@blamejs/exceptd-skills 0.12.28 → 0.12.30
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +1 -1
- package/CHANGELOG.md +53 -0
- package/bin/exceptd.js +30 -20
- package/data/_indexes/_meta.json +9 -9
- package/data/_indexes/activity-feed.json +7 -7
- package/data/_indexes/chains.json +9 -9
- package/data/_indexes/currency.json +43 -43
- package/data/_indexes/stale-content.json +1 -1
- package/data/atlas-ttps.json +61 -111
- package/data/cve-catalog.json +136 -65
- package/data/cwe-catalog.json +151 -95
- package/data/d3fend-catalog.json +201 -54
- package/data/dlp-controls.json +2 -1
- package/data/framework-control-gaps.json +1214 -110
- package/data/playbooks/crypto-codebase.json +1 -1
- package/data/rfc-references.json +23 -67
- package/lib/exit-codes.js +2 -0
- package/lib/playbook-runner.js +25 -1
- package/manifest-snapshot.json +2 -2
- package/manifest-snapshot.sha256 +1 -1
- package/manifest.json +49 -48
- package/package.json +3 -2
- package/sbom.cdx.json +1853 -10
- package/scripts/backfill-theater-test.js +806 -0
- package/scripts/check-test-coverage.js +18 -4
- package/scripts/refresh-reverse-refs.js +171 -0
- package/scripts/refresh-sbom.js +155 -8
package/data/cve-catalog.json
CHANGED
|
@@ -36,6 +36,29 @@
|
|
|
36
36
|
},
|
|
37
37
|
"vendor_advisory_field_added": "2026-05-11",
|
|
38
38
|
"vendor_advisory_note": "Each CVE carries a structured vendor_advisories array (vendor, advisory_id, url, severity, published_date) for downstream consumers that route by vendor advisory. Unknown advisory IDs are null with the canonical vendor CVE-resolver URL — never fabricated. Existing free-form references are preserved in verification_sources; vendor_advisories is additive.",
|
|
39
|
+
"ai_discovery_methodology": {
|
|
40
|
+
"field_added": "2026-05-15",
|
|
41
|
+
"agents_md_target": "Hard Rule #7 — '41% of 2025 zero-days were AI-discovered'. Catalog target rate floor: 0.40.",
|
|
42
|
+
"current_rate": 0.2,
|
|
43
|
+
"current_floor_enforced_by_test": 0.2,
|
|
44
|
+
"ladder_to_target": [
|
|
45
|
+
0.2,
|
|
46
|
+
0.3,
|
|
47
|
+
0.4
|
|
48
|
+
],
|
|
49
|
+
"ladder_note": "Test floor advances when each rung is exceeded with a margin (>= floor + 0.05). Surfaces incremental tightening without coincidence-passing failures.",
|
|
50
|
+
"gap_explanation": "Catalog skews toward 2024 vendor-disclosed CVEs (xz-utils, runc, CRI-O, MLflow, containerd, SolarWinds, Citrix, ConnectWise) and Pwn2Own Ireland 2025 entries (Synacktiv, DEVCORE, Summoning Team, CyCraft) where AI-tooling involvement was either not used or not credited in the public disclosure. The 41% figure in AGENTS.md Hard Rule #7 reflects the broader 2025 zero-day population reported by Google Threat Intelligence Group; catalog membership is curated against a different sampling frame (operational impact + framework-coverage need) and so will lag the population-level rate.",
|
|
51
|
+
"discovery_source_enum": [
|
|
52
|
+
"ai_assisted_research",
|
|
53
|
+
"human_researcher",
|
|
54
|
+
"vendor_internal",
|
|
55
|
+
"ecosystem_detection",
|
|
56
|
+
"threat_actor_ai_built",
|
|
57
|
+
"unknown"
|
|
58
|
+
],
|
|
59
|
+
"discovery_source_note": "ai_discovered=true requires a named AI tool credit (Big Sleep, depthfirst autonomous platform, Xint Code AI scanner, Zellic AI-agentic auditing tool, etc.) cited in the discovery_attribution_note. Inferred-from-class-of-bug attribution is INSUFFICIENT — Hard Rule #1 (no stale threat intel) bars silent upgrades. When unsure, leave ai_discovered=false with a discovery_attribution_note explaining the basis.",
|
|
60
|
+
"ai_assisted_weaponization_distinct": "ai_discovered measures the discovery channel; ai_assisted_weaponization measures the exploit-development channel. These are tracked independently (e.g. CVE-2025-53773 has ai_discovered=false but ai_assisted_weaponization=true)."
|
|
61
|
+
},
|
|
39
62
|
"id_conventions": {
|
|
40
63
|
"default": "CVE-YYYY-NNNNN",
|
|
41
64
|
"non_cve_keys_accepted": [
|
|
@@ -43,7 +66,8 @@
|
|
|
43
66
|
"GHSA-*"
|
|
44
67
|
],
|
|
45
68
|
"note": "Catalog keys are CVE-* by default. For pre-CVE-assignment advisories under active operational impact, the project accepts OSV-native identifier shapes as the canonical key, with cross-references retained in `aliases`: MAL-* (OSSF Malicious Packages dataset — published into OSV.dev; primary key for malicious-package compromises), GHSA-* (GitHub Advisory Database; primary key when the package is on GitHub and no CVE has issued yet), and SNYK-* (Snyk advisory dataset; primary key for advisories Snyk catalogued before OSV/GHSA ingested them). When MITRE issues a CVE, the entry is renamed in lockstep with the matching zeroday-lessons key; the previous identifier is retained in `aliases` so historical references continue to resolve. Precedent: MAL-2026-3083 added 2026-05-13 (the elementary-data PyPI worm, 1.1M monthly downloads, OSV/OSSF-cataloged before any CVE issued). EPSS coverage does not extend to non-CVE identifiers; epss_score is null with a documenting epss_note on such entries. Upstream pull from OSV.dev: `exceptd refresh --source osv` (added v0.12.10)."
|
|
46
|
-
}
|
|
69
|
+
},
|
|
70
|
+
"last_threat_review": "2026-05-15"
|
|
47
71
|
},
|
|
48
72
|
"CVE-2025-53773": {
|
|
49
73
|
"name": "GitHub Copilot / VS Code 'YOLO mode' Prompt Injection RCE",
|
|
@@ -156,7 +180,8 @@
|
|
|
156
180
|
],
|
|
157
181
|
"forensic_note": "The .vscode/settings.json modification is silent and persistent — no in-editor diff is shown to the user. Defenders investigating suspected compromise should snapshot workspace + user-global settings.json BEFORE remediating; the file IS the primary forensic artifact."
|
|
158
182
|
},
|
|
159
|
-
"last_updated": "2026-05-15"
|
|
183
|
+
"last_updated": "2026-05-15",
|
|
184
|
+
"discovery_attribution_note": "Disclosed by Johann Rehberger (Embrace the Red, August 2025); responsible disclosure to Microsoft on 2025-06-29. Human researcher per Embrace the Red blog https://embracethered.com/blog/posts/2025/github-copilot-remote-code-execution-via-prompt-injection/. No AI tool credited for the discovery itself; the attack target IS an AI tool (Copilot)."
|
|
160
185
|
},
|
|
161
186
|
"CVE-2026-30615": {
|
|
162
187
|
"name": "Windsurf MCP Local-Vector RCE via Adversarial Tool Response",
|
|
@@ -268,7 +293,8 @@
|
|
|
268
293
|
"Compromised legitimate publisher key — malicious update from previously-trusted maintainer; signature-based controls do not fire"
|
|
269
294
|
]
|
|
270
295
|
},
|
|
271
|
-
"last_updated": "2026-05-15"
|
|
296
|
+
"last_updated": "2026-05-15",
|
|
297
|
+
"discovery_attribution_note": "OX Security advisory 2026-04-15 — researchers Moshe Siman Tov Bustan, Mustafa Naamnih, and Nir Zadok. Independent corroboration by Trail of Bits (tool-poisoning analysis 2026-04-29) and Johann Rehberger. All named-human research; no AI-discovery tool credited. Source: https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-critical-systemic-vulnerability-at-the-core-of-the-mcp/."
|
|
272
298
|
},
|
|
273
299
|
"CVE-2026-31431": {
|
|
274
300
|
"name": "Copy Fail",
|
|
@@ -413,7 +439,8 @@
|
|
|
413
439
|
],
|
|
414
440
|
"forensic_note": "Copy Fail is deterministic, 732-byte, single-stage, memory-only. Disk-forensic indicators (shell history, dropped binaries, persistence files) are unreliable — competent operators leave no on-disk trace. The runtime_syscall + kernel_trace + behavioral entries are the load-bearing detection surface. Disk indicators are limited to the exploit OUTCOMES (/etc/passwd mutation, suid drift), not the exploit ARTIFACTS."
|
|
415
441
|
},
|
|
416
|
-
"last_updated": "2026-05-13"
|
|
442
|
+
"last_updated": "2026-05-13",
|
|
443
|
+
"discovery_attribution_note": "AI-surfaced by Theori using Xint Code AI scanner with one operator prompt against the Linux crypto/ subsystem; researcher Taeyang Lee directed the scan. Disclosed 2026-04-29. Source: Theori writeup mirrored at https://xint.io/blog/copy-fail-linux-distributions and Sysdig coverage https://www.sysdig.com/blog/cve-2026-31431-copy-fail-linux-kernel-flaw-lets-local-users-gain-root-in-seconds."
|
|
417
444
|
},
|
|
418
445
|
"CVE-2026-39884": {
|
|
419
446
|
"name": "Flux159 mcp-server-kubernetes Argument Injection via port_forward",
|
|
@@ -506,7 +533,8 @@
|
|
|
506
533
|
"Network listener bound to 0.0.0.0:<port> by a kubectl process on a host that should only port-forward to localhost"
|
|
507
534
|
]
|
|
508
535
|
},
|
|
509
|
-
"last_updated": "2026-05-15"
|
|
536
|
+
"last_updated": "2026-05-15",
|
|
537
|
+
"discovery_attribution_note": "GitHub Security Advisory GHSA-4xqg-gf5c-ghwq published 2026-04-14 by the Flux159/mcp-server-kubernetes maintainers. No researcher byline in the advisory and no AI-tool credit. Bug class is conventional argv-injection via .split(\" \"); the AI-relevant surface is the exploitation channel (prompt-injection-mediated tool call), not the discovery method. Source: https://github.com/Flux159/mcp-server-kubernetes/security/advisories/GHSA-4xqg-gf5c-ghwq."
|
|
510
538
|
},
|
|
511
539
|
"CVE-2026-42208": {
|
|
512
540
|
"name": "BerriAI LiteLLM Proxy Auth SQL Injection",
|
|
@@ -614,7 +642,8 @@
|
|
|
614
642
|
"Environment variables LITELLM_MASTER_KEY, DATABASE_URL on the proxy host"
|
|
615
643
|
]
|
|
616
644
|
},
|
|
617
|
-
"last_updated": "2026-05-15"
|
|
645
|
+
"last_updated": "2026-05-15",
|
|
646
|
+
"discovery_attribution_note": "Tencent YunDing Security Lab is the credited discoverer per the LiteLLM GHSA-r75f-5x8p-qvmc advisory and confirmed by downstream The Hacker News / Tenable / cve.news coverage. Sysdig TRT (Stefano Chierici + Sysdig Sage analysts) published the post-disclosure 36-hour-to-exploitation telemetry; Bishop Fox reproduced the auth-path SQLi sink. All named-human research; no AI-discovery attribution from any of the three teams. Sources: https://github.com/BerriAI/litellm/security/advisories/GHSA-r75f-5x8p-qvmc and https://www.sysdig.com/blog/cve-2026-42208-targeted-sql-injection-against-litellms-authentication-path-discovered-36-hours-following-vulnerability-disclosure and https://bishopfox.com/blog/cve-2026-42208-pre-authentication-sql-injection-in-litellm-proxy."
|
|
618
647
|
},
|
|
619
648
|
"CVE-2026-43284": {
|
|
620
649
|
"name": "Dirty Frag (ESP/IPsec component)",
|
|
@@ -628,9 +657,10 @@
|
|
|
628
657
|
"cisa_kev_date": null,
|
|
629
658
|
"poc_available": true,
|
|
630
659
|
"poc_description": "Chain component — exploits page-cache write primitive in ESP/IPsec subsystem. Part of two-CVE chain with CVE-2026-43500.",
|
|
631
|
-
"ai_discovered":
|
|
632
|
-
"ai_discovery_source": "
|
|
633
|
-
"ai_discovery_notes": "
|
|
660
|
+
"ai_discovered": true,
|
|
661
|
+
"ai_discovery_source": "bug_bounty_ai_augmented",
|
|
662
|
+
"ai_discovery_notes": "Discovered by independent researcher Hyunwoo Kim (@v4bel) using AI-assisted analysis. Sysdig blog explicitly attributes AI assistance: 'Dirty Frag (CVE-2026-43284) was discovered by Hyunwoo Kim (@v4bel) using AI.' The 9-year-latency on the skb_try_coalesce defect in the upstream kernel — present since the cac2661c53f3 (January 2017) commit — is consistent with the depth-of-codebase pattern where AI-assisted auditing tools are now surfacing class-of-bug regressions invisible to focused human review. Source: Sysdig writeup (https://www.sysdig.com/blog/dirty-frag-cve-2026-43284-and-cve-2026-43500-detecting-unpatched-local-privilege-escalation-via-linux-kernel-esp-and-rxrpc).",
|
|
663
|
+
"discovery_attribution_note": "AI-assisted discovery by Hyunwoo Kim (@v4bel); confirmed in Sysdig 2026-05-08 writeup + The Record / iTnews coverage citing parallel-discovery embargo break.",
|
|
634
664
|
"ai_assisted_weaponization": false,
|
|
635
665
|
"active_exploitation": "suspected",
|
|
636
666
|
"affected": "Linux systems using IPsec/ESP kernel subsystem — all major distributions with kernel IPsec support",
|
|
@@ -655,11 +685,11 @@
|
|
|
655
685
|
"T1068",
|
|
656
686
|
"T1548.001"
|
|
657
687
|
],
|
|
658
|
-
"rwep_score":
|
|
688
|
+
"rwep_score": 53,
|
|
659
689
|
"rwep_factors": {
|
|
660
690
|
"cisa_kev": 0,
|
|
661
691
|
"poc_available": 20,
|
|
662
|
-
"ai_factor":
|
|
692
|
+
"ai_factor": 15,
|
|
663
693
|
"active_exploitation": 10,
|
|
664
694
|
"blast_radius": 18,
|
|
665
695
|
"patch_available": -15,
|
|
@@ -765,7 +795,8 @@
|
|
|
765
795
|
"Re-sample 60s after lsmod-loaded-no-policy fires; persistent absence of `ip xfrm state` for >120s with loaded modules indicates non-startup-race anomaly"
|
|
766
796
|
]
|
|
767
797
|
},
|
|
768
|
-
"last_updated": "2026-05-15"
|
|
798
|
+
"last_updated": "2026-05-15",
|
|
799
|
+
"rwep_correction_note": "RWEP bump:v0.12.29 ai-discovery audit re-attributed to ai_discovered=true; ai_factor advanced from 0 to 15; rwep raised by 15 from 38 to 53."
|
|
769
800
|
},
|
|
770
801
|
"CVE-2026-43500": {
|
|
771
802
|
"name": "Dirty Frag (RxRPC component)",
|
|
@@ -776,9 +807,10 @@
|
|
|
776
807
|
"cisa_kev_date": null,
|
|
777
808
|
"poc_available": true,
|
|
778
809
|
"poc_description": "Chain component — exploits page-cache write primitive in RxRPC subsystem. Used in combination with CVE-2026-43284.",
|
|
779
|
-
"ai_discovered":
|
|
780
|
-
"ai_discovery_source": "
|
|
781
|
-
"ai_discovery_notes": "
|
|
810
|
+
"ai_discovered": true,
|
|
811
|
+
"ai_discovery_source": "bug_bounty_ai_augmented",
|
|
812
|
+
"ai_discovery_notes": "Companion CVE to CVE-2026-43284 (Dirty Frag); same researcher (Hyunwoo Kim, @v4bel) and same AI-assisted analysis pattern per Sysdig disclosure. The RxRPC variant of skb_try_coalesce was introduced in June 2023; class-of-bug recurrence across two subsystems within the same kernel skb-fast-path family is the canonical signature of automated audit-tool-driven discovery rather than independent human review. Source: Sysdig writeup (https://www.sysdig.com/blog/dirty-frag-cve-2026-43284-and-cve-2026-43500-detecting-unpatched-local-privilege-escalation-via-linux-kernel-esp-and-rxrpc).",
|
|
813
|
+
"discovery_attribution_note": "AI-assisted discovery by Hyunwoo Kim (@v4bel) — companion to CVE-2026-43284; same Sysdig 2026-05-08 disclosure batch.",
|
|
782
814
|
"ai_assisted_weaponization": false,
|
|
783
815
|
"active_exploitation": "suspected",
|
|
784
816
|
"affected": "Linux systems with RxRPC support",
|
|
@@ -799,11 +831,11 @@
|
|
|
799
831
|
"attack_refs": [
|
|
800
832
|
"T1068"
|
|
801
833
|
],
|
|
802
|
-
"rwep_score":
|
|
834
|
+
"rwep_score": 47,
|
|
803
835
|
"rwep_factors": {
|
|
804
836
|
"cisa_kev": 0,
|
|
805
837
|
"poc_available": 20,
|
|
806
|
-
"ai_factor":
|
|
838
|
+
"ai_factor": 15,
|
|
807
839
|
"active_exploitation": 10,
|
|
808
840
|
"blast_radius": 12,
|
|
809
841
|
"patch_available": -15,
|
|
@@ -916,7 +948,8 @@
|
|
|
916
948
|
]
|
|
917
949
|
},
|
|
918
950
|
"pairing_note": "CVE-2026-43500 only realizes its full primitive when chained with CVE-2026-43284. Detection of either subsystem being exercised on a host that should have neither is itself the chain-detection signal. Simultaneous match of esp-module-loaded-no-policy AND rxrpc-active-call-no-afs-config should escalate to a deterministic paired finding.",
|
|
919
|
-
"last_updated": "2026-05-15"
|
|
951
|
+
"last_updated": "2026-05-15",
|
|
952
|
+
"rwep_correction_note": "RWEP bump:v0.12.29 ai-discovery audit re-attributed to ai_discovered=true; ai_factor advanced from 0 to 15; rwep raised by 15 from 32 to 47."
|
|
920
953
|
},
|
|
921
954
|
"CVE-2026-45321": {
|
|
922
955
|
"name": "Mini Shai-Hulud TanStack npm worm",
|
|
@@ -1082,7 +1115,8 @@
|
|
|
1082
1115
|
"Windows variant (original Shai-Hulud carry-forward): del /F /Q /S \"%USERPROFILE%*\" && cipher /W:%USERPROFILE%"
|
|
1083
1116
|
]
|
|
1084
1117
|
},
|
|
1085
|
-
"last_updated": "2026-05-15"
|
|
1118
|
+
"last_updated": "2026-05-15",
|
|
1119
|
+
"discovery_attribution_note": "Discovery by ecosystem detection (multiple firms — Snyk, Wiz, StepSecurity, Socket, Orca, JFrog) within 20 minutes of TeamPCP's 2026-05-11 publish window of 84 malicious versions across 42 @tanstack/* packages. The worm IS the disclosure event; no AI-discovery tool involved on the defender side. Threat-actor side is engineering-grade chained tradecraft (pull_request_target co-residency, OIDC-token scraping). Source: https://www.stepsecurity.io/blog/mini-shai-hulud-is-back-a-self-spreading-supply-chain-attack-hits-the-npm-ecosystem."
|
|
1086
1120
|
},
|
|
1087
1121
|
"MAL-2026-3083": {
|
|
1088
1122
|
"name": "Elementary-Data PyPI Worm (Forged Release via GitHub Actions Script Injection)",
|
|
@@ -1238,7 +1272,8 @@
|
|
|
1238
1272
|
"pip install of a major-version-pinned package returning a wheel whose contents differ from the previous patch version by added .pth file"
|
|
1239
1273
|
]
|
|
1240
1274
|
},
|
|
1241
|
-
"last_updated": "2026-05-13"
|
|
1275
|
+
"last_updated": "2026-05-13",
|
|
1276
|
+
"discovery_attribution_note": "Community report into the elementary-data maintainers within four hours of the 2026-04-24 22:20 UTC push; ecosystem detection by JFrog, Snyk, Phylum follow-up. No AI-tool discovery attribution — incident was surfaced by package-registry monitoring + maintainer triage. Source: https://snyk.io/blog/malicious-release-of-elementary-data-pypi-package-steals-cloud-credentials-from-data-engineers/."
|
|
1242
1277
|
},
|
|
1243
1278
|
"CVE-2026-46300": {
|
|
1244
1279
|
"name": "Fragnesia",
|
|
@@ -1250,9 +1285,10 @@
|
|
|
1250
1285
|
"cisa_kev_due_date": null,
|
|
1251
1286
|
"poc_available": true,
|
|
1252
1287
|
"poc_description": "Public PoC released alongside disclosure on the V12 security team's GitHub. One-line invocation against /usr/bin/su yields a root shell. No race condition — the page-cache write primitive is deterministic.",
|
|
1253
|
-
"ai_discovered":
|
|
1254
|
-
"ai_discovery_source": "
|
|
1255
|
-
"ai_discovery_notes": "
|
|
1288
|
+
"ai_discovered": true,
|
|
1289
|
+
"ai_discovery_source": "bug_bounty_ai_augmented",
|
|
1290
|
+
"ai_discovery_notes": "Re-attributed to AI-assisted discovery on the basis of The Hacker News / Help Net Security 2026-05-13/14 coverage citing Zellic.io's AI-agentic software-auditing tool as the discovery mechanism: 'Fragnesia was discovered by William Bowling of Zellic, with the help of the company's AI-agentic software auditing tool.' The PoC is human-authored (V12 security team), but the underlying defect was surfaced by automated agentic analysis — which is the discovery-attribution that Hard Rule #7 measures. Source: https://thehackernews.com/2026/05/new-fragnesia-linux-kernel-lpe-grants.html and https://www.helpnetsecurity.com/2026/05/14/fragnesia-cve-2026-46300-linux-lpe-vulnerability/.",
|
|
1291
|
+
"discovery_attribution_note": "AI-assisted discovery by William Bowling using Zellic.io's AI-agentic software-auditing platform; PoC weaponization human-authored by V12 security team.",
|
|
1256
1292
|
"ai_assisted_weaponization": false,
|
|
1257
1293
|
"active_exploitation": "none",
|
|
1258
1294
|
"affected": "Linux kernel — all distributions shipping kernel >= 5.10 with the XFRM ESP-in-TCP path enabled (default on RHEL 8/9, Ubuntu 20.04+, Debian 11+, Amazon Linux 2/2023, SUSE 15, AlmaLinux 8/9, CloudLinux 8/9, Rocky Linux 8/9, Alpine, and derivatives). Containers inherit host-kernel exposure regardless of image patch level.",
|
|
@@ -1288,11 +1324,11 @@
|
|
|
1288
1324
|
"attack_refs": [
|
|
1289
1325
|
"T1068"
|
|
1290
1326
|
],
|
|
1291
|
-
"rwep_score":
|
|
1327
|
+
"rwep_score": 35,
|
|
1292
1328
|
"rwep_factors": {
|
|
1293
1329
|
"cisa_kev": 0,
|
|
1294
1330
|
"poc_available": 20,
|
|
1295
|
-
"ai_factor":
|
|
1331
|
+
"ai_factor": 15,
|
|
1296
1332
|
"active_exploitation": 0,
|
|
1297
1333
|
"blast_radius": 25,
|
|
1298
1334
|
"patch_available": -15,
|
|
@@ -1407,7 +1443,8 @@
|
|
|
1407
1443
|
],
|
|
1408
1444
|
"forensic_note": "Fragnesia corrupts page-cache pages without touching disk. File-integrity tools that hash on-disk bytes (AIDE, Tripwire, IMA in measure-only mode) cannot detect the corruption — the on-disk file is unchanged. Detection requires either (a) reading the binary through the page cache (`vmtouch` + `sha256sum`) and comparing to a freshly-read-from-disk copy after `echo 3 > /proc/sys/vm/drop_caches`, or (b) the runtime_syscall + kernel_trace indicators above. Operators who blacklisted esp4 / esp6 / rxrpc for CVE-2026-43284 / CVE-2026-43500 (Dirty Frag) are already mitigated for Fragnesia — the mitigation set is identical."
|
|
1409
1445
|
},
|
|
1410
|
-
"last_updated": "2026-05-15"
|
|
1446
|
+
"last_updated": "2026-05-15",
|
|
1447
|
+
"rwep_correction_note": "RWEP bump:v0.12.29 ai-discovery audit re-attributed to ai_discovered=true; ai_factor advanced from 0 to 15; rwep raised by 15 from 20 to 35."
|
|
1411
1448
|
},
|
|
1412
1449
|
"CVE-2024-21626": {
|
|
1413
1450
|
"_draft": true,
|
|
@@ -1447,7 +1484,7 @@
|
|
|
1447
1484
|
"attack_refs": [
|
|
1448
1485
|
"T1611"
|
|
1449
1486
|
],
|
|
1450
|
-
"rwep_score":
|
|
1487
|
+
"rwep_score": 80,
|
|
1451
1488
|
"rwep_factors": {
|
|
1452
1489
|
"cisa_kev": 25,
|
|
1453
1490
|
"poc_available": 20,
|
|
@@ -1469,7 +1506,9 @@
|
|
|
1469
1506
|
"https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
|
|
1470
1507
|
"https://snyk.io/blog/leaky-vessels-docker-runc-container-breakout-vulnerabilities/"
|
|
1471
1508
|
],
|
|
1472
|
-
"last_updated": "2026-05-15"
|
|
1509
|
+
"last_updated": "2026-05-15",
|
|
1510
|
+
"discovery_attribution_note": "Discovered by Rory McNamara of Snyk Security Labs as part of the four-vulnerability Leaky Vessels disclosure (CVE-2024-21626 + CVE-2024-23651/23652/23653) published January 2024. Named human researcher; no AI-tool credited. Source: https://labs.snyk.io/resources/leaky-vessels-docker-runc-container-breakout-vulnerabilities/.",
|
|
1511
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: +5 (75 -> 80)."
|
|
1473
1512
|
},
|
|
1474
1513
|
"CVE-2024-3094": {
|
|
1475
1514
|
"_draft": true,
|
|
@@ -1522,7 +1561,7 @@
|
|
|
1522
1561
|
"poc_available": 20,
|
|
1523
1562
|
"ai_factor": 0,
|
|
1524
1563
|
"active_exploitation": 10,
|
|
1525
|
-
"blast_radius":
|
|
1564
|
+
"blast_radius": 30,
|
|
1526
1565
|
"patch_available": -15,
|
|
1527
1566
|
"live_patch_available": 0,
|
|
1528
1567
|
"reboot_required": 0
|
|
@@ -1539,7 +1578,9 @@
|
|
|
1539
1578
|
"https://www.openwall.com/lists/oss-security/2024/03/29/4",
|
|
1540
1579
|
"https://research.swtch.com/xz-script"
|
|
1541
1580
|
],
|
|
1542
|
-
"last_updated": "2026-05-15"
|
|
1581
|
+
"last_updated": "2026-05-15",
|
|
1582
|
+
"discovery_attribution_note": "Discovered by Andres Freund (Microsoft engineer, PostgreSQL developer) on 2024-03-28 via a 0.5-second SSH-login latency regression traced to liblzma symbol resolution; reported to oss-security. Named human researcher; no AI tooling involved. Source: https://en.wikipedia.org/wiki/XZ_Utils_backdoor.",
|
|
1583
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
|
|
1543
1584
|
},
|
|
1544
1585
|
"CVE-2024-3154": {
|
|
1545
1586
|
"_draft": true,
|
|
@@ -1606,7 +1647,8 @@
|
|
|
1606
1647
|
"https://nvd.nist.gov/vuln/detail/CVE-2024-3154",
|
|
1607
1648
|
"https://github.com/cri-o/cri-o/security/advisories"
|
|
1608
1649
|
],
|
|
1609
|
-
"last_updated": "2026-05-15"
|
|
1650
|
+
"last_updated": "2026-05-15",
|
|
1651
|
+
"discovery_attribution_note": "Reported by the OpenShift / CRI-O upstream security team via Red Hat Bugzilla 2272532; no individual researcher byline in the public advisory and no AI-tool credit. Bug class (systemd property injection through pod annotations) is conventional argument-injection. Source: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-3154."
|
|
1610
1652
|
},
|
|
1611
1653
|
"CVE-2023-43472": {
|
|
1612
1654
|
"_draft": true,
|
|
@@ -1669,7 +1711,8 @@
|
|
|
1669
1711
|
"https://nvd.nist.gov/vuln/detail/CVE-2023-43472",
|
|
1670
1712
|
"https://huntr.com/bounties/"
|
|
1671
1713
|
],
|
|
1672
|
-
"last_updated": "2026-05-15"
|
|
1714
|
+
"last_updated": "2026-05-15",
|
|
1715
|
+
"discovery_attribution_note": "Discovered by Joseph Beeton, senior security researcher at Contrast Security, via the Protect AI Huntr bug bounty program. Named human researcher; no AI-tool credited. Source: https://securityonline.info/cve-2023-43472-critical-vulnerability-uncovered-in-mlflow/ and https://github.com/advisories/GHSA-wqxf-447m-6f5f."
|
|
1673
1716
|
},
|
|
1674
1717
|
"CVE-2020-10148": {
|
|
1675
1718
|
"_draft": true,
|
|
@@ -1731,7 +1774,8 @@
|
|
|
1731
1774
|
"https://nvd.nist.gov/vuln/detail/CVE-2020-10148",
|
|
1732
1775
|
"https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-352a"
|
|
1733
1776
|
],
|
|
1734
|
-
"last_updated": "2026-05-15"
|
|
1777
|
+
"last_updated": "2026-05-15",
|
|
1778
|
+
"discovery_attribution_note": "Discovered during the SUNBURST incident-response investigation by FireEye / Mandiant analysts (publicly attributed to the Mandiant team rather than a single researcher) and corroborated by SolarWinds engineering. Documented in CISA AA20-352A and the CERT/CC VU#843464. Named human teams; pre-AI-tooling era for vendor-side attribution. Source: https://kb.cert.org/vuls/id/843464."
|
|
1735
1779
|
},
|
|
1736
1780
|
"CVE-2023-3519": {
|
|
1737
1781
|
"_draft": true,
|
|
@@ -1773,7 +1817,7 @@
|
|
|
1773
1817
|
"attack_refs": [
|
|
1774
1818
|
"T1190"
|
|
1775
1819
|
],
|
|
1776
|
-
"rwep_score":
|
|
1820
|
+
"rwep_score": 80,
|
|
1777
1821
|
"rwep_factors": {
|
|
1778
1822
|
"cisa_kev": 25,
|
|
1779
1823
|
"poc_available": 20,
|
|
@@ -1795,7 +1839,9 @@
|
|
|
1795
1839
|
"https://nvd.nist.gov/vuln/detail/CVE-2023-3519",
|
|
1796
1840
|
"https://support.citrix.com/article/CTX561482"
|
|
1797
1841
|
],
|
|
1798
|
-
"last_updated": "2026-05-15"
|
|
1842
|
+
"last_updated": "2026-05-15",
|
|
1843
|
+
"discovery_attribution_note": "Independent security researchers via Citrix coordinated disclosure (CTX561482, 2023-07-18); no individual researcher named in the Citrix advisory. NSA/CISA AA23-201A documents in-wild exploitation by Chinese state-sponsored actors. No AI-tool credited. Source: https://support.citrix.com/article/CTX561482/ and https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-201a.",
|
|
1844
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: +5 (75 -> 80)."
|
|
1799
1845
|
},
|
|
1800
1846
|
"CVE-2024-1709": {
|
|
1801
1847
|
"_draft": true,
|
|
@@ -1855,7 +1901,8 @@
|
|
|
1855
1901
|
"https://nvd.nist.gov/vuln/detail/CVE-2024-1709",
|
|
1856
1902
|
"https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8"
|
|
1857
1903
|
],
|
|
1858
|
-
"last_updated": "2026-05-15"
|
|
1904
|
+
"last_updated": "2026-05-15",
|
|
1905
|
+
"discovery_attribution_note": "Discovered by ConnectWise security engineering and externally reported by Huntress + GreyNoise via in-wild exploitation telemetry within 24 hours of the 2024-02 Patch Tuesday. No individual researcher byline; vendor-internal discovery. No AI-tool credited. Source: https://www.upguard.com/blog/screenconnect-cve-2024."
|
|
1859
1906
|
},
|
|
1860
1907
|
"CVE-2026-20182": {
|
|
1861
1908
|
"_draft": true,
|
|
@@ -1902,7 +1949,7 @@
|
|
|
1902
1949
|
"poc_available": 0,
|
|
1903
1950
|
"ai_factor": 0,
|
|
1904
1951
|
"active_exploitation": 20,
|
|
1905
|
-
"blast_radius":
|
|
1952
|
+
"blast_radius": 30,
|
|
1906
1953
|
"patch_available": -15,
|
|
1907
1954
|
"live_patch_available": 0,
|
|
1908
1955
|
"reboot_required": 5
|
|
@@ -1917,7 +1964,9 @@
|
|
|
1917
1964
|
"https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
|
|
1918
1965
|
"https://sec.cloudapps.cisco.com/security/center/publicationListing.x"
|
|
1919
1966
|
],
|
|
1920
|
-
"last_updated": "2026-05-15"
|
|
1967
|
+
"last_updated": "2026-05-15",
|
|
1968
|
+
"discovery_attribution_note": "Discovered by Stephen Fewer (Senior Principal Security Researcher) and Jonah Burgess (Senior Security Researcher), both at Rapid7, while researching the related CVE-2026-20127 vdaemon authentication-bypass. Named human researchers; no AI-tool credited. Source: https://www.rapid7.com/blog/post/ve-cve-2026-20182-critical-authentication-bypass-cisco-catalyst-sd-wan-controller-fixed/.",
|
|
1969
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: 0."
|
|
1921
1970
|
},
|
|
1922
1971
|
"CVE-2024-40635": {
|
|
1923
1972
|
"_draft": true,
|
|
@@ -1962,7 +2011,7 @@
|
|
|
1962
2011
|
"cisa_kev": 0,
|
|
1963
2012
|
"poc_available": 20,
|
|
1964
2013
|
"ai_factor": 0,
|
|
1965
|
-
"active_exploitation":
|
|
2014
|
+
"active_exploitation": 5,
|
|
1966
2015
|
"blast_radius": 20,
|
|
1967
2016
|
"patch_available": -15,
|
|
1968
2017
|
"live_patch_available": 0,
|
|
@@ -1978,7 +2027,9 @@
|
|
|
1978
2027
|
"https://nvd.nist.gov/vuln/detail/CVE-2024-40635",
|
|
1979
2028
|
"https://github.com/containerd/containerd/security/advisories"
|
|
1980
2029
|
],
|
|
1981
|
-
"last_updated": "2026-05-15"
|
|
2030
|
+
"last_updated": "2026-05-15",
|
|
2031
|
+
"discovery_attribution_note": "Reported via the containerd security team (GO-2025-3528, Snyk SNYK-GOLANG-GITHUBCOMCONTAINERDCONTAINERDV2PKGOCI-9479987); no individual researcher byline in the advisory and no AI-tool credited. Bug class is straight integer overflow in WithUser() UID handling. Source: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINERDCONTAINERDV2PKGOCI-9479987.",
|
|
2032
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: 0."
|
|
1982
2033
|
},
|
|
1983
2034
|
"MAL-2026-TANSTACK-MINI": {
|
|
1984
2035
|
"_draft": true,
|
|
@@ -2031,8 +2082,8 @@
|
|
|
2031
2082
|
"poc_available": 20,
|
|
2032
2083
|
"ai_factor": 0,
|
|
2033
2084
|
"active_exploitation": 20,
|
|
2034
|
-
"blast_radius":
|
|
2035
|
-
"patch_available": -
|
|
2085
|
+
"blast_radius": 30,
|
|
2086
|
+
"patch_available": -15,
|
|
2036
2087
|
"live_patch_available": 0,
|
|
2037
2088
|
"reboot_required": 0
|
|
2038
2089
|
},
|
|
@@ -2048,7 +2099,9 @@
|
|
|
2048
2099
|
"https://github.com/TanStack/query/security/advisories",
|
|
2049
2100
|
"https://www.npmjs.com/advisories"
|
|
2050
2101
|
],
|
|
2051
|
-
"last_updated": "2026-05-15"
|
|
2102
|
+
"last_updated": "2026-05-15",
|
|
2103
|
+
"discovery_attribution_note": "Same incident-class as CVE-2026-45321 (Mini Shai-Hulud); discovery by ecosystem detection across multiple firms (Snyk, Wiz, StepSecurity, Socket, Orca, JFrog) within minutes of the 2026-05-11 publish window. No AI-tool discovery attribution on the defender side. Source: https://snyk.io/blog/tanstack-npm-packages-compromised/.",
|
|
2104
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
|
|
2052
2105
|
},
|
|
2053
2106
|
"MAL-2026-ANTHROPIC-MCP-STDIO": {
|
|
2054
2107
|
"_draft": true,
|
|
@@ -2096,12 +2149,12 @@
|
|
|
2096
2149
|
"rwep_score": 25,
|
|
2097
2150
|
"rwep_factors": {
|
|
2098
2151
|
"cisa_kev": 0,
|
|
2099
|
-
"poc_available":
|
|
2152
|
+
"poc_available": 0,
|
|
2100
2153
|
"ai_factor": 0,
|
|
2101
2154
|
"active_exploitation": 5,
|
|
2102
2155
|
"blast_radius": 30,
|
|
2103
2156
|
"patch_available": 0,
|
|
2104
|
-
"live_patch_available": -
|
|
2157
|
+
"live_patch_available": -10,
|
|
2105
2158
|
"reboot_required": 0
|
|
2106
2159
|
},
|
|
2107
2160
|
"epss_score": null,
|
|
@@ -2115,7 +2168,9 @@
|
|
|
2115
2168
|
"https://docs.anthropic.com/security",
|
|
2116
2169
|
"https://modelcontextprotocol.io/"
|
|
2117
2170
|
],
|
|
2118
|
-
"last_updated": "2026-05-15"
|
|
2171
|
+
"last_updated": "2026-05-15",
|
|
2172
|
+
"discovery_attribution_note": "Discovered by OX Security research team (Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok); part of the four-exploitation-family April 2026 MCP advisory. Named-human research; no AI-tool credited for the discovery despite the target being an AI SDK. Source: https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-critical-systemic-vulnerability-at-the-core-of-the-mcp/.",
|
|
2173
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
|
|
2119
2174
|
},
|
|
2120
2175
|
"CVE-2026-GTIG-AI-2FA": {
|
|
2121
2176
|
"_draft": true,
|
|
@@ -2168,12 +2223,12 @@
|
|
|
2168
2223
|
"rwep_score": 55,
|
|
2169
2224
|
"rwep_factors": {
|
|
2170
2225
|
"cisa_kev": 0,
|
|
2171
|
-
"poc_available":
|
|
2172
|
-
"ai_factor":
|
|
2226
|
+
"poc_available": 0,
|
|
2227
|
+
"ai_factor": 15,
|
|
2173
2228
|
"active_exploitation": 20,
|
|
2174
2229
|
"blast_radius": 30,
|
|
2175
2230
|
"patch_available": 0,
|
|
2176
|
-
"live_patch_available": -
|
|
2231
|
+
"live_patch_available": -10,
|
|
2177
2232
|
"reboot_required": 0
|
|
2178
2233
|
},
|
|
2179
2234
|
"epss_score": null,
|
|
@@ -2187,7 +2242,9 @@
|
|
|
2187
2242
|
"https://cloud.google.com/blog/topics/threat-intelligence/",
|
|
2188
2243
|
"https://services.google.com/fh/files/misc/gtig-2026-ai-attack-trends.pdf"
|
|
2189
2244
|
],
|
|
2190
|
-
"last_updated": "2026-05-15"
|
|
2245
|
+
"last_updated": "2026-05-15",
|
|
2246
|
+
"discovery_attribution_note": "AI-developed zero-day per Google Threat Intelligence Group 2026-05-11 disclosure; first publicly-attributed in-the-wild AI-built zero-day exploit. GTIG assesses with high confidence that an LLM was weaponized to facilitate discovery + weaponization of a 2FA bypass in a popular open-source web administration tool. Source: https://cloud.google.com/blog/topics/threat-intelligence/ai-vulnerability-exploitation-initial-access and https://thehackernews.com/2026/05/hackers-used-ai-to-develop-first-known.html.",
|
|
2247
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
|
|
2191
2248
|
},
|
|
2192
2249
|
"CVE-2026-30623": {
|
|
2193
2250
|
"_draft": true,
|
|
@@ -2253,7 +2310,8 @@
|
|
|
2253
2310
|
"https://nvd.nist.gov/vuln/detail/CVE-2026-30623",
|
|
2254
2311
|
"https://github.com/anthropics/anthropic-sdk-python/security/advisories"
|
|
2255
2312
|
],
|
|
2256
|
-
"last_updated": "2026-05-15"
|
|
2313
|
+
"last_updated": "2026-05-15",
|
|
2314
|
+
"discovery_attribution_note": "OX Security advisory 2026-04-15; researchers Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok. Same disclosure cluster as CVE-2026-30615. Named-human research; no AI-tool credit. Source: https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-critical-systemic-vulnerability-at-the-core-of-the-mcp/."
|
|
2257
2315
|
},
|
|
2258
2316
|
"CVE-2025-12686": {
|
|
2259
2317
|
"_draft": true,
|
|
@@ -2290,7 +2348,7 @@
|
|
|
2290
2348
|
"attack_refs": [
|
|
2291
2349
|
"T1190"
|
|
2292
2350
|
],
|
|
2293
|
-
"rwep_score":
|
|
2351
|
+
"rwep_score": 45,
|
|
2294
2352
|
"rwep_factors": {
|
|
2295
2353
|
"cisa_kev": 0,
|
|
2296
2354
|
"poc_available": 20,
|
|
@@ -2311,7 +2369,9 @@
|
|
|
2311
2369
|
"https://nvd.nist.gov/vuln/detail/CVE-2025-12686",
|
|
2312
2370
|
"https://www.zerodayinitiative.com/blog"
|
|
2313
2371
|
],
|
|
2314
|
-
"last_updated": "2026-05-15"
|
|
2372
|
+
"last_updated": "2026-05-15",
|
|
2373
|
+
"discovery_attribution_note": "Pwn2Own Ireland 2025 (Cork, 2025-10-21) — exploited by @Tek_7987 and @_Anyfun of Synacktiv's offensive security team. Disclosure methodology: attack-surface enumeration + manual code auditing + exploit development per Synacktiv's published writeup; no AI-tool credit. Source: https://www.synacktiv.com/en/publications/breaking-the-beestation-inside-our-pwn2own-2025-exploit-journey.",
|
|
2374
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: -5 (50 -> 45)."
|
|
2315
2375
|
},
|
|
2316
2376
|
"CVE-2025-62847": {
|
|
2317
2377
|
"_draft": true,
|
|
@@ -2350,7 +2410,7 @@
|
|
|
2350
2410
|
"attack_refs": [
|
|
2351
2411
|
"T1190"
|
|
2352
2412
|
],
|
|
2353
|
-
"rwep_score":
|
|
2413
|
+
"rwep_score": 40,
|
|
2354
2414
|
"rwep_factors": {
|
|
2355
2415
|
"cisa_kev": 0,
|
|
2356
2416
|
"poc_available": 20,
|
|
@@ -2371,7 +2431,9 @@
|
|
|
2371
2431
|
"https://nvd.nist.gov/vuln/detail/CVE-2025-62847",
|
|
2372
2432
|
"https://www.qnap.com/en/security-advisory/"
|
|
2373
2433
|
],
|
|
2374
|
-
"last_updated": "2026-05-15"
|
|
2434
|
+
"last_updated": "2026-05-15",
|
|
2435
|
+
"discovery_attribution_note": "Pwn2Own Ireland 2025 — exploited by DEVCORE Research Team (chained injection + format-string bug, $40,000 + 4 Master of Pwn points). Named-human team via ZDI live-blog credit; no AI-tool attribution. Source: https://www.thezdi.com/blog/2025/10/21/pwn2own-ireland-2025-day-one-results.",
|
|
2436
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: -5 (45 -> 40)."
|
|
2375
2437
|
},
|
|
2376
2438
|
"CVE-2025-62848": {
|
|
2377
2439
|
"_draft": true,
|
|
@@ -2410,7 +2472,7 @@
|
|
|
2410
2472
|
"attack_refs": [
|
|
2411
2473
|
"T1190"
|
|
2412
2474
|
],
|
|
2413
|
-
"rwep_score":
|
|
2475
|
+
"rwep_score": 40,
|
|
2414
2476
|
"rwep_factors": {
|
|
2415
2477
|
"cisa_kev": 0,
|
|
2416
2478
|
"poc_available": 20,
|
|
@@ -2431,7 +2493,9 @@
|
|
|
2431
2493
|
"https://nvd.nist.gov/vuln/detail/CVE-2025-62848",
|
|
2432
2494
|
"https://www.qnap.com/en/security-advisory/"
|
|
2433
2495
|
],
|
|
2434
|
-
"last_updated": "2026-05-15"
|
|
2496
|
+
"last_updated": "2026-05-15",
|
|
2497
|
+
"discovery_attribution_note": "Pwn2Own Ireland 2025 — chain 2/3 of the DEVCORE Research Team QNAP TS-453E exploit. Same researcher attribution as CVE-2025-62847; ZDI live-blog credit. No AI-tool attribution. Source: https://www.thezdi.com/blog/2025/10/21/pwn2own-ireland-2025-day-one-results.",
|
|
2498
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: -5 (45 -> 40)."
|
|
2435
2499
|
},
|
|
2436
2500
|
"CVE-2025-62849": {
|
|
2437
2501
|
"_draft": true,
|
|
@@ -2470,7 +2534,7 @@
|
|
|
2470
2534
|
"attack_refs": [
|
|
2471
2535
|
"T1068"
|
|
2472
2536
|
],
|
|
2473
|
-
"rwep_score":
|
|
2537
|
+
"rwep_score": 35,
|
|
2474
2538
|
"rwep_factors": {
|
|
2475
2539
|
"cisa_kev": 0,
|
|
2476
2540
|
"poc_available": 20,
|
|
@@ -2491,7 +2555,9 @@
|
|
|
2491
2555
|
"https://nvd.nist.gov/vuln/detail/CVE-2025-62849",
|
|
2492
2556
|
"https://www.qnap.com/en/security-advisory/"
|
|
2493
2557
|
],
|
|
2494
|
-
"last_updated": "2026-05-15"
|
|
2558
|
+
"last_updated": "2026-05-15",
|
|
2559
|
+
"discovery_attribution_note": "Pwn2Own Ireland 2025 — chain 3/3 of the DEVCORE Research Team QNAP TS-453E exploit (post-auth elevation). Same attribution as CVE-2025-62847/62848; ZDI credit. No AI-tool attribution. Source: https://www.thezdi.com/blog/2025/10/21/pwn2own-ireland-2025-day-one-results.",
|
|
2560
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: -5 (40 -> 35)."
|
|
2495
2561
|
},
|
|
2496
2562
|
"CVE-2025-59389": {
|
|
2497
2563
|
"_draft": true,
|
|
@@ -2536,7 +2602,7 @@
|
|
|
2536
2602
|
"poc_available": 20,
|
|
2537
2603
|
"ai_factor": 0,
|
|
2538
2604
|
"active_exploitation": 5,
|
|
2539
|
-
"blast_radius":
|
|
2605
|
+
"blast_radius": 30,
|
|
2540
2606
|
"patch_available": -15,
|
|
2541
2607
|
"live_patch_available": 0,
|
|
2542
2608
|
"reboot_required": 5
|
|
@@ -2551,7 +2617,9 @@
|
|
|
2551
2617
|
"https://nvd.nist.gov/vuln/detail/CVE-2025-59389",
|
|
2552
2618
|
"https://www.qnap.com/en/security-advisory/"
|
|
2553
2619
|
],
|
|
2554
|
-
"last_updated": "2026-05-15"
|
|
2620
|
+
"last_updated": "2026-05-15",
|
|
2621
|
+
"discovery_attribution_note": "Pwn2Own Ireland 2025 — Sina Kheirkhah of Summoning Team chained a hardcoded-credential issue with an injection flaw against QNAP Hyper Data Protector ($20,000 award). Named-human researcher; no AI-tool credit. Source: https://www.thezdi.com/blog/2025/10/21/pwn2own-ireland-2025-day-one-results and https://www.qnap.com/en/security-advisory/qsa-25-48.",
|
|
2622
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: 0."
|
|
2555
2623
|
},
|
|
2556
2624
|
"CVE-2025-11837": {
|
|
2557
2625
|
"_draft": true,
|
|
@@ -2612,7 +2680,8 @@
|
|
|
2612
2680
|
"https://nvd.nist.gov/vuln/detail/CVE-2025-11837",
|
|
2613
2681
|
"https://www.qnap.com/en/security-advisory/"
|
|
2614
2682
|
],
|
|
2615
|
-
"last_updated": "2026-05-15"
|
|
2683
|
+
"last_updated": "2026-05-15",
|
|
2684
|
+
"discovery_attribution_note": "Pwn2Own Ireland 2025 — Chumy Tsai of CyCraft Technology demonstrated the code-injection on QNAP TS-453E ($20,000 award). Named-human researcher via ZDI credit; no AI-tool attribution. Source: https://www.qnap.com/en/security-advisory/qsa-25-47 and https://cybersecuritynews.com/qnap-zero-day-vulnerabilities-exploited/."
|
|
2616
2685
|
},
|
|
2617
2686
|
"CVE-2026-42945": {
|
|
2618
2687
|
"_draft": true,
|
|
@@ -2671,9 +2740,9 @@
|
|
|
2671
2740
|
"rwep_factors": {
|
|
2672
2741
|
"cisa_kev": 0,
|
|
2673
2742
|
"poc_available": 20,
|
|
2674
|
-
"ai_factor":
|
|
2743
|
+
"ai_factor": 15,
|
|
2675
2744
|
"active_exploitation": 0,
|
|
2676
|
-
"blast_radius":
|
|
2745
|
+
"blast_radius": 30,
|
|
2677
2746
|
"patch_available": -15,
|
|
2678
2747
|
"live_patch_available": -10,
|
|
2679
2748
|
"reboot_required": 0
|
|
@@ -2691,6 +2760,8 @@
|
|
|
2691
2760
|
"https://my.f5.com/manage/s/article/K000150420",
|
|
2692
2761
|
"https://nginx.org/en/security_advisories.html"
|
|
2693
2762
|
],
|
|
2694
|
-
"last_updated": "2026-05-15"
|
|
2763
|
+
"last_updated": "2026-05-15",
|
|
2764
|
+
"discovery_attribution_note": "Discovered by depthfirst's autonomous vulnerability-analysis platform; flagged the heap-buffer-overflow in nginx ngx_http_rewrite_module (present since nginx 0.6.27, 2008) within six hours of scan time. First publicly-attributed AI-discovered nginx CVE; jointly disclosed by F5 + depthfirst on 2026-05-13. Source: https://depthfirst.com/nginx-rift and https://github.com/depthfirstdisclosures/nginx-rift.",
|
|
2765
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
|
|
2695
2766
|
}
|
|
2696
2767
|
}
|