{"page":2,"per_page":25,"total_vulns":1577,"total_pages":64,"vulnerabilities":[{"_id":"69b444e9cef7ac5351727a86","cveID":"CVE-2026-3910","dateAdded":"2026-03-13","dueDate":"2026-03-27","notes":"https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_12.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-3910","product":"Chromium V8","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Google Chromium V8 contains an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.","vendorProject":"Google","vulnerabilityName":"Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":2.8,"baseScore":8.8,"nvdReferences":[{"url":"https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_12.html","source":"chrome-cve-admin@google.com","tags":["Vendor Advisory","Release Notes"]},{"url":"https://issues.chromium.org/issues/491410818","source":"chrome-cve-admin@google.com","tags":["Permissions Required"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-3910","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69b1aff9e51abd70875a9137","cveID":"CVE-2025-68613","dateAdded":"2026-03-11","dueDate":"2026-03-25","notes":"https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp ; https://nvd.nist.gov/vuln/detail/CVE-2025-68613","product":"n8n","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"n8n contains an improper control of dynamically managed code resources vulnerability in its workflow expression evaluation system that allows for remote code execution.","vendorProject":"n8n","vulnerabilityName":"n8n Improper Control of Dynamically-Managed Code Resources Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"CRITICAL","exploitabilityScore":3.1,"baseScore":9.9,"nvdReferences":[{"url":"https://github.com/n8n-io/n8n/commit/08f332015153decdda3c37ad4fcb9f7ba13a7c79","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/n8n-io/n8n/commit/1c933358acef527ff61466e53268b41a04be1000","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/n8n-io/n8n/commit/39a2d1d60edde89674ca96dcbb3eb076ffff6316","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.akamai.com/blog/security-research/2026/feb/zerobot-malware-targets-n8n-automation-platform","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-68613","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":["https://github.com/h3raklez/CVE-2025-68613","https://github.com/Victorhugofariasvieir66/relatorio-n8n.md","https://github.com/shibaaa204/CVE-2025-68613","https://github.com/TheInterception/n8n_CVE-2025-68613_exploit_payloads","https://github.com/ahmedshamsddin/n8n-RCE-CVE-2025-68613","https://github.com/gagaltotal/n8n-cve-2025-68613","https://github.com/LingerANR/n8n-CVE-2025-68613","https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis","https://github.com/J4ck3LSyN-Gen2/n8n-CVE-2025-68613-TryHackMe","https://github.com/releaseown/Analysis-n8n-CVE-2025-68613","https://github.com/mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613","https://github.com/hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultimate","https://github.com/JohannesLks/CVE-2025-68613-Python-Exploit","https://github.com/AbdulRKB/n8n-RCE","https://github.com/manyaigdtuw/CVE-2025-68613_Scanner","https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab","https://github.com/secjoker/CVE-2025-68613","https://github.com/111ddea/CVE-2025-68613","https://github.com/GnuTLam/POC-CVE-2025-68613","https://github.com/nehkark/CVE-2025-68613","https://github.com/intbjw/CVE-2025-68613-poc-via-copilot","https://github.com/reem-012/poc_CVE-2025-68613","https://github.com/wioui/n8n-CVE-2025-68613-exploit","https://github.com/sahilccras/Blackash-CVE-2025-68613","https://github.com/TheStingR/CVE-2025-68613","https://github.com/TheStingR/CVE-2025-68613-POC","https://github.com/Ashwesker/Blackash-CVE-2025-68613","https://github.com/rxerium/CVE-2025-68613"],"openThreatData":[{"adversaries":["MuddyWater"],"malwareFamiles":["Persianc2","Arenac2","Keyc2","Tsundere botnet"],"affectedIndustries":["Defense","Finance","Healthcare","Technology","Government","Transportation"],"communityAdversaries":["MuddyWater"],"communityMalwareFamilies":["Tsundere botnet","Administrator","Persianc2","Arenac2","Keyc2"],"communityAffectedIndustries":["Defense","Finance","Healthcare","Technology","Government","Transportation"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69af372a69585225d3e7c26b","cveID":"CVE-2026-1603","dateAdded":"2026-03-09","dueDate":"2026-03-23","notes":"https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2026-1603","product":" Endpoint Manager (EPM)","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Ivanti Endpoint Manager (EPM) contains an authentication bypass using an alternate path or channel vulnerability that could allow a remote unauthenticated attacker to leak specific stored credential data.","vendorProject":"Ivanti","vulnerabilityName":"Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":3.9,"baseScore":8.6,"nvdReferences":[{"url":"https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US","source":"3c1d8aa1-5a33-4ea4-8992-aadd6440af75","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-1603","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69af372a69585225d3e7c26a","cveID":"CVE-2025-26399","dateAdded":"2026-03-09","dueDate":"2026-03-12","notes":"https://www.solarwinds.com/trust-center/security-advisories/cve-2025-26399 ; https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_12-8-7-hotfix-1_release_notes.htm ; https://nvd.nist.gov/vuln/detail/CVE-2025-26399","product":"Web Help Desk","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"SolarWinds Web Help Desk contain a deserialization of untrusted data vulnerability in AjaxProxy that could allow an attacker to run commands on the host machine.","vendorProject":"SolarWinds","vulnerabilityName":"SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"CRITICAL","exploitabilityScore":3.9,"baseScore":9.8,"nvdReferences":[{"url":"https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_12-8-7-hotfix-1_release_notes.htm","source":"psirt@solarwinds.com","tags":["Release Notes"]},{"url":"https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-26399","source":"psirt@solarwinds.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-26399","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"},{"url":"https://www.microsoft.com/en-us/security/blog/2026/02/06/active-exploitation-solarwinds-web-help-desk/","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":["https://github.com/rxerium/CVE-2025-26399"],"openThreatData":[{"adversaries":["Storm-1567"],"malwareFamiles":["Akira"],"affectedIndustries":[],"communityAdversaries":["DKnife, Supply chain attack targeting dYdX, RCtea Botnet, ClawHavoc, CrashFix, Prometei"],"communityMalwareFamilies":["#lowfi:hstr:pyinstaller_packaged_script","Akira","Alf:heraklezeval:trojan:win32/c2lop","Tel:exploit:html/pswebkit","#exploit:win32/blofeldscat"],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69af372a69585225d3e7c269","cveID":"CVE-2021-22054","dateAdded":"2026-03-09","dueDate":"2026-03-23","notes":"https://web.archive.org/web/20211222154335/https://www.vmware.com/security/advisories/VMSA-2021-0029.html ; https://nvd.nist.gov/vuln/detail/CVE-2021-22054","product":"Workspace One UEM","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Omnissa Workspace One UEM formerly known as VMware Workspace One UEM contains a server-side request forgery (SSRF) vulnerability that could allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information.","vendorProject":"Omnissa","vulnerabilityName":"Omnissa Workspace ONE Server-Side Request Forgery","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":3.9,"baseScore":7.5,"nvdReferences":[{"url":"https://www.vmware.com/security/advisories/VMSA-2021-0029.html","source":"security@vmware.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.vmware.com/security/advisories/VMSA-2021-0029.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-22054","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"},{"url":"https://www.greynoise.io/blog/new-ssrf-exploitation-surge","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":["https://github.com/MKSx/CVE-2021-22054"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69a9e31ae1c8456d585ab210","cveID":"CVE-2023-41974","dateAdded":"2026-03-05","dueDate":"2026-03-26","notes":"https://support.apple.com/en-us/HT213938 ; https://support.apple.com/kb/HT213938 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41974","product":"iOS and iPadOS","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Apple iOS and iPadOS contain a use-after-free vulnerability. An app may be able to execute arbitrary code with kernel privileges.","vendorProject":"Apple","vulnerabilityName":"Apple iOS and iPadOS Use-After-Free Vulnerability","nvdData":[{"attackVector":"LOCAL","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":1.8,"baseScore":7.8,"nvdReferences":[{"url":"https://support.apple.com/en-us/HT213938","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/HT213938","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/kb/HT213938","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41974","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":["UNC6691"],"communityMalwareFamilies":["Plasmagrid","Coruna"],"communityAffectedIndustries":["Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in","Finance"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69a9e31ae1c8456d585ab20f","cveID":"CVE-2021-30952","dateAdded":"2026-03-05","dueDate":"2026-03-26","notes":"https://support.apple.com/en-us/HT212975 ; https://support.apple.com/en-us/HT212976 ; https://support.apple.com/en-us/HT212978 ; https://support.apple.com/en-us/HT212980 ; https://support.apple.com/en-us/HT212982 ; https://nvd.nist.gov/vuln/detail/CVE-2021-30952","product":"Multiple Products","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Apple tvOS, macOS, Safari, iPadOS and watchOS contain an integer overflow or wraparound vulnerability due to the processing of maliciously crafted web content that may lead to arbitrary code execution.","vendorProject":"Apple","vulnerabilityName":"Apple Multiple Products Integer Overflow or Wraparound Vulnerability","nvdData":[{"attackVector":"LOCAL","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":1.8,"baseScore":7.8,"nvdReferences":[{"url":"http://www.openwall.com/lists/oss-security/2022/01/21/2","source":"product-security@apple.com"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/","source":"product-security@apple.com"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/","source":"product-security@apple.com"},{"url":"https://support.apple.com/en-us/HT212975","source":"product-security@apple.com"},{"url":"https://support.apple.com/en-us/HT212976","source":"product-security@apple.com"},{"url":"https://support.apple.com/en-us/HT212978","source":"product-security@apple.com"},{"url":"https://support.apple.com/en-us/HT212980","source":"product-security@apple.com"},{"url":"https://support.apple.com/en-us/HT212982","source":"product-security@apple.com"},{"url":"https://www.debian.org/security/2022/dsa-5060","source":"product-security@apple.com"},{"url":"https://www.debian.org/security/2022/dsa-5061","source":"product-security@apple.com"},{"url":"http://www.openwall.com/lists/oss-security/2022/01/21/2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://support.apple.com/en-us/HT212975","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://support.apple.com/en-us/HT212976","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://support.apple.com/en-us/HT212978","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://support.apple.com/en-us/HT212980","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://support.apple.com/en-us/HT212982","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.debian.org/security/2022/dsa-5060","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.debian.org/security/2022/dsa-5061","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30952","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":[],"openThreatData":[{"adversaries":["UNC6691"],"malwareFamiles":["Plasmagrid","Coruna"],"affectedIndustries":["Finance"],"communityAdversaries":["UNC6691"],"communityMalwareFamilies":["Plasmagrid","Epiphany","Coruna"],"communityAffectedIndustries":["Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in","Finance"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69a9e31ae1c8456d585ab20e","cveID":"CVE-2023-43000","dateAdded":"2026-03-05","dueDate":"2026-03-26","notes":"https://support.apple.com/en-us/120324 ; https://support.apple.com/en-us/120331 ; https://support.apple.com/en-us/120338 ; https://nvd.nist.gov/vuln/detail/CVE-2023-43000","product":"Multiple Products","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Apple macOS, iOS, iPadOS, and Safari 16.6 contain a use-after-free vulnerability due to the processing of maliciously crafted web content that may lead to memory corruption.","vendorProject":"Apple","vulnerabilityName":"Apple Multiple products Use-After-Free Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":2.8,"baseScore":8.8,"nvdReferences":[{"url":"https://support.apple.com/en-us/120324","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/120331","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://support.apple.com/en-us/120338","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-43000","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":[],"openThreatData":[{"adversaries":["UNC6691"],"malwareFamiles":["Coruna","Plasmagrid"],"affectedIndustries":["Finance"],"communityAdversaries":["UNC6691"],"communityMalwareFamilies":["Coruna","Plasmagrid"],"communityAffectedIndustries":["Finance","Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69a9e31ae1c8456d585ab20d","cveID":"CVE-2021-22681","dateAdded":"2026-03-05","dueDate":"2026-03-26","notes":"https://support.rockwellautomation.com/app/answers/answer_view/a_id/1130301/~/cve-2021-22681%3A-authentication-bypass-vulnerability-found-in-logix-controllers- ; https://www.cisa.gov/news-events/ics-advisories/icsa-21-056-03 ; https://nvd.nist.gov/vuln/detail/CVE-2021-22681","product":"Multiple Products","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Multiple Rockwell products contain an insufficient protected credentials vulnerability. Studio 5000 Logix Designer software may allow a key to be discovered. This key is used to verify Logix controllers are communicating with Rockwell Automation design software. If successfully exploited, this vulnerability could allow an unauthorized application to connect with Logix controllers. To leverage this vulnerability, an unauthorized user would require network access to the controller.","vendorProject":"Rockwell","vulnerabilityName":"Rockwell Multiple Products Insufficient Protected Credentials Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"CRITICAL","exploitabilityScore":3.9,"baseScore":9.8,"nvdReferences":[{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-056-03","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-056-03","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-22681","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69a9e31ae1c8456d585ab20c","cveID":"CVE-2017-7921","dateAdded":"2026-03-05","dueDate":"2026-03-26","notes":"https://www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/ ; https://nvd.nist.gov/vuln/detail/CVE-2017-7921","product":"Multiple Products","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Multiple Hikvision products contain an improper authentication vulnerability that could allow a malicious user to escalate privileges on the system and gain access to sensitive information.","vendorProject":"Hikvision","vulnerabilityName":"Hikvision Multiple Products Improper Authentication Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"CRITICAL","exploitabilityScore":3.9,"baseScore":9.8,"nvdReferences":[{"url":"http://www.hikvision.com/us/about_10805.html","source":"ics-cert@hq.dhs.gov","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/98313","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://ghostbin.com/paste/q2vq2","source":"ics-cert@hq.dhs.gov"},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-17-124-01","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.hikvision.com/us/about_10805.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/98313","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://ghostbin.com/paste/q2vq2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-17-124-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.hikvision.com/cn/support/CybersecurityCenter/SecurityNotices/20170314/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-notification--privilege-escalating-vulnerability-in-cer/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-7921","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Deferred"}],"githubPocs":["https://github.com/KelvinWin10/CVE-2017-7921-rewrite","https://github.com/mverschu/CVE-2017-7921","https://github.com/Wyl-cmd/CVE-2017-7921-Research-Toolkit","https://github.com/saaydmr/hikvision-exploiter","https://github.com/f3d0rq/CVE-2017-7921","https://github.com/voidsshadows/Hikvision-City-Hunter","https://github.com/GabrielAvls/CVE-2017-7921","https://github.com/andychao/CVE-2017-7921_reproduces_decrypted_file_sharing","https://github.com/aengussong/hikvision_probe","https://github.com/initon/Hikvision---CVE-2017-7921","https://github.com/kooroshsanaei/HikVision-CVE-2017-7921","https://github.com/AnonkiGroup/AnonHik","https://github.com/fracergu/CVE-2017-7921","https://github.com/K3ysTr0K3R/CVE-2017-7921-EXPLOIT","https://github.com/krypton612/hikivision","https://github.com/201646613/CVE-2017-7921","https://github.com/chrisjd20/hikvision_CVE-2017-7921_auth_bypass_config_decryptor","https://github.com/MisakaMikato/cve-2017-7921-golang","https://github.com/BurnyMcDull/CVE-2017-7921","https://github.com/JrDw0/CVE-2017-7921-EXP"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69a723faeef4642d18e0823a","cveID":"CVE-2026-21385","dateAdded":"2026-03-03","dueDate":"2026-03-24","notes":"https://source.android.com/docs/security/bulletin/2026/2026-03-01 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21385","product":"Multiple Chipsets","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Multiple Qualcomm chipsets contain a memory corruption vulnerability while using alignments for memory allocation. ","vendorProject":"Qualcomm","vulnerabilityName":"Qualcomm Multiple Chipsets Memory Corruption Vulnerability","nvdData":[{"attackVector":"LOCAL","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":1.8,"baseScore":7.8,"nvdReferences":[{"url":"https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html","source":"product-security@qualcomm.com","tags":["Patch","Vendor Advisory"]},{"url":"https://source.android.com/docs/security/bulletin/2026/2026-03-01","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21385","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":["https://github.com/automate-it0/qualcomm-vulnerability-scanner"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"69a723faeef4642d18e08239","cveID":"CVE-2026-22719","dateAdded":"2026-03-03","dueDate":"2026-03-24","notes":"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ; https://knowledge.broadcom.com/external/article/430349 ; https://nvd.nist.gov/vuln/detail/CVE-2026-22719","product":"VMware Aria Operations","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Broadcom VMware Aria Operations formerly known as vRealize Operations (vROps) contains a command injection vulnerability that allows an unauthenticated attacker to execute arbitrary commands, potentially leading to remote code execution during support‑assisted product migration.","vendorProject":"Broadcom","vulnerabilityName":"Broadcom VMware Aria Operations Command Injection Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"HIGH","baseSeverity":"HIGH","exploitabilityScore":2.2,"baseScore":8.1,"nvdReferences":[{"url":"https://knowledge.broadcom.com/external/article/430349","source":"security@vmware.com","tags":["Mitigation","Vendor Advisory"]},{"url":"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947","source":"security@vmware.com","tags":["Patch","Vendor Advisory"]},{"url":"https://techdocs.broadcom.com/us/en/vmware-cis/aria/aria-operations/8-18/vmware-aria-operations-8186-release-notes.html","source":"security@vmware.com","tags":["Release Notes"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-22719","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"699f2ce9c7f8434cfaacf32b","cveID":"CVE-2026-20127","dateAdded":"2026-02-25","dueDate":"2026-02-27","notes":"CISA Mitigation Instructions: https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems ; https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk ; https://nvd.nist.gov/vuln/detail/CVE-2026-20127","product":"Catalyst SD-WAN Controller and Manager","requiredAction":"Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.","shortDescription":"Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, contain an authentication bypass vulnerability could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.","vendorProject":"Cisco","vulnerabilityName":"Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"CRITICAL","exploitabilityScore":3.9,"baseScore":10.0,"nvdReferences":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-20127","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":["https://github.com/leemuun/CVE-2026-20127","https://github.com/abrahamsurf/sdwan-scanner-CVE-2026-20127","https://github.com/BugFor-Pings/CVE-2026-20127_EXP","https://github.com/sfewer-r7/CVE-2026-20127","https://github.com/randeepajayasekara/CVE-2026-20127","https://github.com/sfewer-r7/CVE-2026-20127","https://github.com/randeepajayasekara/CVE-2026-20127"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":["StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s","Contagious Interview Campaign, Triton fork campaign, CRESCENTHARVEST, MIMICRAT, Operation Olalampo"],"communityMalwareFamilies":["Pws:win32/qqpass.fc","Trojan:win32/neconyd.a","Trojan:win32/zombie.a","Forks","#lowfi:suspicioussectionname","Malware family: stealthworker / gobrut","Win.malware.urelas-9863836-0","Alf:heraklezeval:trojan:msil/gravityrat!rfn","Multiple malware’s , trojans and rats","Win.trojan.vundo-7170412-0","Md5 hash: f8add7e7161460ea2b1970cf4ca535bf"],"communityAffectedIndustries":["Critical infrastructure","Foreign"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"699f2ce9c7f8434cfaacf32a","cveID":"CVE-2022-20775","dateAdded":"2026-02-25","dueDate":"2026-02-27","notes":"CISA Mitigation Instructions: https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems ; https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems ; https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html ; https://nvd.nist.gov/vuln/detail/CVE-2022-20775","product":"SD-WAN","requiredAction":"Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.","shortDescription":"Cisco SD-WAN CLI contains a path traversal vulnerability that could allow an authenticated local attacker to gain elevated privileges via improper access controls on commands within the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.","vendorProject":"Cisco","vulnerabilityName":"Cisco SD-WAN Path Traversal Vulnerability","nvdData":[{"attackVector":"LOCAL","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":1.8,"baseScore":7.8,"nvdReferences":[{"url":"https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc","source":"psirt@cisco.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-20775","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":["https://github.com/bluefalconink/cisa-ed-26-03-tracker"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"699df78943bb58f0604d6834","cveID":"CVE-2026-25108","dateAdded":"2026-02-24","dueDate":"2026-03-17","notes":"https://jvn.jp/en/jp/JVN84622767/ ; https://nvd.nist.gov/vuln/detail/CVE-2026-25108","product":"FileZen","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Soliton Systems K.K FileZen contains an OS command injection vulnerability when an user logs-in to the affected product and sends a specially crafted HTTP request.","vendorProject":"Soliton Systems K.K","vulnerabilityName":"Soliton Systems K.K FileZen OS Command Injection Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":2.8,"baseScore":8.8,"nvdReferences":[{"url":"https://jvn.jp/en/jp/JVN84622767/","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory"]},{"url":"https://www.soliton.co.jp/support/2026/006657.html","source":"vultures@jpcert.or.jp","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-25108","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[""]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"6998cda991eb5b97c464905a","cveID":"CVE-2025-68461","dateAdded":"2026-02-20","dueDate":"2026-03-13","notes":"https://roundcube.net/news/2025/12/13/security-updates-1.6.12-and-1.5.12 ; https://github.com/roundcube/roundcubemail/commit/bfa032631c36b900e7444dfa278340b33cbf7cdb ; https://nvd.nist.gov/vuln/detail/CVE-2025-68461","product":"Webmail","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"RoundCube Webmail contains a cross-site scripting vulnerability via the animate tag in an SVG document.","vendorProject":"Roundcube","vulnerabilityName":"RoundCube Webmail Cross-site Scripting Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":3.9,"baseScore":7.2,"nvdReferences":[{"url":"https://github.com/roundcube/roundcubemail/commit/bfa032631c36b900e7444dfa278340b33cbf7cdb","source":"cve@mitre.org","tags":["Patch"]},{"url":"https://roundcube.net/news/2025/12/13/security-updates-1.6.12-and-1.5.12","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-68461","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":["https://github.com/gotr00t0day/CVE-2025-68461","https://github.com/rxerium/CVE-2025-68461"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"6998cda991eb5b97c4649059","cveID":"CVE-2025-49113","dateAdded":"2026-02-20","dueDate":"2026-03-13","notes":"https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10 ; https://github.com/roundcube/roundcubemail/releases/tag/1.5.10 ; https://github.com/roundcube/roundcubemail/releases/tag/1.6.11 ; https://nvd.nist.gov/vuln/detail/CVE-2025-49113","product":"Webmail","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"RoundCube Webmail contains a deserialization of untrusted data vulnerability that allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php.","vendorProject":"Roundcube","vulnerabilityName":"RoundCube Webmail Deserialization of Untrusted Data Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"CRITICAL","exploitabilityScore":3.1,"baseScore":9.9,"nvdReferences":[{"url":"https://fearsoff.org/research/roundcube","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://github.com/roundcube/roundcubemail/commit/0376f69e958a8fef7f6f09e352c541b4e7729c4d","source":"cve@mitre.org","tags":["Patch"]},{"url":"https://github.com/roundcube/roundcubemail/commit/7408f31379666124a39f9cb1018f62bc5e2dc695","source":"cve@mitre.org","tags":["Patch"]},{"url":"https://github.com/roundcube/roundcubemail/commit/c50a07d88ca38f018a0f4a0b008e9a1deb32637e","source":"cve@mitre.org","tags":["Patch"]},{"url":"https://github.com/roundcube/roundcubemail/pull/9865","source":"cve@mitre.org","tags":["Issue Tracking"]},{"url":"https://github.com/roundcube/roundcubemail/releases/tag/1.5.10","source":"cve@mitre.org","tags":["Release Notes"]},{"url":"https://github.com/roundcube/roundcubemail/releases/tag/1.6.11","source":"cve@mitre.org","tags":["Release Notes"]},{"url":"https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://www.vicarius.io/vsociety/posts/cve-2025-49113-roundcube-mitigation-script","source":"cve@mitre.org","tags":["Exploit","Mitigation","Third Party Advisory"]},{"url":"https://www.vicarius.io/vsociety/posts/cve-2025-49113-roundcube-vulnerability-detection","source":"cve@mitre.org","tags":["Exploit","Mitigation","Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2025/06/02/3","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/06/msg00008.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-49113","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":["https://github.com/ankitpandey383/roundcube-cve-2025-49113-lab","https://github.com/l4f2s4/CVE-2025-49113-exploit.php","https://github.com/LeakForge/CVE-2025-49113","https://github.com/AC8999/CVE-2025-49113","https://github.com/Zwique/CVE-2025-49113","https://github.com/SteamPunk424/CVE-2025-49113-Roundcube-RCE-PHP","https://github.com/00xCanelo/CVE-2025-49113","https://github.com/issamjr/CVE-2025-49113-Scanner","https://github.com/5kr1pt/Roundcube_CVE-2025-49113","https://github.com/B1ack4sh/Blackash-CVE-2025-49113","https://github.com/5kr1pt/WriteUp-Roundcube_CVE-2025-49113","https://github.com/Yuri08loveElaina/CVE-2025-49113","https://github.com/BiiTts/Roundcube-CVE-2025-49113","https://github.com/hakaioffsec/CVE-2025-49113-exploit","https://github.com/SyFi/CVE-2025-49113","https://github.com/Ademking/CVE-2025-49113-nuclei-template","https://github.com/rxerium/CVE-2025-49113"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":["pi, pdfkit.net","Adversary Profile: Salt Typhoon Alignment The architectural gap identified by mudoSO mirrors the act","StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s","Tier-1 SaaS Reputation Parasitism Leveraging Wix Infrastructure"],"communityMalwareFamilies":["Malware family: stealthworker / gobrut","Virtool:win32/vbinject.gen!jb","Alf:heraklezeval:trojan:win32/c2lop","#lowfi:hstr:pyinstaller_packaged_script","Et","Unix.trojan.mirai-7646352-0","Win.trojan.vb-83922","Tel:exploit:html/pswebkit","Spyfu","#exploit:win32/blofeldscat","Nids","Md5 hash: f8add7e7161460ea2b1970cf4ca535bf"],"communityAffectedIndustries":["","Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"6995f26ae9fc268328865d84","cveID":"CVE-2026-22769","dateAdded":"2026-02-18","dueDate":"2026-02-21","notes":"https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079 ; https://www.dell.com/support/kbdoc/en-us/000426742/recoverpoint-for-vms-apply-the-remediation-script-for-dsa ; https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day ; https://nvd.nist.gov/vuln/detail/CVE-2026-22769","product":"RecoverPoint for Virtual Machines (RP4VMs)","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Dell RecoverPoint for Virtual Machines (RP4VMs) contains an use of hard-coded credentials vulnerability that could allow an unauthenticated remote attacker to gain unauthorized access to the underlying operating system and root-level persistence.","vendorProject":"Dell","vulnerabilityName":"Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"CRITICAL","exploitabilityScore":3.9,"baseScore":10.0,"nvdReferences":[{"url":"https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079","source":"security_alert@emc.com","tags":["Patch","Vendor Advisory"]},{"url":"https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Third Party Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-22769","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}],"vulnStatus":"Analyzed"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":["Adversary Profile: Salt Typhoon Alignment The architectural gap identified by mudoSO mirrors the act","Cephalus Ransomware, Transparent Tribe, CRESCENTHARVEST, Keenadu, Cloudflare Pages \"Continue Read\" R","pi, pdfkit.net","Tier-1 SaaS Reputation Parasitism Leveraging Wix Infrastructure"],"communityMalwareFamilies":["#exploit:win32/blofeldscat","Alf:heraklezeval:trojan:win32/c2lop","#lowfi:hstr:pyinstaller_packaged_script","Forks","Tel:exploit:html/pswebkit"],"communityAffectedIndustries":["Critical infrastructure","","Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in","Foreign"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"6995f26ae9fc268328865d83","cveID":"CVE-2021-22175","dateAdded":"2026-02-18","dueDate":"2026-03-11","notes":"https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22175.json ; https://nvd.nist.gov/vuln/detail/CVE-2021-22175","product":"GitLab","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"GitLab contains a server-side request forgery (SSRF) vulnerability when requests to the internal network for webhooks are enabled.","vendorProject":"GitLab","vulnerabilityName":"GitLab Server-Side Request Forgery (SSRF) Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"HIGH","baseSeverity":"MEDIUM","exploitabilityScore":2.2,"baseScore":6.8,"nvdReferences":[{"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22175.json","source":"cve@gitlab.com","tags":["Vendor Advisory"]},{"url":"https://gitlab.com/gitlab-org/gitlab/-/issues/294178","source":"cve@gitlab.com","tags":["Broken Link"]},{"url":"https://hackerone.com/reports/1059596","source":"cve@gitlab.com","tags":["Permissions Required","Third Party Advisory"]},{"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22175.json","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://gitlab.com/gitlab-org/gitlab/-/issues/294178","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"https://hackerone.com/reports/1059596","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required","Third Party Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-22175","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":[],"communityMalwareFamilies":[],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"6994d929008952522ea3854d","cveID":"CVE-2026-2441","dateAdded":"2026-02-17","dueDate":"2026-03-10","notes":"https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441","product":"Chromium","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Google Chromium CSS contains a use-after-free vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.","vendorProject":"Google","vulnerabilityName":"Google Chromium CSS Use-After-Free Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":2.8,"baseScore":8.8,"nvdReferences":[{"url":"https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html","source":"chrome-cve-admin@google.com","tags":["Release Notes"]},{"url":"https://issues.chromium.org/issues/483569511","source":"chrome-cve-admin@google.com","tags":["Issue Tracking","Permissions Required"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-2441","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":["https://github.com/fartlover37/CVE-2026-2441-PoC"],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":["Adversary Profile: Salt Typhoon Alignment The architectural gap identified by mudoSO mirrors the act","Threat","pi, pdfkit.net","Tier-1 SaaS Reputation Parasitism Leveraging Wix Infrastructure","StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s"],"communityMalwareFamilies":["Threat","Malware family: stealthworker / gobrut","Virtool:win32/vbinject.gen!jb","Lumma","Alf:heraklezeval:trojan:win32/c2lop","Shinyhunters","Ninja browser","Tel:exploit:html/pswebkit","Et","#lowfi:hstr:pyinstaller_packaged_script","Nids","#exploit:win32/blofeldscat","Unix.trojan.mirai-7646352-0","Win.trojan.vb-83922","Tesla","Md5 hash: f8add7e7161460ea2b1970cf4ca535bf","Spyfu"],"communityAffectedIndustries":["","Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"6994d929008952522ea3854c","cveID":"CVE-2008-0015","dateAdded":"2026-02-17","dueDate":"2026-03-10","notes":"https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015","product":"Windows","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Microsoft Windows Video ActiveX Control contains a remote code execution vulnerability. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.","vendorProject":"Microsoft","vulnerabilityName":" Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":2.8,"baseScore":8.8,"nvdReferences":[{"url":"http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx","source":"cve@mitre.org"},{"url":"http://isc.sans.org/diary.html?storyid=6733","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://osvdb.org/55651","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/36187","source":"cve@mitre.org"},{"url":"http://www.csis.dk/dk/nyheder/nyheder.asp?tekstID=799","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.iss.net/threats/329.html","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.kb.cert.org/vuls/id/180513","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.microsoft.com/technet/security/advisory/972890.mspx","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/35558","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/35585","source":"cve@mitre.org"},{"url":"http://www.securitytracker.com/id?1022514","source":"cve@mitre.org"},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-187A.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-195A.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-223A.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2009/2232","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-032","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6333","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6363","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7436","source":"cve@mitre.org"},{"url":"http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://isc.sans.org/diary.html?storyid=6733","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://osvdb.org/55651","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/36187","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.csis.dk/dk/nyheder/nyheder.asp?tekstID=799","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.iss.net/threats/329.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.kb.cert.org/vuls/id/180513","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.microsoft.com/technet/security/advisory/972890.mspx","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/35558","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/35585","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id?1022514","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-187A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-195A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-223A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2009/2232","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-032","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6333","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6363","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7436","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2008-0015","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Deferred"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":["StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s"],"communityMalwareFamilies":["Md5 hash: f8add7e7161460ea2b1970cf4ca535bf","Malware family: stealthworker / gobrut"],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"6994d929008952522ea3854b","cveID":"CVE-2024-7694","dateAdded":"2026-02-17","dueDate":"2026-03-10","notes":"https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694","product":"ThreatSonar Anti-Ransomware","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"TeamT5 ThreatSonar Anti-Ransomware contains an unrestricted upload of file with dangerous type vulnerability. ThreatSonar Anti-Ransomware does not properly validate the content of uploaded files. Remote attackers with administrator privileges on the product platform can upload malicious files, which can be used to execute arbitrary system commands on the server.","vendorProject":"TeamT5","vulnerabilityName":"TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"HIGH","exploitabilityScore":1.2,"baseScore":7.2,"nvdReferences":[{"url":"https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html","source":"twcert@cert.org.tw","tags":["Third Party Advisory"]},{"url":"https://www.twcert.org.tw/tw/cp-132-7998-d76dd-1.html","source":"twcert@cert.org.tw","tags":["Third Party Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-7694","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":["StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s"],"communityMalwareFamilies":["Malware family: stealthworker / gobrut","Md5 hash: f8add7e7161460ea2b1970cf4ca535bf"],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"6994d929008952522ea3854a","cveID":"CVE-2020-7796","dateAdded":"2026-02-17","dueDate":"2026-03-10","notes":"https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796","product":"Zimbra Collaboration Suite","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"Synacor Zimbra Collaboration Suite (ZCS) contains a server-side request forgery vulnerability if WebEx zimlet installed and zimlet JSP is enabled.","vendorProject":"Synacor","vulnerabilityName":"Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"CRITICAL","exploitabilityScore":3.9,"baseScore":9.8,"nvdReferences":[{"url":"https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7","source":"cve@mitre.org","tags":["Release Notes","Vendor Advisory"]},{"url":"https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-7796","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":["StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s"],"communityMalwareFamilies":["Md5 hash: f8add7e7161460ea2b1970cf4ca535bf","Malware family: stealthworker / gobrut"],"communityAffectedIndustries":[]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"6990823915f26dddc1adb58d","cveID":"CVE-2026-1731","dateAdded":"2026-02-13","dueDate":"2026-02-16","notes":"Please adhere to the vendor's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible BeyondTrust products affected by this vulnerability. For more information please: see: https://www.beyondtrust.com/trust-center/security-advisories/bt26-02 ; https://nvd.nist.gov/vuln/detail/CVE-2026-1731","product":"Remote Support (RS) and Privileged Remote Access (PRA)","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)contain an OS command injection vulnerability. Successful exploitation could allow an unauthenticated remote attacker to execute operating system commands in the context of the site user. Successful exploitation requires no authentication or user interaction and may lead to system compromise, including unauthorized access, data exfiltration, and service disruption.","vendorProject":"BeyondTrust","vulnerabilityName":"BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"LOW","baseSeverity":"CRITICAL","exploitabilityScore":3.9,"baseScore":9.8,"nvdReferences":[{"url":"https://beyondtrustcorp.service-now.com/csm?id=csm_kb_article&sysparm_article=KB0023293","source":"13061848-ea10-403d-bd75-c83a022c2891","tags":["Permissions Required"]},{"url":"https://www.beyondtrust.com/trust-center/security-advisories/bt26-02","source":"13061848-ea10-403d-bd75-c83a022c2891","tags":["Vendor Advisory"]},{"url":"https://github.com/win3zz/CVE-2026-1731","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-1731","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]},{"url":"https://www.greynoise.io/blog/reconnaissance-beyondtrust-rce-cve-2026-1731","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Third Party Advisory"]}],"vulnStatus":"Analyzed"}],"githubPocs":["https://github.com/cybrdude/cve-2026-1731-scanner","https://github.com/win3zz/CVE-2026-1731","https://github.com/jakubie07/CVE-2026-1731","https://github.com/hexissam/CVE-2026-1731","https://github.com/LutfifakeeXone/CVE-2026-1731","https://github.com/zensheII/CVE-2026-1731-PoC"],"openThreatData":[{"adversaries":["MuddyWater","Storm-1175"],"malwareFamiles":["Keyc2","Persianc2","Arenac2","Medusa","Tsundere botnet"],"affectedIndustries":["Finance","Healthcare","Defense","Transportation","Technology","Government"],"communityAdversaries":["TeamPCP","Adversary Profile: Salt Typhoon Alignment The architectural gap identified by mudoSO mirrors the act","MuddyWater","DTO malware, GoPix banking Trojan, SERPENTINE#CLOUD, FAUX#ELEVATE, Katana","GhostSocks, Resoker, DeepLoad Malware, Pawn Storm Campaign, St.M.Trojan, CrySome RAT"],"communityMalwareFamilies":["#lowfi:hstr:pyinstaller_packaged_script","#exploit:win32/blofeldscat","Persianc2","Arenac2","Alf:heraklezeval:trojan:win32/c2lop","Tel:exploit:html/pswebkit","Keyc2","Tsundere botnet"],"communityAffectedIndustries":["","Finance","Defense","Healthcare","Education","Transportation","Technology","Government","Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in"]}],"knownRansomwareCampaignUse":"Unknown"},{"_id":"698e41a9789ad6f4322b5e69","cveID":"CVE-2025-40536","dateAdded":"2026-02-12","dueDate":"2026-02-15","notes":"https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm ; https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40536 ; https://nvd.nist.gov/vuln/detail/CVE-2025-40536","product":"Web Help Desk","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","shortDescription":"SolarWinds Web Help Desk contains a security control bypass vulnerability that could allow an unauthenticated attacker to gain access to certain restricted functionality.","vendorProject":"SolarWinds","vulnerabilityName":"SolarWinds Web Help Desk Security Control Bypass Vulnerability","nvdData":[{"attackVector":"NETWORK","attackComplexity":"HIGH","baseSeverity":"HIGH","exploitabilityScore":2.2,"baseScore":8.1,"nvdReferences":[{"url":"https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm","source":"psirt@solarwinds.com","tags":["Release Notes"]},{"url":"https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40536","source":"psirt@solarwinds.com","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-40536","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"},{"url":"https://www.huntress.com/blog/active-exploitation-solarwinds-web-help-desk-cve-2025-26399","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}],"vulnStatus":"Modified"}],"githubPocs":[],"openThreatData":[{"adversaries":[],"malwareFamiles":[],"affectedIndustries":[],"communityAdversaries":["DKnife, Supply chain attack targeting dYdX, RCtea Botnet, ClawHavoc, CrashFix, Prometei"],"communityMalwareFamilies":["Tel:exploit:html/pswebkit","#lowfi:hstr:pyinstaller_packaged_script","#exploit:win32/blofeldscat","Alf:heraklezeval:trojan:win32/c2lop"],"communityAffectedIndustries":["Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in"]}],"knownRansomwareCampaignUse":"Unknown"}]}