@blamejs/exceptd-skills 0.12.24 → 0.12.26

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (51) hide show
  1. package/AGENTS.md +12 -4
  2. package/CHANGELOG.md +127 -0
  3. package/data/_indexes/_meta.json +44 -43
  4. package/data/_indexes/activity-feed.json +54 -47
  5. package/data/_indexes/catalog-summaries.json +20 -20
  6. package/data/_indexes/chains.json +561 -6
  7. package/data/_indexes/currency.json +19 -10
  8. package/data/_indexes/frequency.json +207 -55
  9. package/data/_indexes/handoff-dag.json +4 -0
  10. package/data/_indexes/jurisdiction-clocks.json +2 -2
  11. package/data/_indexes/jurisdiction-map.json +25 -12
  12. package/data/_indexes/section-offsets.json +490 -396
  13. package/data/_indexes/stale-content.json +14 -2
  14. package/data/_indexes/summary-cards.json +57 -3
  15. package/data/_indexes/token-budget.json +129 -74
  16. package/data/_indexes/trigger-table.json +66 -0
  17. package/data/_indexes/xref.json +58 -8
  18. package/data/atlas-ttps.json +528 -19
  19. package/data/attack-techniques.json +198 -84
  20. package/data/cve-catalog.json +1309 -9
  21. package/data/exploit-availability.json +300 -10
  22. package/data/framework-control-gaps.json +557 -1
  23. package/data/global-frameworks.json +44 -19
  24. package/data/rfc-references.json +94 -1
  25. package/data/zeroday-lessons.json +475 -13
  26. package/lib/schemas/cve-catalog.schema.json +24 -3
  27. package/manifest-snapshot.json +68 -2
  28. package/manifest-snapshot.sha256 +1 -1
  29. package/manifest.json +145 -59
  30. package/package.json +1 -1
  31. package/sbom.cdx.json +7 -7
  32. package/skills/ai-attack-surface/skill.md +11 -2
  33. package/skills/ai-c2-detection/skill.md +3 -1
  34. package/skills/ai-risk-management/skill.md +3 -1
  35. package/skills/api-security/skill.md +4 -0
  36. package/skills/attack-surface-pentest/skill.md +1 -0
  37. package/skills/container-runtime-security/skill.md +3 -1
  38. package/skills/dlp-gap-analysis/skill.md +1 -1
  39. package/skills/exploit-scoring/skill.md +2 -2
  40. package/skills/incident-response-playbook/skill.md +1 -1
  41. package/skills/kernel-lpe-triage/skill.md +6 -1
  42. package/skills/mcp-agent-trust/skill.md +7 -2
  43. package/skills/mlops-security/skill.md +1 -1
  44. package/skills/rag-pipeline-security/skill.md +4 -2
  45. package/skills/sector-financial/skill.md +1 -1
  46. package/skills/sector-telecom/skill.md +259 -0
  47. package/skills/skill-update-loop/skill.md +1 -1
  48. package/skills/supply-chain-integrity/skill.md +3 -1
  49. package/skills/threat-model-currency/skill.md +1 -1
  50. package/skills/webapp-security/skill.md +2 -0
  51. package/skills/zeroday-gap-learn/skill.md +2 -2
@@ -1,8 +1,8 @@
1
1
  {
2
2
  "_meta": {
3
- "schema_version": "1.0.0",
4
- "last_updated": "2026-05-01",
5
- "note": "Tracks PoC availability and weaponization stage per CVE. Update when status changes. last_verified must be within 90 days.",
3
+ "schema_version": "1.1.0",
4
+ "last_updated": "2026-05-15",
5
+ "note": "Tracks PoC availability and weaponization stage per CVE. Update when status changes. last_verified must be within 90 days. v1.1.0 (2026-05-15): added ai_discovery_source enum + ai_assist_factor ladder (low|moderate|high|very_high) per AGENTS.md Hard Rule #7.",
6
6
  "tlp": "CLEAR",
7
7
  "source_confidence": {
8
8
  "scheme": "Admiralty (A-F + 1-6)",
@@ -21,6 +21,9 @@
21
21
  "poc_description": "Demonstrated in controlled environment — adversarial instructions in PR description field trigger code execution via GitHub Copilot interaction.",
22
22
  "weaponization_stage": "demonstrated",
23
23
  "ai_discovery_confirmed": false,
24
+ "ai_discovery_source": "unknown",
25
+ "ai_discovery_notes": "ai_discovery_confirmed=false means AI did not discover the bug (or provenance is unknown). ai_tool_enabled=true means the attack surface IS an AI tool (Copilot). These are orthogonal axes; the cve-catalog.json companion entry uses ai_assisted_weaponization=true for the same semantics as ai_tool_enabled here.",
26
+ "ai_assist_factor": "moderate",
24
27
  "ai_tool_enabled": true,
25
28
  "exploit_complexity": "low",
26
29
  "last_verified": "2026-05-01",
@@ -31,6 +34,8 @@
31
34
  "poc_description": "Conceptual exploit demonstrated — malicious MCP server → zero-interaction RCE via AI client vulnerability in Windsurf.",
32
35
  "weaponization_stage": "partial",
33
36
  "ai_discovery_confirmed": false,
37
+ "ai_discovery_source": "human_researcher",
38
+ "ai_assist_factor": "low",
34
39
  "exploit_complexity": "low_once_mcp_server_installed",
35
40
  "last_verified": "2026-05-01",
36
41
  "verification_source": "NVD, Windsurf vendor advisory"
@@ -40,6 +45,8 @@
40
45
  "poc_description": "Single-stage deterministic root escalation script, reported as 732 bytes. No race condition. Requires unprivileged local code execution.",
41
46
  "weaponization_stage": "fully_weaponized",
42
47
  "ai_discovery_confirmed": true,
48
+ "ai_discovery_source": "vendor_research",
49
+ "ai_assist_factor": "very_high",
43
50
  "ai_discovery_notes": "Researcher reports AI system discovery in approximately 1 hour via automated vulnerability analysis",
44
51
  "metasploit_module": "unknown",
45
52
  "exploit_complexity": "low",
@@ -51,6 +58,8 @@
51
58
  "poc_description": "GHSA-4xqg-gf5c-ghwq publishes argv-injection PoC: invoke port_forward MCP tool with resourceName containing space-delimited kubectl flags (--address=0.0.0.0, -n kube-system). Attacker-controllable flags reach kubectl via .split(' ') concatenation.",
52
59
  "weaponization_stage": "partially_weaponized",
53
60
  "ai_discovery_confirmed": false,
61
+ "ai_discovery_source": "human_researcher",
62
+ "ai_assist_factor": "low",
54
63
  "ai_assisted_weaponization": false,
55
64
  "exploit_complexity": "low",
56
65
  "complexity_notes": "Requires upstream prompt-injection vector (RAG / PR / issue) to deliver the tainted resourceName to the AI assistant; pure-MCP-server exploitation impractical without an LLM-mediated step.",
@@ -63,6 +72,8 @@
63
72
  "poc_description": "GHSA-r75f-5x8p-qvmc documents the SQL injection sink shape — crafted Authorization header reaches the vulnerable query via error-handling paths. CISA KEV listing 2026-05-08 confirms in-wild exploitation.",
64
73
  "weaponization_stage": "fully_weaponized",
65
74
  "ai_discovery_confirmed": false,
75
+ "ai_discovery_source": "human_researcher",
76
+ "ai_assist_factor": "low",
66
77
  "ai_assisted_weaponization": false,
67
78
  "exploit_complexity": "low",
68
79
  "complexity_notes": "Curl-able exploit — POST /chat/completions with SQLi payload in Authorization header. No auth required.",
@@ -74,25 +85,33 @@
74
85
  "poc_status": "public",
75
86
  "poc_description": "Chain component — exploits ESP/IPsec subsystem. Requires combination with CVE-2026-43500 or independent gadget chain.",
76
87
  "weaponization_stage": "partially_weaponized",
77
- "ai_discovery_confirmed": false,
88
+ "ai_discovery_confirmed": true,
89
+ "ai_discovery_source": "vendor_research",
90
+ "ai_assist_factor": "high",
91
+ "ai_discovery_notes": "Disclosed by Hyunwoo Kim; AI-assisted discovery assessed as likely by Sysdig + Help Net Security given 9-year exposure gap (ESP path landed Jan 2017) and same primitive class as AI-discovered Copy Fail.",
78
92
  "exploit_complexity": "moderate",
79
- "last_verified": "2026-05-01",
80
- "verification_source": "NVD references, researcher (Hyunwoo Kim) disclosure"
93
+ "last_verified": "2026-05-15",
94
+ "verification_source": "NVD references, researcher (Hyunwoo Kim) disclosure, Sysdig analysis, Help Net Security"
81
95
  },
82
96
  "CVE-2026-43500": {
83
97
  "poc_status": "public",
84
98
  "poc_description": "Chain component — RxRPC subsystem. Used with CVE-2026-43284.",
85
99
  "weaponization_stage": "partially_weaponized",
86
- "ai_discovery_confirmed": false,
100
+ "ai_discovery_confirmed": true,
101
+ "ai_discovery_source": "vendor_research",
102
+ "ai_assist_factor": "high",
103
+ "ai_discovery_notes": "Co-disclosed sibling of CVE-2026-43284; same AI-assisted-discovery assessment applies.",
87
104
  "exploit_complexity": "moderate",
88
- "last_verified": "2026-05-01",
89
- "verification_source": "NVD references, researcher (Hyunwoo Kim) disclosure"
105
+ "last_verified": "2026-05-15",
106
+ "verification_source": "NVD references, researcher (Hyunwoo Kim) disclosure, Sysdig analysis"
90
107
  },
91
108
  "CVE-2026-45321": {
92
109
  "poc_status": "public",
93
110
  "poc_description": "84 malicious versions published across 42 @tanstack/* packages 2026-05-11 — the worm itself IS the PoC. Payload analysis published by multiple researchers within 20 minutes; SHA-256 anchors and C2 infrastructure documented in cve-catalog.json iocs block.",
94
111
  "weaponization_stage": "fully_weaponized",
95
112
  "ai_discovery_confirmed": false,
113
+ "ai_discovery_source": "threat_actor_ai_built",
114
+ "ai_assist_factor": "low",
96
115
  "ai_assisted_weaponization": false,
97
116
  "exploit_complexity": "high",
98
117
  "complexity_notes": "Chain requires upstream maintainer to have pull_request_target plus cache plus id-token:write — present in TanStack but not universally. Downstream consumers experience the chain as a low-complexity install of a yanked-but-cached version.",
@@ -105,6 +124,8 @@
105
124
  "poc_description": "Orphan commit b1e4b1f3aad0d489ab0e9208031c67402bbb8480 still readable on GitHub. The .pth-file install-time payload mechanism is documented; exfiltration domain igotnofriendsonlineorirl-imgonnakmslmao.skyhanni.cloud was live during the 8h exposure window (2026-04-24 22:20Z through 2026-04-25 ~06:30Z).",
106
125
  "weaponization_stage": "fully_weaponized",
107
126
  "ai_discovery_confirmed": false,
127
+ "ai_discovery_source": "human_researcher",
128
+ "ai_assist_factor": "low",
108
129
  "ai_assisted_weaponization": false,
109
130
  "exploit_complexity": "low",
110
131
  "complexity_notes": "Primitive is GitHub Actions script injection via ${{ github.event.comment.body }} in a run: step. Anyone with a GitHub account can comment on a public PR.",
@@ -118,7 +139,10 @@
118
139
  "weaponization_stage": "demonstrated",
119
140
  "exploit_class": "deterministic LPE primitive",
120
141
  "maturity_tier": "PoC",
121
- "ai_discovery_confirmed": false,
142
+ "ai_discovery_confirmed": true,
143
+ "ai_discovery_source": "vendor_research",
144
+ "ai_assist_factor": "very_high",
145
+ "ai_discovery_notes": "Discovered by William Bowling (Zellic.io / V12 security team) with assistance from Zellic's AI-agentic code-auditing tool. Anchor case for AI-driven autonomous discovery in 2026; cycle-5 backfill correction to the originally-tagged ai_discovery_confirmed=false.",
122
146
  "ai_assisted_weaponization": false,
123
147
  "exploit_complexity": "low",
124
148
  "complexity_notes": "Single-stage, deterministic. Same primitive class as Dirty Frag (CVE-2026-43284 / CVE-2026-43500) — the bug was introduced by the patch for Dirty Frag, so existing module-unload mitigations for esp4 / esp6 / rxrpc also mitigate Fragnesia.",
@@ -127,5 +151,271 @@
127
151
  "poc_observed_at": "2026-05-13",
128
152
  "last_verified": "2026-05-14",
129
153
  "verification_source": "NVD CVE-2026-46300, V12 security team disclosure, AlmaLinux + CloudLinux advisories, Microsoft Security Blog (Dirty Frag family analysis)"
154
+ },
155
+ "CVE-2024-21626": {
156
+ "poc_status": "public",
157
+ "poc_description": "Snyk Labs PoC and multiple public exploit scripts; container-escape via leaked /proc/self/fd file descriptor.",
158
+ "weaponization_stage": "fully_weaponized",
159
+ "ai_discovery_confirmed": false,
160
+ "ai_discovery_source": "human_researcher",
161
+ "ai_assist_factor": "low",
162
+ "ai_assisted_weaponization": false,
163
+ "exploit_complexity": "low",
164
+ "active_exploitation": "confirmed",
165
+ "last_verified": "2026-05-15",
166
+ "verification_source": "NVD, CISA KEV, Snyk Labs Leaky Vessels disclosure"
167
+ },
168
+ "CVE-2024-3094": {
169
+ "poc_status": "public",
170
+ "poc_description": "Backdoor IS the PoC. Public reverse-engineering writeups by Andres Freund, Akamai, JFrog, Binarly cover the m4 macro chain, IFUNC override, and sshd RSA pubkey trigger.",
171
+ "weaponization_stage": "fully_weaponized",
172
+ "ai_discovery_confirmed": false,
173
+ "ai_discovery_source": "human_researcher",
174
+ "ai_assist_factor": "low",
175
+ "ai_assisted_weaponization": false,
176
+ "exploit_complexity": "high",
177
+ "complexity_notes": "Operational exploitation requires the Ed448 signing key embedded in the backdoor; mass scanning yields detection-not-exploitation.",
178
+ "active_exploitation": "suspected",
179
+ "last_verified": "2026-05-15",
180
+ "verification_source": "NVD, CISA, Andres Freund openwall disclosure, Akamai + JFrog + Binarly analyses"
181
+ },
182
+ "CVE-2024-3154": {
183
+ "poc_status": "public",
184
+ "poc_description": "Public PoC demonstrates kernel-module load via crafted pod spec — attacker controls modprobe argument path.",
185
+ "weaponization_stage": "demonstrated",
186
+ "ai_discovery_confirmed": false,
187
+ "ai_discovery_source": "human_researcher",
188
+ "ai_assist_factor": "low",
189
+ "ai_assisted_weaponization": false,
190
+ "exploit_complexity": "low",
191
+ "active_exploitation": "unknown",
192
+ "last_verified": "2026-05-15",
193
+ "verification_source": "NVD, CRI-O GHSA"
194
+ },
195
+ "CVE-2023-43472": {
196
+ "poc_status": "public",
197
+ "poc_description": "Protect AI Huntr submission — single-request path-traversal against the MLflow artifact-fetch endpoint.",
198
+ "weaponization_stage": "demonstrated",
199
+ "ai_discovery_confirmed": false,
200
+ "ai_discovery_source": "bug_bounty_ai_augmented",
201
+ "ai_assist_factor": "moderate",
202
+ "ai_assisted_weaponization": false,
203
+ "exploit_complexity": "low",
204
+ "active_exploitation": "unknown",
205
+ "last_verified": "2026-05-15",
206
+ "verification_source": "NVD, Protect AI Huntr disclosure"
207
+ },
208
+ "CVE-2020-10148": {
209
+ "poc_status": "public",
210
+ "poc_description": "CISA AA20-352A and follow-on community writeups document the SkipI18nStrings URI-pattern bypass.",
211
+ "weaponization_stage": "fully_weaponized",
212
+ "ai_discovery_confirmed": false,
213
+ "ai_discovery_source": "human_researcher",
214
+ "ai_assist_factor": "low",
215
+ "ai_assisted_weaponization": false,
216
+ "exploit_complexity": "low",
217
+ "active_exploitation": "confirmed",
218
+ "active_exploitation_notes": "Used at scale during SUNBURST campaign against US federal and Fortune 500 networks.",
219
+ "last_verified": "2026-05-15",
220
+ "verification_source": "NVD, CISA AA20-352A, SolarWinds advisory"
221
+ },
222
+ "CVE-2023-3519": {
223
+ "poc_status": "public",
224
+ "poc_description": "Multiple public PoCs (Mandiant, AssetNote) cover the pre-auth SAML stack-overflow chain.",
225
+ "weaponization_stage": "fully_weaponized",
226
+ "ai_discovery_confirmed": false,
227
+ "ai_discovery_source": "human_researcher",
228
+ "ai_assist_factor": "low",
229
+ "ai_assisted_weaponization": false,
230
+ "exploit_complexity": "low",
231
+ "active_exploitation": "confirmed",
232
+ "last_verified": "2026-05-15",
233
+ "verification_source": "NVD, CISA KEV, Citrix advisory CTX561482, Mandiant + AssetNote"
234
+ },
235
+ "CVE-2024-1709": {
236
+ "poc_status": "public",
237
+ "poc_description": "/SetupWizard.aspx/anything one-liner auth bypass; public PoC and Metasploit module within 48 hours of disclosure.",
238
+ "weaponization_stage": "fully_weaponized",
239
+ "ai_discovery_confirmed": false,
240
+ "ai_discovery_source": "human_researcher",
241
+ "ai_assist_factor": "low",
242
+ "ai_assisted_weaponization": false,
243
+ "metasploit_module": "exploit/multi/http/connectwise_screenconnect_auth_bypass",
244
+ "exploit_complexity": "low",
245
+ "active_exploitation": "confirmed",
246
+ "last_verified": "2026-05-15",
247
+ "verification_source": "NVD, CISA KEV, ConnectWise advisory, Rapid7 + Huntress"
248
+ },
249
+ "CVE-2026-20182": {
250
+ "poc_status": "private",
251
+ "poc_description": "No public PoC at KEV-listing 2026-05-14. Cisco vendor advisory references observed exploitation by named threat group.",
252
+ "weaponization_stage": "fully_weaponized",
253
+ "ai_discovery_confirmed": false,
254
+ "ai_discovery_source": "unknown",
255
+ "ai_assist_factor": "low",
256
+ "ai_assisted_weaponization": false,
257
+ "exploit_complexity": "low",
258
+ "active_exploitation": "confirmed",
259
+ "last_verified": "2026-05-15",
260
+ "verification_source": "CISA KEV 2026-05-14, Cisco PSIRT advisory"
261
+ },
262
+ "CVE-2024-40635": {
263
+ "poc_status": "demonstrated",
264
+ "poc_description": "Snyk Labs disclosure includes CIDR overflow PoC; cross-namespace IP allocation aliasing demonstrated in lab.",
265
+ "weaponization_stage": "demonstrated",
266
+ "ai_discovery_confirmed": false,
267
+ "ai_discovery_source": "human_researcher",
268
+ "ai_assist_factor": "low",
269
+ "ai_assisted_weaponization": false,
270
+ "exploit_complexity": "moderate",
271
+ "active_exploitation": "unknown",
272
+ "last_verified": "2026-05-15",
273
+ "verification_source": "NVD, Snyk Labs disclosure, containerd GHSA"
274
+ },
275
+ "MAL-2026-TANSTACK-MINI": {
276
+ "poc_status": "public",
277
+ "poc_description": "84 malicious versions across 42 @tanstack/* packages 2026-05-11; payload self-propagates by republishing to any package the host has npm-publish rights on.",
278
+ "weaponization_stage": "fully_weaponized",
279
+ "ai_discovery_confirmed": false,
280
+ "ai_discovery_source": "human_researcher",
281
+ "ai_assist_factor": "low",
282
+ "ai_assisted_weaponization": false,
283
+ "exploit_complexity": "low",
284
+ "complexity_notes": "Self-propagating supply-chain worm; consumer-side exploitation is install-time before any review.",
285
+ "active_exploitation": "confirmed",
286
+ "last_verified": "2026-05-15",
287
+ "verification_source": "TanStack security advisory 2026-05-11, npm advisories"
288
+ },
289
+ "MAL-2026-ANTHROPIC-MCP-STDIO": {
290
+ "poc_status": "private",
291
+ "poc_description": "Embargoed reproduction in vendor channel; operator-side mitigations published while CVE assignment is pending.",
292
+ "weaponization_stage": "partially_weaponized",
293
+ "ai_discovery_confirmed": false,
294
+ "ai_discovery_source": "vendor_research",
295
+ "ai_assist_factor": "moderate",
296
+ "ai_assisted_weaponization": false,
297
+ "exploit_complexity": "low",
298
+ "active_exploitation": "unknown",
299
+ "last_verified": "2026-05-15",
300
+ "verification_source": "Anthropic security channel, MCP project advisory"
301
+ },
302
+ "CVE-2026-GTIG-AI-2FA": {
303
+ "poc_status": "private",
304
+ "poc_description": "Embargoed per GTIG. AI-built exploit code observed in-the-wild against an unnamed enterprise 2FA service.",
305
+ "weaponization_stage": "fully_weaponized",
306
+ "ai_discovery_confirmed": true,
307
+ "ai_discovery_source": "threat_actor_ai_built",
308
+ "ai_assist_factor": "very_high",
309
+ "ai_discovery_notes": "First documented case of a fully AI-BUILT zero-day exploit observed in-the-wild — threat actor used a frontier LLM to construct the auth-state-confusion payload.",
310
+ "ai_assisted_weaponization": true,
311
+ "exploit_complexity": "moderate",
312
+ "active_exploitation": "confirmed",
313
+ "last_verified": "2026-05-15",
314
+ "verification_source": "GTIG 2026-05-11 report, Google Cloud Threat Intelligence"
315
+ },
316
+ "CVE-2026-30623": {
317
+ "poc_status": "public",
318
+ "poc_description": "Public advisory documents the argv-string concatenation in MCP-client stdio transport; researcher-published PoC chains operator-config to shell-meta injection.",
319
+ "weaponization_stage": "demonstrated",
320
+ "ai_discovery_confirmed": false,
321
+ "ai_discovery_source": "unknown",
322
+ "ai_assist_factor": "low",
323
+ "ai_assisted_weaponization": false,
324
+ "exploit_complexity": "low",
325
+ "active_exploitation": "suspected",
326
+ "last_verified": "2026-05-15",
327
+ "verification_source": "NVD CVE-2026-30623, Anthropic GHSA"
328
+ },
329
+ "CVE-2025-12686": {
330
+ "poc_status": "public",
331
+ "poc_description": "Pwn2Own Ireland 2025 full-chain demonstration on Synology BeeStation; researcher writeup published post-disclosure.",
332
+ "weaponization_stage": "demonstrated",
333
+ "ai_discovery_confirmed": false,
334
+ "ai_discovery_source": "human_researcher",
335
+ "ai_assist_factor": "low",
336
+ "ai_assisted_weaponization": false,
337
+ "exploit_complexity": "low",
338
+ "active_exploitation": "unknown",
339
+ "last_verified": "2026-05-15",
340
+ "verification_source": "ZDI Pwn2Own Ireland 2025, NVD"
341
+ },
342
+ "CVE-2025-62847": {
343
+ "poc_status": "demonstrated",
344
+ "poc_description": "Pwn2Own Ireland 2025 chain component 1/3 against QNAP QTS/QuTS hero; combined with CVE-2025-62848 and CVE-2025-62849 for full unauth RCE.",
345
+ "weaponization_stage": "demonstrated",
346
+ "ai_discovery_confirmed": false,
347
+ "ai_discovery_source": "human_researcher",
348
+ "ai_assist_factor": "low",
349
+ "ai_assisted_weaponization": false,
350
+ "exploit_complexity": "moderate",
351
+ "active_exploitation": "unknown",
352
+ "last_verified": "2026-05-15",
353
+ "verification_source": "ZDI Pwn2Own Ireland 2025, QNAP PSIRT"
354
+ },
355
+ "CVE-2025-62848": {
356
+ "poc_status": "demonstrated",
357
+ "poc_description": "Pwn2Own Ireland 2025 chain component 2/3; chained with CVE-2025-62847 and CVE-2025-62849.",
358
+ "weaponization_stage": "demonstrated",
359
+ "ai_discovery_confirmed": false,
360
+ "ai_discovery_source": "human_researcher",
361
+ "ai_assist_factor": "low",
362
+ "ai_assisted_weaponization": false,
363
+ "exploit_complexity": "moderate",
364
+ "active_exploitation": "unknown",
365
+ "last_verified": "2026-05-15",
366
+ "verification_source": "ZDI Pwn2Own Ireland 2025, QNAP PSIRT"
367
+ },
368
+ "CVE-2025-62849": {
369
+ "poc_status": "demonstrated",
370
+ "poc_description": "Pwn2Own Ireland 2025 chain component 3/3 — post-auth privilege escalation.",
371
+ "weaponization_stage": "demonstrated",
372
+ "ai_discovery_confirmed": false,
373
+ "ai_discovery_source": "human_researcher",
374
+ "ai_assist_factor": "low",
375
+ "ai_assisted_weaponization": false,
376
+ "exploit_complexity": "moderate",
377
+ "active_exploitation": "unknown",
378
+ "last_verified": "2026-05-15",
379
+ "verification_source": "ZDI Pwn2Own Ireland 2025, QNAP PSIRT"
380
+ },
381
+ "CVE-2025-59389": {
382
+ "poc_status": "demonstrated",
383
+ "poc_description": "Summoning Team / Sina Kheirkhah Pwn2Own Ireland 2025 demonstration on QNAP Hyper Data Protector — critical unauth RCE on backup-orchestration appliance.",
384
+ "weaponization_stage": "demonstrated",
385
+ "ai_discovery_confirmed": false,
386
+ "ai_discovery_source": "human_researcher",
387
+ "ai_assist_factor": "low",
388
+ "ai_assisted_weaponization": false,
389
+ "exploit_complexity": "low",
390
+ "active_exploitation": "unknown",
391
+ "last_verified": "2026-05-15",
392
+ "verification_source": "ZDI Pwn2Own Ireland 2025, QNAP PSIRT"
393
+ },
394
+ "CVE-2025-11837": {
395
+ "poc_status": "demonstrated",
396
+ "poc_description": "Code-injection in QNAP Malware Remover. The affected software is itself a security tool — high theater-detection signal per AGENTS.md Hard Rule #6.",
397
+ "weaponization_stage": "demonstrated",
398
+ "ai_discovery_confirmed": false,
399
+ "ai_discovery_source": "human_researcher",
400
+ "ai_assist_factor": "low",
401
+ "ai_assisted_weaponization": false,
402
+ "exploit_complexity": "low",
403
+ "active_exploitation": "unknown",
404
+ "last_verified": "2026-05-15",
405
+ "verification_source": "QNAP PSIRT advisory"
406
+ },
407
+ "CVE-2026-42945": {
408
+ "poc_status": "public",
409
+ "poc_description": "depthfirst-disclosure published PoC at https://github.com/depthfirstdisclosures/nginx-rift — heap buffer overflow in rewrite-directive PCRE unnamed-capture handling. Single HTTP request, no auth.",
410
+ "weaponization_stage": "fully_weaponized",
411
+ "ai_discovery_confirmed": true,
412
+ "ai_discovery_source": "academic_ai_fuzzing",
413
+ "ai_assist_factor": "very_high",
414
+ "ai_discovery_notes": "First publicly-attributed AI-discovered nginx CVE. Discovery by depthfirst autonomous-analysis platform on a code path present in every nginx release for 18 years.",
415
+ "ai_assisted_weaponization": false,
416
+ "exploit_complexity": "low",
417
+ "active_exploitation": "none",
418
+ "last_verified": "2026-05-15",
419
+ "verification_source": "depthfirst-disclosure GitHub, F5 K000150420, nginx security advisories"
130
420
  }
131
421
  }