage2/detect_CVE-2026-21509","https://github.com/planetoid/cve-2026-21509-mitigation","https://github.com/suuhm/CVE-2026-21509-handler","https://github.com/DameDode/CVE-2026-21509-POC"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":["APT28","Adversary Profile: Salt Typhoon Alignment The architectural gap identified by mudoSO mirrors the act","Winnti","Gentlemen Ransomware, Ruby Jumper, Moonrise RAT, Dust Specter, NoEscape, Ransom House, Steaelite","StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s","Bo_team","DTO malware, GoPix banking Trojan, SERPENTINE#CLOUD, FAUX#ELEVATE, Katana"],"communityMalwareFamilies":["#lowfi:hstr:pyinstaller_packaged_script","Md5 hash: f8add7e7161460ea2b1970cf4ca535bf","#exploit:win32/blofeldscat","Alf:heraklezeval:trojan:win32/c2lop","Tel:exploit:html/pswebkit","Malware family: stealthworker / gobrut"],"communityAffectedIndustries":["Military","Education","Government","Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in","Logistic","Aerospace","Transportation"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"6966a6999f160182cf8eca32","cveID":"CVE-2026-20805","dateAdded":"2026-01-13","dueDate":"2026-02-03","notes":"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20805 ; https://nvd.nist.gov/vuln/detail/CVE-2026-20805","product":"Windows","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Windows contains an information disclosure vulnerability that allows an authorized attacker to disclose information locally.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Windows Information Disclosure Vulnerability","nvdData":[{"attackVector":"LOCAL","attackComplexity":"LOW","baseSeverity":"MEDIUM","exploitabilityScore":1.8,"baseScore":5.5,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20805","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-20805","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":["https://github.com/fevar54/CVE-2026-20805-POC","https://github.com/Uzair-Baig0900/CVE-2026-20805-PoC","https://github.com/mrk336/Inside-CVE-2026-20805-How-a-Windows-DWM-Flaw-Exposed-Sensitive-Data","https://github.com/SimoesCTT/SCTT-2026-33-0002-DWM-Visual-Field-Singularity","https://github.com/SimoesCTT/-SCTT-2026-33-0002-DWM-Visual-Field-Singularity"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":["StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s"],"communityMalwareFamilies":["Md5 hash: f8add7e7161460ea2b1970cf4ca535bf","Malware family: stealthworker / gobrut"],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"695eaf894d545e1fd0514095","cveID":"CVE-2009-0556","dateAdded":"2026-01-07","dueDate":"2026-01-28","notes":"https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 ; https://nvd.nist.gov/vuln/detail/CVE-2009-0556","product":"Office","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Office PowerPoint contains a code injection vulnerability that allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAtom containing an invalid index value that triggers memory corruption.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Office PowerPoint Code Injection Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":2.8,"baseScore":8.8,"nvdReferences":[{"url":"http://blogs.technet.com/mmpc/archive/2009/04/02/new-0-day-exploits-using-powerpoint-files.aspx","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"http://blogs.technet.com/msrc/archive/2009/04/02/microsoft-security-advisory-969136.aspx","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"http://blogs.technet.com/srd/archive/2009/04/02/investigating-the-new-powerpoint-issue.aspx","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"http://osvdb.org/53182","source":"secure@microsoft.com"},{"url":"http://secunia.com/advisories/34572","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"http://www.kb.cert.org/vuls/id/627331","source":"secure@microsoft.com","tags":["US Government Resource"]},{"url":"http://www.microsoft.com/technet/security/advisory/969136.mspx","source":"secure@microsoft.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/503453/100/0/threaded","source":"secure@microsoft.com"},{"url":"http://www.securityfocus.com/bid/34351","source":"secure@microsoft.com"},{"url":"http://www.securitytracker.com/id?1021967","source":"secure@microsoft.com"},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-132A.html","source":"secure@microsoft.com","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2009/0915","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"http://www.vupen.com/english/advisories/2009/1290","source":"secure@microsoft.com"},{"url":"http://www.zerodayinitiative.com/advisories/ZDI-09-019","source":"secure@microsoft.com"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017","source":"secure@microsoft.com"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49632","source":"secure@microsoft.com"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6204","source":"secure@microsoft.com"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6279","source":"secure@microsoft.com"},{"url":"http://blogs.technet.com/mmpc/archive/2009/04/02/new-0-day-exploits-using-powerpoint-files.aspx","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://blogs.technet.com/msrc/archive/2009/04/02/microsoft-security-advisory-969136.aspx","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://blogs.technet.com/srd/archive/2009/04/02/investigating-the-new-powerpoint-issue.aspx","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://osvdb.org/53182","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/34572","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.kb.cert.org/vuls/id/627331","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.microsoft.com/technet/security/advisory/969136.mspx","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/503453/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/34351","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id?1021967","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-132A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2009/0915","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.vupen.com/english/advisories/2009/1290","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.zerodayinitiative.com/advisories/ZDI-09-019","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49632","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6204","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6279","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2009-0556","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Deferred"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"693882191efa30072f7aea8b","cveID":"CVE-2025-62221","dateAdded":"2025-12-09","dueDate":"2025-12-30","notes":"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62221 ; https://nvd.nist.gov/vuln/detail/CVE-2025-62221","product":"Windows","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Windows Cloud Files Mini Filter Driver contains a use after free vulnerability that can allow an authorized attacker to elevate privileges locally.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Windows Use After Free Vulnerability","nvdData":[{"attackVector":"LOCAL","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":1.8,"baseScore":7.8,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-62221","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":["https://github.com/LoKinii/CVE-2025-62221-Exploit","https://github.com/JeanKauffman1305/CVE-2025-62221-Exploit-"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"6914b15978ae45f41e9ca2a3","cveID":"CVE-2025-62215","dateAdded":"2025-11-12","dueDate":"2025-12-03","notes":"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62215 ; https://nvd.nist.gov/vuln/detail/CVE-2025-62215","product":"Windows","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Windows Kernel contains a race condition vulnerability that allows a local attacker with low-level privileges to escalate privileges. Successful exploitation of this vulnerability could enable the attacker to gain SYSTEM-level access.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Windows Race Condition Vulnerability","nvdData":[{"attackVector":"LOCAL","attackComplexity":"HIGH","baseSeverity":"HIGH","exploitabilityScore":1.0,"baseScore":7.0,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62215","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-62215","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":["https://github.com/dexterm300/CVE-2025-62215-exploit-poc","https://github.com/abrewer251/CVE-2025-62215_Windows_Kernel_PE","https://github.com/mrk336/Kernel-Chaos-Weaponizing-CVE-2025-62215-for-SYSTEM-Privilege-Escalation","https://github.com/theman001/CVE-2025-62215","https://github.com/uky007/CVE-2025-62215_analysis"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"68fbc0f9be5f7e7d0cd1ed1b","cveID":"CVE-2025-59287","dateAdded":"2025-10-24","dueDate":"2025-11-14","notes":"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287 ; https://nvd.nist.gov/vuln/detail/CVE-2025-59287","product":"Windows","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Windows Server Update Service (WSUS) contains a deserialization of untrusted data vulnerability that allows for remote code execution.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"CRITICAL","exploitabilityScore":3.9,"baseScore":9.8,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"https://hawktrace.com/blog/CVE-2025-59287","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-windows-server-wsus-flaw-exploited-in-attacks/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://gist.github.com/hawktrace/880b54fb9c07ddb028baaae401bd3951","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Third Party Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-59287","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Third Party Advisory","US Government Resource"]}],"vulnStatus":"Modified"}],"githubPocs":["https://github.com/keeganparr1/CVE-2025-59287-hawktrace","https://github.com/mrk336/Breaking-the-Update-Chain-Inside-CVE-2025-59287-and-the-WSUS-RCE-Threat","https://github.com/mubix/Find-WSUS","https://github.com/RadzaRr/WSUSResponder","https://github.com/tecxx/CVE-2025-59287-WSUS","https://github.com/Lupovis/Honeypot-for-CVE-2025-59287-WSUS","https://github.com/0xBruno/WSUSploit.NET","https://github.com/garvitv14/CVE-2025-59287","https://github.com/jiansiting/CVE-2025-59287","https://github.com/0x7556/CVE-2025-59287","https://github.com/fsanzmoya/wsus_CVE-2025-59287","https://github.com/esteban11121/WSUS-RCE-Mitigation-59287","https://github.com/AdityaBhatt3010/CVE-2025-59287-When-your-patch-server-becomes-the-attack-vector","https://github.com/FurkanKAYAPINAR/CVE-2025-59287","https://github.com/th1n0/CVE-2025-59287","https://github.com/dexterm300/cve-2025-59287-exploit-poc","https://github.com/Sid6Effect/CVE-2025-59287","https://github.com/QurtiDev/WSUS-CVE-2025-59287-RCE","https://github.com/crondenice/CVE-2025-59287","https://github.com/gud425/gud425.github.io","https://github.com/vtntkmfyyftrem/CVE-2025-59287","https://github.com/you-dream-1hall/CVE-2025-59287","https://github.com/salman5230/CVE-2025-59287","https://github.com/vatslaaeytoygag/CVE-2025-59287"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":["Head Mare","APT27","Gentlemen Ransomware, Ruby Jumper, Moonrise RAT, Dust Specter, NoEscape, Ransom House, Steaelite","Dragon_clover","Cephalus Ransomware, Transparent Tribe, CRESCENTHARVEST, Keenadu, Cloudflare Pages \"Continue Read\" R"],"communityMalwareFamilies":["Php","Beyondtrust"],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"68f650c91ee9d064e6b09486","cveID":"CVE-2025-33073","dateAdded":"2025-10-20","dueDate":"2025-11-10","notes":"https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-33073 ; https://nvd.nist.gov/vuln/detail/CVE-2025-33073","product":"Windows","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Windows SMB Client contains an improper access control vulnerability that could allow for privilege escalation. An attacker could execute a specially crafted malicious script to coerce the victim machine to connect back to the attack system using SMB and authenticate.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Windows SMB Client Improper Access Control Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":2.8,"baseScore":8.8,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"https://www.vicarius.io/vsociety/posts/cve-2025-33073-detection-script-improper-access-control-in-windows-smb-affects-microsoft-products","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.vicarius.io/vsociety/posts/cve-2025-33073-mitigation-script-improper-access-control-in-windows-smb-affects-microsoft-products","source":"af854a3a-2127-422b-91ae-364da2661108"}],"vulnStatus":"Modified"}],"githubPocs":["https://github.com/SellMeFish/windows-smb-vulnerability-framework-cve-2025-33073","https://github.com/matejsmycka/CVE-2025-33073-checker","https://github.com/joaozixx/CVE-2025-33073","https://github.com/mverschu/CVE-2025-33073","https://github.com/sleepasleepzzz/CVE-2025-33073","https://github.com/B1ack4sh/Blackash-CVE-2025-33073","https://github.com/uziii2208/CVE-2025-33073","https://github.com/Iddygodwin/CVE-2025-33073","https://github.com/irjfifndn-prog/Blackash-CVE-2025-33073","https://github.com/pol4ir/CVE-2025-33073","https://github.com/IyarGross/SMB-CVE-2025-33073","https://github.com/IyarGross/SMB-CVE-2025-33073","https://github.com/EgCupCake/cupntlm-Automated-Exploit-For-CVE-2025-33073-"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":["Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"68ee91f9eedaba4884e5ab29","cveID":"CVE-2025-59230","dateAdded":"2025-10-14","dueDate":"2025-11-04","notes":"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59230 ; https://nvd.nist.gov/vuln/detail/CVE-2025-59230","product":"Windows","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Windows contains an improper access control vulnerability in Windows Remote Access Connection Manager which could allow an authorized attacker to elevate privileges locally.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Windows Improper Access Control Vulnerability","nvdData":[{"attackVector":"LOCAL","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":1.8,"baseScore":7.8,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230","source":"secure@microsoft.com","tags":["Vendor Advisory"]}],"vulnStatus":"Analyzed"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"68ee91f9eedaba4884e5ab28","cveID":"CVE-2025-24990","dateAdded":"2025-10-14","dueDate":"2025-11-04","notes":"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24990 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24990","product":"Windows","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Windows Agere Modem Driver contains an untrusted pointer dereference vulnerability that allows for privilege escalation. An attacker who successfully exploited this vulnerability could gain administrator privileges.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Windows Untrusted Pointer Dereference Vulnerability","nvdData":[{"attackVector":"LOCAL","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":1.8,"baseScore":7.8,"nvdReferences":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990","source":"secure@microsoft.com","tags":["Vendor Advisory"]}],"vulnStatus":"Analyzed"}],"githubPocs":["https://github.com/moiz-2x/CVE-2025-24990_POC"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"68e405f967a38868e613de96","cveID":"CVE-2011-3402","dateAdded":"2025-10-06","dueDate":"2025-10-27","notes":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-087 ; https://nvd.nist.gov/vuln/detail/CVE-2011-3402","product":"Windows","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Windows Kernel contains an unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers that allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page.","vendorProject":"Microsoft","vulnerabilityName":"Microsoft Windows Remote Code Execution Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":2.8,"baseScore":8.8,"nvdReferences":[{"url":"http://blogs.mcafee.com/mcafee-labs/the-day-of-the-golden-jackal-%E2%80%93-further-tales-of-the-stuxnet-files","source":"secure@microsoft.com"},{"url":"http://blogs.technet.com/b/msrc/archive/2011/11/03/microsoft-releases-security-advisory-2639658.aspx","source":"secure@microsoft.com"},{"url":"http://isc.sans.edu/diary/Duqu+Mitigation/11950","source":"secure@microsoft.com"},{"url":"http://secunia.com/advisories/49121","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/49122","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"http://technet.microsoft.com/security/advisory/2639658","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"http://www.securelist.com/en/blog/208193197/The_Mystery_of_Duqu_Part_Two","source":"secure@microsoft.com"},{"url":"http://www.securitytracker.com/id?1027039","source":"secure@microsoft.com"},{"url":"http://www.symantec.com/connect/w32-duqu_status-updates_installer-zero-day-exploit","source":"secure@microsoft.com"},{"url":"http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_duqu_the_precursor_to_the_next_stuxnet.pdf","source":"secure@microsoft.com"},{"url":"http://www.us-cert.gov/cas/techalerts/TA11-347A.html","source":"secure@microsoft.com","tags":["US Government Resource"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA12-129A.html","source":"secure@microsoft.com","tags":["US Government Resource"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA12-164A.html","source":"secure@microsoft.com","tags":["US Government Resource"]},{"url":"http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-291-01E.pdf","source":"secure@microsoft.com","tags":["US Government Resource"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-087","source":"secure@microsoft.com"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-034","source":"secure@microsoft.com"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-039","source":"secure@microsoft.com"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13998","source":"secure@microsoft.com"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15290","source":"secure@microsoft.com"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15645","source":"secure@microsoft.com"},{"url":"http://blogs.mcafee.com/mcafee-labs/the-day-of-the-golden-jackal-%E2%80%93-further-tales-of-the-stuxnet-files","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://blogs.technet.com/b/msrc/archive/2011/11/03/microsoft-releases-security-advisory-2639658.aspx","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://isc.sans.edu/diary/Duqu+Mitigation/11950","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/49121","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/49122","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://technet.microsoft.com/security/advisory/2639658","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securelist.com/en/blog/208193197/The_Mystery_of_Duqu_Part_Two","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id?1027039","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.symantec.com/connect/w32-duqu_status-updates_installer-zero-day-exploit","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_duqu_the_precursor_to_the_next_stuxnet.pdf","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.us-cert.gov/cas/techalerts/TA11-347A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA12-129A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA12-164A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-291-01E.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-087","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-034","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-039","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13998","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15290","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15645","source":"af854a3a-2127-422b-91ae-364da2661108"}],"vulnStatus":"Deferred"}],"githubPocs":[],"openThreatData":[{"adversaries":["APT31"],"malwareFamiles":["Danderspritz","Epmo","Epme"],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"}]}