@blamejs/exceptd-skills 0.12.27 → 0.12.29
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +4 -1
- package/CHANGELOG.md +54 -0
- package/bin/exceptd.js +30 -20
- package/data/_indexes/_meta.json +26 -23
- package/data/_indexes/activity-feed.json +32 -11
- package/data/_indexes/catalog-summaries.json +3 -3
- package/data/_indexes/chains.json +965 -35
- package/data/_indexes/currency.json +68 -41
- package/data/_indexes/frequency.json +428 -124
- package/data/_indexes/handoff-dag.json +70 -19
- package/data/_indexes/jurisdiction-map.json +37 -12
- package/data/_indexes/section-offsets.json +282 -0
- package/data/_indexes/stale-content.json +3 -3
- package/data/_indexes/summary-cards.json +198 -0
- package/data/_indexes/token-budget.json +168 -3
- package/data/_indexes/trigger-table.json +190 -0
- package/data/_indexes/xref.json +145 -2
- package/data/atlas-ttps.json +61 -111
- package/data/attack-techniques.json +104 -19
- package/data/cve-catalog.json +101 -45
- package/data/cwe-catalog.json +149 -94
- package/data/d3fend-catalog.json +199 -53
- package/data/framework-control-gaps.json +1679 -89
- package/data/playbooks/cloud-iam-incident.json +1351 -0
- package/data/playbooks/crypto-codebase.json +1 -1
- package/data/playbooks/idp-incident.json +1259 -0
- package/data/playbooks/ransomware.json +1407 -0
- package/data/rfc-references.json +58 -59
- package/lib/exit-codes.js +2 -0
- package/lib/playbook-runner.js +25 -1
- package/manifest-snapshot.json +220 -3
- package/manifest-snapshot.sha256 +1 -1
- package/manifest.json +287 -45
- package/package.json +3 -2
- package/sbom.cdx.json +1854 -11
- package/scripts/backfill-theater-test.js +806 -0
- package/scripts/refresh-reverse-refs.js +171 -0
- package/scripts/refresh-sbom.js +155 -8
- package/skills/cloud-iam-incident/skill.md +419 -0
- package/skills/idp-incident-response/skill.md +352 -0
- package/skills/ransomware-response/skill.md +374 -0
package/data/cve-catalog.json
CHANGED
|
@@ -36,6 +36,29 @@
|
|
|
36
36
|
},
|
|
37
37
|
"vendor_advisory_field_added": "2026-05-11",
|
|
38
38
|
"vendor_advisory_note": "Each CVE carries a structured vendor_advisories array (vendor, advisory_id, url, severity, published_date) for downstream consumers that route by vendor advisory. Unknown advisory IDs are null with the canonical vendor CVE-resolver URL — never fabricated. Existing free-form references are preserved in verification_sources; vendor_advisories is additive.",
|
|
39
|
+
"ai_discovery_methodology": {
|
|
40
|
+
"field_added": "2026-05-15",
|
|
41
|
+
"agents_md_target": "Hard Rule #7 — '41% of 2025 zero-days were AI-discovered'. Catalog target rate floor: 0.40.",
|
|
42
|
+
"current_rate": 0.2,
|
|
43
|
+
"current_floor_enforced_by_test": 0.2,
|
|
44
|
+
"ladder_to_target": [
|
|
45
|
+
0.2,
|
|
46
|
+
0.3,
|
|
47
|
+
0.4
|
|
48
|
+
],
|
|
49
|
+
"ladder_note": "Test floor advances when each rung is exceeded with a margin (>= floor + 0.05). Surfaces incremental tightening without coincidence-passing failures.",
|
|
50
|
+
"gap_explanation": "Catalog skews toward 2024 vendor-disclosed CVEs (xz-utils, runc, CRI-O, MLflow, containerd, SolarWinds, Citrix, ConnectWise) and Pwn2Own Ireland 2025 entries (Synacktiv, DEVCORE, Summoning Team, CyCraft) where AI-tooling involvement was either not used or not credited in the public disclosure. The 41% figure in AGENTS.md Hard Rule #7 reflects the broader 2025 zero-day population reported by Google Threat Intelligence Group; catalog membership is curated against a different sampling frame (operational impact + framework-coverage need) and so will lag the population-level rate.",
|
|
51
|
+
"discovery_source_enum": [
|
|
52
|
+
"ai_assisted_research",
|
|
53
|
+
"human_researcher",
|
|
54
|
+
"vendor_internal",
|
|
55
|
+
"ecosystem_detection",
|
|
56
|
+
"threat_actor_ai_built",
|
|
57
|
+
"unknown"
|
|
58
|
+
],
|
|
59
|
+
"discovery_source_note": "ai_discovered=true requires a named AI tool credit (Big Sleep, depthfirst autonomous platform, Xint Code AI scanner, Zellic AI-agentic auditing tool, etc.) cited in the discovery_attribution_note. Inferred-from-class-of-bug attribution is INSUFFICIENT — Hard Rule #1 (no stale threat intel) bars silent upgrades. When unsure, leave ai_discovered=false with a discovery_attribution_note explaining the basis.",
|
|
60
|
+
"ai_assisted_weaponization_distinct": "ai_discovered measures the discovery channel; ai_assisted_weaponization measures the exploit-development channel. These are tracked independently (e.g. CVE-2025-53773 has ai_discovered=false but ai_assisted_weaponization=true)."
|
|
61
|
+
},
|
|
39
62
|
"id_conventions": {
|
|
40
63
|
"default": "CVE-YYYY-NNNNN",
|
|
41
64
|
"non_cve_keys_accepted": [
|
|
@@ -156,7 +179,8 @@
|
|
|
156
179
|
],
|
|
157
180
|
"forensic_note": "The .vscode/settings.json modification is silent and persistent — no in-editor diff is shown to the user. Defenders investigating suspected compromise should snapshot workspace + user-global settings.json BEFORE remediating; the file IS the primary forensic artifact."
|
|
158
181
|
},
|
|
159
|
-
"last_updated": "2026-05-15"
|
|
182
|
+
"last_updated": "2026-05-15",
|
|
183
|
+
"discovery_attribution_note": "Disclosed by Johann Rehberger (Embrace the Red, August 2025); responsible disclosure to Microsoft on 2025-06-29. Human researcher per Embrace the Red blog https://embracethered.com/blog/posts/2025/github-copilot-remote-code-execution-via-prompt-injection/. No AI tool credited for the discovery itself; the attack target IS an AI tool (Copilot)."
|
|
160
184
|
},
|
|
161
185
|
"CVE-2026-30615": {
|
|
162
186
|
"name": "Windsurf MCP Local-Vector RCE via Adversarial Tool Response",
|
|
@@ -268,7 +292,8 @@
|
|
|
268
292
|
"Compromised legitimate publisher key — malicious update from previously-trusted maintainer; signature-based controls do not fire"
|
|
269
293
|
]
|
|
270
294
|
},
|
|
271
|
-
"last_updated": "2026-05-15"
|
|
295
|
+
"last_updated": "2026-05-15",
|
|
296
|
+
"discovery_attribution_note": "OX Security advisory 2026-04-15 — researchers Moshe Siman Tov Bustan, Mustafa Naamnih, and Nir Zadok. Independent corroboration by Trail of Bits (tool-poisoning analysis 2026-04-29) and Johann Rehberger. All named-human research; no AI-discovery tool credited. Source: https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-critical-systemic-vulnerability-at-the-core-of-the-mcp/."
|
|
272
297
|
},
|
|
273
298
|
"CVE-2026-31431": {
|
|
274
299
|
"name": "Copy Fail",
|
|
@@ -413,7 +438,8 @@
|
|
|
413
438
|
],
|
|
414
439
|
"forensic_note": "Copy Fail is deterministic, 732-byte, single-stage, memory-only. Disk-forensic indicators (shell history, dropped binaries, persistence files) are unreliable — competent operators leave no on-disk trace. The runtime_syscall + kernel_trace + behavioral entries are the load-bearing detection surface. Disk indicators are limited to the exploit OUTCOMES (/etc/passwd mutation, suid drift), not the exploit ARTIFACTS."
|
|
415
440
|
},
|
|
416
|
-
"last_updated": "2026-05-13"
|
|
441
|
+
"last_updated": "2026-05-13",
|
|
442
|
+
"discovery_attribution_note": "AI-surfaced by Theori using Xint Code AI scanner with one operator prompt against the Linux crypto/ subsystem; researcher Taeyang Lee directed the scan. Disclosed 2026-04-29. Source: Theori writeup mirrored at https://xint.io/blog/copy-fail-linux-distributions and Sysdig coverage https://www.sysdig.com/blog/cve-2026-31431-copy-fail-linux-kernel-flaw-lets-local-users-gain-root-in-seconds."
|
|
417
443
|
},
|
|
418
444
|
"CVE-2026-39884": {
|
|
419
445
|
"name": "Flux159 mcp-server-kubernetes Argument Injection via port_forward",
|
|
@@ -506,7 +532,8 @@
|
|
|
506
532
|
"Network listener bound to 0.0.0.0:<port> by a kubectl process on a host that should only port-forward to localhost"
|
|
507
533
|
]
|
|
508
534
|
},
|
|
509
|
-
"last_updated": "2026-05-15"
|
|
535
|
+
"last_updated": "2026-05-15",
|
|
536
|
+
"discovery_attribution_note": "GitHub Security Advisory GHSA-4xqg-gf5c-ghwq published 2026-04-14 by the Flux159/mcp-server-kubernetes maintainers. No researcher byline in the advisory and no AI-tool credit. Bug class is conventional argv-injection via .split(\" \"); the AI-relevant surface is the exploitation channel (prompt-injection-mediated tool call), not the discovery method. Source: https://github.com/Flux159/mcp-server-kubernetes/security/advisories/GHSA-4xqg-gf5c-ghwq."
|
|
510
537
|
},
|
|
511
538
|
"CVE-2026-42208": {
|
|
512
539
|
"name": "BerriAI LiteLLM Proxy Auth SQL Injection",
|
|
@@ -614,7 +641,8 @@
|
|
|
614
641
|
"Environment variables LITELLM_MASTER_KEY, DATABASE_URL on the proxy host"
|
|
615
642
|
]
|
|
616
643
|
},
|
|
617
|
-
"last_updated": "2026-05-15"
|
|
644
|
+
"last_updated": "2026-05-15",
|
|
645
|
+
"discovery_attribution_note": "Sysdig Threat Research Team — Stefano Chierici and the Sysdig Sage / TRT analysts — surfaced the SQLi via post-disclosure exploitation telemetry; Bishop Fox researchers reproduced and confirmed the auth-path SQLi sink. All named-human research; no AI-discovery attribution from either firm. Source: https://www.sysdig.com/blog/cve-2026-42208-targeted-sql-injection-against-litellms-authentication-path-discovered-36-hours-following-vulnerability-disclosure and https://bishopfox.com/blog/cve-2026-42208-pre-authentication-sql-injection-in-litellm-proxy."
|
|
618
646
|
},
|
|
619
647
|
"CVE-2026-43284": {
|
|
620
648
|
"name": "Dirty Frag (ESP/IPsec component)",
|
|
@@ -628,9 +656,10 @@
|
|
|
628
656
|
"cisa_kev_date": null,
|
|
629
657
|
"poc_available": true,
|
|
630
658
|
"poc_description": "Chain component — exploits page-cache write primitive in ESP/IPsec subsystem. Part of two-CVE chain with CVE-2026-43500.",
|
|
631
|
-
"ai_discovered":
|
|
632
|
-
"ai_discovery_source": "
|
|
633
|
-
"ai_discovery_notes": "
|
|
659
|
+
"ai_discovered": true,
|
|
660
|
+
"ai_discovery_source": "bug_bounty_ai_augmented",
|
|
661
|
+
"ai_discovery_notes": "Discovered by independent researcher Hyunwoo Kim (@v4bel) using AI-assisted analysis. Sysdig blog explicitly attributes AI assistance: 'Dirty Frag (CVE-2026-43284) was discovered by Hyunwoo Kim (@v4bel) using AI.' The 9-year-latency on the skb_try_coalesce defect in the upstream kernel — present since the cac2661c53f3 (January 2017) commit — is consistent with the depth-of-codebase pattern where AI-assisted auditing tools are now surfacing class-of-bug regressions invisible to focused human review. Source: Sysdig writeup (https://www.sysdig.com/blog/dirty-frag-cve-2026-43284-and-cve-2026-43500-detecting-unpatched-local-privilege-escalation-via-linux-kernel-esp-and-rxrpc).",
|
|
662
|
+
"discovery_attribution_note": "AI-assisted discovery by Hyunwoo Kim (@v4bel); confirmed in Sysdig 2026-05-08 writeup + The Record / iTnews coverage citing parallel-discovery embargo break.",
|
|
634
663
|
"ai_assisted_weaponization": false,
|
|
635
664
|
"active_exploitation": "suspected",
|
|
636
665
|
"affected": "Linux systems using IPsec/ESP kernel subsystem — all major distributions with kernel IPsec support",
|
|
@@ -655,11 +684,11 @@
|
|
|
655
684
|
"T1068",
|
|
656
685
|
"T1548.001"
|
|
657
686
|
],
|
|
658
|
-
"rwep_score":
|
|
687
|
+
"rwep_score": 53,
|
|
659
688
|
"rwep_factors": {
|
|
660
689
|
"cisa_kev": 0,
|
|
661
690
|
"poc_available": 20,
|
|
662
|
-
"ai_factor":
|
|
691
|
+
"ai_factor": 15,
|
|
663
692
|
"active_exploitation": 10,
|
|
664
693
|
"blast_radius": 18,
|
|
665
694
|
"patch_available": -15,
|
|
@@ -765,7 +794,8 @@
|
|
|
765
794
|
"Re-sample 60s after lsmod-loaded-no-policy fires; persistent absence of `ip xfrm state` for >120s with loaded modules indicates non-startup-race anomaly"
|
|
766
795
|
]
|
|
767
796
|
},
|
|
768
|
-
"last_updated": "2026-05-15"
|
|
797
|
+
"last_updated": "2026-05-15",
|
|
798
|
+
"rwep_correction_note": "RWEP bump:v0.12.29 ai-discovery audit re-attributed to ai_discovered=true; ai_factor advanced from 0 to 15; rwep raised by 15 from 38 to 53."
|
|
769
799
|
},
|
|
770
800
|
"CVE-2026-43500": {
|
|
771
801
|
"name": "Dirty Frag (RxRPC component)",
|
|
@@ -776,9 +806,10 @@
|
|
|
776
806
|
"cisa_kev_date": null,
|
|
777
807
|
"poc_available": true,
|
|
778
808
|
"poc_description": "Chain component — exploits page-cache write primitive in RxRPC subsystem. Used in combination with CVE-2026-43284.",
|
|
779
|
-
"ai_discovered":
|
|
780
|
-
"ai_discovery_source": "
|
|
781
|
-
"ai_discovery_notes": "
|
|
809
|
+
"ai_discovered": true,
|
|
810
|
+
"ai_discovery_source": "bug_bounty_ai_augmented",
|
|
811
|
+
"ai_discovery_notes": "Companion CVE to CVE-2026-43284 (Dirty Frag); same researcher (Hyunwoo Kim, @v4bel) and same AI-assisted analysis pattern per Sysdig disclosure. The RxRPC variant of skb_try_coalesce was introduced in June 2023; class-of-bug recurrence across two subsystems within the same kernel skb-fast-path family is the canonical signature of automated audit-tool-driven discovery rather than independent human review. Source: Sysdig writeup (https://www.sysdig.com/blog/dirty-frag-cve-2026-43284-and-cve-2026-43500-detecting-unpatched-local-privilege-escalation-via-linux-kernel-esp-and-rxrpc).",
|
|
812
|
+
"discovery_attribution_note": "AI-assisted discovery by Hyunwoo Kim (@v4bel) — companion to CVE-2026-43284; same Sysdig 2026-05-08 disclosure batch.",
|
|
782
813
|
"ai_assisted_weaponization": false,
|
|
783
814
|
"active_exploitation": "suspected",
|
|
784
815
|
"affected": "Linux systems with RxRPC support",
|
|
@@ -799,11 +830,11 @@
|
|
|
799
830
|
"attack_refs": [
|
|
800
831
|
"T1068"
|
|
801
832
|
],
|
|
802
|
-
"rwep_score":
|
|
833
|
+
"rwep_score": 47,
|
|
803
834
|
"rwep_factors": {
|
|
804
835
|
"cisa_kev": 0,
|
|
805
836
|
"poc_available": 20,
|
|
806
|
-
"ai_factor":
|
|
837
|
+
"ai_factor": 15,
|
|
807
838
|
"active_exploitation": 10,
|
|
808
839
|
"blast_radius": 12,
|
|
809
840
|
"patch_available": -15,
|
|
@@ -916,7 +947,8 @@
|
|
|
916
947
|
]
|
|
917
948
|
},
|
|
918
949
|
"pairing_note": "CVE-2026-43500 only realizes its full primitive when chained with CVE-2026-43284. Detection of either subsystem being exercised on a host that should have neither is itself the chain-detection signal. Simultaneous match of esp-module-loaded-no-policy AND rxrpc-active-call-no-afs-config should escalate to a deterministic paired finding.",
|
|
919
|
-
"last_updated": "2026-05-15"
|
|
950
|
+
"last_updated": "2026-05-15",
|
|
951
|
+
"rwep_correction_note": "RWEP bump:v0.12.29 ai-discovery audit re-attributed to ai_discovered=true; ai_factor advanced from 0 to 15; rwep raised by 15 from 32 to 47."
|
|
920
952
|
},
|
|
921
953
|
"CVE-2026-45321": {
|
|
922
954
|
"name": "Mini Shai-Hulud TanStack npm worm",
|
|
@@ -1082,7 +1114,8 @@
|
|
|
1082
1114
|
"Windows variant (original Shai-Hulud carry-forward): del /F /Q /S \"%USERPROFILE%*\" && cipher /W:%USERPROFILE%"
|
|
1083
1115
|
]
|
|
1084
1116
|
},
|
|
1085
|
-
"last_updated": "2026-05-15"
|
|
1117
|
+
"last_updated": "2026-05-15",
|
|
1118
|
+
"discovery_attribution_note": "Discovery by ecosystem detection (multiple firms — Snyk, Wiz, StepSecurity, Socket, Orca, JFrog) within 20 minutes of TeamPCP's 2026-05-11 publish window of 84 malicious versions across 42 @tanstack/* packages. The worm IS the disclosure event; no AI-discovery tool involved on the defender side. Threat-actor side is engineering-grade chained tradecraft (pull_request_target co-residency, OIDC-token scraping). Source: https://www.stepsecurity.io/blog/mini-shai-hulud-is-back-a-self-spreading-supply-chain-attack-hits-the-npm-ecosystem."
|
|
1086
1119
|
},
|
|
1087
1120
|
"MAL-2026-3083": {
|
|
1088
1121
|
"name": "Elementary-Data PyPI Worm (Forged Release via GitHub Actions Script Injection)",
|
|
@@ -1238,7 +1271,8 @@
|
|
|
1238
1271
|
"pip install of a major-version-pinned package returning a wheel whose contents differ from the previous patch version by added .pth file"
|
|
1239
1272
|
]
|
|
1240
1273
|
},
|
|
1241
|
-
"last_updated": "2026-05-13"
|
|
1274
|
+
"last_updated": "2026-05-13",
|
|
1275
|
+
"discovery_attribution_note": "Community report into the elementary-data maintainers within four hours of the 2026-04-24 22:20 UTC push; ecosystem detection by JFrog, Snyk, Phylum follow-up. No AI-tool discovery attribution — incident was surfaced by package-registry monitoring + maintainer triage. Source: https://snyk.io/blog/malicious-release-of-elementary-data-pypi-package-steals-cloud-credentials-from-data-engineers/."
|
|
1242
1276
|
},
|
|
1243
1277
|
"CVE-2026-46300": {
|
|
1244
1278
|
"name": "Fragnesia",
|
|
@@ -1250,9 +1284,10 @@
|
|
|
1250
1284
|
"cisa_kev_due_date": null,
|
|
1251
1285
|
"poc_available": true,
|
|
1252
1286
|
"poc_description": "Public PoC released alongside disclosure on the V12 security team's GitHub. One-line invocation against /usr/bin/su yields a root shell. No race condition — the page-cache write primitive is deterministic.",
|
|
1253
|
-
"ai_discovered":
|
|
1254
|
-
"ai_discovery_source": "
|
|
1255
|
-
"ai_discovery_notes": "
|
|
1287
|
+
"ai_discovered": true,
|
|
1288
|
+
"ai_discovery_source": "bug_bounty_ai_augmented",
|
|
1289
|
+
"ai_discovery_notes": "Re-attributed to AI-assisted discovery on the basis of The Hacker News / Help Net Security 2026-05-13/14 coverage citing Zellic.io's AI-agentic software-auditing tool as the discovery mechanism: 'Fragnesia was discovered by William Bowling of Zellic, with the help of the company's AI-agentic software auditing tool.' The PoC is human-authored (V12 security team), but the underlying defect was surfaced by automated agentic analysis — which is the discovery-attribution that Hard Rule #7 measures. Source: https://thehackernews.com/2026/05/new-fragnesia-linux-kernel-lpe-grants.html and https://www.helpnetsecurity.com/2026/05/14/fragnesia-cve-2026-46300-linux-lpe-vulnerability/.",
|
|
1290
|
+
"discovery_attribution_note": "AI-assisted discovery by William Bowling using Zellic.io's AI-agentic software-auditing platform; PoC weaponization human-authored by V12 security team.",
|
|
1256
1291
|
"ai_assisted_weaponization": false,
|
|
1257
1292
|
"active_exploitation": "none",
|
|
1258
1293
|
"affected": "Linux kernel — all distributions shipping kernel >= 5.10 with the XFRM ESP-in-TCP path enabled (default on RHEL 8/9, Ubuntu 20.04+, Debian 11+, Amazon Linux 2/2023, SUSE 15, AlmaLinux 8/9, CloudLinux 8/9, Rocky Linux 8/9, Alpine, and derivatives). Containers inherit host-kernel exposure regardless of image patch level.",
|
|
@@ -1288,11 +1323,11 @@
|
|
|
1288
1323
|
"attack_refs": [
|
|
1289
1324
|
"T1068"
|
|
1290
1325
|
],
|
|
1291
|
-
"rwep_score":
|
|
1326
|
+
"rwep_score": 35,
|
|
1292
1327
|
"rwep_factors": {
|
|
1293
1328
|
"cisa_kev": 0,
|
|
1294
1329
|
"poc_available": 20,
|
|
1295
|
-
"ai_factor":
|
|
1330
|
+
"ai_factor": 15,
|
|
1296
1331
|
"active_exploitation": 0,
|
|
1297
1332
|
"blast_radius": 25,
|
|
1298
1333
|
"patch_available": -15,
|
|
@@ -1407,7 +1442,8 @@
|
|
|
1407
1442
|
],
|
|
1408
1443
|
"forensic_note": "Fragnesia corrupts page-cache pages without touching disk. File-integrity tools that hash on-disk bytes (AIDE, Tripwire, IMA in measure-only mode) cannot detect the corruption — the on-disk file is unchanged. Detection requires either (a) reading the binary through the page cache (`vmtouch` + `sha256sum`) and comparing to a freshly-read-from-disk copy after `echo 3 > /proc/sys/vm/drop_caches`, or (b) the runtime_syscall + kernel_trace indicators above. Operators who blacklisted esp4 / esp6 / rxrpc for CVE-2026-43284 / CVE-2026-43500 (Dirty Frag) are already mitigated for Fragnesia — the mitigation set is identical."
|
|
1409
1444
|
},
|
|
1410
|
-
"last_updated": "2026-05-15"
|
|
1445
|
+
"last_updated": "2026-05-15",
|
|
1446
|
+
"rwep_correction_note": "RWEP bump:v0.12.29 ai-discovery audit re-attributed to ai_discovered=true; ai_factor advanced from 0 to 15; rwep raised by 15 from 20 to 35."
|
|
1411
1447
|
},
|
|
1412
1448
|
"CVE-2024-21626": {
|
|
1413
1449
|
"_draft": true,
|
|
@@ -1469,7 +1505,8 @@
|
|
|
1469
1505
|
"https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
|
|
1470
1506
|
"https://snyk.io/blog/leaky-vessels-docker-runc-container-breakout-vulnerabilities/"
|
|
1471
1507
|
],
|
|
1472
|
-
"last_updated": "2026-05-15"
|
|
1508
|
+
"last_updated": "2026-05-15",
|
|
1509
|
+
"discovery_attribution_note": "Discovered by Rory McNamara of Snyk Security Labs as part of the four-vulnerability Leaky Vessels disclosure (CVE-2024-21626 + CVE-2024-23651/23652/23653) published January 2024. Named human researcher; no AI-tool credited. Source: https://labs.snyk.io/resources/leaky-vessels-docker-runc-container-breakout-vulnerabilities/."
|
|
1473
1510
|
},
|
|
1474
1511
|
"CVE-2024-3094": {
|
|
1475
1512
|
"_draft": true,
|
|
@@ -1539,7 +1576,8 @@
|
|
|
1539
1576
|
"https://www.openwall.com/lists/oss-security/2024/03/29/4",
|
|
1540
1577
|
"https://research.swtch.com/xz-script"
|
|
1541
1578
|
],
|
|
1542
|
-
"last_updated": "2026-05-15"
|
|
1579
|
+
"last_updated": "2026-05-15",
|
|
1580
|
+
"discovery_attribution_note": "Discovered by Andres Freund (Microsoft engineer, PostgreSQL developer) on 2024-03-28 via a 0.5-second SSH-login latency regression traced to liblzma symbol resolution; reported to oss-security. Named human researcher; no AI tooling involved. Source: https://en.wikipedia.org/wiki/XZ_Utils_backdoor."
|
|
1543
1581
|
},
|
|
1544
1582
|
"CVE-2024-3154": {
|
|
1545
1583
|
"_draft": true,
|
|
@@ -1606,7 +1644,8 @@
|
|
|
1606
1644
|
"https://nvd.nist.gov/vuln/detail/CVE-2024-3154",
|
|
1607
1645
|
"https://github.com/cri-o/cri-o/security/advisories"
|
|
1608
1646
|
],
|
|
1609
|
-
"last_updated": "2026-05-15"
|
|
1647
|
+
"last_updated": "2026-05-15",
|
|
1648
|
+
"discovery_attribution_note": "Reported by the OpenShift / CRI-O upstream security team via Red Hat Bugzilla 2272532; no individual researcher byline in the public advisory and no AI-tool credit. Bug class (systemd property injection through pod annotations) is conventional argument-injection. Source: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-3154."
|
|
1610
1649
|
},
|
|
1611
1650
|
"CVE-2023-43472": {
|
|
1612
1651
|
"_draft": true,
|
|
@@ -1669,7 +1708,8 @@
|
|
|
1669
1708
|
"https://nvd.nist.gov/vuln/detail/CVE-2023-43472",
|
|
1670
1709
|
"https://huntr.com/bounties/"
|
|
1671
1710
|
],
|
|
1672
|
-
"last_updated": "2026-05-15"
|
|
1711
|
+
"last_updated": "2026-05-15",
|
|
1712
|
+
"discovery_attribution_note": "Discovered by Joseph Beeton, senior security researcher at Contrast Security, via the Protect AI Huntr bug bounty program. Named human researcher; no AI-tool credited. Source: https://securityonline.info/cve-2023-43472-critical-vulnerability-uncovered-in-mlflow/ and https://github.com/advisories/GHSA-wqxf-447m-6f5f."
|
|
1673
1713
|
},
|
|
1674
1714
|
"CVE-2020-10148": {
|
|
1675
1715
|
"_draft": true,
|
|
@@ -1731,7 +1771,8 @@
|
|
|
1731
1771
|
"https://nvd.nist.gov/vuln/detail/CVE-2020-10148",
|
|
1732
1772
|
"https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-352a"
|
|
1733
1773
|
],
|
|
1734
|
-
"last_updated": "2026-05-15"
|
|
1774
|
+
"last_updated": "2026-05-15",
|
|
1775
|
+
"discovery_attribution_note": "Discovered during the SUNBURST incident-response investigation by FireEye / Mandiant analysts (publicly attributed to the Mandiant team rather than a single researcher) and corroborated by SolarWinds engineering. Documented in CISA AA20-352A and the CERT/CC VU#843464. Named human teams; pre-AI-tooling era for vendor-side attribution. Source: https://kb.cert.org/vuls/id/843464."
|
|
1735
1776
|
},
|
|
1736
1777
|
"CVE-2023-3519": {
|
|
1737
1778
|
"_draft": true,
|
|
@@ -1795,7 +1836,8 @@
|
|
|
1795
1836
|
"https://nvd.nist.gov/vuln/detail/CVE-2023-3519",
|
|
1796
1837
|
"https://support.citrix.com/article/CTX561482"
|
|
1797
1838
|
],
|
|
1798
|
-
"last_updated": "2026-05-15"
|
|
1839
|
+
"last_updated": "2026-05-15",
|
|
1840
|
+
"discovery_attribution_note": "Independent security researchers via Citrix coordinated disclosure (CTX561482, 2023-07-18); no individual researcher named in the Citrix advisory. NSA/CISA AA23-201A documents in-wild exploitation by Chinese state-sponsored actors. No AI-tool credited. Source: https://support.citrix.com/article/CTX561482/ and https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-201a."
|
|
1799
1841
|
},
|
|
1800
1842
|
"CVE-2024-1709": {
|
|
1801
1843
|
"_draft": true,
|
|
@@ -1855,7 +1897,8 @@
|
|
|
1855
1897
|
"https://nvd.nist.gov/vuln/detail/CVE-2024-1709",
|
|
1856
1898
|
"https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8"
|
|
1857
1899
|
],
|
|
1858
|
-
"last_updated": "2026-05-15"
|
|
1900
|
+
"last_updated": "2026-05-15",
|
|
1901
|
+
"discovery_attribution_note": "Discovered by ConnectWise security engineering and externally reported by Huntress + GreyNoise via in-wild exploitation telemetry within 24 hours of the 2024-02 Patch Tuesday. No individual researcher byline; vendor-internal discovery. No AI-tool credited. Source: https://www.upguard.com/blog/screenconnect-cve-2024."
|
|
1859
1902
|
},
|
|
1860
1903
|
"CVE-2026-20182": {
|
|
1861
1904
|
"_draft": true,
|
|
@@ -1917,7 +1960,8 @@
|
|
|
1917
1960
|
"https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
|
|
1918
1961
|
"https://sec.cloudapps.cisco.com/security/center/publicationListing.x"
|
|
1919
1962
|
],
|
|
1920
|
-
"last_updated": "2026-05-15"
|
|
1963
|
+
"last_updated": "2026-05-15",
|
|
1964
|
+
"discovery_attribution_note": "Discovered by Stephen Fewer (Senior Principal Security Researcher) and Jonah Burgess (Senior Security Researcher), both at Rapid7, while researching the related CVE-2026-20127 vdaemon authentication-bypass. Named human researchers; no AI-tool credited. Source: https://www.rapid7.com/blog/post/ve-cve-2026-20182-critical-authentication-bypass-cisco-catalyst-sd-wan-controller-fixed/."
|
|
1921
1965
|
},
|
|
1922
1966
|
"CVE-2024-40635": {
|
|
1923
1967
|
"_draft": true,
|
|
@@ -1978,7 +2022,8 @@
|
|
|
1978
2022
|
"https://nvd.nist.gov/vuln/detail/CVE-2024-40635",
|
|
1979
2023
|
"https://github.com/containerd/containerd/security/advisories"
|
|
1980
2024
|
],
|
|
1981
|
-
"last_updated": "2026-05-15"
|
|
2025
|
+
"last_updated": "2026-05-15",
|
|
2026
|
+
"discovery_attribution_note": "Reported via the containerd security team (GO-2025-3528, Snyk SNYK-GOLANG-GITHUBCOMCONTAINERDCONTAINERDV2PKGOCI-9479987); no individual researcher byline in the advisory and no AI-tool credited. Bug class is straight integer overflow in WithUser() UID handling. Source: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINERDCONTAINERDV2PKGOCI-9479987."
|
|
1982
2027
|
},
|
|
1983
2028
|
"MAL-2026-TANSTACK-MINI": {
|
|
1984
2029
|
"_draft": true,
|
|
@@ -2048,7 +2093,8 @@
|
|
|
2048
2093
|
"https://github.com/TanStack/query/security/advisories",
|
|
2049
2094
|
"https://www.npmjs.com/advisories"
|
|
2050
2095
|
],
|
|
2051
|
-
"last_updated": "2026-05-15"
|
|
2096
|
+
"last_updated": "2026-05-15",
|
|
2097
|
+
"discovery_attribution_note": "Same incident-class as CVE-2026-45321 (Mini Shai-Hulud); discovery by ecosystem detection across multiple firms (Snyk, Wiz, StepSecurity, Socket, Orca, JFrog) within minutes of the 2026-05-11 publish window. No AI-tool discovery attribution on the defender side. Source: https://snyk.io/blog/tanstack-npm-packages-compromised/."
|
|
2052
2098
|
},
|
|
2053
2099
|
"MAL-2026-ANTHROPIC-MCP-STDIO": {
|
|
2054
2100
|
"_draft": true,
|
|
@@ -2115,7 +2161,8 @@
|
|
|
2115
2161
|
"https://docs.anthropic.com/security",
|
|
2116
2162
|
"https://modelcontextprotocol.io/"
|
|
2117
2163
|
],
|
|
2118
|
-
"last_updated": "2026-05-15"
|
|
2164
|
+
"last_updated": "2026-05-15",
|
|
2165
|
+
"discovery_attribution_note": "Discovered by OX Security research team (Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok); part of the four-exploitation-family April 2026 MCP advisory. Named-human research; no AI-tool credited for the discovery despite the target being an AI SDK. Source: https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-critical-systemic-vulnerability-at-the-core-of-the-mcp/."
|
|
2119
2166
|
},
|
|
2120
2167
|
"CVE-2026-GTIG-AI-2FA": {
|
|
2121
2168
|
"_draft": true,
|
|
@@ -2187,7 +2234,8 @@
|
|
|
2187
2234
|
"https://cloud.google.com/blog/topics/threat-intelligence/",
|
|
2188
2235
|
"https://services.google.com/fh/files/misc/gtig-2026-ai-attack-trends.pdf"
|
|
2189
2236
|
],
|
|
2190
|
-
"last_updated": "2026-05-15"
|
|
2237
|
+
"last_updated": "2026-05-15",
|
|
2238
|
+
"discovery_attribution_note": "AI-developed zero-day per Google Threat Intelligence Group 2026-05-11 disclosure; first publicly-attributed in-the-wild AI-built zero-day exploit. GTIG assesses with high confidence that an LLM was weaponized to facilitate discovery + weaponization of a 2FA bypass in a popular open-source web administration tool. Source: https://cloud.google.com/blog/topics/threat-intelligence/ai-vulnerability-exploitation-initial-access and https://thehackernews.com/2026/05/hackers-used-ai-to-develop-first-known.html."
|
|
2191
2239
|
},
|
|
2192
2240
|
"CVE-2026-30623": {
|
|
2193
2241
|
"_draft": true,
|
|
@@ -2253,7 +2301,8 @@
|
|
|
2253
2301
|
"https://nvd.nist.gov/vuln/detail/CVE-2026-30623",
|
|
2254
2302
|
"https://github.com/anthropics/anthropic-sdk-python/security/advisories"
|
|
2255
2303
|
],
|
|
2256
|
-
"last_updated": "2026-05-15"
|
|
2304
|
+
"last_updated": "2026-05-15",
|
|
2305
|
+
"discovery_attribution_note": "OX Security advisory 2026-04-15; researchers Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok. Same disclosure cluster as CVE-2026-30615. Named-human research; no AI-tool credit. Source: https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-critical-systemic-vulnerability-at-the-core-of-the-mcp/."
|
|
2257
2306
|
},
|
|
2258
2307
|
"CVE-2025-12686": {
|
|
2259
2308
|
"_draft": true,
|
|
@@ -2311,7 +2360,8 @@
|
|
|
2311
2360
|
"https://nvd.nist.gov/vuln/detail/CVE-2025-12686",
|
|
2312
2361
|
"https://www.zerodayinitiative.com/blog"
|
|
2313
2362
|
],
|
|
2314
|
-
"last_updated": "2026-05-15"
|
|
2363
|
+
"last_updated": "2026-05-15",
|
|
2364
|
+
"discovery_attribution_note": "Pwn2Own Ireland 2025 (Cork, 2025-10-21) — exploited by @Tek_7987 and @_Anyfun of Synacktiv's offensive security team. Disclosure methodology: attack-surface enumeration + manual code auditing + exploit development per Synacktiv's published writeup; no AI-tool credit. Source: https://www.synacktiv.com/en/publications/breaking-the-beestation-inside-our-pwn2own-2025-exploit-journey."
|
|
2315
2365
|
},
|
|
2316
2366
|
"CVE-2025-62847": {
|
|
2317
2367
|
"_draft": true,
|
|
@@ -2371,7 +2421,8 @@
|
|
|
2371
2421
|
"https://nvd.nist.gov/vuln/detail/CVE-2025-62847",
|
|
2372
2422
|
"https://www.qnap.com/en/security-advisory/"
|
|
2373
2423
|
],
|
|
2374
|
-
"last_updated": "2026-05-15"
|
|
2424
|
+
"last_updated": "2026-05-15",
|
|
2425
|
+
"discovery_attribution_note": "Pwn2Own Ireland 2025 — exploited by DEVCORE Research Team (chained injection + format-string bug, $40,000 + 4 Master of Pwn points). Named-human team via ZDI live-blog credit; no AI-tool attribution. Source: https://www.thezdi.com/blog/2025/10/21/pwn2own-ireland-2025-day-one-results."
|
|
2375
2426
|
},
|
|
2376
2427
|
"CVE-2025-62848": {
|
|
2377
2428
|
"_draft": true,
|
|
@@ -2431,7 +2482,8 @@
|
|
|
2431
2482
|
"https://nvd.nist.gov/vuln/detail/CVE-2025-62848",
|
|
2432
2483
|
"https://www.qnap.com/en/security-advisory/"
|
|
2433
2484
|
],
|
|
2434
|
-
"last_updated": "2026-05-15"
|
|
2485
|
+
"last_updated": "2026-05-15",
|
|
2486
|
+
"discovery_attribution_note": "Pwn2Own Ireland 2025 — chain 2/3 of the DEVCORE Research Team QNAP TS-453E exploit. Same researcher attribution as CVE-2025-62847; ZDI live-blog credit. No AI-tool attribution. Source: https://www.thezdi.com/blog/2025/10/21/pwn2own-ireland-2025-day-one-results."
|
|
2435
2487
|
},
|
|
2436
2488
|
"CVE-2025-62849": {
|
|
2437
2489
|
"_draft": true,
|
|
@@ -2491,7 +2543,8 @@
|
|
|
2491
2543
|
"https://nvd.nist.gov/vuln/detail/CVE-2025-62849",
|
|
2492
2544
|
"https://www.qnap.com/en/security-advisory/"
|
|
2493
2545
|
],
|
|
2494
|
-
"last_updated": "2026-05-15"
|
|
2546
|
+
"last_updated": "2026-05-15",
|
|
2547
|
+
"discovery_attribution_note": "Pwn2Own Ireland 2025 — chain 3/3 of the DEVCORE Research Team QNAP TS-453E exploit (post-auth elevation). Same attribution as CVE-2025-62847/62848; ZDI credit. No AI-tool attribution. Source: https://www.thezdi.com/blog/2025/10/21/pwn2own-ireland-2025-day-one-results."
|
|
2495
2548
|
},
|
|
2496
2549
|
"CVE-2025-59389": {
|
|
2497
2550
|
"_draft": true,
|
|
@@ -2551,7 +2604,8 @@
|
|
|
2551
2604
|
"https://nvd.nist.gov/vuln/detail/CVE-2025-59389",
|
|
2552
2605
|
"https://www.qnap.com/en/security-advisory/"
|
|
2553
2606
|
],
|
|
2554
|
-
"last_updated": "2026-05-15"
|
|
2607
|
+
"last_updated": "2026-05-15",
|
|
2608
|
+
"discovery_attribution_note": "Pwn2Own Ireland 2025 — Sina Kheirkhah of Summoning Team chained a hardcoded-credential issue with an injection flaw against QNAP Hyper Data Protector ($20,000 award). Named-human researcher; no AI-tool credit. Source: https://www.thezdi.com/blog/2025/10/21/pwn2own-ireland-2025-day-one-results and https://www.qnap.com/en/security-advisory/qsa-25-48."
|
|
2555
2609
|
},
|
|
2556
2610
|
"CVE-2025-11837": {
|
|
2557
2611
|
"_draft": true,
|
|
@@ -2612,7 +2666,8 @@
|
|
|
2612
2666
|
"https://nvd.nist.gov/vuln/detail/CVE-2025-11837",
|
|
2613
2667
|
"https://www.qnap.com/en/security-advisory/"
|
|
2614
2668
|
],
|
|
2615
|
-
"last_updated": "2026-05-15"
|
|
2669
|
+
"last_updated": "2026-05-15",
|
|
2670
|
+
"discovery_attribution_note": "Pwn2Own Ireland 2025 — Chumy Tsai of CyCraft Technology demonstrated the code-injection on QNAP TS-453E ($20,000 award). Named-human researcher via ZDI credit; no AI-tool attribution. Source: https://www.qnap.com/en/security-advisory/qsa-25-47 and https://cybersecuritynews.com/qnap-zero-day-vulnerabilities-exploited/."
|
|
2616
2671
|
},
|
|
2617
2672
|
"CVE-2026-42945": {
|
|
2618
2673
|
"_draft": true,
|
|
@@ -2691,6 +2746,7 @@
|
|
|
2691
2746
|
"https://my.f5.com/manage/s/article/K000150420",
|
|
2692
2747
|
"https://nginx.org/en/security_advisories.html"
|
|
2693
2748
|
],
|
|
2694
|
-
"last_updated": "2026-05-15"
|
|
2749
|
+
"last_updated": "2026-05-15",
|
|
2750
|
+
"discovery_attribution_note": "Discovered by depthfirst's autonomous vulnerability-analysis platform; flagged the heap-buffer-overflow in nginx ngx_http_rewrite_module (present since nginx 0.6.27, 2008) within six hours of scan time. First publicly-attributed AI-discovered nginx CVE; jointly disclosed by F5 + depthfirst on 2026-05-13. Source: https://depthfirst.com/nginx-rift and https://github.com/depthfirstdisclosures/nginx-rift."
|
|
2695
2751
|
}
|
|
2696
2752
|
}
|