@blamejs/exceptd-skills 0.12.39 → 0.12.40
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +23 -0
- package/bin/exceptd.js +6 -1
- package/data/_indexes/_meta.json +3 -3
- package/data/_indexes/chains.json +2794 -800
- package/data/framework-control-gaps.json +92 -189
- package/lib/framework-gap.js +13 -3
- package/manifest-snapshot.json +1 -1
- package/manifest-snapshot.sha256 +1 -1
- package/manifest.json +44 -44
- package/orchestrator/index.js +6 -1
- package/package.json +1 -1
- package/sbom.cdx.json +17 -17
- package/scripts/refresh-reverse-refs.js +29 -3
|
@@ -17,37 +17,17 @@
|
|
|
17
17
|
"referencing_skills": [
|
|
18
18
|
"ai-attack-surface",
|
|
19
19
|
"mcp-agent-trust",
|
|
20
|
-
"compliance-theater",
|
|
21
|
-
"exploit-scoring",
|
|
22
|
-
"rag-pipeline-security",
|
|
23
|
-
"attack-surface-pentest",
|
|
24
|
-
"fuzz-testing-strategy",
|
|
25
|
-
"dlp-gap-analysis",
|
|
26
|
-
"supply-chain-integrity",
|
|
27
20
|
"identity-assurance",
|
|
28
|
-
"ot-ics-security",
|
|
29
|
-
"coordinated-vuln-disclosure",
|
|
30
|
-
"threat-modeling-methodology",
|
|
31
|
-
"webapp-security",
|
|
32
|
-
"ai-risk-management",
|
|
33
21
|
"sector-healthcare",
|
|
34
22
|
"sector-financial",
|
|
35
|
-
"sector-federal-government",
|
|
36
|
-
"sector-energy",
|
|
37
23
|
"api-security",
|
|
38
24
|
"cloud-security",
|
|
39
25
|
"container-runtime-security",
|
|
40
|
-
"mlops-security",
|
|
41
26
|
"incident-response-playbook",
|
|
42
27
|
"age-gates-child-safety"
|
|
43
28
|
],
|
|
44
29
|
"chain": {
|
|
45
30
|
"cwes": [
|
|
46
|
-
{
|
|
47
|
-
"id": "CWE-1037",
|
|
48
|
-
"name": "Processor Optimization Removal or Modification of Security-critical Code",
|
|
49
|
-
"category": "Hardware / Side Channel"
|
|
50
|
-
},
|
|
51
31
|
{
|
|
52
32
|
"id": "CWE-1039",
|
|
53
33
|
"name": "Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbations",
|
|
@@ -58,16 +38,6 @@
|
|
|
58
38
|
"name": "Initialization of a Resource with an Insecure Default",
|
|
59
39
|
"category": "Configuration"
|
|
60
40
|
},
|
|
61
|
-
{
|
|
62
|
-
"id": "CWE-125",
|
|
63
|
-
"name": "Out-of-bounds Read",
|
|
64
|
-
"category": "Memory Safety"
|
|
65
|
-
},
|
|
66
|
-
{
|
|
67
|
-
"id": "CWE-1357",
|
|
68
|
-
"name": "Reliance on Insufficiently Trustworthy Component",
|
|
69
|
-
"category": "Supply Chain"
|
|
70
|
-
},
|
|
71
41
|
{
|
|
72
42
|
"id": "CWE-1395",
|
|
73
43
|
"name": "Dependency on Vulnerable Third-Party Component",
|
|
@@ -78,11 +48,6 @@
|
|
|
78
48
|
"name": "Improper Validation of Generative AI Output",
|
|
79
49
|
"category": "AI/ML"
|
|
80
50
|
},
|
|
81
|
-
{
|
|
82
|
-
"id": "CWE-20",
|
|
83
|
-
"name": "Improper Input Validation",
|
|
84
|
-
"category": "Validation"
|
|
85
|
-
},
|
|
86
51
|
{
|
|
87
52
|
"id": "CWE-200",
|
|
88
53
|
"name": "Exposure of Sensitive Information to an Unauthorized Actor",
|
|
@@ -118,16 +83,6 @@
|
|
|
118
83
|
"name": "Cross-Site Request Forgery (CSRF)",
|
|
119
84
|
"category": "Session"
|
|
120
85
|
},
|
|
121
|
-
{
|
|
122
|
-
"id": "CWE-362",
|
|
123
|
-
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition)",
|
|
124
|
-
"category": "Concurrency"
|
|
125
|
-
},
|
|
126
|
-
{
|
|
127
|
-
"id": "CWE-416",
|
|
128
|
-
"name": "Use After Free",
|
|
129
|
-
"category": "Memory Safety"
|
|
130
|
-
},
|
|
131
86
|
{
|
|
132
87
|
"id": "CWE-434",
|
|
133
88
|
"name": "Unrestricted Upload of File with Dangerous Type",
|
|
@@ -138,11 +93,6 @@
|
|
|
138
93
|
"name": "Download of Code Without Integrity Check",
|
|
139
94
|
"category": "Supply Chain"
|
|
140
95
|
},
|
|
141
|
-
{
|
|
142
|
-
"id": "CWE-502",
|
|
143
|
-
"name": "Deserialization of Untrusted Data",
|
|
144
|
-
"category": "Serialization"
|
|
145
|
-
},
|
|
146
96
|
{
|
|
147
97
|
"id": "CWE-732",
|
|
148
98
|
"name": "Incorrect Permission Assignment for Critical Resource",
|
|
@@ -153,31 +103,16 @@
|
|
|
153
103
|
"name": "Improper Neutralization of Special Elements used in a Command (Command Injection)",
|
|
154
104
|
"category": "Injection"
|
|
155
105
|
},
|
|
156
|
-
{
|
|
157
|
-
"id": "CWE-78",
|
|
158
|
-
"name": "Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)",
|
|
159
|
-
"category": "Injection"
|
|
160
|
-
},
|
|
161
106
|
{
|
|
162
107
|
"id": "CWE-787",
|
|
163
108
|
"name": "Out-of-bounds Write",
|
|
164
109
|
"category": "Memory Safety"
|
|
165
110
|
},
|
|
166
|
-
{
|
|
167
|
-
"id": "CWE-79",
|
|
168
|
-
"name": "Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)",
|
|
169
|
-
"category": "Injection"
|
|
170
|
-
},
|
|
171
111
|
{
|
|
172
112
|
"id": "CWE-798",
|
|
173
113
|
"name": "Use of Hard-coded Credentials",
|
|
174
114
|
"category": "Credentials"
|
|
175
115
|
},
|
|
176
|
-
{
|
|
177
|
-
"id": "CWE-829",
|
|
178
|
-
"name": "Inclusion of Functionality from Untrusted Control Sphere",
|
|
179
|
-
"category": "Supply Chain"
|
|
180
|
-
},
|
|
181
116
|
{
|
|
182
117
|
"id": "CWE-862",
|
|
183
118
|
"name": "Missing Authorization",
|
|
@@ -188,11 +123,6 @@
|
|
|
188
123
|
"name": "Incorrect Authorization",
|
|
189
124
|
"category": "Authorization"
|
|
190
125
|
},
|
|
191
|
-
{
|
|
192
|
-
"id": "CWE-89",
|
|
193
|
-
"name": "Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)",
|
|
194
|
-
"category": "Injection"
|
|
195
|
-
},
|
|
196
126
|
{
|
|
197
127
|
"id": "CWE-918",
|
|
198
128
|
"name": "Server-Side Request Forgery (SSRF)",
|
|
@@ -286,16 +216,6 @@
|
|
|
286
216
|
"id": "D3-NTA",
|
|
287
217
|
"name": "Network Traffic Analysis",
|
|
288
218
|
"tactic": "Detect"
|
|
289
|
-
},
|
|
290
|
-
{
|
|
291
|
-
"id": "D3-NTPM",
|
|
292
|
-
"name": "Network Traffic Policy Mapping",
|
|
293
|
-
"tactic": "Model"
|
|
294
|
-
},
|
|
295
|
-
{
|
|
296
|
-
"id": "D3-PSEP",
|
|
297
|
-
"name": "Process Segment Execution Prevention",
|
|
298
|
-
"tactic": "Harden"
|
|
299
219
|
}
|
|
300
220
|
],
|
|
301
221
|
"framework_gaps": [
|
|
@@ -314,26 +234,6 @@
|
|
|
314
234
|
"framework": "ALL",
|
|
315
235
|
"control_name": "Prompt Injection as Access Control Failure"
|
|
316
236
|
},
|
|
317
|
-
{
|
|
318
|
-
"id": "CIS-Controls-v8-Control7",
|
|
319
|
-
"framework": "CIS Controls v8",
|
|
320
|
-
"control_name": "Continuous Vulnerability Management"
|
|
321
|
-
},
|
|
322
|
-
{
|
|
323
|
-
"id": "CMMC-2.0-Level-2",
|
|
324
|
-
"framework": "CMMC 2.0 (Cybersecurity Maturity Model Certification) Level 2",
|
|
325
|
-
"control_name": "Level 2 — Advanced (110 NIST 800-171 Rev 2 controls)"
|
|
326
|
-
},
|
|
327
|
-
{
|
|
328
|
-
"id": "CWE-Top-25-2024-meta",
|
|
329
|
-
"framework": "CWE Top 25 Most Dangerous Software Weaknesses (2024 list)",
|
|
330
|
-
"control_name": "Meta-control: have you addressed the CWE Top 25?"
|
|
331
|
-
},
|
|
332
|
-
{
|
|
333
|
-
"id": "CycloneDX-v1.6-SBOM",
|
|
334
|
-
"framework": "CycloneDX v1.6 (OWASP SBOM standard)",
|
|
335
|
-
"control_name": "Software Bill of Materials"
|
|
336
|
-
},
|
|
337
237
|
{
|
|
338
238
|
"id": "FedRAMP-Rev5-Moderate",
|
|
339
239
|
"framework": "FedRAMP Rev 5 Moderate",
|
|
@@ -349,11 +249,6 @@
|
|
|
349
249
|
"framework": "HITRUST CSF v11.4",
|
|
350
250
|
"control_name": "Outsourced services management"
|
|
351
251
|
},
|
|
352
|
-
{
|
|
353
|
-
"id": "IEC-62443-3-3",
|
|
354
|
-
"framework": "IEC 62443-3-3 (Industrial communication networks — security for IACS)",
|
|
355
|
-
"control_name": "System security requirements and security levels"
|
|
356
|
-
},
|
|
357
252
|
{
|
|
358
253
|
"id": "ISO-27001-2022-A.8.16",
|
|
359
254
|
"framework": "ISO/IEC 27001:2022",
|
|
@@ -369,36 +264,11 @@
|
|
|
369
264
|
"framework": "ISO/IEC 27001:2022",
|
|
370
265
|
"control_name": "Outsourced development"
|
|
371
266
|
},
|
|
372
|
-
{
|
|
373
|
-
"id": "ISO-27001-2022-A.8.8",
|
|
374
|
-
"framework": "ISO/IEC 27001:2022",
|
|
375
|
-
"control_name": "Management of technical vulnerabilities"
|
|
376
|
-
},
|
|
377
267
|
{
|
|
378
268
|
"id": "ISO-IEC-23894-2023-clause-7",
|
|
379
269
|
"framework": "ISO/IEC 23894:2023 (AI Risk Management Guidance)",
|
|
380
270
|
"control_name": "AI risk management process"
|
|
381
271
|
},
|
|
382
|
-
{
|
|
383
|
-
"id": "ISO-IEC-42001-2023-clause-6.1.2",
|
|
384
|
-
"framework": "ISO/IEC 42001:2023 (AI Management System)",
|
|
385
|
-
"control_name": "AI risk assessment"
|
|
386
|
-
},
|
|
387
|
-
{
|
|
388
|
-
"id": "NERC-CIP-007-6-R4",
|
|
389
|
-
"framework": "NERC CIP-007-6 (BES Cyber System Security Management)",
|
|
390
|
-
"control_name": "Security event monitoring"
|
|
391
|
-
},
|
|
392
|
-
{
|
|
393
|
-
"id": "NIS2-Art21-patch-management",
|
|
394
|
-
"framework": "EU NIS2 Directive",
|
|
395
|
-
"control_name": "Vulnerability handling and disclosure"
|
|
396
|
-
},
|
|
397
|
-
{
|
|
398
|
-
"id": "NIST-800-115",
|
|
399
|
-
"framework": "NIST SP 800-115 (Technical Guide to Information Security Testing and Assessment)",
|
|
400
|
-
"control_name": "Technical Guide to Information Security Testing and Assessment"
|
|
401
|
-
},
|
|
402
272
|
{
|
|
403
273
|
"id": "NIST-800-218-SSDF",
|
|
404
274
|
"framework": "NIST SP 800-218 (Secure Software Development Framework v1.1)",
|
|
@@ -419,21 +289,6 @@
|
|
|
419
289
|
"framework": "NIST SP 800-53 Rev 5",
|
|
420
290
|
"control_name": "Supply Chain Protection"
|
|
421
291
|
},
|
|
422
|
-
{
|
|
423
|
-
"id": "NIST-800-53-SC-28",
|
|
424
|
-
"framework": "NIST SP 800-53 Rev 5",
|
|
425
|
-
"control_name": "Protection of Information at Rest"
|
|
426
|
-
},
|
|
427
|
-
{
|
|
428
|
-
"id": "NIST-800-53-SC-7",
|
|
429
|
-
"framework": "NIST SP 800-53 Rev 5",
|
|
430
|
-
"control_name": "Boundary Protection"
|
|
431
|
-
},
|
|
432
|
-
{
|
|
433
|
-
"id": "NIST-800-53-SI-12",
|
|
434
|
-
"framework": "NIST SP 800-53 Rev 5",
|
|
435
|
-
"control_name": "Information Management and Retention"
|
|
436
|
-
},
|
|
437
292
|
{
|
|
438
293
|
"id": "NIST-800-53-SI-3",
|
|
439
294
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -444,16 +299,6 @@
|
|
|
444
299
|
"framework": "NIST SP 800-63B Rev 4 (Digital Identity Guidelines — Authentication & Lifecycle Mgmt)",
|
|
445
300
|
"control_name": "Authentication and Lifecycle Management (AAL/IAL/FAL)"
|
|
446
301
|
},
|
|
447
|
-
{
|
|
448
|
-
"id": "NIST-800-82r3",
|
|
449
|
-
"framework": "NIST SP 800-82 Rev 3 (Guide to OT Security)",
|
|
450
|
-
"control_name": "Guide to Operational Technology (OT) Security"
|
|
451
|
-
},
|
|
452
|
-
{
|
|
453
|
-
"id": "NIST-AI-RMF-MEASURE-2.5",
|
|
454
|
-
"framework": "NIST AI RMF 1.0",
|
|
455
|
-
"control_name": "AI system to human interaction evaluation"
|
|
456
|
-
},
|
|
457
302
|
{
|
|
458
303
|
"id": "OWASP-ASVS-v5.0-V14",
|
|
459
304
|
"framework": "OWASP ASVS v5.0",
|
|
@@ -474,26 +319,11 @@
|
|
|
474
319
|
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
475
320
|
"control_name": "Excessive Agency"
|
|
476
321
|
},
|
|
477
|
-
{
|
|
478
|
-
"id": "OWASP-LLM-Top-10-2025-LLM08",
|
|
479
|
-
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
480
|
-
"control_name": "Vector and Embedding Weaknesses"
|
|
481
|
-
},
|
|
482
|
-
{
|
|
483
|
-
"id": "OWASP-Pen-Testing-Guide-v5",
|
|
484
|
-
"framework": "OWASP Web Security Testing Guide v5 (WSTG)",
|
|
485
|
-
"control_name": "Web application penetration testing methodology"
|
|
486
|
-
},
|
|
487
322
|
{
|
|
488
323
|
"id": "PSD2-RTS-SCA",
|
|
489
324
|
"framework": "EU PSD2 Regulatory Technical Standards on Strong Customer Authentication (Commission Delegated Regulation (EU) 2018/389)",
|
|
490
325
|
"control_name": "Strong Customer Authentication and Common and Secure Communication"
|
|
491
326
|
},
|
|
492
|
-
{
|
|
493
|
-
"id": "PTES-Pre-engagement",
|
|
494
|
-
"framework": "Penetration Testing Execution Standard (PTES)",
|
|
495
|
-
"control_name": "Pre-engagement Interactions"
|
|
496
|
-
},
|
|
497
327
|
{
|
|
498
328
|
"id": "SLSA-v1.0-Build-L3",
|
|
499
329
|
"framework": "SLSA v1.0 (Supply-chain Levels for Software Artifacts) — Build Track",
|
|
@@ -514,42 +344,24 @@
|
|
|
514
344
|
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
515
345
|
"control_name": "Risk Mitigation — Vendor and Business Partner Risk"
|
|
516
346
|
},
|
|
517
|
-
{
|
|
518
|
-
"id": "SPDX-v3.0-SBOM",
|
|
519
|
-
"framework": "SPDX v3.0 (ISO/IEC 5962-aligned SBOM standard)",
|
|
520
|
-
"control_name": "Software Package Data Exchange — SBOM"
|
|
521
|
-
},
|
|
522
347
|
{
|
|
523
348
|
"id": "SWIFT-CSCF-v2026-1.1",
|
|
524
349
|
"framework": "SWIFT Customer Security Controls Framework v2026",
|
|
525
350
|
"control_name": "SWIFT Environment Protection"
|
|
526
|
-
},
|
|
527
|
-
{
|
|
528
|
-
"id": "VEX-CSAF-v2.1",
|
|
529
|
-
"framework": "VEX via OASIS CSAF 2.1 (Common Security Advisory Framework)",
|
|
530
|
-
"control_name": "Vulnerability Exploitability eXchange profile"
|
|
531
351
|
}
|
|
532
352
|
],
|
|
533
353
|
"attack_refs": [
|
|
534
|
-
"T0855",
|
|
535
|
-
"T0883",
|
|
536
354
|
"T1041",
|
|
537
355
|
"T1059",
|
|
538
356
|
"T1068",
|
|
539
357
|
"T1078",
|
|
540
358
|
"T1110",
|
|
541
|
-
"T1133",
|
|
542
359
|
"T1190",
|
|
543
360
|
"T1195.001",
|
|
544
|
-
"T1195.002",
|
|
545
|
-
"T1213",
|
|
546
361
|
"T1486",
|
|
547
|
-
"T1505",
|
|
548
362
|
"T1530",
|
|
549
363
|
"T1552",
|
|
550
|
-
"T1554",
|
|
551
364
|
"T1556",
|
|
552
|
-
"T1565",
|
|
553
365
|
"T1566",
|
|
554
366
|
"T1567",
|
|
555
367
|
"T1610",
|
|
@@ -564,7 +376,6 @@
|
|
|
564
376
|
"RFC-9114",
|
|
565
377
|
"RFC-9180",
|
|
566
378
|
"RFC-9421",
|
|
567
|
-
"RFC-9458",
|
|
568
379
|
"RFC-9700"
|
|
569
380
|
]
|
|
570
381
|
}
|
|
@@ -578,41 +389,21 @@
|
|
|
578
389
|
"epss_percentile": 0.86,
|
|
579
390
|
"referencing_skills": [
|
|
580
391
|
"mcp-agent-trust",
|
|
581
|
-
"compliance-theater",
|
|
582
|
-
"attack-surface-pentest",
|
|
583
|
-
"fuzz-testing-strategy",
|
|
584
|
-
"dlp-gap-analysis",
|
|
585
392
|
"supply-chain-integrity",
|
|
586
393
|
"identity-assurance",
|
|
587
394
|
"coordinated-vuln-disclosure",
|
|
588
|
-
"threat-modeling-methodology",
|
|
589
|
-
"webapp-security",
|
|
590
|
-
"ai-risk-management",
|
|
591
395
|
"sector-healthcare",
|
|
592
|
-
"sector-federal-government",
|
|
593
|
-
"api-security",
|
|
594
396
|
"cloud-security",
|
|
595
397
|
"container-runtime-security",
|
|
596
|
-
"mlops-security",
|
|
597
398
|
"age-gates-child-safety"
|
|
598
399
|
],
|
|
599
400
|
"chain": {
|
|
600
401
|
"cwes": [
|
|
601
|
-
{
|
|
602
|
-
"id": "CWE-1039",
|
|
603
|
-
"name": "Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbations",
|
|
604
|
-
"category": "AI/ML"
|
|
605
|
-
},
|
|
606
402
|
{
|
|
607
403
|
"id": "CWE-1188",
|
|
608
404
|
"name": "Initialization of a Resource with an Insecure Default",
|
|
609
405
|
"category": "Configuration"
|
|
610
406
|
},
|
|
611
|
-
{
|
|
612
|
-
"id": "CWE-125",
|
|
613
|
-
"name": "Out-of-bounds Read",
|
|
614
|
-
"category": "Memory Safety"
|
|
615
|
-
},
|
|
616
407
|
{
|
|
617
408
|
"id": "CWE-1357",
|
|
618
409
|
"name": "Reliance on Insufficiently Trustworthy Component",
|
|
@@ -628,11 +419,6 @@
|
|
|
628
419
|
"name": "Improper Validation of Generative AI Output",
|
|
629
420
|
"category": "AI/ML"
|
|
630
421
|
},
|
|
631
|
-
{
|
|
632
|
-
"id": "CWE-20",
|
|
633
|
-
"name": "Improper Input Validation",
|
|
634
|
-
"category": "Validation"
|
|
635
|
-
},
|
|
636
422
|
{
|
|
637
423
|
"id": "CWE-200",
|
|
638
424
|
"name": "Exposure of Sensitive Information to an Unauthorized Actor",
|
|
@@ -668,16 +454,6 @@
|
|
|
668
454
|
"name": "Cross-Site Request Forgery (CSRF)",
|
|
669
455
|
"category": "Session"
|
|
670
456
|
},
|
|
671
|
-
{
|
|
672
|
-
"id": "CWE-362",
|
|
673
|
-
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition)",
|
|
674
|
-
"category": "Concurrency"
|
|
675
|
-
},
|
|
676
|
-
{
|
|
677
|
-
"id": "CWE-416",
|
|
678
|
-
"name": "Use After Free",
|
|
679
|
-
"category": "Memory Safety"
|
|
680
|
-
},
|
|
681
457
|
{
|
|
682
458
|
"id": "CWE-434",
|
|
683
459
|
"name": "Unrestricted Upload of File with Dangerous Type",
|
|
@@ -703,21 +479,11 @@
|
|
|
703
479
|
"name": "Improper Neutralization of Special Elements used in a Command (Command Injection)",
|
|
704
480
|
"category": "Injection"
|
|
705
481
|
},
|
|
706
|
-
{
|
|
707
|
-
"id": "CWE-78",
|
|
708
|
-
"name": "Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)",
|
|
709
|
-
"category": "Injection"
|
|
710
|
-
},
|
|
711
482
|
{
|
|
712
483
|
"id": "CWE-787",
|
|
713
484
|
"name": "Out-of-bounds Write",
|
|
714
485
|
"category": "Memory Safety"
|
|
715
486
|
},
|
|
716
|
-
{
|
|
717
|
-
"id": "CWE-79",
|
|
718
|
-
"name": "Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)",
|
|
719
|
-
"category": "Injection"
|
|
720
|
-
},
|
|
721
487
|
{
|
|
722
488
|
"id": "CWE-798",
|
|
723
489
|
"name": "Use of Hard-coded Credentials",
|
|
@@ -738,11 +504,6 @@
|
|
|
738
504
|
"name": "Incorrect Authorization",
|
|
739
505
|
"category": "Authorization"
|
|
740
506
|
},
|
|
741
|
-
{
|
|
742
|
-
"id": "CWE-89",
|
|
743
|
-
"name": "Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)",
|
|
744
|
-
"category": "Injection"
|
|
745
|
-
},
|
|
746
507
|
{
|
|
747
508
|
"id": "CWE-918",
|
|
748
509
|
"name": "Server-Side Request Forgery (SSRF)",
|
|
@@ -775,16 +536,6 @@
|
|
|
775
536
|
"name": "Backdoor ML Model",
|
|
776
537
|
"tactic": "Persistence"
|
|
777
538
|
},
|
|
778
|
-
{
|
|
779
|
-
"id": "AML.T0020",
|
|
780
|
-
"name": "Poison Training Data",
|
|
781
|
-
"tactic": "ML Attack Staging"
|
|
782
|
-
},
|
|
783
|
-
{
|
|
784
|
-
"id": "AML.T0043",
|
|
785
|
-
"name": "Craft Adversarial Data",
|
|
786
|
-
"tactic": "ML Attack Staging"
|
|
787
|
-
},
|
|
788
539
|
{
|
|
789
540
|
"id": "AML.T0051",
|
|
790
541
|
"name": "LLM Prompt Injection",
|
|
@@ -817,48 +568,18 @@
|
|
|
817
568
|
"name": "Executable Hashbased Allowlist",
|
|
818
569
|
"tactic": "Harden"
|
|
819
570
|
},
|
|
820
|
-
{
|
|
821
|
-
"id": "D3-IOPR",
|
|
822
|
-
"name": "Input/Output Profiling Resource",
|
|
823
|
-
"tactic": "Detect"
|
|
824
|
-
},
|
|
825
571
|
{
|
|
826
572
|
"id": "D3-MFA",
|
|
827
573
|
"name": "Multi-factor Authentication",
|
|
828
574
|
"tactic": "Harden"
|
|
829
|
-
}
|
|
830
|
-
|
|
831
|
-
|
|
832
|
-
"name": "Network Traffic Analysis",
|
|
833
|
-
"tactic": "Detect"
|
|
834
|
-
},
|
|
835
|
-
{
|
|
836
|
-
"id": "D3-NTPM",
|
|
837
|
-
"name": "Network Traffic Policy Mapping",
|
|
838
|
-
"tactic": "Model"
|
|
839
|
-
},
|
|
840
|
-
{
|
|
841
|
-
"id": "D3-PSEP",
|
|
842
|
-
"name": "Process Segment Execution Prevention",
|
|
843
|
-
"tactic": "Harden"
|
|
844
|
-
}
|
|
845
|
-
],
|
|
846
|
-
"framework_gaps": [
|
|
847
|
-
{
|
|
848
|
-
"id": "ALL-AI-PIPELINE-INTEGRITY",
|
|
849
|
-
"framework": "ALL",
|
|
850
|
-
"control_name": "AI Pipeline Integrity"
|
|
851
|
-
},
|
|
575
|
+
}
|
|
576
|
+
],
|
|
577
|
+
"framework_gaps": [
|
|
852
578
|
{
|
|
853
579
|
"id": "ALL-MCP-TOOL-TRUST",
|
|
854
580
|
"framework": "ALL",
|
|
855
581
|
"control_name": "MCP/Agent Tool Trust Boundaries"
|
|
856
582
|
},
|
|
857
|
-
{
|
|
858
|
-
"id": "ALL-PROMPT-INJECTION-ACCESS-CONTROL",
|
|
859
|
-
"framework": "ALL",
|
|
860
|
-
"control_name": "Prompt Injection as Access Control Failure"
|
|
861
|
-
},
|
|
862
583
|
{
|
|
863
584
|
"id": "CMMC-2.0-Level-2",
|
|
864
585
|
"framework": "CMMC 2.0 (Cybersecurity Maturity Model Certification) Level 2",
|
|
@@ -884,11 +605,6 @@
|
|
|
884
605
|
"framework": "HITRUST CSF v11.4",
|
|
885
606
|
"control_name": "Outsourced services management"
|
|
886
607
|
},
|
|
887
|
-
{
|
|
888
|
-
"id": "ISO-27001-2022-A.8.16",
|
|
889
|
-
"framework": "ISO/IEC 27001:2022",
|
|
890
|
-
"control_name": "Monitoring activities"
|
|
891
|
-
},
|
|
892
608
|
{
|
|
893
609
|
"id": "ISO-27001-2022-A.8.28",
|
|
894
610
|
"framework": "ISO/IEC 27001:2022",
|
|
@@ -904,26 +620,6 @@
|
|
|
904
620
|
"framework": "ISO/IEC 27001:2022",
|
|
905
621
|
"control_name": "Management of technical vulnerabilities"
|
|
906
622
|
},
|
|
907
|
-
{
|
|
908
|
-
"id": "ISO-IEC-23894-2023-clause-7",
|
|
909
|
-
"framework": "ISO/IEC 23894:2023 (AI Risk Management Guidance)",
|
|
910
|
-
"control_name": "AI risk management process"
|
|
911
|
-
},
|
|
912
|
-
{
|
|
913
|
-
"id": "ISO-IEC-42001-2023-clause-6.1.2",
|
|
914
|
-
"framework": "ISO/IEC 42001:2023 (AI Management System)",
|
|
915
|
-
"control_name": "AI risk assessment"
|
|
916
|
-
},
|
|
917
|
-
{
|
|
918
|
-
"id": "NIS2-Art21-patch-management",
|
|
919
|
-
"framework": "EU NIS2 Directive",
|
|
920
|
-
"control_name": "Vulnerability handling and disclosure"
|
|
921
|
-
},
|
|
922
|
-
{
|
|
923
|
-
"id": "NIST-800-115",
|
|
924
|
-
"framework": "NIST SP 800-115 (Technical Guide to Information Security Testing and Assessment)",
|
|
925
|
-
"control_name": "Technical Guide to Information Security Testing and Assessment"
|
|
926
|
-
},
|
|
927
623
|
{
|
|
928
624
|
"id": "NIST-800-218-SSDF",
|
|
929
625
|
"framework": "NIST SP 800-218 (Secure Software Development Framework v1.1)",
|
|
@@ -944,61 +640,21 @@
|
|
|
944
640
|
"framework": "NIST SP 800-53 Rev 5",
|
|
945
641
|
"control_name": "Supply Chain Protection"
|
|
946
642
|
},
|
|
947
|
-
{
|
|
948
|
-
"id": "NIST-800-53-SC-28",
|
|
949
|
-
"framework": "NIST SP 800-53 Rev 5",
|
|
950
|
-
"control_name": "Protection of Information at Rest"
|
|
951
|
-
},
|
|
952
|
-
{
|
|
953
|
-
"id": "NIST-800-53-SC-7",
|
|
954
|
-
"framework": "NIST SP 800-53 Rev 5",
|
|
955
|
-
"control_name": "Boundary Protection"
|
|
956
|
-
},
|
|
957
643
|
{
|
|
958
644
|
"id": "NIST-800-63B-rev4",
|
|
959
645
|
"framework": "NIST SP 800-63B Rev 4 (Digital Identity Guidelines — Authentication & Lifecycle Mgmt)",
|
|
960
646
|
"control_name": "Authentication and Lifecycle Management (AAL/IAL/FAL)"
|
|
961
647
|
},
|
|
962
|
-
{
|
|
963
|
-
"id": "NIST-AI-RMF-MEASURE-2.5",
|
|
964
|
-
"framework": "NIST AI RMF 1.0",
|
|
965
|
-
"control_name": "AI system to human interaction evaluation"
|
|
966
|
-
},
|
|
967
|
-
{
|
|
968
|
-
"id": "OWASP-ASVS-v5.0-V14",
|
|
969
|
-
"framework": "OWASP ASVS v5.0",
|
|
970
|
-
"control_name": "Configuration verification"
|
|
971
|
-
},
|
|
972
|
-
{
|
|
973
|
-
"id": "OWASP-LLM-Top-10-2025-LLM01",
|
|
974
|
-
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
975
|
-
"control_name": "Prompt Injection"
|
|
976
|
-
},
|
|
977
648
|
{
|
|
978
649
|
"id": "OWASP-LLM-Top-10-2025-LLM06",
|
|
979
650
|
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
980
651
|
"control_name": "Excessive Agency"
|
|
981
652
|
},
|
|
982
|
-
{
|
|
983
|
-
"id": "OWASP-LLM-Top-10-2025-LLM08",
|
|
984
|
-
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
985
|
-
"control_name": "Vector and Embedding Weaknesses"
|
|
986
|
-
},
|
|
987
|
-
{
|
|
988
|
-
"id": "OWASP-Pen-Testing-Guide-v5",
|
|
989
|
-
"framework": "OWASP Web Security Testing Guide v5 (WSTG)",
|
|
990
|
-
"control_name": "Web application penetration testing methodology"
|
|
991
|
-
},
|
|
992
653
|
{
|
|
993
654
|
"id": "PSD2-RTS-SCA",
|
|
994
655
|
"framework": "EU PSD2 Regulatory Technical Standards on Strong Customer Authentication (Commission Delegated Regulation (EU) 2018/389)",
|
|
995
656
|
"control_name": "Strong Customer Authentication and Common and Secure Communication"
|
|
996
657
|
},
|
|
997
|
-
{
|
|
998
|
-
"id": "PTES-Pre-engagement",
|
|
999
|
-
"framework": "Penetration Testing Execution Standard (PTES)",
|
|
1000
|
-
"control_name": "Pre-engagement Interactions"
|
|
1001
|
-
},
|
|
1002
658
|
{
|
|
1003
659
|
"id": "SLSA-v1.0-Build-L3",
|
|
1004
660
|
"framework": "SLSA v1.0 (Supply-chain Levels for Software Artifacts) — Build Track",
|
|
@@ -1009,11 +665,6 @@
|
|
|
1009
665
|
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
1010
666
|
"control_name": "Logical and Physical Access Controls"
|
|
1011
667
|
},
|
|
1012
|
-
{
|
|
1013
|
-
"id": "SOC2-CC7-anomaly-detection",
|
|
1014
|
-
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
1015
|
-
"control_name": "System Operations — Threat and Vulnerability Management"
|
|
1016
|
-
},
|
|
1017
668
|
{
|
|
1018
669
|
"id": "SOC2-CC9-vendor-management",
|
|
1019
670
|
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
@@ -1036,22 +687,17 @@
|
|
|
1036
687
|
}
|
|
1037
688
|
],
|
|
1038
689
|
"attack_refs": [
|
|
1039
|
-
"T1041",
|
|
1040
690
|
"T1059",
|
|
1041
691
|
"T1068",
|
|
1042
692
|
"T1078",
|
|
1043
693
|
"T1110",
|
|
1044
|
-
"T1133",
|
|
1045
694
|
"T1190",
|
|
1046
695
|
"T1195.001",
|
|
1047
696
|
"T1195.002",
|
|
1048
|
-
"T1213",
|
|
1049
|
-
"T1505",
|
|
1050
697
|
"T1530",
|
|
1051
698
|
"T1552",
|
|
1052
699
|
"T1554",
|
|
1053
700
|
"T1556",
|
|
1054
|
-
"T1565",
|
|
1055
701
|
"T1567",
|
|
1056
702
|
"T1610",
|
|
1057
703
|
"T1611"
|
|
@@ -1065,7 +711,6 @@
|
|
|
1065
711
|
"RFC-9114",
|
|
1066
712
|
"RFC-9180",
|
|
1067
713
|
"RFC-9421",
|
|
1068
|
-
"RFC-9458",
|
|
1069
714
|
"RFC-9700"
|
|
1070
715
|
]
|
|
1071
716
|
}
|
|
@@ -1338,52 +983,42 @@
|
|
|
1338
983
|
"cisa_kev": false,
|
|
1339
984
|
"epss_score": 0.00039,
|
|
1340
985
|
"epss_percentile": 0.11727,
|
|
1341
|
-
"referencing_skills": [],
|
|
1342
|
-
"chain": {
|
|
1343
|
-
"cwes": [],
|
|
1344
|
-
"atlas": [],
|
|
1345
|
-
"d3fend": [],
|
|
1346
|
-
"framework_gaps": [],
|
|
1347
|
-
"attack_refs": [],
|
|
1348
|
-
"rfc_refs": []
|
|
1349
|
-
}
|
|
1350
|
-
},
|
|
1351
|
-
"CVE-2026-42208": {
|
|
1352
|
-
"name": "BerriAI LiteLLM Proxy Auth SQL Injection",
|
|
1353
|
-
"rwep": 65,
|
|
1354
|
-
"cvss": 9.8,
|
|
1355
|
-
"cisa_kev": true,
|
|
1356
|
-
"epss_score": 0.37368,
|
|
1357
|
-
"epss_percentile": 0.9722,
|
|
1358
|
-
"referencing_skills": [],
|
|
1359
|
-
"chain": {
|
|
1360
|
-
"cwes": [],
|
|
1361
|
-
"atlas": [],
|
|
1362
|
-
"d3fend": [],
|
|
1363
|
-
"framework_gaps": [],
|
|
1364
|
-
"attack_refs": [],
|
|
1365
|
-
"rfc_refs": []
|
|
1366
|
-
}
|
|
1367
|
-
},
|
|
1368
|
-
"CVE-2026-43284": {
|
|
1369
|
-
"name": "Dirty Frag (ESP/IPsec component)",
|
|
1370
|
-
"rwep": 53,
|
|
1371
|
-
"cvss": 8.8,
|
|
1372
|
-
"cisa_kev": false,
|
|
1373
|
-
"epss_score": 0.00007,
|
|
1374
|
-
"epss_percentile": 0.0051,
|
|
1375
986
|
"referencing_skills": [
|
|
1376
987
|
"kernel-lpe-triage",
|
|
1377
|
-
"
|
|
1378
|
-
"
|
|
988
|
+
"ai-attack-surface",
|
|
989
|
+
"attack-surface-pentest",
|
|
990
|
+
"ot-ics-security",
|
|
991
|
+
"webapp-security",
|
|
992
|
+
"ai-risk-management",
|
|
993
|
+
"sector-energy"
|
|
1379
994
|
],
|
|
1380
995
|
"chain": {
|
|
1381
996
|
"cwes": [
|
|
997
|
+
{
|
|
998
|
+
"id": "CWE-1037",
|
|
999
|
+
"name": "Processor Optimization Removal or Modification of Security-critical Code",
|
|
1000
|
+
"category": "Hardware / Side Channel"
|
|
1001
|
+
},
|
|
1002
|
+
{
|
|
1003
|
+
"id": "CWE-1039",
|
|
1004
|
+
"name": "Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbations",
|
|
1005
|
+
"category": "AI/ML"
|
|
1006
|
+
},
|
|
1007
|
+
{
|
|
1008
|
+
"id": "CWE-1188",
|
|
1009
|
+
"name": "Initialization of a Resource with an Insecure Default",
|
|
1010
|
+
"category": "Configuration"
|
|
1011
|
+
},
|
|
1382
1012
|
{
|
|
1383
1013
|
"id": "CWE-125",
|
|
1384
1014
|
"name": "Out-of-bounds Read",
|
|
1385
1015
|
"category": "Memory Safety"
|
|
1386
1016
|
},
|
|
1017
|
+
{
|
|
1018
|
+
"id": "CWE-1395",
|
|
1019
|
+
"name": "Dependency on Vulnerable Third-Party Component",
|
|
1020
|
+
"category": "Supply Chain"
|
|
1021
|
+
},
|
|
1387
1022
|
{
|
|
1388
1023
|
"id": "CWE-1426",
|
|
1389
1024
|
"name": "Improper Validation of Generative AI Output",
|
|
@@ -1395,9 +1030,29 @@
|
|
|
1395
1030
|
"category": "Information Exposure"
|
|
1396
1031
|
},
|
|
1397
1032
|
{
|
|
1398
|
-
"id": "CWE-
|
|
1399
|
-
"name": "
|
|
1400
|
-
"category": "
|
|
1033
|
+
"id": "CWE-22",
|
|
1034
|
+
"name": "Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)",
|
|
1035
|
+
"category": "Path/Resource"
|
|
1036
|
+
},
|
|
1037
|
+
{
|
|
1038
|
+
"id": "CWE-269",
|
|
1039
|
+
"name": "Improper Privilege Management",
|
|
1040
|
+
"category": "Authorization"
|
|
1041
|
+
},
|
|
1042
|
+
{
|
|
1043
|
+
"id": "CWE-287",
|
|
1044
|
+
"name": "Improper Authentication",
|
|
1045
|
+
"category": "Authentication"
|
|
1046
|
+
},
|
|
1047
|
+
{
|
|
1048
|
+
"id": "CWE-306",
|
|
1049
|
+
"name": "Missing Authentication for Critical Function",
|
|
1050
|
+
"category": "Authentication"
|
|
1051
|
+
},
|
|
1052
|
+
{
|
|
1053
|
+
"id": "CWE-352",
|
|
1054
|
+
"name": "Cross-Site Request Forgery (CSRF)",
|
|
1055
|
+
"category": "Session"
|
|
1401
1056
|
},
|
|
1402
1057
|
{
|
|
1403
1058
|
"id": "CWE-362",
|
|
@@ -1409,74 +1064,149 @@
|
|
|
1409
1064
|
"name": "Use After Free",
|
|
1410
1065
|
"category": "Memory Safety"
|
|
1411
1066
|
},
|
|
1067
|
+
{
|
|
1068
|
+
"id": "CWE-434",
|
|
1069
|
+
"name": "Unrestricted Upload of File with Dangerous Type",
|
|
1070
|
+
"category": "File Handling"
|
|
1071
|
+
},
|
|
1072
|
+
{
|
|
1073
|
+
"id": "CWE-502",
|
|
1074
|
+
"name": "Deserialization of Untrusted Data",
|
|
1075
|
+
"category": "Serialization"
|
|
1076
|
+
},
|
|
1412
1077
|
{
|
|
1413
1078
|
"id": "CWE-672",
|
|
1414
1079
|
"name": "Operation on a Resource after Expiration or Release",
|
|
1415
1080
|
"category": "Memory Safety"
|
|
1416
1081
|
},
|
|
1417
1082
|
{
|
|
1418
|
-
"id": "CWE-
|
|
1419
|
-
"name": "
|
|
1420
|
-
"category": "
|
|
1421
|
-
}
|
|
1422
|
-
],
|
|
1423
|
-
"atlas": [
|
|
1424
|
-
{
|
|
1425
|
-
"id": "AML.T0017",
|
|
1426
|
-
"name": "Discover ML Model Ontology",
|
|
1427
|
-
"tactic": "Discovery"
|
|
1083
|
+
"id": "CWE-732",
|
|
1084
|
+
"name": "Incorrect Permission Assignment for Critical Resource",
|
|
1085
|
+
"category": "Authorization"
|
|
1428
1086
|
},
|
|
1429
1087
|
{
|
|
1430
|
-
"id": "
|
|
1431
|
-
"name": "
|
|
1432
|
-
"
|
|
1088
|
+
"id": "CWE-77",
|
|
1089
|
+
"name": "Improper Neutralization of Special Elements used in a Command (Command Injection)",
|
|
1090
|
+
"category": "Injection"
|
|
1433
1091
|
},
|
|
1434
1092
|
{
|
|
1435
|
-
"id": "
|
|
1436
|
-
"name": "
|
|
1437
|
-
"
|
|
1438
|
-
}
|
|
1439
|
-
],
|
|
1440
|
-
"d3fend": [
|
|
1093
|
+
"id": "CWE-78",
|
|
1094
|
+
"name": "Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)",
|
|
1095
|
+
"category": "Injection"
|
|
1096
|
+
},
|
|
1441
1097
|
{
|
|
1442
|
-
"id": "
|
|
1443
|
-
"name": "
|
|
1444
|
-
"
|
|
1098
|
+
"id": "CWE-787",
|
|
1099
|
+
"name": "Out-of-bounds Write",
|
|
1100
|
+
"category": "Memory Safety"
|
|
1445
1101
|
},
|
|
1446
1102
|
{
|
|
1447
|
-
"id": "
|
|
1448
|
-
"name": "
|
|
1449
|
-
"
|
|
1103
|
+
"id": "CWE-79",
|
|
1104
|
+
"name": "Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)",
|
|
1105
|
+
"category": "Injection"
|
|
1450
1106
|
},
|
|
1451
1107
|
{
|
|
1452
|
-
"id": "
|
|
1453
|
-
"name": "
|
|
1454
|
-
"
|
|
1108
|
+
"id": "CWE-798",
|
|
1109
|
+
"name": "Use of Hard-coded Credentials",
|
|
1110
|
+
"category": "Credentials"
|
|
1455
1111
|
},
|
|
1456
1112
|
{
|
|
1457
|
-
"id": "
|
|
1458
|
-
"name": "
|
|
1459
|
-
"
|
|
1113
|
+
"id": "CWE-862",
|
|
1114
|
+
"name": "Missing Authorization",
|
|
1115
|
+
"category": "Authorization"
|
|
1460
1116
|
},
|
|
1461
1117
|
{
|
|
1462
|
-
"id": "
|
|
1463
|
-
"name": "
|
|
1118
|
+
"id": "CWE-863",
|
|
1119
|
+
"name": "Incorrect Authorization",
|
|
1120
|
+
"category": "Authorization"
|
|
1121
|
+
},
|
|
1122
|
+
{
|
|
1123
|
+
"id": "CWE-89",
|
|
1124
|
+
"name": "Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)",
|
|
1125
|
+
"category": "Injection"
|
|
1126
|
+
},
|
|
1127
|
+
{
|
|
1128
|
+
"id": "CWE-918",
|
|
1129
|
+
"name": "Server-Side Request Forgery (SSRF)",
|
|
1130
|
+
"category": "Network"
|
|
1131
|
+
},
|
|
1132
|
+
{
|
|
1133
|
+
"id": "CWE-94",
|
|
1134
|
+
"name": "Improper Control of Generation of Code (Code Injection)",
|
|
1135
|
+
"category": "Injection"
|
|
1136
|
+
}
|
|
1137
|
+
],
|
|
1138
|
+
"atlas": [
|
|
1139
|
+
{
|
|
1140
|
+
"id": "AML.T0010",
|
|
1141
|
+
"name": "ML Supply Chain Compromise",
|
|
1142
|
+
"tactic": "Initial Access"
|
|
1143
|
+
},
|
|
1144
|
+
{
|
|
1145
|
+
"id": "AML.T0016",
|
|
1146
|
+
"name": "Obtain Capabilities: Develop Capabilities",
|
|
1147
|
+
"tactic": "Resource Development"
|
|
1148
|
+
},
|
|
1149
|
+
{
|
|
1150
|
+
"id": "AML.T0017",
|
|
1151
|
+
"name": "Discover ML Model Ontology",
|
|
1152
|
+
"tactic": "Discovery"
|
|
1153
|
+
},
|
|
1154
|
+
{
|
|
1155
|
+
"id": "AML.T0018",
|
|
1156
|
+
"name": "Backdoor ML Model",
|
|
1157
|
+
"tactic": "Persistence"
|
|
1158
|
+
},
|
|
1159
|
+
{
|
|
1160
|
+
"id": "AML.T0020",
|
|
1161
|
+
"name": "Poison Training Data",
|
|
1162
|
+
"tactic": "ML Attack Staging"
|
|
1163
|
+
},
|
|
1164
|
+
{
|
|
1165
|
+
"id": "AML.T0043",
|
|
1166
|
+
"name": "Craft Adversarial Data",
|
|
1167
|
+
"tactic": "ML Attack Staging"
|
|
1168
|
+
},
|
|
1169
|
+
{
|
|
1170
|
+
"id": "AML.T0051",
|
|
1171
|
+
"name": "LLM Prompt Injection",
|
|
1172
|
+
"tactic": "Execution"
|
|
1173
|
+
},
|
|
1174
|
+
{
|
|
1175
|
+
"id": "AML.T0054",
|
|
1176
|
+
"name": "LLM Jailbreak",
|
|
1177
|
+
"tactic": "Defense Evasion"
|
|
1178
|
+
},
|
|
1179
|
+
{
|
|
1180
|
+
"id": "AML.T0096",
|
|
1181
|
+
"name": "AI API as Covert C2 Channel",
|
|
1182
|
+
"tactic": "Command and Control"
|
|
1183
|
+
}
|
|
1184
|
+
],
|
|
1185
|
+
"d3fend": [
|
|
1186
|
+
{
|
|
1187
|
+
"id": "D3-ASLR",
|
|
1188
|
+
"name": "Address Space Layout Randomization",
|
|
1189
|
+
"tactic": "Harden"
|
|
1190
|
+
},
|
|
1191
|
+
{
|
|
1192
|
+
"id": "D3-CSPP",
|
|
1193
|
+
"name": "Client-server Payload Profiling",
|
|
1464
1194
|
"tactic": "Detect"
|
|
1465
1195
|
},
|
|
1466
1196
|
{
|
|
1467
|
-
"id": "D3-
|
|
1468
|
-
"name": "
|
|
1197
|
+
"id": "D3-EAL",
|
|
1198
|
+
"name": "Executable Allowlisting",
|
|
1469
1199
|
"tactic": "Harden"
|
|
1470
1200
|
},
|
|
1471
1201
|
{
|
|
1472
|
-
"id": "D3-
|
|
1473
|
-
"name": "
|
|
1202
|
+
"id": "D3-IOPR",
|
|
1203
|
+
"name": "Input/Output Profiling Resource",
|
|
1474
1204
|
"tactic": "Detect"
|
|
1475
1205
|
},
|
|
1476
1206
|
{
|
|
1477
|
-
"id": "D3-
|
|
1478
|
-
"name": "Network Traffic
|
|
1479
|
-
"tactic": "
|
|
1207
|
+
"id": "D3-NTA",
|
|
1208
|
+
"name": "Network Traffic Analysis",
|
|
1209
|
+
"tactic": "Detect"
|
|
1480
1210
|
},
|
|
1481
1211
|
{
|
|
1482
1212
|
"id": "D3-PHRA",
|
|
@@ -1490,45 +1220,70 @@
|
|
|
1490
1220
|
}
|
|
1491
1221
|
],
|
|
1492
1222
|
"framework_gaps": [
|
|
1223
|
+
{
|
|
1224
|
+
"id": "ALL-AI-PIPELINE-INTEGRITY",
|
|
1225
|
+
"framework": "ALL",
|
|
1226
|
+
"control_name": "AI Pipeline Integrity"
|
|
1227
|
+
},
|
|
1228
|
+
{
|
|
1229
|
+
"id": "ALL-PROMPT-INJECTION-ACCESS-CONTROL",
|
|
1230
|
+
"framework": "ALL",
|
|
1231
|
+
"control_name": "Prompt Injection as Access Control Failure"
|
|
1232
|
+
},
|
|
1493
1233
|
{
|
|
1494
1234
|
"id": "CIS-Controls-v8-Control7",
|
|
1495
1235
|
"framework": "CIS Controls v8",
|
|
1496
1236
|
"control_name": "Continuous Vulnerability Management"
|
|
1497
1237
|
},
|
|
1498
1238
|
{
|
|
1499
|
-
"id": "
|
|
1500
|
-
"framework": "
|
|
1501
|
-
"control_name": "
|
|
1239
|
+
"id": "IEC-62443-3-3",
|
|
1240
|
+
"framework": "IEC 62443-3-3 (Industrial communication networks — security for IACS)",
|
|
1241
|
+
"control_name": "System security requirements and security levels"
|
|
1502
1242
|
},
|
|
1503
1243
|
{
|
|
1504
|
-
"id": "ISO-27001-2022-A.8.
|
|
1244
|
+
"id": "ISO-27001-2022-A.8.28",
|
|
1505
1245
|
"framework": "ISO/IEC 27001:2022",
|
|
1506
|
-
"control_name": "
|
|
1246
|
+
"control_name": "Secure coding"
|
|
1507
1247
|
},
|
|
1508
1248
|
{
|
|
1509
1249
|
"id": "ISO-27001-2022-A.8.8",
|
|
1510
1250
|
"framework": "ISO/IEC 27001:2022",
|
|
1511
1251
|
"control_name": "Management of technical vulnerabilities"
|
|
1512
1252
|
},
|
|
1253
|
+
{
|
|
1254
|
+
"id": "ISO-IEC-23894-2023-clause-7",
|
|
1255
|
+
"framework": "ISO/IEC 23894:2023 (AI Risk Management Guidance)",
|
|
1256
|
+
"control_name": "AI risk management process"
|
|
1257
|
+
},
|
|
1513
1258
|
{
|
|
1514
1259
|
"id": "ISO-IEC-42001-2023-clause-6.1.2",
|
|
1515
1260
|
"framework": "ISO/IEC 42001:2023 (AI Management System)",
|
|
1516
1261
|
"control_name": "AI risk assessment"
|
|
1517
1262
|
},
|
|
1263
|
+
{
|
|
1264
|
+
"id": "NERC-CIP-007-6-R4",
|
|
1265
|
+
"framework": "NERC CIP-007-6 (BES Cyber System Security Management)",
|
|
1266
|
+
"control_name": "Security event monitoring"
|
|
1267
|
+
},
|
|
1518
1268
|
{
|
|
1519
1269
|
"id": "NIS2-Art21-patch-management",
|
|
1520
1270
|
"framework": "EU NIS2 Directive",
|
|
1521
1271
|
"control_name": "Vulnerability handling and disclosure"
|
|
1522
1272
|
},
|
|
1523
1273
|
{
|
|
1524
|
-
"id": "NIST-800-
|
|
1525
|
-
"framework": "NIST SP 800-
|
|
1526
|
-
"control_name": "
|
|
1274
|
+
"id": "NIST-800-115",
|
|
1275
|
+
"framework": "NIST SP 800-115 (Technical Guide to Information Security Testing and Assessment)",
|
|
1276
|
+
"control_name": "Technical Guide to Information Security Testing and Assessment"
|
|
1527
1277
|
},
|
|
1528
1278
|
{
|
|
1529
|
-
"id": "NIST-800-
|
|
1279
|
+
"id": "NIST-800-218-SSDF",
|
|
1280
|
+
"framework": "NIST SP 800-218 (Secure Software Development Framework v1.1)",
|
|
1281
|
+
"control_name": "Secure Software Development Framework"
|
|
1282
|
+
},
|
|
1283
|
+
{
|
|
1284
|
+
"id": "NIST-800-53-AC-2",
|
|
1530
1285
|
"framework": "NIST SP 800-53 Rev 5",
|
|
1531
|
-
"control_name": "
|
|
1286
|
+
"control_name": "Account Management"
|
|
1532
1287
|
},
|
|
1533
1288
|
{
|
|
1534
1289
|
"id": "NIST-800-53-SC-8",
|
|
@@ -1540,59 +1295,103 @@
|
|
|
1540
1295
|
"framework": "NIST SP 800-53 Rev 5",
|
|
1541
1296
|
"control_name": "Flaw Remediation"
|
|
1542
1297
|
},
|
|
1298
|
+
{
|
|
1299
|
+
"id": "NIST-800-53-SI-3",
|
|
1300
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
1301
|
+
"control_name": "Malicious Code Protection"
|
|
1302
|
+
},
|
|
1303
|
+
{
|
|
1304
|
+
"id": "NIST-800-82r3",
|
|
1305
|
+
"framework": "NIST SP 800-82 Rev 3 (Guide to OT Security)",
|
|
1306
|
+
"control_name": "Guide to Operational Technology (OT) Security"
|
|
1307
|
+
},
|
|
1308
|
+
{
|
|
1309
|
+
"id": "NIST-AI-RMF-MEASURE-2.5",
|
|
1310
|
+
"framework": "NIST AI RMF 1.0",
|
|
1311
|
+
"control_name": "AI system to human interaction evaluation"
|
|
1312
|
+
},
|
|
1313
|
+
{
|
|
1314
|
+
"id": "OWASP-ASVS-v5.0-V14",
|
|
1315
|
+
"framework": "OWASP ASVS v5.0",
|
|
1316
|
+
"control_name": "Configuration verification"
|
|
1317
|
+
},
|
|
1318
|
+
{
|
|
1319
|
+
"id": "OWASP-LLM-Top-10-2025-LLM01",
|
|
1320
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
1321
|
+
"control_name": "Prompt Injection"
|
|
1322
|
+
},
|
|
1323
|
+
{
|
|
1324
|
+
"id": "OWASP-LLM-Top-10-2025-LLM02",
|
|
1325
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
1326
|
+
"control_name": "Sensitive Information Disclosure"
|
|
1327
|
+
},
|
|
1328
|
+
{
|
|
1329
|
+
"id": "OWASP-Pen-Testing-Guide-v5",
|
|
1330
|
+
"framework": "OWASP Web Security Testing Guide v5 (WSTG)",
|
|
1331
|
+
"control_name": "Web application penetration testing methodology"
|
|
1332
|
+
},
|
|
1543
1333
|
{
|
|
1544
1334
|
"id": "PCI-DSS-4.0-6.3.3",
|
|
1545
1335
|
"framework": "PCI DSS 4.0",
|
|
1546
1336
|
"control_name": "All system components are protected from known vulnerabilities by installing applicable security patches/updates"
|
|
1547
1337
|
},
|
|
1548
1338
|
{
|
|
1549
|
-
"id": "
|
|
1339
|
+
"id": "PTES-Pre-engagement",
|
|
1340
|
+
"framework": "Penetration Testing Execution Standard (PTES)",
|
|
1341
|
+
"control_name": "Pre-engagement Interactions"
|
|
1342
|
+
},
|
|
1343
|
+
{
|
|
1344
|
+
"id": "SOC2-CC6-logical-access",
|
|
1550
1345
|
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
1551
|
-
"control_name": "
|
|
1346
|
+
"control_name": "Logical and Physical Access Controls"
|
|
1552
1347
|
}
|
|
1553
1348
|
],
|
|
1554
1349
|
"attack_refs": [
|
|
1555
|
-
"
|
|
1350
|
+
"T0855",
|
|
1351
|
+
"T0883",
|
|
1352
|
+
"T1059",
|
|
1556
1353
|
"T1068",
|
|
1557
|
-
"
|
|
1558
|
-
"
|
|
1354
|
+
"T1078",
|
|
1355
|
+
"T1133",
|
|
1356
|
+
"T1190",
|
|
1357
|
+
"T1505",
|
|
1559
1358
|
"T1548.001",
|
|
1560
|
-
"
|
|
1359
|
+
"T1566"
|
|
1561
1360
|
],
|
|
1562
1361
|
"rfc_refs": [
|
|
1563
|
-
"DRAFT-IETF-TLS-ECDHE-MLKEM",
|
|
1564
|
-
"DRAFT-IETF-TLS-HYBRID-DESIGN",
|
|
1565
1362
|
"RFC-4301",
|
|
1566
1363
|
"RFC-4303",
|
|
1567
1364
|
"RFC-7296",
|
|
1568
|
-
"RFC-
|
|
1365
|
+
"RFC-7519",
|
|
1569
1366
|
"RFC-8446",
|
|
1570
|
-
"RFC-
|
|
1571
|
-
"RFC-
|
|
1572
|
-
"RFC-9420",
|
|
1573
|
-
"RFC-9458",
|
|
1574
|
-
"RFC-9794"
|
|
1367
|
+
"RFC-8725",
|
|
1368
|
+
"RFC-9114"
|
|
1575
1369
|
]
|
|
1576
1370
|
}
|
|
1577
1371
|
},
|
|
1578
|
-
"CVE-2026-
|
|
1579
|
-
"name": "
|
|
1580
|
-
"rwep":
|
|
1581
|
-
"cvss":
|
|
1582
|
-
"cisa_kev":
|
|
1583
|
-
"epss_score": 0.
|
|
1584
|
-
"epss_percentile": 0.
|
|
1372
|
+
"CVE-2026-42208": {
|
|
1373
|
+
"name": "BerriAI LiteLLM Proxy Auth SQL Injection",
|
|
1374
|
+
"rwep": 65,
|
|
1375
|
+
"cvss": 9.8,
|
|
1376
|
+
"cisa_kev": true,
|
|
1377
|
+
"epss_score": 0.37368,
|
|
1378
|
+
"epss_percentile": 0.9722,
|
|
1585
1379
|
"referencing_skills": [
|
|
1586
|
-
"
|
|
1587
|
-
"
|
|
1588
|
-
"
|
|
1380
|
+
"ai-attack-surface",
|
|
1381
|
+
"webapp-security",
|
|
1382
|
+
"ai-risk-management"
|
|
1589
1383
|
],
|
|
1590
1384
|
"chain": {
|
|
1591
1385
|
"cwes": [
|
|
1592
1386
|
{
|
|
1593
|
-
"id": "CWE-
|
|
1594
|
-
"name": "
|
|
1595
|
-
"category": "
|
|
1387
|
+
"id": "CWE-1039",
|
|
1388
|
+
"name": "Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbations",
|
|
1389
|
+
"category": "AI/ML"
|
|
1390
|
+
},
|
|
1391
|
+
{
|
|
1392
|
+
"id": "CWE-1188",
|
|
1393
|
+
"name": "Initialization of a Resource with an Insecure Default",
|
|
1394
|
+
"category": "Configuration"
|
|
1596
1395
|
},
|
|
1597
1396
|
{
|
|
1598
1397
|
"id": "CWE-1426",
|
|
@@ -1605,46 +1404,1640 @@
|
|
|
1605
1404
|
"category": "Information Exposure"
|
|
1606
1405
|
},
|
|
1607
1406
|
{
|
|
1608
|
-
"id": "CWE-
|
|
1609
|
-
"name": "
|
|
1610
|
-
"category": "
|
|
1407
|
+
"id": "CWE-22",
|
|
1408
|
+
"name": "Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)",
|
|
1409
|
+
"category": "Path/Resource"
|
|
1611
1410
|
},
|
|
1612
1411
|
{
|
|
1613
|
-
"id": "CWE-
|
|
1614
|
-
"name": "
|
|
1615
|
-
"category": "
|
|
1412
|
+
"id": "CWE-269",
|
|
1413
|
+
"name": "Improper Privilege Management",
|
|
1414
|
+
"category": "Authorization"
|
|
1616
1415
|
},
|
|
1617
1416
|
{
|
|
1618
|
-
"id": "CWE-
|
|
1619
|
-
"name": "
|
|
1620
|
-
"category": "
|
|
1417
|
+
"id": "CWE-287",
|
|
1418
|
+
"name": "Improper Authentication",
|
|
1419
|
+
"category": "Authentication"
|
|
1621
1420
|
},
|
|
1622
1421
|
{
|
|
1623
|
-
"id": "CWE-
|
|
1624
|
-
"name": "
|
|
1625
|
-
"category": "
|
|
1422
|
+
"id": "CWE-352",
|
|
1423
|
+
"name": "Cross-Site Request Forgery (CSRF)",
|
|
1424
|
+
"category": "Session"
|
|
1425
|
+
},
|
|
1426
|
+
{
|
|
1427
|
+
"id": "CWE-434",
|
|
1428
|
+
"name": "Unrestricted Upload of File with Dangerous Type",
|
|
1429
|
+
"category": "File Handling"
|
|
1430
|
+
},
|
|
1431
|
+
{
|
|
1432
|
+
"id": "CWE-502",
|
|
1433
|
+
"name": "Deserialization of Untrusted Data",
|
|
1434
|
+
"category": "Serialization"
|
|
1435
|
+
},
|
|
1436
|
+
{
|
|
1437
|
+
"id": "CWE-732",
|
|
1438
|
+
"name": "Incorrect Permission Assignment for Critical Resource",
|
|
1439
|
+
"category": "Authorization"
|
|
1440
|
+
},
|
|
1441
|
+
{
|
|
1442
|
+
"id": "CWE-77",
|
|
1443
|
+
"name": "Improper Neutralization of Special Elements used in a Command (Command Injection)",
|
|
1444
|
+
"category": "Injection"
|
|
1445
|
+
},
|
|
1446
|
+
{
|
|
1447
|
+
"id": "CWE-78",
|
|
1448
|
+
"name": "Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)",
|
|
1449
|
+
"category": "Injection"
|
|
1450
|
+
},
|
|
1451
|
+
{
|
|
1452
|
+
"id": "CWE-79",
|
|
1453
|
+
"name": "Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)",
|
|
1454
|
+
"category": "Injection"
|
|
1455
|
+
},
|
|
1456
|
+
{
|
|
1457
|
+
"id": "CWE-862",
|
|
1458
|
+
"name": "Missing Authorization",
|
|
1459
|
+
"category": "Authorization"
|
|
1460
|
+
},
|
|
1461
|
+
{
|
|
1462
|
+
"id": "CWE-863",
|
|
1463
|
+
"name": "Incorrect Authorization",
|
|
1464
|
+
"category": "Authorization"
|
|
1465
|
+
},
|
|
1466
|
+
{
|
|
1467
|
+
"id": "CWE-89",
|
|
1468
|
+
"name": "Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)",
|
|
1469
|
+
"category": "Injection"
|
|
1470
|
+
},
|
|
1471
|
+
{
|
|
1472
|
+
"id": "CWE-918",
|
|
1473
|
+
"name": "Server-Side Request Forgery (SSRF)",
|
|
1474
|
+
"category": "Network"
|
|
1475
|
+
},
|
|
1476
|
+
{
|
|
1477
|
+
"id": "CWE-94",
|
|
1478
|
+
"name": "Improper Control of Generation of Code (Code Injection)",
|
|
1479
|
+
"category": "Injection"
|
|
1480
|
+
}
|
|
1481
|
+
],
|
|
1482
|
+
"atlas": [
|
|
1483
|
+
{
|
|
1484
|
+
"id": "AML.T0016",
|
|
1485
|
+
"name": "Obtain Capabilities: Develop Capabilities",
|
|
1486
|
+
"tactic": "Resource Development"
|
|
1487
|
+
},
|
|
1488
|
+
{
|
|
1489
|
+
"id": "AML.T0017",
|
|
1490
|
+
"name": "Discover ML Model Ontology",
|
|
1491
|
+
"tactic": "Discovery"
|
|
1492
|
+
},
|
|
1493
|
+
{
|
|
1494
|
+
"id": "AML.T0018",
|
|
1495
|
+
"name": "Backdoor ML Model",
|
|
1496
|
+
"tactic": "Persistence"
|
|
1497
|
+
},
|
|
1498
|
+
{
|
|
1499
|
+
"id": "AML.T0020",
|
|
1500
|
+
"name": "Poison Training Data",
|
|
1501
|
+
"tactic": "ML Attack Staging"
|
|
1502
|
+
},
|
|
1503
|
+
{
|
|
1504
|
+
"id": "AML.T0043",
|
|
1505
|
+
"name": "Craft Adversarial Data",
|
|
1506
|
+
"tactic": "ML Attack Staging"
|
|
1507
|
+
},
|
|
1508
|
+
{
|
|
1509
|
+
"id": "AML.T0051",
|
|
1510
|
+
"name": "LLM Prompt Injection",
|
|
1511
|
+
"tactic": "Execution"
|
|
1512
|
+
},
|
|
1513
|
+
{
|
|
1514
|
+
"id": "AML.T0054",
|
|
1515
|
+
"name": "LLM Jailbreak",
|
|
1516
|
+
"tactic": "Defense Evasion"
|
|
1517
|
+
},
|
|
1518
|
+
{
|
|
1519
|
+
"id": "AML.T0096",
|
|
1520
|
+
"name": "AI API as Covert C2 Channel",
|
|
1521
|
+
"tactic": "Command and Control"
|
|
1522
|
+
}
|
|
1523
|
+
],
|
|
1524
|
+
"d3fend": [
|
|
1525
|
+
{
|
|
1526
|
+
"id": "D3-IOPR",
|
|
1527
|
+
"name": "Input/Output Profiling Resource",
|
|
1528
|
+
"tactic": "Detect"
|
|
1529
|
+
},
|
|
1530
|
+
{
|
|
1531
|
+
"id": "D3-NTA",
|
|
1532
|
+
"name": "Network Traffic Analysis",
|
|
1533
|
+
"tactic": "Detect"
|
|
1534
|
+
}
|
|
1535
|
+
],
|
|
1536
|
+
"framework_gaps": [
|
|
1537
|
+
{
|
|
1538
|
+
"id": "ALL-AI-PIPELINE-INTEGRITY",
|
|
1539
|
+
"framework": "ALL",
|
|
1540
|
+
"control_name": "AI Pipeline Integrity"
|
|
1541
|
+
},
|
|
1542
|
+
{
|
|
1543
|
+
"id": "ALL-PROMPT-INJECTION-ACCESS-CONTROL",
|
|
1544
|
+
"framework": "ALL",
|
|
1545
|
+
"control_name": "Prompt Injection as Access Control Failure"
|
|
1546
|
+
},
|
|
1547
|
+
{
|
|
1548
|
+
"id": "ISO-27001-2022-A.8.28",
|
|
1549
|
+
"framework": "ISO/IEC 27001:2022",
|
|
1550
|
+
"control_name": "Secure coding"
|
|
1551
|
+
},
|
|
1552
|
+
{
|
|
1553
|
+
"id": "ISO-IEC-23894-2023-clause-7",
|
|
1554
|
+
"framework": "ISO/IEC 23894:2023 (AI Risk Management Guidance)",
|
|
1555
|
+
"control_name": "AI risk management process"
|
|
1556
|
+
},
|
|
1557
|
+
{
|
|
1558
|
+
"id": "ISO-IEC-42001-2023-clause-6.1.2",
|
|
1559
|
+
"framework": "ISO/IEC 42001:2023 (AI Management System)",
|
|
1560
|
+
"control_name": "AI risk assessment"
|
|
1561
|
+
},
|
|
1562
|
+
{
|
|
1563
|
+
"id": "NIST-800-218-SSDF",
|
|
1564
|
+
"framework": "NIST SP 800-218 (Secure Software Development Framework v1.1)",
|
|
1565
|
+
"control_name": "Secure Software Development Framework"
|
|
1566
|
+
},
|
|
1567
|
+
{
|
|
1568
|
+
"id": "NIST-800-53-AC-2",
|
|
1569
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
1570
|
+
"control_name": "Account Management"
|
|
1571
|
+
},
|
|
1572
|
+
{
|
|
1573
|
+
"id": "NIST-800-53-SI-3",
|
|
1574
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
1575
|
+
"control_name": "Malicious Code Protection"
|
|
1576
|
+
},
|
|
1577
|
+
{
|
|
1578
|
+
"id": "NIST-AI-RMF-MEASURE-2.5",
|
|
1579
|
+
"framework": "NIST AI RMF 1.0",
|
|
1580
|
+
"control_name": "AI system to human interaction evaluation"
|
|
1581
|
+
},
|
|
1582
|
+
{
|
|
1583
|
+
"id": "OWASP-ASVS-v5.0-V14",
|
|
1584
|
+
"framework": "OWASP ASVS v5.0",
|
|
1585
|
+
"control_name": "Configuration verification"
|
|
1586
|
+
},
|
|
1587
|
+
{
|
|
1588
|
+
"id": "OWASP-LLM-Top-10-2025-LLM01",
|
|
1589
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
1590
|
+
"control_name": "Prompt Injection"
|
|
1591
|
+
},
|
|
1592
|
+
{
|
|
1593
|
+
"id": "OWASP-LLM-Top-10-2025-LLM02",
|
|
1594
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
1595
|
+
"control_name": "Sensitive Information Disclosure"
|
|
1596
|
+
},
|
|
1597
|
+
{
|
|
1598
|
+
"id": "SOC2-CC6-logical-access",
|
|
1599
|
+
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
1600
|
+
"control_name": "Logical and Physical Access Controls"
|
|
1601
|
+
}
|
|
1602
|
+
],
|
|
1603
|
+
"attack_refs": [
|
|
1604
|
+
"T1059",
|
|
1605
|
+
"T1190",
|
|
1606
|
+
"T1505",
|
|
1607
|
+
"T1566"
|
|
1608
|
+
],
|
|
1609
|
+
"rfc_refs": [
|
|
1610
|
+
"RFC-7519",
|
|
1611
|
+
"RFC-8446",
|
|
1612
|
+
"RFC-8725",
|
|
1613
|
+
"RFC-9114"
|
|
1614
|
+
]
|
|
1615
|
+
}
|
|
1616
|
+
},
|
|
1617
|
+
"CVE-2026-43284": {
|
|
1618
|
+
"name": "Dirty Frag (ESP/IPsec component)",
|
|
1619
|
+
"rwep": 53,
|
|
1620
|
+
"cvss": 8.8,
|
|
1621
|
+
"cisa_kev": false,
|
|
1622
|
+
"epss_score": 0.00007,
|
|
1623
|
+
"epss_percentile": 0.0051,
|
|
1624
|
+
"referencing_skills": [
|
|
1625
|
+
"kernel-lpe-triage",
|
|
1626
|
+
"pqc-first",
|
|
1627
|
+
"dlp-gap-analysis"
|
|
1628
|
+
],
|
|
1629
|
+
"chain": {
|
|
1630
|
+
"cwes": [
|
|
1631
|
+
{
|
|
1632
|
+
"id": "CWE-125",
|
|
1633
|
+
"name": "Out-of-bounds Read",
|
|
1634
|
+
"category": "Memory Safety"
|
|
1635
|
+
},
|
|
1636
|
+
{
|
|
1637
|
+
"id": "CWE-1426",
|
|
1638
|
+
"name": "Improper Validation of Generative AI Output",
|
|
1639
|
+
"category": "AI/ML"
|
|
1640
|
+
},
|
|
1641
|
+
{
|
|
1642
|
+
"id": "CWE-200",
|
|
1643
|
+
"name": "Exposure of Sensitive Information to an Unauthorized Actor",
|
|
1644
|
+
"category": "Information Exposure"
|
|
1645
|
+
},
|
|
1646
|
+
{
|
|
1647
|
+
"id": "CWE-327",
|
|
1648
|
+
"name": "Use of a Broken or Risky Cryptographic Algorithm",
|
|
1649
|
+
"category": "Cryptography"
|
|
1650
|
+
},
|
|
1651
|
+
{
|
|
1652
|
+
"id": "CWE-362",
|
|
1653
|
+
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition)",
|
|
1654
|
+
"category": "Concurrency"
|
|
1655
|
+
},
|
|
1656
|
+
{
|
|
1657
|
+
"id": "CWE-416",
|
|
1658
|
+
"name": "Use After Free",
|
|
1659
|
+
"category": "Memory Safety"
|
|
1660
|
+
},
|
|
1661
|
+
{
|
|
1662
|
+
"id": "CWE-672",
|
|
1663
|
+
"name": "Operation on a Resource after Expiration or Release",
|
|
1664
|
+
"category": "Memory Safety"
|
|
1665
|
+
},
|
|
1666
|
+
{
|
|
1667
|
+
"id": "CWE-787",
|
|
1668
|
+
"name": "Out-of-bounds Write",
|
|
1669
|
+
"category": "Memory Safety"
|
|
1670
|
+
}
|
|
1671
|
+
],
|
|
1672
|
+
"atlas": [
|
|
1673
|
+
{
|
|
1674
|
+
"id": "AML.T0017",
|
|
1675
|
+
"name": "Discover ML Model Ontology",
|
|
1676
|
+
"tactic": "Discovery"
|
|
1677
|
+
},
|
|
1678
|
+
{
|
|
1679
|
+
"id": "AML.T0051",
|
|
1680
|
+
"name": "LLM Prompt Injection",
|
|
1681
|
+
"tactic": "Execution"
|
|
1682
|
+
},
|
|
1683
|
+
{
|
|
1684
|
+
"id": "AML.T0096",
|
|
1685
|
+
"name": "AI API as Covert C2 Channel",
|
|
1686
|
+
"tactic": "Command and Control"
|
|
1687
|
+
}
|
|
1688
|
+
],
|
|
1689
|
+
"d3fend": [
|
|
1690
|
+
{
|
|
1691
|
+
"id": "D3-ASLR",
|
|
1692
|
+
"name": "Address Space Layout Randomization",
|
|
1693
|
+
"tactic": "Harden"
|
|
1694
|
+
},
|
|
1695
|
+
{
|
|
1696
|
+
"id": "D3-CSPP",
|
|
1697
|
+
"name": "Client-server Payload Profiling",
|
|
1698
|
+
"tactic": "Detect"
|
|
1699
|
+
},
|
|
1700
|
+
{
|
|
1701
|
+
"id": "D3-EAL",
|
|
1702
|
+
"name": "Executable Allowlisting",
|
|
1703
|
+
"tactic": "Harden"
|
|
1704
|
+
},
|
|
1705
|
+
{
|
|
1706
|
+
"id": "D3-FE",
|
|
1707
|
+
"name": "File Encryption",
|
|
1708
|
+
"tactic": "Harden"
|
|
1709
|
+
},
|
|
1710
|
+
{
|
|
1711
|
+
"id": "D3-IOPR",
|
|
1712
|
+
"name": "Input/Output Profiling Resource",
|
|
1713
|
+
"tactic": "Detect"
|
|
1714
|
+
},
|
|
1715
|
+
{
|
|
1716
|
+
"id": "D3-MENCR",
|
|
1717
|
+
"name": "Message Encryption",
|
|
1718
|
+
"tactic": "Harden"
|
|
1719
|
+
},
|
|
1720
|
+
{
|
|
1721
|
+
"id": "D3-NTA",
|
|
1722
|
+
"name": "Network Traffic Analysis",
|
|
1723
|
+
"tactic": "Detect"
|
|
1724
|
+
},
|
|
1725
|
+
{
|
|
1726
|
+
"id": "D3-NTPM",
|
|
1727
|
+
"name": "Network Traffic Policy Mapping",
|
|
1728
|
+
"tactic": "Model"
|
|
1729
|
+
},
|
|
1730
|
+
{
|
|
1731
|
+
"id": "D3-PHRA",
|
|
1732
|
+
"name": "Process Hardware Resource Access",
|
|
1733
|
+
"tactic": "Isolate"
|
|
1734
|
+
},
|
|
1735
|
+
{
|
|
1736
|
+
"id": "D3-PSEP",
|
|
1737
|
+
"name": "Process Segment Execution Prevention",
|
|
1738
|
+
"tactic": "Harden"
|
|
1739
|
+
}
|
|
1740
|
+
],
|
|
1741
|
+
"framework_gaps": [
|
|
1742
|
+
{
|
|
1743
|
+
"id": "CIS-Controls-v8-Control7",
|
|
1744
|
+
"framework": "CIS Controls v8",
|
|
1745
|
+
"control_name": "Continuous Vulnerability Management"
|
|
1746
|
+
},
|
|
1747
|
+
{
|
|
1748
|
+
"id": "HIPAA-Security-Rule-164.312(a)(1)",
|
|
1749
|
+
"framework": "HIPAA Security Rule (45 CFR § 164.312)",
|
|
1750
|
+
"control_name": "Access control standard (technical safeguards)"
|
|
1751
|
+
},
|
|
1752
|
+
{
|
|
1753
|
+
"id": "ISO-27001-2022-A.8.16",
|
|
1754
|
+
"framework": "ISO/IEC 27001:2022",
|
|
1755
|
+
"control_name": "Monitoring activities"
|
|
1756
|
+
},
|
|
1757
|
+
{
|
|
1758
|
+
"id": "ISO-27001-2022-A.8.8",
|
|
1759
|
+
"framework": "ISO/IEC 27001:2022",
|
|
1760
|
+
"control_name": "Management of technical vulnerabilities"
|
|
1761
|
+
},
|
|
1762
|
+
{
|
|
1763
|
+
"id": "ISO-IEC-42001-2023-clause-6.1.2",
|
|
1764
|
+
"framework": "ISO/IEC 42001:2023 (AI Management System)",
|
|
1765
|
+
"control_name": "AI risk assessment"
|
|
1766
|
+
},
|
|
1767
|
+
{
|
|
1768
|
+
"id": "NIS2-Art21-patch-management",
|
|
1769
|
+
"framework": "EU NIS2 Directive",
|
|
1770
|
+
"control_name": "Vulnerability handling and disclosure"
|
|
1771
|
+
},
|
|
1772
|
+
{
|
|
1773
|
+
"id": "NIST-800-53-SC-28",
|
|
1774
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
1775
|
+
"control_name": "Protection of Information at Rest"
|
|
1776
|
+
},
|
|
1777
|
+
{
|
|
1778
|
+
"id": "NIST-800-53-SC-7",
|
|
1779
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
1780
|
+
"control_name": "Boundary Protection"
|
|
1781
|
+
},
|
|
1782
|
+
{
|
|
1783
|
+
"id": "NIST-800-53-SC-8",
|
|
1784
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
1785
|
+
"control_name": "Transmission Confidentiality and Integrity"
|
|
1786
|
+
},
|
|
1787
|
+
{
|
|
1788
|
+
"id": "NIST-800-53-SI-2",
|
|
1789
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
1790
|
+
"control_name": "Flaw Remediation"
|
|
1791
|
+
},
|
|
1792
|
+
{
|
|
1793
|
+
"id": "PCI-DSS-4.0-6.3.3",
|
|
1794
|
+
"framework": "PCI DSS 4.0",
|
|
1795
|
+
"control_name": "All system components are protected from known vulnerabilities by installing applicable security patches/updates"
|
|
1796
|
+
},
|
|
1797
|
+
{
|
|
1798
|
+
"id": "SOC2-CC7-anomaly-detection",
|
|
1799
|
+
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
1800
|
+
"control_name": "System Operations — Threat and Vulnerability Management"
|
|
1801
|
+
}
|
|
1802
|
+
],
|
|
1803
|
+
"attack_refs": [
|
|
1804
|
+
"T1041",
|
|
1805
|
+
"T1068",
|
|
1806
|
+
"T1213",
|
|
1807
|
+
"T1530",
|
|
1808
|
+
"T1548.001",
|
|
1809
|
+
"T1567"
|
|
1810
|
+
],
|
|
1811
|
+
"rfc_refs": [
|
|
1812
|
+
"DRAFT-IETF-TLS-ECDHE-MLKEM",
|
|
1813
|
+
"DRAFT-IETF-TLS-HYBRID-DESIGN",
|
|
1814
|
+
"RFC-4301",
|
|
1815
|
+
"RFC-4303",
|
|
1816
|
+
"RFC-7296",
|
|
1817
|
+
"RFC-8032",
|
|
1818
|
+
"RFC-8446",
|
|
1819
|
+
"RFC-9106",
|
|
1820
|
+
"RFC-9180",
|
|
1821
|
+
"RFC-9420",
|
|
1822
|
+
"RFC-9458",
|
|
1823
|
+
"RFC-9794"
|
|
1824
|
+
]
|
|
1825
|
+
}
|
|
1826
|
+
},
|
|
1827
|
+
"CVE-2026-43500": {
|
|
1828
|
+
"name": "Dirty Frag (RxRPC component)",
|
|
1829
|
+
"rwep": 47,
|
|
1830
|
+
"cvss": 7.6,
|
|
1831
|
+
"cisa_kev": false,
|
|
1832
|
+
"epss_score": 0.0001,
|
|
1833
|
+
"epss_percentile": 0.0115,
|
|
1834
|
+
"referencing_skills": [
|
|
1835
|
+
"kernel-lpe-triage"
|
|
1836
|
+
],
|
|
1837
|
+
"chain": {
|
|
1838
|
+
"cwes": [
|
|
1839
|
+
{
|
|
1840
|
+
"id": "CWE-125",
|
|
1841
|
+
"name": "Out-of-bounds Read",
|
|
1842
|
+
"category": "Memory Safety"
|
|
1843
|
+
},
|
|
1844
|
+
{
|
|
1845
|
+
"id": "CWE-362",
|
|
1846
|
+
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition)",
|
|
1847
|
+
"category": "Concurrency"
|
|
1848
|
+
},
|
|
1849
|
+
{
|
|
1850
|
+
"id": "CWE-416",
|
|
1851
|
+
"name": "Use After Free",
|
|
1852
|
+
"category": "Memory Safety"
|
|
1853
|
+
},
|
|
1854
|
+
{
|
|
1855
|
+
"id": "CWE-672",
|
|
1856
|
+
"name": "Operation on a Resource after Expiration or Release",
|
|
1857
|
+
"category": "Memory Safety"
|
|
1858
|
+
},
|
|
1859
|
+
{
|
|
1860
|
+
"id": "CWE-787",
|
|
1861
|
+
"name": "Out-of-bounds Write",
|
|
1862
|
+
"category": "Memory Safety"
|
|
1863
|
+
}
|
|
1864
|
+
],
|
|
1865
|
+
"atlas": [],
|
|
1866
|
+
"d3fend": [
|
|
1867
|
+
{
|
|
1868
|
+
"id": "D3-ASLR",
|
|
1869
|
+
"name": "Address Space Layout Randomization",
|
|
1870
|
+
"tactic": "Harden"
|
|
1871
|
+
},
|
|
1872
|
+
{
|
|
1873
|
+
"id": "D3-EAL",
|
|
1874
|
+
"name": "Executable Allowlisting",
|
|
1875
|
+
"tactic": "Harden"
|
|
1876
|
+
},
|
|
1877
|
+
{
|
|
1878
|
+
"id": "D3-PHRA",
|
|
1879
|
+
"name": "Process Hardware Resource Access",
|
|
1880
|
+
"tactic": "Isolate"
|
|
1881
|
+
},
|
|
1882
|
+
{
|
|
1883
|
+
"id": "D3-PSEP",
|
|
1884
|
+
"name": "Process Segment Execution Prevention",
|
|
1885
|
+
"tactic": "Harden"
|
|
1886
|
+
}
|
|
1887
|
+
],
|
|
1888
|
+
"framework_gaps": [
|
|
1889
|
+
{
|
|
1890
|
+
"id": "CIS-Controls-v8-Control7",
|
|
1891
|
+
"framework": "CIS Controls v8",
|
|
1892
|
+
"control_name": "Continuous Vulnerability Management"
|
|
1893
|
+
},
|
|
1894
|
+
{
|
|
1895
|
+
"id": "ISO-27001-2022-A.8.8",
|
|
1896
|
+
"framework": "ISO/IEC 27001:2022",
|
|
1897
|
+
"control_name": "Management of technical vulnerabilities"
|
|
1898
|
+
},
|
|
1899
|
+
{
|
|
1900
|
+
"id": "NIS2-Art21-patch-management",
|
|
1901
|
+
"framework": "EU NIS2 Directive",
|
|
1902
|
+
"control_name": "Vulnerability handling and disclosure"
|
|
1903
|
+
},
|
|
1904
|
+
{
|
|
1905
|
+
"id": "NIST-800-53-SC-8",
|
|
1906
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
1907
|
+
"control_name": "Transmission Confidentiality and Integrity"
|
|
1908
|
+
},
|
|
1909
|
+
{
|
|
1910
|
+
"id": "NIST-800-53-SI-2",
|
|
1911
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
1912
|
+
"control_name": "Flaw Remediation"
|
|
1913
|
+
},
|
|
1914
|
+
{
|
|
1915
|
+
"id": "PCI-DSS-4.0-6.3.3",
|
|
1916
|
+
"framework": "PCI DSS 4.0",
|
|
1917
|
+
"control_name": "All system components are protected from known vulnerabilities by installing applicable security patches/updates"
|
|
1918
|
+
}
|
|
1919
|
+
],
|
|
1920
|
+
"attack_refs": [
|
|
1921
|
+
"T1068",
|
|
1922
|
+
"T1548.001"
|
|
1923
|
+
],
|
|
1924
|
+
"rfc_refs": [
|
|
1925
|
+
"RFC-4301",
|
|
1926
|
+
"RFC-4303",
|
|
1927
|
+
"RFC-7296"
|
|
1928
|
+
]
|
|
1929
|
+
}
|
|
1930
|
+
},
|
|
1931
|
+
"CVE-2026-45321": {
|
|
1932
|
+
"name": "Mini Shai-Hulud TanStack npm worm",
|
|
1933
|
+
"rwep": 45,
|
|
1934
|
+
"cvss": 9.6,
|
|
1935
|
+
"cisa_kev": false,
|
|
1936
|
+
"epss_score": 0.00039,
|
|
1937
|
+
"epss_percentile": 0.1179,
|
|
1938
|
+
"referencing_skills": [
|
|
1939
|
+
"kernel-lpe-triage",
|
|
1940
|
+
"mcp-agent-trust",
|
|
1941
|
+
"attack-surface-pentest",
|
|
1942
|
+
"fuzz-testing-strategy",
|
|
1943
|
+
"supply-chain-integrity",
|
|
1944
|
+
"ot-ics-security",
|
|
1945
|
+
"coordinated-vuln-disclosure",
|
|
1946
|
+
"threat-modeling-methodology",
|
|
1947
|
+
"webapp-security",
|
|
1948
|
+
"sector-federal-government",
|
|
1949
|
+
"sector-energy",
|
|
1950
|
+
"api-security",
|
|
1951
|
+
"container-runtime-security",
|
|
1952
|
+
"mlops-security"
|
|
1953
|
+
],
|
|
1954
|
+
"chain": {
|
|
1955
|
+
"cwes": [
|
|
1956
|
+
{
|
|
1957
|
+
"id": "CWE-1037",
|
|
1958
|
+
"name": "Processor Optimization Removal or Modification of Security-critical Code",
|
|
1959
|
+
"category": "Hardware / Side Channel"
|
|
1960
|
+
},
|
|
1961
|
+
{
|
|
1962
|
+
"id": "CWE-1188",
|
|
1963
|
+
"name": "Initialization of a Resource with an Insecure Default",
|
|
1964
|
+
"category": "Configuration"
|
|
1965
|
+
},
|
|
1966
|
+
{
|
|
1967
|
+
"id": "CWE-125",
|
|
1968
|
+
"name": "Out-of-bounds Read",
|
|
1969
|
+
"category": "Memory Safety"
|
|
1970
|
+
},
|
|
1971
|
+
{
|
|
1972
|
+
"id": "CWE-1357",
|
|
1973
|
+
"name": "Reliance on Insufficiently Trustworthy Component",
|
|
1974
|
+
"category": "Supply Chain"
|
|
1975
|
+
},
|
|
1976
|
+
{
|
|
1977
|
+
"id": "CWE-1395",
|
|
1978
|
+
"name": "Dependency on Vulnerable Third-Party Component",
|
|
1979
|
+
"category": "Supply Chain"
|
|
1980
|
+
},
|
|
1981
|
+
{
|
|
1982
|
+
"id": "CWE-1426",
|
|
1983
|
+
"name": "Improper Validation of Generative AI Output",
|
|
1984
|
+
"category": "AI/ML"
|
|
1985
|
+
},
|
|
1986
|
+
{
|
|
1987
|
+
"id": "CWE-20",
|
|
1988
|
+
"name": "Improper Input Validation",
|
|
1989
|
+
"category": "Validation"
|
|
1990
|
+
},
|
|
1991
|
+
{
|
|
1992
|
+
"id": "CWE-200",
|
|
1993
|
+
"name": "Exposure of Sensitive Information to an Unauthorized Actor",
|
|
1994
|
+
"category": "Information Exposure"
|
|
1995
|
+
},
|
|
1996
|
+
{
|
|
1997
|
+
"id": "CWE-22",
|
|
1998
|
+
"name": "Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)",
|
|
1999
|
+
"category": "Path/Resource"
|
|
2000
|
+
},
|
|
2001
|
+
{
|
|
2002
|
+
"id": "CWE-269",
|
|
2003
|
+
"name": "Improper Privilege Management",
|
|
2004
|
+
"category": "Authorization"
|
|
2005
|
+
},
|
|
2006
|
+
{
|
|
2007
|
+
"id": "CWE-287",
|
|
2008
|
+
"name": "Improper Authentication",
|
|
2009
|
+
"category": "Authentication"
|
|
2010
|
+
},
|
|
2011
|
+
{
|
|
2012
|
+
"id": "CWE-306",
|
|
2013
|
+
"name": "Missing Authentication for Critical Function",
|
|
2014
|
+
"category": "Authentication"
|
|
2015
|
+
},
|
|
2016
|
+
{
|
|
2017
|
+
"id": "CWE-345",
|
|
2018
|
+
"name": "Insufficient Verification of Data Authenticity",
|
|
2019
|
+
"category": "Authenticity / Supply Chain"
|
|
2020
|
+
},
|
|
2021
|
+
{
|
|
2022
|
+
"id": "CWE-352",
|
|
2023
|
+
"name": "Cross-Site Request Forgery (CSRF)",
|
|
2024
|
+
"category": "Session"
|
|
2025
|
+
},
|
|
2026
|
+
{
|
|
2027
|
+
"id": "CWE-362",
|
|
2028
|
+
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition)",
|
|
2029
|
+
"category": "Concurrency"
|
|
2030
|
+
},
|
|
2031
|
+
{
|
|
2032
|
+
"id": "CWE-416",
|
|
2033
|
+
"name": "Use After Free",
|
|
2034
|
+
"category": "Memory Safety"
|
|
2035
|
+
},
|
|
2036
|
+
{
|
|
2037
|
+
"id": "CWE-434",
|
|
2038
|
+
"name": "Unrestricted Upload of File with Dangerous Type",
|
|
2039
|
+
"category": "File Handling"
|
|
2040
|
+
},
|
|
2041
|
+
{
|
|
2042
|
+
"id": "CWE-494",
|
|
2043
|
+
"name": "Download of Code Without Integrity Check",
|
|
2044
|
+
"category": "Supply Chain"
|
|
2045
|
+
},
|
|
2046
|
+
{
|
|
2047
|
+
"id": "CWE-502",
|
|
2048
|
+
"name": "Deserialization of Untrusted Data",
|
|
2049
|
+
"category": "Serialization"
|
|
2050
|
+
},
|
|
2051
|
+
{
|
|
2052
|
+
"id": "CWE-672",
|
|
2053
|
+
"name": "Operation on a Resource after Expiration or Release",
|
|
2054
|
+
"category": "Memory Safety"
|
|
2055
|
+
},
|
|
2056
|
+
{
|
|
2057
|
+
"id": "CWE-732",
|
|
2058
|
+
"name": "Incorrect Permission Assignment for Critical Resource",
|
|
2059
|
+
"category": "Authorization"
|
|
2060
|
+
},
|
|
2061
|
+
{
|
|
2062
|
+
"id": "CWE-77",
|
|
2063
|
+
"name": "Improper Neutralization of Special Elements used in a Command (Command Injection)",
|
|
2064
|
+
"category": "Injection"
|
|
2065
|
+
},
|
|
2066
|
+
{
|
|
2067
|
+
"id": "CWE-78",
|
|
2068
|
+
"name": "Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)",
|
|
2069
|
+
"category": "Injection"
|
|
2070
|
+
},
|
|
2071
|
+
{
|
|
2072
|
+
"id": "CWE-787",
|
|
2073
|
+
"name": "Out-of-bounds Write",
|
|
2074
|
+
"category": "Memory Safety"
|
|
2075
|
+
},
|
|
2076
|
+
{
|
|
2077
|
+
"id": "CWE-79",
|
|
2078
|
+
"name": "Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)",
|
|
2079
|
+
"category": "Injection"
|
|
2080
|
+
},
|
|
2081
|
+
{
|
|
2082
|
+
"id": "CWE-798",
|
|
2083
|
+
"name": "Use of Hard-coded Credentials",
|
|
2084
|
+
"category": "Credentials"
|
|
2085
|
+
},
|
|
2086
|
+
{
|
|
2087
|
+
"id": "CWE-829",
|
|
2088
|
+
"name": "Inclusion of Functionality from Untrusted Control Sphere",
|
|
2089
|
+
"category": "Supply Chain"
|
|
2090
|
+
},
|
|
2091
|
+
{
|
|
2092
|
+
"id": "CWE-862",
|
|
2093
|
+
"name": "Missing Authorization",
|
|
2094
|
+
"category": "Authorization"
|
|
2095
|
+
},
|
|
2096
|
+
{
|
|
2097
|
+
"id": "CWE-863",
|
|
2098
|
+
"name": "Incorrect Authorization",
|
|
2099
|
+
"category": "Authorization"
|
|
2100
|
+
},
|
|
2101
|
+
{
|
|
2102
|
+
"id": "CWE-89",
|
|
2103
|
+
"name": "Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)",
|
|
2104
|
+
"category": "Injection"
|
|
2105
|
+
},
|
|
2106
|
+
{
|
|
2107
|
+
"id": "CWE-918",
|
|
2108
|
+
"name": "Server-Side Request Forgery (SSRF)",
|
|
2109
|
+
"category": "Network"
|
|
2110
|
+
},
|
|
2111
|
+
{
|
|
2112
|
+
"id": "CWE-94",
|
|
2113
|
+
"name": "Improper Control of Generation of Code (Code Injection)",
|
|
2114
|
+
"category": "Injection"
|
|
2115
|
+
}
|
|
2116
|
+
],
|
|
2117
|
+
"atlas": [
|
|
2118
|
+
{
|
|
2119
|
+
"id": "AML.T0010",
|
|
2120
|
+
"name": "ML Supply Chain Compromise",
|
|
2121
|
+
"tactic": "Initial Access"
|
|
2122
|
+
},
|
|
2123
|
+
{
|
|
2124
|
+
"id": "AML.T0016",
|
|
2125
|
+
"name": "Obtain Capabilities: Develop Capabilities",
|
|
2126
|
+
"tactic": "Resource Development"
|
|
2127
|
+
},
|
|
2128
|
+
{
|
|
2129
|
+
"id": "AML.T0017",
|
|
2130
|
+
"name": "Discover ML Model Ontology",
|
|
2131
|
+
"tactic": "Discovery"
|
|
2132
|
+
},
|
|
2133
|
+
{
|
|
2134
|
+
"id": "AML.T0018",
|
|
2135
|
+
"name": "Backdoor ML Model",
|
|
2136
|
+
"tactic": "Persistence"
|
|
2137
|
+
},
|
|
2138
|
+
{
|
|
2139
|
+
"id": "AML.T0020",
|
|
2140
|
+
"name": "Poison Training Data",
|
|
2141
|
+
"tactic": "ML Attack Staging"
|
|
2142
|
+
},
|
|
2143
|
+
{
|
|
2144
|
+
"id": "AML.T0043",
|
|
2145
|
+
"name": "Craft Adversarial Data",
|
|
2146
|
+
"tactic": "ML Attack Staging"
|
|
2147
|
+
},
|
|
2148
|
+
{
|
|
2149
|
+
"id": "AML.T0051",
|
|
2150
|
+
"name": "LLM Prompt Injection",
|
|
2151
|
+
"tactic": "Execution"
|
|
2152
|
+
},
|
|
2153
|
+
{
|
|
2154
|
+
"id": "AML.T0096",
|
|
2155
|
+
"name": "AI API as Covert C2 Channel",
|
|
2156
|
+
"tactic": "Command and Control"
|
|
2157
|
+
}
|
|
2158
|
+
],
|
|
2159
|
+
"d3fend": [
|
|
2160
|
+
{
|
|
2161
|
+
"id": "D3-ASLR",
|
|
2162
|
+
"name": "Address Space Layout Randomization",
|
|
2163
|
+
"tactic": "Harden"
|
|
2164
|
+
},
|
|
2165
|
+
{
|
|
2166
|
+
"id": "D3-CBAN",
|
|
2167
|
+
"name": "Certificate-based Authentication",
|
|
2168
|
+
"tactic": "Harden"
|
|
2169
|
+
},
|
|
2170
|
+
{
|
|
2171
|
+
"id": "D3-CSPP",
|
|
2172
|
+
"name": "Client-server Payload Profiling",
|
|
2173
|
+
"tactic": "Detect"
|
|
2174
|
+
},
|
|
2175
|
+
{
|
|
2176
|
+
"id": "D3-EAL",
|
|
2177
|
+
"name": "Executable Allowlisting",
|
|
2178
|
+
"tactic": "Harden"
|
|
2179
|
+
},
|
|
2180
|
+
{
|
|
2181
|
+
"id": "D3-EHB",
|
|
2182
|
+
"name": "Executable Hashbased Allowlist",
|
|
2183
|
+
"tactic": "Harden"
|
|
2184
|
+
},
|
|
2185
|
+
{
|
|
2186
|
+
"id": "D3-IOPR",
|
|
2187
|
+
"name": "Input/Output Profiling Resource",
|
|
2188
|
+
"tactic": "Detect"
|
|
2189
|
+
},
|
|
2190
|
+
{
|
|
2191
|
+
"id": "D3-MFA",
|
|
2192
|
+
"name": "Multi-factor Authentication",
|
|
2193
|
+
"tactic": "Harden"
|
|
2194
|
+
},
|
|
2195
|
+
{
|
|
2196
|
+
"id": "D3-NTA",
|
|
2197
|
+
"name": "Network Traffic Analysis",
|
|
2198
|
+
"tactic": "Detect"
|
|
2199
|
+
},
|
|
2200
|
+
{
|
|
2201
|
+
"id": "D3-PHRA",
|
|
2202
|
+
"name": "Process Hardware Resource Access",
|
|
2203
|
+
"tactic": "Isolate"
|
|
2204
|
+
},
|
|
2205
|
+
{
|
|
2206
|
+
"id": "D3-PSEP",
|
|
2207
|
+
"name": "Process Segment Execution Prevention",
|
|
2208
|
+
"tactic": "Harden"
|
|
2209
|
+
}
|
|
2210
|
+
],
|
|
2211
|
+
"framework_gaps": [
|
|
2212
|
+
{
|
|
2213
|
+
"id": "ALL-MCP-TOOL-TRUST",
|
|
2214
|
+
"framework": "ALL",
|
|
2215
|
+
"control_name": "MCP/Agent Tool Trust Boundaries"
|
|
2216
|
+
},
|
|
2217
|
+
{
|
|
2218
|
+
"id": "CIS-Controls-v8-Control7",
|
|
2219
|
+
"framework": "CIS Controls v8",
|
|
2220
|
+
"control_name": "Continuous Vulnerability Management"
|
|
2221
|
+
},
|
|
2222
|
+
{
|
|
2223
|
+
"id": "CMMC-2.0-Level-2",
|
|
2224
|
+
"framework": "CMMC 2.0 (Cybersecurity Maturity Model Certification) Level 2",
|
|
2225
|
+
"control_name": "Level 2 — Advanced (110 NIST 800-171 Rev 2 controls)"
|
|
2226
|
+
},
|
|
2227
|
+
{
|
|
2228
|
+
"id": "CycloneDX-v1.6-SBOM",
|
|
2229
|
+
"framework": "CycloneDX v1.6 (OWASP SBOM standard)",
|
|
2230
|
+
"control_name": "Software Bill of Materials"
|
|
2231
|
+
},
|
|
2232
|
+
{
|
|
2233
|
+
"id": "FedRAMP-Rev5-Moderate",
|
|
2234
|
+
"framework": "FedRAMP Rev 5 Moderate",
|
|
2235
|
+
"control_name": "FedRAMP Moderate baseline (NIST 800-53 Rev 5 tailoring)"
|
|
2236
|
+
},
|
|
2237
|
+
{
|
|
2238
|
+
"id": "HITRUST-CSF-v11.4-09.l",
|
|
2239
|
+
"framework": "HITRUST CSF v11.4",
|
|
2240
|
+
"control_name": "Outsourced services management"
|
|
2241
|
+
},
|
|
2242
|
+
{
|
|
2243
|
+
"id": "IEC-62443-3-3",
|
|
2244
|
+
"framework": "IEC 62443-3-3 (Industrial communication networks — security for IACS)",
|
|
2245
|
+
"control_name": "System security requirements and security levels"
|
|
2246
|
+
},
|
|
2247
|
+
{
|
|
2248
|
+
"id": "ISO-27001-2022-A.8.28",
|
|
2249
|
+
"framework": "ISO/IEC 27001:2022",
|
|
2250
|
+
"control_name": "Secure coding"
|
|
2251
|
+
},
|
|
2252
|
+
{
|
|
2253
|
+
"id": "ISO-27001-2022-A.8.30",
|
|
2254
|
+
"framework": "ISO/IEC 27001:2022",
|
|
2255
|
+
"control_name": "Outsourced development"
|
|
2256
|
+
},
|
|
2257
|
+
{
|
|
2258
|
+
"id": "ISO-27001-2022-A.8.8",
|
|
2259
|
+
"framework": "ISO/IEC 27001:2022",
|
|
2260
|
+
"control_name": "Management of technical vulnerabilities"
|
|
2261
|
+
},
|
|
2262
|
+
{
|
|
2263
|
+
"id": "ISO-IEC-23894-2023-clause-7",
|
|
2264
|
+
"framework": "ISO/IEC 23894:2023 (AI Risk Management Guidance)",
|
|
2265
|
+
"control_name": "AI risk management process"
|
|
2266
|
+
},
|
|
2267
|
+
{
|
|
2268
|
+
"id": "ISO-IEC-42001-2023-clause-6.1.2",
|
|
2269
|
+
"framework": "ISO/IEC 42001:2023 (AI Management System)",
|
|
2270
|
+
"control_name": "AI risk assessment"
|
|
2271
|
+
},
|
|
2272
|
+
{
|
|
2273
|
+
"id": "NERC-CIP-007-6-R4",
|
|
2274
|
+
"framework": "NERC CIP-007-6 (BES Cyber System Security Management)",
|
|
2275
|
+
"control_name": "Security event monitoring"
|
|
2276
|
+
},
|
|
2277
|
+
{
|
|
2278
|
+
"id": "NIS2-Art21-patch-management",
|
|
2279
|
+
"framework": "EU NIS2 Directive",
|
|
2280
|
+
"control_name": "Vulnerability handling and disclosure"
|
|
2281
|
+
},
|
|
2282
|
+
{
|
|
2283
|
+
"id": "NIST-800-115",
|
|
2284
|
+
"framework": "NIST SP 800-115 (Technical Guide to Information Security Testing and Assessment)",
|
|
2285
|
+
"control_name": "Technical Guide to Information Security Testing and Assessment"
|
|
2286
|
+
},
|
|
2287
|
+
{
|
|
2288
|
+
"id": "NIST-800-218-SSDF",
|
|
2289
|
+
"framework": "NIST SP 800-218 (Secure Software Development Framework v1.1)",
|
|
2290
|
+
"control_name": "Secure Software Development Framework"
|
|
2291
|
+
},
|
|
2292
|
+
{
|
|
2293
|
+
"id": "NIST-800-53-AC-2",
|
|
2294
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
2295
|
+
"control_name": "Account Management"
|
|
2296
|
+
},
|
|
2297
|
+
{
|
|
2298
|
+
"id": "NIST-800-53-CM-7",
|
|
2299
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
2300
|
+
"control_name": "Least Functionality"
|
|
2301
|
+
},
|
|
2302
|
+
{
|
|
2303
|
+
"id": "NIST-800-53-SA-12",
|
|
2304
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
2305
|
+
"control_name": "Supply Chain Protection"
|
|
2306
|
+
},
|
|
2307
|
+
{
|
|
2308
|
+
"id": "NIST-800-53-SC-8",
|
|
2309
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
2310
|
+
"control_name": "Transmission Confidentiality and Integrity"
|
|
2311
|
+
},
|
|
2312
|
+
{
|
|
2313
|
+
"id": "NIST-800-53-SI-2",
|
|
2314
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
2315
|
+
"control_name": "Flaw Remediation"
|
|
2316
|
+
},
|
|
2317
|
+
{
|
|
2318
|
+
"id": "NIST-800-82r3",
|
|
2319
|
+
"framework": "NIST SP 800-82 Rev 3 (Guide to OT Security)",
|
|
2320
|
+
"control_name": "Guide to Operational Technology (OT) Security"
|
|
2321
|
+
},
|
|
2322
|
+
{
|
|
2323
|
+
"id": "NIST-AI-RMF-MEASURE-2.5",
|
|
2324
|
+
"framework": "NIST AI RMF 1.0",
|
|
2325
|
+
"control_name": "AI system to human interaction evaluation"
|
|
2326
|
+
},
|
|
2327
|
+
{
|
|
2328
|
+
"id": "OWASP-ASVS-v5.0-V14",
|
|
2329
|
+
"framework": "OWASP ASVS v5.0",
|
|
2330
|
+
"control_name": "Configuration verification"
|
|
2331
|
+
},
|
|
2332
|
+
{
|
|
2333
|
+
"id": "OWASP-LLM-Top-10-2025-LLM01",
|
|
2334
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
2335
|
+
"control_name": "Prompt Injection"
|
|
2336
|
+
},
|
|
2337
|
+
{
|
|
2338
|
+
"id": "OWASP-LLM-Top-10-2025-LLM06",
|
|
2339
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
2340
|
+
"control_name": "Excessive Agency"
|
|
2341
|
+
},
|
|
2342
|
+
{
|
|
2343
|
+
"id": "OWASP-LLM-Top-10-2025-LLM08",
|
|
2344
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
2345
|
+
"control_name": "Vector and Embedding Weaknesses"
|
|
2346
|
+
},
|
|
2347
|
+
{
|
|
2348
|
+
"id": "OWASP-Pen-Testing-Guide-v5",
|
|
2349
|
+
"framework": "OWASP Web Security Testing Guide v5 (WSTG)",
|
|
2350
|
+
"control_name": "Web application penetration testing methodology"
|
|
2351
|
+
},
|
|
2352
|
+
{
|
|
2353
|
+
"id": "PCI-DSS-4.0-6.3.3",
|
|
2354
|
+
"framework": "PCI DSS 4.0",
|
|
2355
|
+
"control_name": "All system components are protected from known vulnerabilities by installing applicable security patches/updates"
|
|
2356
|
+
},
|
|
2357
|
+
{
|
|
2358
|
+
"id": "PTES-Pre-engagement",
|
|
2359
|
+
"framework": "Penetration Testing Execution Standard (PTES)",
|
|
2360
|
+
"control_name": "Pre-engagement Interactions"
|
|
2361
|
+
},
|
|
2362
|
+
{
|
|
2363
|
+
"id": "SLSA-v1.0-Build-L3",
|
|
2364
|
+
"framework": "SLSA v1.0 (Supply-chain Levels for Software Artifacts) — Build Track",
|
|
2365
|
+
"control_name": "Hardened build platform with non-falsifiable provenance"
|
|
2366
|
+
},
|
|
2367
|
+
{
|
|
2368
|
+
"id": "SOC2-CC9-vendor-management",
|
|
2369
|
+
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
2370
|
+
"control_name": "Risk Mitigation — Vendor and Business Partner Risk"
|
|
2371
|
+
},
|
|
2372
|
+
{
|
|
2373
|
+
"id": "SPDX-v3.0-SBOM",
|
|
2374
|
+
"framework": "SPDX v3.0 (ISO/IEC 5962-aligned SBOM standard)",
|
|
2375
|
+
"control_name": "Software Package Data Exchange — SBOM"
|
|
2376
|
+
},
|
|
2377
|
+
{
|
|
2378
|
+
"id": "SWIFT-CSCF-v2026-1.1",
|
|
2379
|
+
"framework": "SWIFT Customer Security Controls Framework v2026",
|
|
2380
|
+
"control_name": "SWIFT Environment Protection"
|
|
2381
|
+
},
|
|
2382
|
+
{
|
|
2383
|
+
"id": "VEX-CSAF-v2.1",
|
|
2384
|
+
"framework": "VEX via OASIS CSAF 2.1 (Common Security Advisory Framework)",
|
|
2385
|
+
"control_name": "Vulnerability Exploitability eXchange profile"
|
|
2386
|
+
}
|
|
2387
|
+
],
|
|
2388
|
+
"attack_refs": [
|
|
2389
|
+
"T0855",
|
|
2390
|
+
"T0883",
|
|
2391
|
+
"T1059",
|
|
2392
|
+
"T1068",
|
|
2393
|
+
"T1078",
|
|
2394
|
+
"T1133",
|
|
2395
|
+
"T1190",
|
|
2396
|
+
"T1195.001",
|
|
2397
|
+
"T1195.002",
|
|
2398
|
+
"T1505",
|
|
2399
|
+
"T1548.001",
|
|
2400
|
+
"T1554",
|
|
2401
|
+
"T1565",
|
|
2402
|
+
"T1567",
|
|
2403
|
+
"T1610",
|
|
2404
|
+
"T1611"
|
|
2405
|
+
],
|
|
2406
|
+
"rfc_refs": [
|
|
2407
|
+
"RFC-4301",
|
|
2408
|
+
"RFC-4303",
|
|
2409
|
+
"RFC-6749",
|
|
2410
|
+
"RFC-7296",
|
|
2411
|
+
"RFC-7519",
|
|
2412
|
+
"RFC-8032",
|
|
2413
|
+
"RFC-8446",
|
|
2414
|
+
"RFC-8725",
|
|
2415
|
+
"RFC-9114",
|
|
2416
|
+
"RFC-9421",
|
|
2417
|
+
"RFC-9700"
|
|
2418
|
+
]
|
|
2419
|
+
}
|
|
2420
|
+
},
|
|
2421
|
+
"MAL-2026-3083": {
|
|
2422
|
+
"name": "Elementary-Data PyPI Worm (Forged Release via GitHub Actions Script Injection)",
|
|
2423
|
+
"rwep": 45,
|
|
2424
|
+
"cvss": 9.3,
|
|
2425
|
+
"cisa_kev": false,
|
|
2426
|
+
"epss_score": null,
|
|
2427
|
+
"epss_percentile": null,
|
|
2428
|
+
"referencing_skills": [
|
|
2429
|
+
"kernel-lpe-triage",
|
|
2430
|
+
"mcp-agent-trust",
|
|
2431
|
+
"attack-surface-pentest",
|
|
2432
|
+
"fuzz-testing-strategy",
|
|
2433
|
+
"supply-chain-integrity",
|
|
2434
|
+
"ot-ics-security",
|
|
2435
|
+
"coordinated-vuln-disclosure",
|
|
2436
|
+
"threat-modeling-methodology",
|
|
2437
|
+
"webapp-security",
|
|
2438
|
+
"sector-federal-government",
|
|
2439
|
+
"sector-energy",
|
|
2440
|
+
"api-security",
|
|
2441
|
+
"container-runtime-security",
|
|
2442
|
+
"mlops-security"
|
|
2443
|
+
],
|
|
2444
|
+
"chain": {
|
|
2445
|
+
"cwes": [
|
|
2446
|
+
{
|
|
2447
|
+
"id": "CWE-1037",
|
|
2448
|
+
"name": "Processor Optimization Removal or Modification of Security-critical Code",
|
|
2449
|
+
"category": "Hardware / Side Channel"
|
|
2450
|
+
},
|
|
2451
|
+
{
|
|
2452
|
+
"id": "CWE-1188",
|
|
2453
|
+
"name": "Initialization of a Resource with an Insecure Default",
|
|
2454
|
+
"category": "Configuration"
|
|
2455
|
+
},
|
|
2456
|
+
{
|
|
2457
|
+
"id": "CWE-125",
|
|
2458
|
+
"name": "Out-of-bounds Read",
|
|
2459
|
+
"category": "Memory Safety"
|
|
2460
|
+
},
|
|
2461
|
+
{
|
|
2462
|
+
"id": "CWE-1357",
|
|
2463
|
+
"name": "Reliance on Insufficiently Trustworthy Component",
|
|
2464
|
+
"category": "Supply Chain"
|
|
2465
|
+
},
|
|
2466
|
+
{
|
|
2467
|
+
"id": "CWE-1395",
|
|
2468
|
+
"name": "Dependency on Vulnerable Third-Party Component",
|
|
2469
|
+
"category": "Supply Chain"
|
|
2470
|
+
},
|
|
2471
|
+
{
|
|
2472
|
+
"id": "CWE-1426",
|
|
2473
|
+
"name": "Improper Validation of Generative AI Output",
|
|
2474
|
+
"category": "AI/ML"
|
|
2475
|
+
},
|
|
2476
|
+
{
|
|
2477
|
+
"id": "CWE-20",
|
|
2478
|
+
"name": "Improper Input Validation",
|
|
2479
|
+
"category": "Validation"
|
|
2480
|
+
},
|
|
2481
|
+
{
|
|
2482
|
+
"id": "CWE-200",
|
|
2483
|
+
"name": "Exposure of Sensitive Information to an Unauthorized Actor",
|
|
2484
|
+
"category": "Information Exposure"
|
|
2485
|
+
},
|
|
2486
|
+
{
|
|
2487
|
+
"id": "CWE-22",
|
|
2488
|
+
"name": "Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)",
|
|
2489
|
+
"category": "Path/Resource"
|
|
2490
|
+
},
|
|
2491
|
+
{
|
|
2492
|
+
"id": "CWE-269",
|
|
2493
|
+
"name": "Improper Privilege Management",
|
|
2494
|
+
"category": "Authorization"
|
|
2495
|
+
},
|
|
2496
|
+
{
|
|
2497
|
+
"id": "CWE-287",
|
|
2498
|
+
"name": "Improper Authentication",
|
|
2499
|
+
"category": "Authentication"
|
|
2500
|
+
},
|
|
2501
|
+
{
|
|
2502
|
+
"id": "CWE-306",
|
|
2503
|
+
"name": "Missing Authentication for Critical Function",
|
|
2504
|
+
"category": "Authentication"
|
|
2505
|
+
},
|
|
2506
|
+
{
|
|
2507
|
+
"id": "CWE-345",
|
|
2508
|
+
"name": "Insufficient Verification of Data Authenticity",
|
|
2509
|
+
"category": "Authenticity / Supply Chain"
|
|
2510
|
+
},
|
|
2511
|
+
{
|
|
2512
|
+
"id": "CWE-352",
|
|
2513
|
+
"name": "Cross-Site Request Forgery (CSRF)",
|
|
2514
|
+
"category": "Session"
|
|
2515
|
+
},
|
|
2516
|
+
{
|
|
2517
|
+
"id": "CWE-362",
|
|
2518
|
+
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition)",
|
|
2519
|
+
"category": "Concurrency"
|
|
2520
|
+
},
|
|
2521
|
+
{
|
|
2522
|
+
"id": "CWE-416",
|
|
2523
|
+
"name": "Use After Free",
|
|
2524
|
+
"category": "Memory Safety"
|
|
2525
|
+
},
|
|
2526
|
+
{
|
|
2527
|
+
"id": "CWE-434",
|
|
2528
|
+
"name": "Unrestricted Upload of File with Dangerous Type",
|
|
2529
|
+
"category": "File Handling"
|
|
2530
|
+
},
|
|
2531
|
+
{
|
|
2532
|
+
"id": "CWE-494",
|
|
2533
|
+
"name": "Download of Code Without Integrity Check",
|
|
2534
|
+
"category": "Supply Chain"
|
|
2535
|
+
},
|
|
2536
|
+
{
|
|
2537
|
+
"id": "CWE-502",
|
|
2538
|
+
"name": "Deserialization of Untrusted Data",
|
|
2539
|
+
"category": "Serialization"
|
|
2540
|
+
},
|
|
2541
|
+
{
|
|
2542
|
+
"id": "CWE-672",
|
|
2543
|
+
"name": "Operation on a Resource after Expiration or Release",
|
|
2544
|
+
"category": "Memory Safety"
|
|
2545
|
+
},
|
|
2546
|
+
{
|
|
2547
|
+
"id": "CWE-732",
|
|
2548
|
+
"name": "Incorrect Permission Assignment for Critical Resource",
|
|
2549
|
+
"category": "Authorization"
|
|
2550
|
+
},
|
|
2551
|
+
{
|
|
2552
|
+
"id": "CWE-77",
|
|
2553
|
+
"name": "Improper Neutralization of Special Elements used in a Command (Command Injection)",
|
|
2554
|
+
"category": "Injection"
|
|
2555
|
+
},
|
|
2556
|
+
{
|
|
2557
|
+
"id": "CWE-78",
|
|
2558
|
+
"name": "Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)",
|
|
2559
|
+
"category": "Injection"
|
|
2560
|
+
},
|
|
2561
|
+
{
|
|
2562
|
+
"id": "CWE-787",
|
|
2563
|
+
"name": "Out-of-bounds Write",
|
|
2564
|
+
"category": "Memory Safety"
|
|
2565
|
+
},
|
|
2566
|
+
{
|
|
2567
|
+
"id": "CWE-79",
|
|
2568
|
+
"name": "Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)",
|
|
2569
|
+
"category": "Injection"
|
|
2570
|
+
},
|
|
2571
|
+
{
|
|
2572
|
+
"id": "CWE-798",
|
|
2573
|
+
"name": "Use of Hard-coded Credentials",
|
|
2574
|
+
"category": "Credentials"
|
|
2575
|
+
},
|
|
2576
|
+
{
|
|
2577
|
+
"id": "CWE-829",
|
|
2578
|
+
"name": "Inclusion of Functionality from Untrusted Control Sphere",
|
|
2579
|
+
"category": "Supply Chain"
|
|
2580
|
+
},
|
|
2581
|
+
{
|
|
2582
|
+
"id": "CWE-862",
|
|
2583
|
+
"name": "Missing Authorization",
|
|
2584
|
+
"category": "Authorization"
|
|
2585
|
+
},
|
|
2586
|
+
{
|
|
2587
|
+
"id": "CWE-863",
|
|
2588
|
+
"name": "Incorrect Authorization",
|
|
2589
|
+
"category": "Authorization"
|
|
2590
|
+
},
|
|
2591
|
+
{
|
|
2592
|
+
"id": "CWE-89",
|
|
2593
|
+
"name": "Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)",
|
|
2594
|
+
"category": "Injection"
|
|
2595
|
+
},
|
|
2596
|
+
{
|
|
2597
|
+
"id": "CWE-918",
|
|
2598
|
+
"name": "Server-Side Request Forgery (SSRF)",
|
|
2599
|
+
"category": "Network"
|
|
2600
|
+
},
|
|
2601
|
+
{
|
|
2602
|
+
"id": "CWE-94",
|
|
2603
|
+
"name": "Improper Control of Generation of Code (Code Injection)",
|
|
2604
|
+
"category": "Injection"
|
|
2605
|
+
}
|
|
2606
|
+
],
|
|
2607
|
+
"atlas": [
|
|
2608
|
+
{
|
|
2609
|
+
"id": "AML.T0010",
|
|
2610
|
+
"name": "ML Supply Chain Compromise",
|
|
2611
|
+
"tactic": "Initial Access"
|
|
2612
|
+
},
|
|
2613
|
+
{
|
|
2614
|
+
"id": "AML.T0016",
|
|
2615
|
+
"name": "Obtain Capabilities: Develop Capabilities",
|
|
2616
|
+
"tactic": "Resource Development"
|
|
2617
|
+
},
|
|
2618
|
+
{
|
|
2619
|
+
"id": "AML.T0017",
|
|
2620
|
+
"name": "Discover ML Model Ontology",
|
|
2621
|
+
"tactic": "Discovery"
|
|
2622
|
+
},
|
|
2623
|
+
{
|
|
2624
|
+
"id": "AML.T0018",
|
|
2625
|
+
"name": "Backdoor ML Model",
|
|
2626
|
+
"tactic": "Persistence"
|
|
2627
|
+
},
|
|
2628
|
+
{
|
|
2629
|
+
"id": "AML.T0020",
|
|
2630
|
+
"name": "Poison Training Data",
|
|
2631
|
+
"tactic": "ML Attack Staging"
|
|
2632
|
+
},
|
|
2633
|
+
{
|
|
2634
|
+
"id": "AML.T0043",
|
|
2635
|
+
"name": "Craft Adversarial Data",
|
|
2636
|
+
"tactic": "ML Attack Staging"
|
|
2637
|
+
},
|
|
2638
|
+
{
|
|
2639
|
+
"id": "AML.T0051",
|
|
2640
|
+
"name": "LLM Prompt Injection",
|
|
2641
|
+
"tactic": "Execution"
|
|
2642
|
+
},
|
|
2643
|
+
{
|
|
2644
|
+
"id": "AML.T0096",
|
|
2645
|
+
"name": "AI API as Covert C2 Channel",
|
|
2646
|
+
"tactic": "Command and Control"
|
|
2647
|
+
}
|
|
2648
|
+
],
|
|
2649
|
+
"d3fend": [
|
|
2650
|
+
{
|
|
2651
|
+
"id": "D3-ASLR",
|
|
2652
|
+
"name": "Address Space Layout Randomization",
|
|
2653
|
+
"tactic": "Harden"
|
|
2654
|
+
},
|
|
2655
|
+
{
|
|
2656
|
+
"id": "D3-CBAN",
|
|
2657
|
+
"name": "Certificate-based Authentication",
|
|
2658
|
+
"tactic": "Harden"
|
|
2659
|
+
},
|
|
2660
|
+
{
|
|
2661
|
+
"id": "D3-CSPP",
|
|
2662
|
+
"name": "Client-server Payload Profiling",
|
|
2663
|
+
"tactic": "Detect"
|
|
2664
|
+
},
|
|
2665
|
+
{
|
|
2666
|
+
"id": "D3-EAL",
|
|
2667
|
+
"name": "Executable Allowlisting",
|
|
2668
|
+
"tactic": "Harden"
|
|
2669
|
+
},
|
|
2670
|
+
{
|
|
2671
|
+
"id": "D3-EHB",
|
|
2672
|
+
"name": "Executable Hashbased Allowlist",
|
|
2673
|
+
"tactic": "Harden"
|
|
2674
|
+
},
|
|
2675
|
+
{
|
|
2676
|
+
"id": "D3-IOPR",
|
|
2677
|
+
"name": "Input/Output Profiling Resource",
|
|
2678
|
+
"tactic": "Detect"
|
|
2679
|
+
},
|
|
2680
|
+
{
|
|
2681
|
+
"id": "D3-MFA",
|
|
2682
|
+
"name": "Multi-factor Authentication",
|
|
2683
|
+
"tactic": "Harden"
|
|
2684
|
+
},
|
|
2685
|
+
{
|
|
2686
|
+
"id": "D3-NTA",
|
|
2687
|
+
"name": "Network Traffic Analysis",
|
|
2688
|
+
"tactic": "Detect"
|
|
2689
|
+
},
|
|
2690
|
+
{
|
|
2691
|
+
"id": "D3-PHRA",
|
|
2692
|
+
"name": "Process Hardware Resource Access",
|
|
2693
|
+
"tactic": "Isolate"
|
|
2694
|
+
},
|
|
2695
|
+
{
|
|
2696
|
+
"id": "D3-PSEP",
|
|
2697
|
+
"name": "Process Segment Execution Prevention",
|
|
2698
|
+
"tactic": "Harden"
|
|
2699
|
+
}
|
|
2700
|
+
],
|
|
2701
|
+
"framework_gaps": [
|
|
2702
|
+
{
|
|
2703
|
+
"id": "ALL-MCP-TOOL-TRUST",
|
|
2704
|
+
"framework": "ALL",
|
|
2705
|
+
"control_name": "MCP/Agent Tool Trust Boundaries"
|
|
2706
|
+
},
|
|
2707
|
+
{
|
|
2708
|
+
"id": "CIS-Controls-v8-Control7",
|
|
2709
|
+
"framework": "CIS Controls v8",
|
|
2710
|
+
"control_name": "Continuous Vulnerability Management"
|
|
2711
|
+
},
|
|
2712
|
+
{
|
|
2713
|
+
"id": "CMMC-2.0-Level-2",
|
|
2714
|
+
"framework": "CMMC 2.0 (Cybersecurity Maturity Model Certification) Level 2",
|
|
2715
|
+
"control_name": "Level 2 — Advanced (110 NIST 800-171 Rev 2 controls)"
|
|
2716
|
+
},
|
|
2717
|
+
{
|
|
2718
|
+
"id": "CycloneDX-v1.6-SBOM",
|
|
2719
|
+
"framework": "CycloneDX v1.6 (OWASP SBOM standard)",
|
|
2720
|
+
"control_name": "Software Bill of Materials"
|
|
2721
|
+
},
|
|
2722
|
+
{
|
|
2723
|
+
"id": "FedRAMP-Rev5-Moderate",
|
|
2724
|
+
"framework": "FedRAMP Rev 5 Moderate",
|
|
2725
|
+
"control_name": "FedRAMP Moderate baseline (NIST 800-53 Rev 5 tailoring)"
|
|
2726
|
+
},
|
|
2727
|
+
{
|
|
2728
|
+
"id": "HITRUST-CSF-v11.4-09.l",
|
|
2729
|
+
"framework": "HITRUST CSF v11.4",
|
|
2730
|
+
"control_name": "Outsourced services management"
|
|
2731
|
+
},
|
|
2732
|
+
{
|
|
2733
|
+
"id": "IEC-62443-3-3",
|
|
2734
|
+
"framework": "IEC 62443-3-3 (Industrial communication networks — security for IACS)",
|
|
2735
|
+
"control_name": "System security requirements and security levels"
|
|
2736
|
+
},
|
|
2737
|
+
{
|
|
2738
|
+
"id": "ISO-27001-2022-A.8.28",
|
|
2739
|
+
"framework": "ISO/IEC 27001:2022",
|
|
2740
|
+
"control_name": "Secure coding"
|
|
2741
|
+
},
|
|
2742
|
+
{
|
|
2743
|
+
"id": "ISO-27001-2022-A.8.30",
|
|
2744
|
+
"framework": "ISO/IEC 27001:2022",
|
|
2745
|
+
"control_name": "Outsourced development"
|
|
2746
|
+
},
|
|
2747
|
+
{
|
|
2748
|
+
"id": "ISO-27001-2022-A.8.8",
|
|
2749
|
+
"framework": "ISO/IEC 27001:2022",
|
|
2750
|
+
"control_name": "Management of technical vulnerabilities"
|
|
2751
|
+
},
|
|
2752
|
+
{
|
|
2753
|
+
"id": "ISO-IEC-23894-2023-clause-7",
|
|
2754
|
+
"framework": "ISO/IEC 23894:2023 (AI Risk Management Guidance)",
|
|
2755
|
+
"control_name": "AI risk management process"
|
|
2756
|
+
},
|
|
2757
|
+
{
|
|
2758
|
+
"id": "ISO-IEC-42001-2023-clause-6.1.2",
|
|
2759
|
+
"framework": "ISO/IEC 42001:2023 (AI Management System)",
|
|
2760
|
+
"control_name": "AI risk assessment"
|
|
2761
|
+
},
|
|
2762
|
+
{
|
|
2763
|
+
"id": "NERC-CIP-007-6-R4",
|
|
2764
|
+
"framework": "NERC CIP-007-6 (BES Cyber System Security Management)",
|
|
2765
|
+
"control_name": "Security event monitoring"
|
|
2766
|
+
},
|
|
2767
|
+
{
|
|
2768
|
+
"id": "NIS2-Art21-patch-management",
|
|
2769
|
+
"framework": "EU NIS2 Directive",
|
|
2770
|
+
"control_name": "Vulnerability handling and disclosure"
|
|
2771
|
+
},
|
|
2772
|
+
{
|
|
2773
|
+
"id": "NIST-800-115",
|
|
2774
|
+
"framework": "NIST SP 800-115 (Technical Guide to Information Security Testing and Assessment)",
|
|
2775
|
+
"control_name": "Technical Guide to Information Security Testing and Assessment"
|
|
2776
|
+
},
|
|
2777
|
+
{
|
|
2778
|
+
"id": "NIST-800-218-SSDF",
|
|
2779
|
+
"framework": "NIST SP 800-218 (Secure Software Development Framework v1.1)",
|
|
2780
|
+
"control_name": "Secure Software Development Framework"
|
|
2781
|
+
},
|
|
2782
|
+
{
|
|
2783
|
+
"id": "NIST-800-53-AC-2",
|
|
2784
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
2785
|
+
"control_name": "Account Management"
|
|
2786
|
+
},
|
|
2787
|
+
{
|
|
2788
|
+
"id": "NIST-800-53-CM-7",
|
|
2789
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
2790
|
+
"control_name": "Least Functionality"
|
|
2791
|
+
},
|
|
2792
|
+
{
|
|
2793
|
+
"id": "NIST-800-53-SA-12",
|
|
2794
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
2795
|
+
"control_name": "Supply Chain Protection"
|
|
2796
|
+
},
|
|
2797
|
+
{
|
|
2798
|
+
"id": "NIST-800-53-SC-8",
|
|
2799
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
2800
|
+
"control_name": "Transmission Confidentiality and Integrity"
|
|
2801
|
+
},
|
|
2802
|
+
{
|
|
2803
|
+
"id": "NIST-800-53-SI-2",
|
|
2804
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
2805
|
+
"control_name": "Flaw Remediation"
|
|
2806
|
+
},
|
|
2807
|
+
{
|
|
2808
|
+
"id": "NIST-800-82r3",
|
|
2809
|
+
"framework": "NIST SP 800-82 Rev 3 (Guide to OT Security)",
|
|
2810
|
+
"control_name": "Guide to Operational Technology (OT) Security"
|
|
2811
|
+
},
|
|
2812
|
+
{
|
|
2813
|
+
"id": "NIST-AI-RMF-MEASURE-2.5",
|
|
2814
|
+
"framework": "NIST AI RMF 1.0",
|
|
2815
|
+
"control_name": "AI system to human interaction evaluation"
|
|
2816
|
+
},
|
|
2817
|
+
{
|
|
2818
|
+
"id": "OWASP-ASVS-v5.0-V14",
|
|
2819
|
+
"framework": "OWASP ASVS v5.0",
|
|
2820
|
+
"control_name": "Configuration verification"
|
|
2821
|
+
},
|
|
2822
|
+
{
|
|
2823
|
+
"id": "OWASP-LLM-Top-10-2025-LLM01",
|
|
2824
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
2825
|
+
"control_name": "Prompt Injection"
|
|
2826
|
+
},
|
|
2827
|
+
{
|
|
2828
|
+
"id": "OWASP-LLM-Top-10-2025-LLM06",
|
|
2829
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
2830
|
+
"control_name": "Excessive Agency"
|
|
2831
|
+
},
|
|
2832
|
+
{
|
|
2833
|
+
"id": "OWASP-LLM-Top-10-2025-LLM08",
|
|
2834
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
2835
|
+
"control_name": "Vector and Embedding Weaknesses"
|
|
2836
|
+
},
|
|
2837
|
+
{
|
|
2838
|
+
"id": "OWASP-Pen-Testing-Guide-v5",
|
|
2839
|
+
"framework": "OWASP Web Security Testing Guide v5 (WSTG)",
|
|
2840
|
+
"control_name": "Web application penetration testing methodology"
|
|
2841
|
+
},
|
|
2842
|
+
{
|
|
2843
|
+
"id": "PCI-DSS-4.0-6.3.3",
|
|
2844
|
+
"framework": "PCI DSS 4.0",
|
|
2845
|
+
"control_name": "All system components are protected from known vulnerabilities by installing applicable security patches/updates"
|
|
2846
|
+
},
|
|
2847
|
+
{
|
|
2848
|
+
"id": "PTES-Pre-engagement",
|
|
2849
|
+
"framework": "Penetration Testing Execution Standard (PTES)",
|
|
2850
|
+
"control_name": "Pre-engagement Interactions"
|
|
2851
|
+
},
|
|
2852
|
+
{
|
|
2853
|
+
"id": "SLSA-v1.0-Build-L3",
|
|
2854
|
+
"framework": "SLSA v1.0 (Supply-chain Levels for Software Artifacts) — Build Track",
|
|
2855
|
+
"control_name": "Hardened build platform with non-falsifiable provenance"
|
|
2856
|
+
},
|
|
2857
|
+
{
|
|
2858
|
+
"id": "SOC2-CC9-vendor-management",
|
|
2859
|
+
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
2860
|
+
"control_name": "Risk Mitigation — Vendor and Business Partner Risk"
|
|
2861
|
+
},
|
|
2862
|
+
{
|
|
2863
|
+
"id": "SPDX-v3.0-SBOM",
|
|
2864
|
+
"framework": "SPDX v3.0 (ISO/IEC 5962-aligned SBOM standard)",
|
|
2865
|
+
"control_name": "Software Package Data Exchange — SBOM"
|
|
2866
|
+
},
|
|
2867
|
+
{
|
|
2868
|
+
"id": "SWIFT-CSCF-v2026-1.1",
|
|
2869
|
+
"framework": "SWIFT Customer Security Controls Framework v2026",
|
|
2870
|
+
"control_name": "SWIFT Environment Protection"
|
|
2871
|
+
},
|
|
2872
|
+
{
|
|
2873
|
+
"id": "VEX-CSAF-v2.1",
|
|
2874
|
+
"framework": "VEX via OASIS CSAF 2.1 (Common Security Advisory Framework)",
|
|
2875
|
+
"control_name": "Vulnerability Exploitability eXchange profile"
|
|
2876
|
+
}
|
|
2877
|
+
],
|
|
2878
|
+
"attack_refs": [
|
|
2879
|
+
"T0855",
|
|
2880
|
+
"T0883",
|
|
2881
|
+
"T1059",
|
|
2882
|
+
"T1068",
|
|
2883
|
+
"T1078",
|
|
2884
|
+
"T1133",
|
|
2885
|
+
"T1190",
|
|
2886
|
+
"T1195.001",
|
|
2887
|
+
"T1195.002",
|
|
2888
|
+
"T1505",
|
|
2889
|
+
"T1548.001",
|
|
2890
|
+
"T1554",
|
|
2891
|
+
"T1565",
|
|
2892
|
+
"T1567",
|
|
2893
|
+
"T1610",
|
|
2894
|
+
"T1611"
|
|
2895
|
+
],
|
|
2896
|
+
"rfc_refs": [
|
|
2897
|
+
"RFC-4301",
|
|
2898
|
+
"RFC-4303",
|
|
2899
|
+
"RFC-6749",
|
|
2900
|
+
"RFC-7296",
|
|
2901
|
+
"RFC-7519",
|
|
2902
|
+
"RFC-8032",
|
|
2903
|
+
"RFC-8446",
|
|
2904
|
+
"RFC-8725",
|
|
2905
|
+
"RFC-9114",
|
|
2906
|
+
"RFC-9421",
|
|
2907
|
+
"RFC-9700"
|
|
2908
|
+
]
|
|
2909
|
+
}
|
|
2910
|
+
},
|
|
2911
|
+
"CVE-2026-46300": {
|
|
2912
|
+
"name": "Fragnesia",
|
|
2913
|
+
"rwep": 35,
|
|
2914
|
+
"cvss": 7.8,
|
|
2915
|
+
"cisa_kev": false,
|
|
2916
|
+
"referencing_skills": [
|
|
2917
|
+
"kernel-lpe-triage",
|
|
2918
|
+
"attack-surface-pentest",
|
|
2919
|
+
"ot-ics-security",
|
|
2920
|
+
"coordinated-vuln-disclosure",
|
|
2921
|
+
"sector-energy"
|
|
2922
|
+
],
|
|
2923
|
+
"chain": {
|
|
2924
|
+
"cwes": [
|
|
2925
|
+
{
|
|
2926
|
+
"id": "CWE-1037",
|
|
2927
|
+
"name": "Processor Optimization Removal or Modification of Security-critical Code",
|
|
2928
|
+
"category": "Hardware / Side Channel"
|
|
2929
|
+
},
|
|
2930
|
+
{
|
|
2931
|
+
"id": "CWE-125",
|
|
2932
|
+
"name": "Out-of-bounds Read",
|
|
2933
|
+
"category": "Memory Safety"
|
|
2934
|
+
},
|
|
2935
|
+
{
|
|
2936
|
+
"id": "CWE-1357",
|
|
2937
|
+
"name": "Reliance on Insufficiently Trustworthy Component",
|
|
2938
|
+
"category": "Supply Chain"
|
|
2939
|
+
},
|
|
2940
|
+
{
|
|
2941
|
+
"id": "CWE-1395",
|
|
2942
|
+
"name": "Dependency on Vulnerable Third-Party Component",
|
|
2943
|
+
"category": "Supply Chain"
|
|
2944
|
+
},
|
|
2945
|
+
{
|
|
2946
|
+
"id": "CWE-22",
|
|
2947
|
+
"name": "Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)",
|
|
2948
|
+
"category": "Path/Resource"
|
|
2949
|
+
},
|
|
2950
|
+
{
|
|
2951
|
+
"id": "CWE-269",
|
|
2952
|
+
"name": "Improper Privilege Management",
|
|
2953
|
+
"category": "Authorization"
|
|
2954
|
+
},
|
|
2955
|
+
{
|
|
2956
|
+
"id": "CWE-287",
|
|
2957
|
+
"name": "Improper Authentication",
|
|
2958
|
+
"category": "Authentication"
|
|
2959
|
+
},
|
|
2960
|
+
{
|
|
2961
|
+
"id": "CWE-306",
|
|
2962
|
+
"name": "Missing Authentication for Critical Function",
|
|
2963
|
+
"category": "Authentication"
|
|
2964
|
+
},
|
|
2965
|
+
{
|
|
2966
|
+
"id": "CWE-352",
|
|
2967
|
+
"name": "Cross-Site Request Forgery (CSRF)",
|
|
2968
|
+
"category": "Session"
|
|
2969
|
+
},
|
|
2970
|
+
{
|
|
2971
|
+
"id": "CWE-362",
|
|
2972
|
+
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition)",
|
|
2973
|
+
"category": "Concurrency"
|
|
2974
|
+
},
|
|
2975
|
+
{
|
|
2976
|
+
"id": "CWE-416",
|
|
2977
|
+
"name": "Use After Free",
|
|
2978
|
+
"category": "Memory Safety"
|
|
2979
|
+
},
|
|
2980
|
+
{
|
|
2981
|
+
"id": "CWE-434",
|
|
2982
|
+
"name": "Unrestricted Upload of File with Dangerous Type",
|
|
2983
|
+
"category": "File Handling"
|
|
2984
|
+
},
|
|
2985
|
+
{
|
|
2986
|
+
"id": "CWE-672",
|
|
2987
|
+
"name": "Operation on a Resource after Expiration or Release",
|
|
2988
|
+
"category": "Memory Safety"
|
|
2989
|
+
},
|
|
2990
|
+
{
|
|
2991
|
+
"id": "CWE-732",
|
|
2992
|
+
"name": "Incorrect Permission Assignment for Critical Resource",
|
|
2993
|
+
"category": "Authorization"
|
|
2994
|
+
},
|
|
2995
|
+
{
|
|
2996
|
+
"id": "CWE-78",
|
|
2997
|
+
"name": "Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)",
|
|
2998
|
+
"category": "Injection"
|
|
1626
2999
|
},
|
|
1627
3000
|
{
|
|
1628
3001
|
"id": "CWE-787",
|
|
1629
3002
|
"name": "Out-of-bounds Write",
|
|
1630
3003
|
"category": "Memory Safety"
|
|
3004
|
+
},
|
|
3005
|
+
{
|
|
3006
|
+
"id": "CWE-79",
|
|
3007
|
+
"name": "Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)",
|
|
3008
|
+
"category": "Injection"
|
|
3009
|
+
},
|
|
3010
|
+
{
|
|
3011
|
+
"id": "CWE-798",
|
|
3012
|
+
"name": "Use of Hard-coded Credentials",
|
|
3013
|
+
"category": "Credentials"
|
|
3014
|
+
},
|
|
3015
|
+
{
|
|
3016
|
+
"id": "CWE-89",
|
|
3017
|
+
"name": "Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)",
|
|
3018
|
+
"category": "Injection"
|
|
3019
|
+
},
|
|
3020
|
+
{
|
|
3021
|
+
"id": "CWE-918",
|
|
3022
|
+
"name": "Server-Side Request Forgery (SSRF)",
|
|
3023
|
+
"category": "Network"
|
|
1631
3024
|
}
|
|
1632
3025
|
],
|
|
1633
3026
|
"atlas": [
|
|
1634
3027
|
{
|
|
1635
|
-
"id": "AML.
|
|
1636
|
-
"name": "
|
|
1637
|
-
"tactic": "
|
|
3028
|
+
"id": "AML.T0010",
|
|
3029
|
+
"name": "ML Supply Chain Compromise",
|
|
3030
|
+
"tactic": "Initial Access"
|
|
3031
|
+
},
|
|
3032
|
+
{
|
|
3033
|
+
"id": "AML.T0043",
|
|
3034
|
+
"name": "Craft Adversarial Data",
|
|
3035
|
+
"tactic": "ML Attack Staging"
|
|
1638
3036
|
},
|
|
1639
3037
|
{
|
|
1640
3038
|
"id": "AML.T0051",
|
|
1641
3039
|
"name": "LLM Prompt Injection",
|
|
1642
3040
|
"tactic": "Execution"
|
|
1643
|
-
},
|
|
1644
|
-
{
|
|
1645
|
-
"id": "AML.T0096",
|
|
1646
|
-
"name": "AI API as Covert C2 Channel",
|
|
1647
|
-
"tactic": "Command and Control"
|
|
1648
3041
|
}
|
|
1649
3042
|
],
|
|
1650
3043
|
"d3fend": [
|
|
@@ -1663,31 +3056,11 @@
|
|
|
1663
3056
|
"name": "Executable Allowlisting",
|
|
1664
3057
|
"tactic": "Harden"
|
|
1665
3058
|
},
|
|
1666
|
-
{
|
|
1667
|
-
"id": "D3-FE",
|
|
1668
|
-
"name": "File Encryption",
|
|
1669
|
-
"tactic": "Harden"
|
|
1670
|
-
},
|
|
1671
|
-
{
|
|
1672
|
-
"id": "D3-IOPR",
|
|
1673
|
-
"name": "Input/Output Profiling Resource",
|
|
1674
|
-
"tactic": "Detect"
|
|
1675
|
-
},
|
|
1676
|
-
{
|
|
1677
|
-
"id": "D3-MENCR",
|
|
1678
|
-
"name": "Message Encryption",
|
|
1679
|
-
"tactic": "Harden"
|
|
1680
|
-
},
|
|
1681
3059
|
{
|
|
1682
3060
|
"id": "D3-NTA",
|
|
1683
3061
|
"name": "Network Traffic Analysis",
|
|
1684
3062
|
"tactic": "Detect"
|
|
1685
3063
|
},
|
|
1686
|
-
{
|
|
1687
|
-
"id": "D3-NTPM",
|
|
1688
|
-
"name": "Network Traffic Policy Mapping",
|
|
1689
|
-
"tactic": "Model"
|
|
1690
|
-
},
|
|
1691
3064
|
{
|
|
1692
3065
|
"id": "D3-PHRA",
|
|
1693
3066
|
"name": "Process Hardware Resource Access",
|
|
@@ -1706,14 +3079,9 @@
|
|
|
1706
3079
|
"control_name": "Continuous Vulnerability Management"
|
|
1707
3080
|
},
|
|
1708
3081
|
{
|
|
1709
|
-
"id": "
|
|
1710
|
-
"framework": "
|
|
1711
|
-
"control_name": "
|
|
1712
|
-
},
|
|
1713
|
-
{
|
|
1714
|
-
"id": "ISO-27001-2022-A.8.16",
|
|
1715
|
-
"framework": "ISO/IEC 27001:2022",
|
|
1716
|
-
"control_name": "Monitoring activities"
|
|
3082
|
+
"id": "IEC-62443-3-3",
|
|
3083
|
+
"framework": "IEC 62443-3-3 (Industrial communication networks — security for IACS)",
|
|
3084
|
+
"control_name": "System security requirements and security levels"
|
|
1717
3085
|
},
|
|
1718
3086
|
{
|
|
1719
3087
|
"id": "ISO-27001-2022-A.8.8",
|
|
@@ -1721,9 +3089,9 @@
|
|
|
1721
3089
|
"control_name": "Management of technical vulnerabilities"
|
|
1722
3090
|
},
|
|
1723
3091
|
{
|
|
1724
|
-
"id": "
|
|
1725
|
-
"framework": "
|
|
1726
|
-
"control_name": "
|
|
3092
|
+
"id": "NERC-CIP-007-6-R4",
|
|
3093
|
+
"framework": "NERC CIP-007-6 (BES Cyber System Security Management)",
|
|
3094
|
+
"control_name": "Security event monitoring"
|
|
1727
3095
|
},
|
|
1728
3096
|
{
|
|
1729
3097
|
"id": "NIS2-Art21-patch-management",
|
|
@@ -1731,14 +3099,14 @@
|
|
|
1731
3099
|
"control_name": "Vulnerability handling and disclosure"
|
|
1732
3100
|
},
|
|
1733
3101
|
{
|
|
1734
|
-
"id": "NIST-800-
|
|
1735
|
-
"framework": "NIST SP 800-
|
|
1736
|
-
"control_name": "
|
|
3102
|
+
"id": "NIST-800-115",
|
|
3103
|
+
"framework": "NIST SP 800-115 (Technical Guide to Information Security Testing and Assessment)",
|
|
3104
|
+
"control_name": "Technical Guide to Information Security Testing and Assessment"
|
|
1737
3105
|
},
|
|
1738
3106
|
{
|
|
1739
|
-
"id": "NIST-800-
|
|
1740
|
-
"framework": "NIST SP 800-
|
|
1741
|
-
"control_name": "
|
|
3107
|
+
"id": "NIST-800-218-SSDF",
|
|
3108
|
+
"framework": "NIST SP 800-218 (Secure Software Development Framework v1.1)",
|
|
3109
|
+
"control_name": "Secure Software Development Framework"
|
|
1742
3110
|
},
|
|
1743
3111
|
{
|
|
1744
3112
|
"id": "NIST-800-53-SC-8",
|
|
@@ -1750,90 +3118,49 @@
|
|
|
1750
3118
|
"framework": "NIST SP 800-53 Rev 5",
|
|
1751
3119
|
"control_name": "Flaw Remediation"
|
|
1752
3120
|
},
|
|
3121
|
+
{
|
|
3122
|
+
"id": "NIST-800-82r3",
|
|
3123
|
+
"framework": "NIST SP 800-82 Rev 3 (Guide to OT Security)",
|
|
3124
|
+
"control_name": "Guide to Operational Technology (OT) Security"
|
|
3125
|
+
},
|
|
3126
|
+
{
|
|
3127
|
+
"id": "OWASP-Pen-Testing-Guide-v5",
|
|
3128
|
+
"framework": "OWASP Web Security Testing Guide v5 (WSTG)",
|
|
3129
|
+
"control_name": "Web application penetration testing methodology"
|
|
3130
|
+
},
|
|
1753
3131
|
{
|
|
1754
3132
|
"id": "PCI-DSS-4.0-6.3.3",
|
|
1755
3133
|
"framework": "PCI DSS 4.0",
|
|
1756
3134
|
"control_name": "All system components are protected from known vulnerabilities by installing applicable security patches/updates"
|
|
1757
3135
|
},
|
|
1758
3136
|
{
|
|
1759
|
-
"id": "
|
|
3137
|
+
"id": "PTES-Pre-engagement",
|
|
3138
|
+
"framework": "Penetration Testing Execution Standard (PTES)",
|
|
3139
|
+
"control_name": "Pre-engagement Interactions"
|
|
3140
|
+
},
|
|
3141
|
+
{
|
|
3142
|
+
"id": "SOC2-CC9-vendor-management",
|
|
1760
3143
|
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
1761
|
-
"control_name": "
|
|
3144
|
+
"control_name": "Risk Mitigation — Vendor and Business Partner Risk"
|
|
1762
3145
|
}
|
|
1763
3146
|
],
|
|
1764
3147
|
"attack_refs": [
|
|
1765
|
-
"
|
|
3148
|
+
"T0855",
|
|
3149
|
+
"T0883",
|
|
3150
|
+
"T1059",
|
|
1766
3151
|
"T1068",
|
|
1767
|
-
"
|
|
1768
|
-
"
|
|
1769
|
-
"
|
|
1770
|
-
"
|
|
3152
|
+
"T1078",
|
|
3153
|
+
"T1133",
|
|
3154
|
+
"T1190",
|
|
3155
|
+
"T1548.001"
|
|
1771
3156
|
],
|
|
1772
3157
|
"rfc_refs": [
|
|
1773
|
-
"DRAFT-IETF-TLS-ECDHE-MLKEM",
|
|
1774
|
-
"DRAFT-IETF-TLS-HYBRID-DESIGN",
|
|
1775
3158
|
"RFC-4301",
|
|
1776
3159
|
"RFC-4303",
|
|
1777
|
-
"RFC-7296"
|
|
1778
|
-
"RFC-8032",
|
|
1779
|
-
"RFC-8446",
|
|
1780
|
-
"RFC-9106",
|
|
1781
|
-
"RFC-9180",
|
|
1782
|
-
"RFC-9420",
|
|
1783
|
-
"RFC-9458",
|
|
1784
|
-
"RFC-9794"
|
|
3160
|
+
"RFC-7296"
|
|
1785
3161
|
]
|
|
1786
3162
|
}
|
|
1787
3163
|
},
|
|
1788
|
-
"CVE-2026-45321": {
|
|
1789
|
-
"name": "Mini Shai-Hulud TanStack npm worm",
|
|
1790
|
-
"rwep": 45,
|
|
1791
|
-
"cvss": 9.6,
|
|
1792
|
-
"cisa_kev": false,
|
|
1793
|
-
"epss_score": 0.00039,
|
|
1794
|
-
"epss_percentile": 0.1179,
|
|
1795
|
-
"referencing_skills": [],
|
|
1796
|
-
"chain": {
|
|
1797
|
-
"cwes": [],
|
|
1798
|
-
"atlas": [],
|
|
1799
|
-
"d3fend": [],
|
|
1800
|
-
"framework_gaps": [],
|
|
1801
|
-
"attack_refs": [],
|
|
1802
|
-
"rfc_refs": []
|
|
1803
|
-
}
|
|
1804
|
-
},
|
|
1805
|
-
"MAL-2026-3083": {
|
|
1806
|
-
"name": "Elementary-Data PyPI Worm (Forged Release via GitHub Actions Script Injection)",
|
|
1807
|
-
"rwep": 45,
|
|
1808
|
-
"cvss": 9.3,
|
|
1809
|
-
"cisa_kev": false,
|
|
1810
|
-
"epss_score": null,
|
|
1811
|
-
"epss_percentile": null,
|
|
1812
|
-
"referencing_skills": [],
|
|
1813
|
-
"chain": {
|
|
1814
|
-
"cwes": [],
|
|
1815
|
-
"atlas": [],
|
|
1816
|
-
"d3fend": [],
|
|
1817
|
-
"framework_gaps": [],
|
|
1818
|
-
"attack_refs": [],
|
|
1819
|
-
"rfc_refs": []
|
|
1820
|
-
}
|
|
1821
|
-
},
|
|
1822
|
-
"CVE-2026-46300": {
|
|
1823
|
-
"name": "Fragnesia",
|
|
1824
|
-
"rwep": 35,
|
|
1825
|
-
"cvss": 7.8,
|
|
1826
|
-
"cisa_kev": false,
|
|
1827
|
-
"referencing_skills": [],
|
|
1828
|
-
"chain": {
|
|
1829
|
-
"cwes": [],
|
|
1830
|
-
"atlas": [],
|
|
1831
|
-
"d3fend": [],
|
|
1832
|
-
"framework_gaps": [],
|
|
1833
|
-
"attack_refs": [],
|
|
1834
|
-
"rfc_refs": []
|
|
1835
|
-
}
|
|
1836
|
-
},
|
|
1837
3164
|
"CVE-2024-21626": {
|
|
1838
3165
|
"name": "runc /proc/self/fd leak (Leaky Vessels)",
|
|
1839
3166
|
"rwep": 80,
|
|
@@ -2289,14 +3616,119 @@
|
|
|
2289
3616
|
"rfc_refs": []
|
|
2290
3617
|
}
|
|
2291
3618
|
},
|
|
2292
|
-
"CVE-2026-6973": {
|
|
2293
|
-
"name": "Ivanti EPMM Authenticated-Admin RCE",
|
|
2294
|
-
"rwep": 62,
|
|
2295
|
-
"cvss": 7.2,
|
|
3619
|
+
"CVE-2026-6973": {
|
|
3620
|
+
"name": "Ivanti EPMM Authenticated-Admin RCE",
|
|
3621
|
+
"rwep": 62,
|
|
3622
|
+
"cvss": 7.2,
|
|
3623
|
+
"cisa_kev": true,
|
|
3624
|
+
"epss_score": null,
|
|
3625
|
+
"referencing_skills": [
|
|
3626
|
+
"kernel-lpe-triage"
|
|
3627
|
+
],
|
|
3628
|
+
"chain": {
|
|
3629
|
+
"cwes": [
|
|
3630
|
+
{
|
|
3631
|
+
"id": "CWE-125",
|
|
3632
|
+
"name": "Out-of-bounds Read",
|
|
3633
|
+
"category": "Memory Safety"
|
|
3634
|
+
},
|
|
3635
|
+
{
|
|
3636
|
+
"id": "CWE-362",
|
|
3637
|
+
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition)",
|
|
3638
|
+
"category": "Concurrency"
|
|
3639
|
+
},
|
|
3640
|
+
{
|
|
3641
|
+
"id": "CWE-416",
|
|
3642
|
+
"name": "Use After Free",
|
|
3643
|
+
"category": "Memory Safety"
|
|
3644
|
+
},
|
|
3645
|
+
{
|
|
3646
|
+
"id": "CWE-672",
|
|
3647
|
+
"name": "Operation on a Resource after Expiration or Release",
|
|
3648
|
+
"category": "Memory Safety"
|
|
3649
|
+
},
|
|
3650
|
+
{
|
|
3651
|
+
"id": "CWE-787",
|
|
3652
|
+
"name": "Out-of-bounds Write",
|
|
3653
|
+
"category": "Memory Safety"
|
|
3654
|
+
}
|
|
3655
|
+
],
|
|
3656
|
+
"atlas": [],
|
|
3657
|
+
"d3fend": [
|
|
3658
|
+
{
|
|
3659
|
+
"id": "D3-ASLR",
|
|
3660
|
+
"name": "Address Space Layout Randomization",
|
|
3661
|
+
"tactic": "Harden"
|
|
3662
|
+
},
|
|
3663
|
+
{
|
|
3664
|
+
"id": "D3-EAL",
|
|
3665
|
+
"name": "Executable Allowlisting",
|
|
3666
|
+
"tactic": "Harden"
|
|
3667
|
+
},
|
|
3668
|
+
{
|
|
3669
|
+
"id": "D3-PHRA",
|
|
3670
|
+
"name": "Process Hardware Resource Access",
|
|
3671
|
+
"tactic": "Isolate"
|
|
3672
|
+
},
|
|
3673
|
+
{
|
|
3674
|
+
"id": "D3-PSEP",
|
|
3675
|
+
"name": "Process Segment Execution Prevention",
|
|
3676
|
+
"tactic": "Harden"
|
|
3677
|
+
}
|
|
3678
|
+
],
|
|
3679
|
+
"framework_gaps": [
|
|
3680
|
+
{
|
|
3681
|
+
"id": "CIS-Controls-v8-Control7",
|
|
3682
|
+
"framework": "CIS Controls v8",
|
|
3683
|
+
"control_name": "Continuous Vulnerability Management"
|
|
3684
|
+
},
|
|
3685
|
+
{
|
|
3686
|
+
"id": "ISO-27001-2022-A.8.8",
|
|
3687
|
+
"framework": "ISO/IEC 27001:2022",
|
|
3688
|
+
"control_name": "Management of technical vulnerabilities"
|
|
3689
|
+
},
|
|
3690
|
+
{
|
|
3691
|
+
"id": "NIS2-Art21-patch-management",
|
|
3692
|
+
"framework": "EU NIS2 Directive",
|
|
3693
|
+
"control_name": "Vulnerability handling and disclosure"
|
|
3694
|
+
},
|
|
3695
|
+
{
|
|
3696
|
+
"id": "NIST-800-53-SC-8",
|
|
3697
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
3698
|
+
"control_name": "Transmission Confidentiality and Integrity"
|
|
3699
|
+
},
|
|
3700
|
+
{
|
|
3701
|
+
"id": "NIST-800-53-SI-2",
|
|
3702
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
3703
|
+
"control_name": "Flaw Remediation"
|
|
3704
|
+
},
|
|
3705
|
+
{
|
|
3706
|
+
"id": "PCI-DSS-4.0-6.3.3",
|
|
3707
|
+
"framework": "PCI DSS 4.0",
|
|
3708
|
+
"control_name": "All system components are protected from known vulnerabilities by installing applicable security patches/updates"
|
|
3709
|
+
}
|
|
3710
|
+
],
|
|
3711
|
+
"attack_refs": [
|
|
3712
|
+
"T1068",
|
|
3713
|
+
"T1548.001"
|
|
3714
|
+
],
|
|
3715
|
+
"rfc_refs": [
|
|
3716
|
+
"RFC-4301",
|
|
3717
|
+
"RFC-4303",
|
|
3718
|
+
"RFC-7296"
|
|
3719
|
+
]
|
|
3720
|
+
}
|
|
3721
|
+
},
|
|
3722
|
+
"CVE-2026-42897": {
|
|
3723
|
+
"name": "Microsoft Exchange OWA Stored XSS / Spoofing Zero-Day",
|
|
3724
|
+
"rwep": 93,
|
|
3725
|
+
"cvss": 8.1,
|
|
2296
3726
|
"cisa_kev": true,
|
|
2297
3727
|
"epss_score": null,
|
|
2298
3728
|
"referencing_skills": [
|
|
2299
|
-
"kernel-lpe-triage"
|
|
3729
|
+
"kernel-lpe-triage",
|
|
3730
|
+
"ai-c2-detection",
|
|
3731
|
+
"dlp-gap-analysis"
|
|
2300
3732
|
],
|
|
2301
3733
|
"chain": {
|
|
2302
3734
|
"cwes": [
|
|
@@ -2305,6 +3737,16 @@
|
|
|
2305
3737
|
"name": "Out-of-bounds Read",
|
|
2306
3738
|
"category": "Memory Safety"
|
|
2307
3739
|
},
|
|
3740
|
+
{
|
|
3741
|
+
"id": "CWE-1426",
|
|
3742
|
+
"name": "Improper Validation of Generative AI Output",
|
|
3743
|
+
"category": "AI/ML"
|
|
3744
|
+
},
|
|
3745
|
+
{
|
|
3746
|
+
"id": "CWE-200",
|
|
3747
|
+
"name": "Exposure of Sensitive Information to an Unauthorized Actor",
|
|
3748
|
+
"category": "Information Exposure"
|
|
3749
|
+
},
|
|
2308
3750
|
{
|
|
2309
3751
|
"id": "CWE-362",
|
|
2310
3752
|
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition)",
|
|
@@ -2326,18 +3768,69 @@
|
|
|
2326
3768
|
"category": "Memory Safety"
|
|
2327
3769
|
}
|
|
2328
3770
|
],
|
|
2329
|
-
"atlas": [
|
|
3771
|
+
"atlas": [
|
|
3772
|
+
{
|
|
3773
|
+
"id": "AML.T0017",
|
|
3774
|
+
"name": "Discover ML Model Ontology",
|
|
3775
|
+
"tactic": "Discovery"
|
|
3776
|
+
},
|
|
3777
|
+
{
|
|
3778
|
+
"id": "AML.T0051",
|
|
3779
|
+
"name": "LLM Prompt Injection",
|
|
3780
|
+
"tactic": "Execution"
|
|
3781
|
+
},
|
|
3782
|
+
{
|
|
3783
|
+
"id": "AML.T0096",
|
|
3784
|
+
"name": "AI API as Covert C2 Channel",
|
|
3785
|
+
"tactic": "Command and Control"
|
|
3786
|
+
}
|
|
3787
|
+
],
|
|
2330
3788
|
"d3fend": [
|
|
2331
3789
|
{
|
|
2332
3790
|
"id": "D3-ASLR",
|
|
2333
3791
|
"name": "Address Space Layout Randomization",
|
|
2334
3792
|
"tactic": "Harden"
|
|
2335
3793
|
},
|
|
3794
|
+
{
|
|
3795
|
+
"id": "D3-CA",
|
|
3796
|
+
"name": "Certificate Analysis",
|
|
3797
|
+
"tactic": "Detect"
|
|
3798
|
+
},
|
|
3799
|
+
{
|
|
3800
|
+
"id": "D3-CSPP",
|
|
3801
|
+
"name": "Client-server Payload Profiling",
|
|
3802
|
+
"tactic": "Detect"
|
|
3803
|
+
},
|
|
3804
|
+
{
|
|
3805
|
+
"id": "D3-DA",
|
|
3806
|
+
"name": "Domain Analysis",
|
|
3807
|
+
"tactic": "Detect"
|
|
3808
|
+
},
|
|
2336
3809
|
{
|
|
2337
3810
|
"id": "D3-EAL",
|
|
2338
3811
|
"name": "Executable Allowlisting",
|
|
2339
3812
|
"tactic": "Harden"
|
|
2340
3813
|
},
|
|
3814
|
+
{
|
|
3815
|
+
"id": "D3-IOPR",
|
|
3816
|
+
"name": "Input/Output Profiling Resource",
|
|
3817
|
+
"tactic": "Detect"
|
|
3818
|
+
},
|
|
3819
|
+
{
|
|
3820
|
+
"id": "D3-NI",
|
|
3821
|
+
"name": "Network Isolation",
|
|
3822
|
+
"tactic": "Isolate"
|
|
3823
|
+
},
|
|
3824
|
+
{
|
|
3825
|
+
"id": "D3-NTA",
|
|
3826
|
+
"name": "Network Traffic Analysis",
|
|
3827
|
+
"tactic": "Detect"
|
|
3828
|
+
},
|
|
3829
|
+
{
|
|
3830
|
+
"id": "D3-NTPM",
|
|
3831
|
+
"name": "Network Traffic Policy Mapping",
|
|
3832
|
+
"tactic": "Model"
|
|
3833
|
+
},
|
|
2341
3834
|
{
|
|
2342
3835
|
"id": "D3-PHRA",
|
|
2343
3836
|
"name": "Process Hardware Resource Access",
|
|
@@ -2355,16 +3848,41 @@
|
|
|
2355
3848
|
"framework": "CIS Controls v8",
|
|
2356
3849
|
"control_name": "Continuous Vulnerability Management"
|
|
2357
3850
|
},
|
|
3851
|
+
{
|
|
3852
|
+
"id": "HIPAA-Security-Rule-164.312(a)(1)",
|
|
3853
|
+
"framework": "HIPAA Security Rule (45 CFR § 164.312)",
|
|
3854
|
+
"control_name": "Access control standard (technical safeguards)"
|
|
3855
|
+
},
|
|
3856
|
+
{
|
|
3857
|
+
"id": "ISO-27001-2022-A.8.16",
|
|
3858
|
+
"framework": "ISO/IEC 27001:2022",
|
|
3859
|
+
"control_name": "Monitoring activities"
|
|
3860
|
+
},
|
|
2358
3861
|
{
|
|
2359
3862
|
"id": "ISO-27001-2022-A.8.8",
|
|
2360
3863
|
"framework": "ISO/IEC 27001:2022",
|
|
2361
3864
|
"control_name": "Management of technical vulnerabilities"
|
|
2362
3865
|
},
|
|
3866
|
+
{
|
|
3867
|
+
"id": "ISO-IEC-42001-2023-clause-6.1.2",
|
|
3868
|
+
"framework": "ISO/IEC 42001:2023 (AI Management System)",
|
|
3869
|
+
"control_name": "AI risk assessment"
|
|
3870
|
+
},
|
|
2363
3871
|
{
|
|
2364
3872
|
"id": "NIS2-Art21-patch-management",
|
|
2365
3873
|
"framework": "EU NIS2 Directive",
|
|
2366
3874
|
"control_name": "Vulnerability handling and disclosure"
|
|
2367
3875
|
},
|
|
3876
|
+
{
|
|
3877
|
+
"id": "NIST-800-53-SC-28",
|
|
3878
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
3879
|
+
"control_name": "Protection of Information at Rest"
|
|
3880
|
+
},
|
|
3881
|
+
{
|
|
3882
|
+
"id": "NIST-800-53-SC-7",
|
|
3883
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
3884
|
+
"control_name": "Boundary Protection"
|
|
3885
|
+
},
|
|
2368
3886
|
{
|
|
2369
3887
|
"id": "NIST-800-53-SC-8",
|
|
2370
3888
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -2375,39 +3893,75 @@
|
|
|
2375
3893
|
"framework": "NIST SP 800-53 Rev 5",
|
|
2376
3894
|
"control_name": "Flaw Remediation"
|
|
2377
3895
|
},
|
|
3896
|
+
{
|
|
3897
|
+
"id": "NIST-800-53-SI-3",
|
|
3898
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
3899
|
+
"control_name": "Malicious Code Protection"
|
|
3900
|
+
},
|
|
2378
3901
|
{
|
|
2379
3902
|
"id": "PCI-DSS-4.0-6.3.3",
|
|
2380
3903
|
"framework": "PCI DSS 4.0",
|
|
2381
3904
|
"control_name": "All system components are protected from known vulnerabilities by installing applicable security patches/updates"
|
|
3905
|
+
},
|
|
3906
|
+
{
|
|
3907
|
+
"id": "SOC2-CC7-anomaly-detection",
|
|
3908
|
+
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
3909
|
+
"control_name": "System Operations — Threat and Vulnerability Management"
|
|
2382
3910
|
}
|
|
2383
3911
|
],
|
|
2384
3912
|
"attack_refs": [
|
|
3913
|
+
"T1041",
|
|
2385
3914
|
"T1068",
|
|
2386
|
-
"
|
|
3915
|
+
"T1071",
|
|
3916
|
+
"T1102",
|
|
3917
|
+
"T1213",
|
|
3918
|
+
"T1530",
|
|
3919
|
+
"T1548.001",
|
|
3920
|
+
"T1567",
|
|
3921
|
+
"T1568"
|
|
2387
3922
|
],
|
|
2388
3923
|
"rfc_refs": [
|
|
2389
3924
|
"RFC-4301",
|
|
2390
3925
|
"RFC-4303",
|
|
2391
|
-
"RFC-7296"
|
|
3926
|
+
"RFC-7296",
|
|
3927
|
+
"RFC-8446",
|
|
3928
|
+
"RFC-9000",
|
|
3929
|
+
"RFC-9114",
|
|
3930
|
+
"RFC-9180",
|
|
3931
|
+
"RFC-9421",
|
|
3932
|
+
"RFC-9458"
|
|
2392
3933
|
]
|
|
2393
3934
|
}
|
|
2394
3935
|
},
|
|
2395
|
-
"CVE-2026-
|
|
2396
|
-
"name": "Microsoft
|
|
2397
|
-
"rwep":
|
|
2398
|
-
"cvss":
|
|
3936
|
+
"CVE-2026-32202": {
|
|
3937
|
+
"name": "Microsoft Windows Shell LNK Mark-of-the-Web Bypass (APT28)",
|
|
3938
|
+
"rwep": 85,
|
|
3939
|
+
"cvss": 7.5,
|
|
2399
3940
|
"cisa_kev": true,
|
|
2400
3941
|
"epss_score": null,
|
|
2401
3942
|
"referencing_skills": [
|
|
2402
|
-
"kernel-lpe-triage"
|
|
3943
|
+
"kernel-lpe-triage",
|
|
3944
|
+
"ai-attack-surface",
|
|
3945
|
+
"ai-c2-detection",
|
|
3946
|
+
"email-security-anti-phishing"
|
|
2403
3947
|
],
|
|
2404
3948
|
"chain": {
|
|
2405
3949
|
"cwes": [
|
|
3950
|
+
{
|
|
3951
|
+
"id": "CWE-1039",
|
|
3952
|
+
"name": "Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbations",
|
|
3953
|
+
"category": "AI/ML"
|
|
3954
|
+
},
|
|
2406
3955
|
{
|
|
2407
3956
|
"id": "CWE-125",
|
|
2408
3957
|
"name": "Out-of-bounds Read",
|
|
2409
3958
|
"category": "Memory Safety"
|
|
2410
3959
|
},
|
|
3960
|
+
{
|
|
3961
|
+
"id": "CWE-1426",
|
|
3962
|
+
"name": "Improper Validation of Generative AI Output",
|
|
3963
|
+
"category": "AI/ML"
|
|
3964
|
+
},
|
|
2411
3965
|
{
|
|
2412
3966
|
"id": "CWE-362",
|
|
2413
3967
|
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition)",
|
|
@@ -2427,47 +3981,163 @@
|
|
|
2427
3981
|
"id": "CWE-787",
|
|
2428
3982
|
"name": "Out-of-bounds Write",
|
|
2429
3983
|
"category": "Memory Safety"
|
|
3984
|
+
},
|
|
3985
|
+
{
|
|
3986
|
+
"id": "CWE-94",
|
|
3987
|
+
"name": "Improper Control of Generation of Code (Code Injection)",
|
|
3988
|
+
"category": "Injection"
|
|
3989
|
+
}
|
|
3990
|
+
],
|
|
3991
|
+
"atlas": [
|
|
3992
|
+
{
|
|
3993
|
+
"id": "AML.T0016",
|
|
3994
|
+
"name": "Obtain Capabilities: Develop Capabilities",
|
|
3995
|
+
"tactic": "Resource Development"
|
|
3996
|
+
},
|
|
3997
|
+
{
|
|
3998
|
+
"id": "AML.T0017",
|
|
3999
|
+
"name": "Discover ML Model Ontology",
|
|
4000
|
+
"tactic": "Discovery"
|
|
4001
|
+
},
|
|
4002
|
+
{
|
|
4003
|
+
"id": "AML.T0018",
|
|
4004
|
+
"name": "Backdoor ML Model",
|
|
4005
|
+
"tactic": "Persistence"
|
|
4006
|
+
},
|
|
4007
|
+
{
|
|
4008
|
+
"id": "AML.T0020",
|
|
4009
|
+
"name": "Poison Training Data",
|
|
4010
|
+
"tactic": "ML Attack Staging"
|
|
4011
|
+
},
|
|
4012
|
+
{
|
|
4013
|
+
"id": "AML.T0043",
|
|
4014
|
+
"name": "Craft Adversarial Data",
|
|
4015
|
+
"tactic": "ML Attack Staging"
|
|
4016
|
+
},
|
|
4017
|
+
{
|
|
4018
|
+
"id": "AML.T0051",
|
|
4019
|
+
"name": "LLM Prompt Injection",
|
|
4020
|
+
"tactic": "Execution"
|
|
4021
|
+
},
|
|
4022
|
+
{
|
|
4023
|
+
"id": "AML.T0054",
|
|
4024
|
+
"name": "LLM Jailbreak",
|
|
4025
|
+
"tactic": "Defense Evasion"
|
|
4026
|
+
},
|
|
4027
|
+
{
|
|
4028
|
+
"id": "AML.T0096",
|
|
4029
|
+
"name": "AI API as Covert C2 Channel",
|
|
4030
|
+
"tactic": "Command and Control"
|
|
2430
4031
|
}
|
|
2431
4032
|
],
|
|
2432
|
-
"atlas": [],
|
|
2433
4033
|
"d3fend": [
|
|
2434
4034
|
{
|
|
2435
4035
|
"id": "D3-ASLR",
|
|
2436
4036
|
"name": "Address Space Layout Randomization",
|
|
2437
4037
|
"tactic": "Harden"
|
|
2438
4038
|
},
|
|
4039
|
+
{
|
|
4040
|
+
"id": "D3-CA",
|
|
4041
|
+
"name": "Certificate Analysis",
|
|
4042
|
+
"tactic": "Detect"
|
|
4043
|
+
},
|
|
4044
|
+
{
|
|
4045
|
+
"id": "D3-CSPP",
|
|
4046
|
+
"name": "Client-server Payload Profiling",
|
|
4047
|
+
"tactic": "Detect"
|
|
4048
|
+
},
|
|
4049
|
+
{
|
|
4050
|
+
"id": "D3-DA",
|
|
4051
|
+
"name": "Domain Analysis",
|
|
4052
|
+
"tactic": "Detect"
|
|
4053
|
+
},
|
|
2439
4054
|
{
|
|
2440
4055
|
"id": "D3-EAL",
|
|
2441
4056
|
"name": "Executable Allowlisting",
|
|
2442
4057
|
"tactic": "Harden"
|
|
2443
4058
|
},
|
|
4059
|
+
{
|
|
4060
|
+
"id": "D3-IOPR",
|
|
4061
|
+
"name": "Input/Output Profiling Resource",
|
|
4062
|
+
"tactic": "Detect"
|
|
4063
|
+
},
|
|
4064
|
+
{
|
|
4065
|
+
"id": "D3-NI",
|
|
4066
|
+
"name": "Network Isolation",
|
|
4067
|
+
"tactic": "Isolate"
|
|
4068
|
+
},
|
|
4069
|
+
{
|
|
4070
|
+
"id": "D3-NTA",
|
|
4071
|
+
"name": "Network Traffic Analysis",
|
|
4072
|
+
"tactic": "Detect"
|
|
4073
|
+
},
|
|
4074
|
+
{
|
|
4075
|
+
"id": "D3-NTPM",
|
|
4076
|
+
"name": "Network Traffic Policy Mapping",
|
|
4077
|
+
"tactic": "Model"
|
|
4078
|
+
},
|
|
2444
4079
|
{
|
|
2445
4080
|
"id": "D3-PHRA",
|
|
2446
4081
|
"name": "Process Hardware Resource Access",
|
|
2447
4082
|
"tactic": "Isolate"
|
|
2448
4083
|
},
|
|
2449
|
-
{
|
|
2450
|
-
"id": "D3-PSEP",
|
|
2451
|
-
"name": "Process Segment Execution Prevention",
|
|
2452
|
-
"tactic": "Harden"
|
|
2453
|
-
}
|
|
2454
|
-
],
|
|
2455
|
-
"framework_gaps": [
|
|
4084
|
+
{
|
|
4085
|
+
"id": "D3-PSEP",
|
|
4086
|
+
"name": "Process Segment Execution Prevention",
|
|
4087
|
+
"tactic": "Harden"
|
|
4088
|
+
}
|
|
4089
|
+
],
|
|
4090
|
+
"framework_gaps": [
|
|
4091
|
+
{
|
|
4092
|
+
"id": "ALL-AI-PIPELINE-INTEGRITY",
|
|
4093
|
+
"framework": "ALL",
|
|
4094
|
+
"control_name": "AI Pipeline Integrity"
|
|
4095
|
+
},
|
|
4096
|
+
{
|
|
4097
|
+
"id": "ALL-PROMPT-INJECTION-ACCESS-CONTROL",
|
|
4098
|
+
"framework": "ALL",
|
|
4099
|
+
"control_name": "Prompt Injection as Access Control Failure"
|
|
4100
|
+
},
|
|
2456
4101
|
{
|
|
2457
4102
|
"id": "CIS-Controls-v8-Control7",
|
|
2458
4103
|
"framework": "CIS Controls v8",
|
|
2459
4104
|
"control_name": "Continuous Vulnerability Management"
|
|
2460
4105
|
},
|
|
4106
|
+
{
|
|
4107
|
+
"id": "ISO-27001-2022-A.8.16",
|
|
4108
|
+
"framework": "ISO/IEC 27001:2022",
|
|
4109
|
+
"control_name": "Monitoring activities"
|
|
4110
|
+
},
|
|
4111
|
+
{
|
|
4112
|
+
"id": "ISO-27001-2022-A.8.28",
|
|
4113
|
+
"framework": "ISO/IEC 27001:2022",
|
|
4114
|
+
"control_name": "Secure coding"
|
|
4115
|
+
},
|
|
2461
4116
|
{
|
|
2462
4117
|
"id": "ISO-27001-2022-A.8.8",
|
|
2463
4118
|
"framework": "ISO/IEC 27001:2022",
|
|
2464
4119
|
"control_name": "Management of technical vulnerabilities"
|
|
2465
4120
|
},
|
|
4121
|
+
{
|
|
4122
|
+
"id": "ISO-IEC-23894-2023-clause-7",
|
|
4123
|
+
"framework": "ISO/IEC 23894:2023 (AI Risk Management Guidance)",
|
|
4124
|
+
"control_name": "AI risk management process"
|
|
4125
|
+
},
|
|
2466
4126
|
{
|
|
2467
4127
|
"id": "NIS2-Art21-patch-management",
|
|
2468
4128
|
"framework": "EU NIS2 Directive",
|
|
2469
4129
|
"control_name": "Vulnerability handling and disclosure"
|
|
2470
4130
|
},
|
|
4131
|
+
{
|
|
4132
|
+
"id": "NIST-800-53-AC-2",
|
|
4133
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
4134
|
+
"control_name": "Account Management"
|
|
4135
|
+
},
|
|
4136
|
+
{
|
|
4137
|
+
"id": "NIST-800-53-SC-7",
|
|
4138
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
4139
|
+
"control_name": "Boundary Protection"
|
|
4140
|
+
},
|
|
2471
4141
|
{
|
|
2472
4142
|
"id": "NIST-800-53-SC-8",
|
|
2473
4143
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -2478,27 +4148,68 @@
|
|
|
2478
4148
|
"framework": "NIST SP 800-53 Rev 5",
|
|
2479
4149
|
"control_name": "Flaw Remediation"
|
|
2480
4150
|
},
|
|
4151
|
+
{
|
|
4152
|
+
"id": "NIST-800-53-SI-3",
|
|
4153
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
4154
|
+
"control_name": "Malicious Code Protection"
|
|
4155
|
+
},
|
|
4156
|
+
{
|
|
4157
|
+
"id": "OWASP-LLM-Top-10-2025-LLM01",
|
|
4158
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
4159
|
+
"control_name": "Prompt Injection"
|
|
4160
|
+
},
|
|
4161
|
+
{
|
|
4162
|
+
"id": "OWASP-LLM-Top-10-2025-LLM02",
|
|
4163
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
4164
|
+
"control_name": "Sensitive Information Disclosure"
|
|
4165
|
+
},
|
|
2481
4166
|
{
|
|
2482
4167
|
"id": "PCI-DSS-4.0-6.3.3",
|
|
2483
4168
|
"framework": "PCI DSS 4.0",
|
|
2484
4169
|
"control_name": "All system components are protected from known vulnerabilities by installing applicable security patches/updates"
|
|
4170
|
+
},
|
|
4171
|
+
{
|
|
4172
|
+
"id": "SOC2-CC6-logical-access",
|
|
4173
|
+
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
4174
|
+
"control_name": "Logical and Physical Access Controls"
|
|
4175
|
+
},
|
|
4176
|
+
{
|
|
4177
|
+
"id": "SOC2-CC7-anomaly-detection",
|
|
4178
|
+
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
4179
|
+
"control_name": "System Operations — Threat and Vulnerability Management"
|
|
2485
4180
|
}
|
|
2486
4181
|
],
|
|
2487
4182
|
"attack_refs": [
|
|
4183
|
+
"T1059",
|
|
2488
4184
|
"T1068",
|
|
2489
|
-
"
|
|
4185
|
+
"T1071",
|
|
4186
|
+
"T1078",
|
|
4187
|
+
"T1102",
|
|
4188
|
+
"T1190",
|
|
4189
|
+
"T1548.001",
|
|
4190
|
+
"T1566",
|
|
4191
|
+
"T1566.001",
|
|
4192
|
+
"T1566.002",
|
|
4193
|
+
"T1566.003",
|
|
4194
|
+
"T1568"
|
|
2490
4195
|
],
|
|
2491
4196
|
"rfc_refs": [
|
|
2492
4197
|
"RFC-4301",
|
|
2493
4198
|
"RFC-4303",
|
|
2494
|
-
"RFC-7296"
|
|
4199
|
+
"RFC-7296",
|
|
4200
|
+
"RFC-8446",
|
|
4201
|
+
"RFC-9000",
|
|
4202
|
+
"RFC-9114",
|
|
4203
|
+
"RFC-9180",
|
|
4204
|
+
"RFC-9421",
|
|
4205
|
+
"RFC-9458"
|
|
2495
4206
|
]
|
|
2496
4207
|
}
|
|
2497
4208
|
},
|
|
2498
|
-
"CVE-2026-
|
|
2499
|
-
"name": "
|
|
2500
|
-
"rwep":
|
|
2501
|
-
"cvss": 7.
|
|
4209
|
+
"CVE-2026-33825": {
|
|
4210
|
+
"name": "BlueHammer — Microsoft Defender File-Remediation TOCTOU LPE",
|
|
4211
|
+
"rwep": 68,
|
|
4212
|
+
"cvss": 7.8,
|
|
2502
4213
|
"cisa_kev": true,
|
|
2503
4214
|
"epss_score": null,
|
|
2504
4215
|
"referencing_skills": [
|
|
@@ -2768,35 +4479,91 @@
|
|
|
2768
4479
|
]
|
|
2769
4480
|
}
|
|
2770
4481
|
},
|
|
2771
|
-
"
|
|
2772
|
-
"name": "
|
|
2773
|
-
"rwep":
|
|
2774
|
-
"cvss":
|
|
2775
|
-
"cisa_kev":
|
|
4482
|
+
"MAL-2026-NODE-IPC-STEALER": {
|
|
4483
|
+
"name": "node-ipc credential-stealer (expired-domain account-recovery compromise)",
|
|
4484
|
+
"rwep": 43,
|
|
4485
|
+
"cvss": 9.8,
|
|
4486
|
+
"cisa_kev": false,
|
|
2776
4487
|
"epss_score": null,
|
|
2777
4488
|
"referencing_skills": [
|
|
2778
|
-
"
|
|
2779
|
-
"
|
|
2780
|
-
"
|
|
2781
|
-
"
|
|
4489
|
+
"fuzz-testing-strategy",
|
|
4490
|
+
"supply-chain-integrity",
|
|
4491
|
+
"coordinated-vuln-disclosure",
|
|
4492
|
+
"threat-modeling-methodology",
|
|
4493
|
+
"webapp-security",
|
|
4494
|
+
"sector-federal-government",
|
|
4495
|
+
"api-security",
|
|
4496
|
+
"container-runtime-security",
|
|
4497
|
+
"mlops-security",
|
|
4498
|
+
"idp-incident-response"
|
|
2782
4499
|
],
|
|
2783
4500
|
"chain": {
|
|
2784
4501
|
"cwes": [
|
|
2785
4502
|
{
|
|
2786
|
-
"id": "CWE-
|
|
2787
|
-
"name": "
|
|
2788
|
-
"category": "
|
|
4503
|
+
"id": "CWE-1188",
|
|
4504
|
+
"name": "Initialization of a Resource with an Insecure Default",
|
|
4505
|
+
"category": "Configuration"
|
|
2789
4506
|
},
|
|
2790
4507
|
{
|
|
2791
4508
|
"id": "CWE-125",
|
|
2792
4509
|
"name": "Out-of-bounds Read",
|
|
2793
4510
|
"category": "Memory Safety"
|
|
2794
4511
|
},
|
|
4512
|
+
{
|
|
4513
|
+
"id": "CWE-1357",
|
|
4514
|
+
"name": "Reliance on Insufficiently Trustworthy Component",
|
|
4515
|
+
"category": "Supply Chain"
|
|
4516
|
+
},
|
|
4517
|
+
{
|
|
4518
|
+
"id": "CWE-1395",
|
|
4519
|
+
"name": "Dependency on Vulnerable Third-Party Component",
|
|
4520
|
+
"category": "Supply Chain"
|
|
4521
|
+
},
|
|
2795
4522
|
{
|
|
2796
4523
|
"id": "CWE-1426",
|
|
2797
4524
|
"name": "Improper Validation of Generative AI Output",
|
|
2798
4525
|
"category": "AI/ML"
|
|
2799
4526
|
},
|
|
4527
|
+
{
|
|
4528
|
+
"id": "CWE-20",
|
|
4529
|
+
"name": "Improper Input Validation",
|
|
4530
|
+
"category": "Validation"
|
|
4531
|
+
},
|
|
4532
|
+
{
|
|
4533
|
+
"id": "CWE-200",
|
|
4534
|
+
"name": "Exposure of Sensitive Information to an Unauthorized Actor",
|
|
4535
|
+
"category": "Information Exposure"
|
|
4536
|
+
},
|
|
4537
|
+
{
|
|
4538
|
+
"id": "CWE-22",
|
|
4539
|
+
"name": "Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)",
|
|
4540
|
+
"category": "Path/Resource"
|
|
4541
|
+
},
|
|
4542
|
+
{
|
|
4543
|
+
"id": "CWE-269",
|
|
4544
|
+
"name": "Improper Privilege Management",
|
|
4545
|
+
"category": "Authorization"
|
|
4546
|
+
},
|
|
4547
|
+
{
|
|
4548
|
+
"id": "CWE-284",
|
|
4549
|
+
"name": "Improper Access Control",
|
|
4550
|
+
"category": "Access Control"
|
|
4551
|
+
},
|
|
4552
|
+
{
|
|
4553
|
+
"id": "CWE-287",
|
|
4554
|
+
"name": "Improper Authentication",
|
|
4555
|
+
"category": "Authentication"
|
|
4556
|
+
},
|
|
4557
|
+
{
|
|
4558
|
+
"id": "CWE-345",
|
|
4559
|
+
"name": "Insufficient Verification of Data Authenticity",
|
|
4560
|
+
"category": "Authenticity / Supply Chain"
|
|
4561
|
+
},
|
|
4562
|
+
{
|
|
4563
|
+
"id": "CWE-352",
|
|
4564
|
+
"name": "Cross-Site Request Forgery (CSRF)",
|
|
4565
|
+
"category": "Session"
|
|
4566
|
+
},
|
|
2800
4567
|
{
|
|
2801
4568
|
"id": "CWE-362",
|
|
2802
4569
|
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition)",
|
|
@@ -2808,15 +4575,75 @@
|
|
|
2808
4575
|
"category": "Memory Safety"
|
|
2809
4576
|
},
|
|
2810
4577
|
{
|
|
2811
|
-
"id": "CWE-
|
|
2812
|
-
"name": "
|
|
2813
|
-
"category": "
|
|
4578
|
+
"id": "CWE-434",
|
|
4579
|
+
"name": "Unrestricted Upload of File with Dangerous Type",
|
|
4580
|
+
"category": "File Handling"
|
|
4581
|
+
},
|
|
4582
|
+
{
|
|
4583
|
+
"id": "CWE-494",
|
|
4584
|
+
"name": "Download of Code Without Integrity Check",
|
|
4585
|
+
"category": "Supply Chain"
|
|
4586
|
+
},
|
|
4587
|
+
{
|
|
4588
|
+
"id": "CWE-502",
|
|
4589
|
+
"name": "Deserialization of Untrusted Data",
|
|
4590
|
+
"category": "Serialization"
|
|
4591
|
+
},
|
|
4592
|
+
{
|
|
4593
|
+
"id": "CWE-522",
|
|
4594
|
+
"name": "Insufficiently Protected Credentials",
|
|
4595
|
+
"category": "Credentials Management"
|
|
4596
|
+
},
|
|
4597
|
+
{
|
|
4598
|
+
"id": "CWE-732",
|
|
4599
|
+
"name": "Incorrect Permission Assignment for Critical Resource",
|
|
4600
|
+
"category": "Authorization"
|
|
4601
|
+
},
|
|
4602
|
+
{
|
|
4603
|
+
"id": "CWE-77",
|
|
4604
|
+
"name": "Improper Neutralization of Special Elements used in a Command (Command Injection)",
|
|
4605
|
+
"category": "Injection"
|
|
4606
|
+
},
|
|
4607
|
+
{
|
|
4608
|
+
"id": "CWE-78",
|
|
4609
|
+
"name": "Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)",
|
|
4610
|
+
"category": "Injection"
|
|
2814
4611
|
},
|
|
2815
4612
|
{
|
|
2816
4613
|
"id": "CWE-787",
|
|
2817
4614
|
"name": "Out-of-bounds Write",
|
|
2818
4615
|
"category": "Memory Safety"
|
|
2819
4616
|
},
|
|
4617
|
+
{
|
|
4618
|
+
"id": "CWE-79",
|
|
4619
|
+
"name": "Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)",
|
|
4620
|
+
"category": "Injection"
|
|
4621
|
+
},
|
|
4622
|
+
{
|
|
4623
|
+
"id": "CWE-829",
|
|
4624
|
+
"name": "Inclusion of Functionality from Untrusted Control Sphere",
|
|
4625
|
+
"category": "Supply Chain"
|
|
4626
|
+
},
|
|
4627
|
+
{
|
|
4628
|
+
"id": "CWE-862",
|
|
4629
|
+
"name": "Missing Authorization",
|
|
4630
|
+
"category": "Authorization"
|
|
4631
|
+
},
|
|
4632
|
+
{
|
|
4633
|
+
"id": "CWE-863",
|
|
4634
|
+
"name": "Incorrect Authorization",
|
|
4635
|
+
"category": "Authorization"
|
|
4636
|
+
},
|
|
4637
|
+
{
|
|
4638
|
+
"id": "CWE-89",
|
|
4639
|
+
"name": "Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)",
|
|
4640
|
+
"category": "Injection"
|
|
4641
|
+
},
|
|
4642
|
+
{
|
|
4643
|
+
"id": "CWE-918",
|
|
4644
|
+
"name": "Server-Side Request Forgery (SSRF)",
|
|
4645
|
+
"category": "Network"
|
|
4646
|
+
},
|
|
2820
4647
|
{
|
|
2821
4648
|
"id": "CWE-94",
|
|
2822
4649
|
"name": "Improper Control of Generation of Code (Code Injection)",
|
|
@@ -2825,9 +4652,9 @@
|
|
|
2825
4652
|
],
|
|
2826
4653
|
"atlas": [
|
|
2827
4654
|
{
|
|
2828
|
-
"id": "AML.
|
|
2829
|
-
"name": "
|
|
2830
|
-
"tactic": "
|
|
4655
|
+
"id": "AML.T0010",
|
|
4656
|
+
"name": "ML Supply Chain Compromise",
|
|
4657
|
+
"tactic": "Initial Access"
|
|
2831
4658
|
},
|
|
2832
4659
|
{
|
|
2833
4660
|
"id": "AML.T0017",
|
|
@@ -2854,68 +4681,43 @@
|
|
|
2854
4681
|
"name": "LLM Prompt Injection",
|
|
2855
4682
|
"tactic": "Execution"
|
|
2856
4683
|
},
|
|
2857
|
-
{
|
|
2858
|
-
"id": "AML.T0054",
|
|
2859
|
-
"name": "LLM Jailbreak",
|
|
2860
|
-
"tactic": "Defense Evasion"
|
|
2861
|
-
},
|
|
2862
4684
|
{
|
|
2863
4685
|
"id": "AML.T0096",
|
|
2864
|
-
"name": "AI API as Covert C2 Channel",
|
|
2865
|
-
"tactic": "Command and Control"
|
|
2866
|
-
}
|
|
2867
|
-
],
|
|
2868
|
-
"d3fend": [
|
|
2869
|
-
{
|
|
2870
|
-
"id": "D3-ASLR",
|
|
2871
|
-
"name": "Address Space Layout Randomization",
|
|
2872
|
-
"tactic": "Harden"
|
|
2873
|
-
},
|
|
2874
|
-
{
|
|
2875
|
-
"id": "D3-CA",
|
|
2876
|
-
"name": "Certificate Analysis",
|
|
2877
|
-
"tactic": "Detect"
|
|
2878
|
-
},
|
|
2879
|
-
{
|
|
2880
|
-
"id": "D3-CSPP",
|
|
2881
|
-
"name": "Client-server Payload Profiling",
|
|
2882
|
-
"tactic": "Detect"
|
|
2883
|
-
},
|
|
4686
|
+
"name": "AI API as Covert C2 Channel",
|
|
4687
|
+
"tactic": "Command and Control"
|
|
4688
|
+
}
|
|
4689
|
+
],
|
|
4690
|
+
"d3fend": [
|
|
2884
4691
|
{
|
|
2885
|
-
"id": "D3-
|
|
2886
|
-
"name": "
|
|
2887
|
-
"tactic": "
|
|
4692
|
+
"id": "D3-CBAN",
|
|
4693
|
+
"name": "Certificate-based Authentication",
|
|
4694
|
+
"tactic": "Harden"
|
|
2888
4695
|
},
|
|
2889
4696
|
{
|
|
2890
4697
|
"id": "D3-EAL",
|
|
2891
4698
|
"name": "Executable Allowlisting",
|
|
2892
4699
|
"tactic": "Harden"
|
|
2893
4700
|
},
|
|
4701
|
+
{
|
|
4702
|
+
"id": "D3-EHB",
|
|
4703
|
+
"name": "Executable Hashbased Allowlist",
|
|
4704
|
+
"tactic": "Harden"
|
|
4705
|
+
},
|
|
2894
4706
|
{
|
|
2895
4707
|
"id": "D3-IOPR",
|
|
2896
4708
|
"name": "Input/Output Profiling Resource",
|
|
2897
4709
|
"tactic": "Detect"
|
|
2898
4710
|
},
|
|
2899
4711
|
{
|
|
2900
|
-
"id": "D3-
|
|
2901
|
-
"name": "
|
|
2902
|
-
"tactic": "
|
|
4712
|
+
"id": "D3-MFA",
|
|
4713
|
+
"name": "Multi-factor Authentication",
|
|
4714
|
+
"tactic": "Harden"
|
|
2903
4715
|
},
|
|
2904
4716
|
{
|
|
2905
4717
|
"id": "D3-NTA",
|
|
2906
4718
|
"name": "Network Traffic Analysis",
|
|
2907
4719
|
"tactic": "Detect"
|
|
2908
4720
|
},
|
|
2909
|
-
{
|
|
2910
|
-
"id": "D3-NTPM",
|
|
2911
|
-
"name": "Network Traffic Policy Mapping",
|
|
2912
|
-
"tactic": "Model"
|
|
2913
|
-
},
|
|
2914
|
-
{
|
|
2915
|
-
"id": "D3-PHRA",
|
|
2916
|
-
"name": "Process Hardware Resource Access",
|
|
2917
|
-
"tactic": "Isolate"
|
|
2918
|
-
},
|
|
2919
4721
|
{
|
|
2920
4722
|
"id": "D3-PSEP",
|
|
2921
4723
|
"name": "Process Segment Execution Prevention",
|
|
@@ -2924,24 +4726,39 @@
|
|
|
2924
4726
|
],
|
|
2925
4727
|
"framework_gaps": [
|
|
2926
4728
|
{
|
|
2927
|
-
"id": "
|
|
2928
|
-
"framework": "
|
|
2929
|
-
"control_name": "
|
|
4729
|
+
"id": "AU-ISM-1559-IdP",
|
|
4730
|
+
"framework": "AU ISM",
|
|
4731
|
+
"control_name": "Privileged Account Credential Management — IdP-tenant control-plane extension"
|
|
2930
4732
|
},
|
|
2931
4733
|
{
|
|
2932
|
-
"id": "
|
|
2933
|
-
"framework": "
|
|
2934
|
-
"control_name": "
|
|
4734
|
+
"id": "CMMC-2.0-Level-2",
|
|
4735
|
+
"framework": "CMMC 2.0 (Cybersecurity Maturity Model Certification) Level 2",
|
|
4736
|
+
"control_name": "Level 2 — Advanced (110 NIST 800-171 Rev 2 controls)"
|
|
2935
4737
|
},
|
|
2936
4738
|
{
|
|
2937
|
-
"id": "
|
|
2938
|
-
"framework": "
|
|
2939
|
-
"control_name": "
|
|
4739
|
+
"id": "CycloneDX-v1.6-SBOM",
|
|
4740
|
+
"framework": "CycloneDX v1.6 (OWASP SBOM standard)",
|
|
4741
|
+
"control_name": "Software Bill of Materials"
|
|
2940
4742
|
},
|
|
2941
4743
|
{
|
|
2942
|
-
"id": "
|
|
4744
|
+
"id": "DORA-Art-19-IdP-4h",
|
|
4745
|
+
"framework": "EU DORA",
|
|
4746
|
+
"control_name": "Major-ICT-related-incident notification — IdP-specific 4-hour clock"
|
|
4747
|
+
},
|
|
4748
|
+
{
|
|
4749
|
+
"id": "FedRAMP-Rev5-Moderate",
|
|
4750
|
+
"framework": "FedRAMP Rev 5 Moderate",
|
|
4751
|
+
"control_name": "FedRAMP Moderate baseline (NIST 800-53 Rev 5 tailoring)"
|
|
4752
|
+
},
|
|
4753
|
+
{
|
|
4754
|
+
"id": "HITRUST-CSF-v11.4-09.l",
|
|
4755
|
+
"framework": "HITRUST CSF v11.4",
|
|
4756
|
+
"control_name": "Outsourced services management"
|
|
4757
|
+
},
|
|
4758
|
+
{
|
|
4759
|
+
"id": "ISO-27001-2022-A.5.16-Federated",
|
|
2943
4760
|
"framework": "ISO/IEC 27001:2022",
|
|
2944
|
-
"control_name": "
|
|
4761
|
+
"control_name": "Identity Management + Authentication Information — federated-state extension"
|
|
2945
4762
|
},
|
|
2946
4763
|
{
|
|
2947
4764
|
"id": "ISO-27001-2022-A.8.28",
|
|
@@ -2959,9 +4776,24 @@
|
|
|
2959
4776
|
"control_name": "AI risk management process"
|
|
2960
4777
|
},
|
|
2961
4778
|
{
|
|
2962
|
-
"id": "
|
|
4779
|
+
"id": "ISO-IEC-42001-2023-clause-6.1.2",
|
|
4780
|
+
"framework": "ISO/IEC 42001:2023 (AI Management System)",
|
|
4781
|
+
"control_name": "AI risk assessment"
|
|
4782
|
+
},
|
|
4783
|
+
{
|
|
4784
|
+
"id": "NIS2-Art-21-Federated-Identity",
|
|
2963
4785
|
"framework": "EU NIS2 Directive",
|
|
2964
|
-
"control_name": "
|
|
4786
|
+
"control_name": "Cryptography + Access Control — federated-identity extension"
|
|
4787
|
+
},
|
|
4788
|
+
{
|
|
4789
|
+
"id": "NIST-800-115",
|
|
4790
|
+
"framework": "NIST SP 800-115 (Technical Guide to Information Security Testing and Assessment)",
|
|
4791
|
+
"control_name": "Technical Guide to Information Security Testing and Assessment"
|
|
4792
|
+
},
|
|
4793
|
+
{
|
|
4794
|
+
"id": "NIST-800-218-SSDF",
|
|
4795
|
+
"framework": "NIST SP 800-218 (Secure Software Development Framework v1.1)",
|
|
4796
|
+
"control_name": "Secure Software Development Framework"
|
|
2965
4797
|
},
|
|
2966
4798
|
{
|
|
2967
4799
|
"id": "NIST-800-53-AC-2",
|
|
@@ -2969,24 +4801,34 @@
|
|
|
2969
4801
|
"control_name": "Account Management"
|
|
2970
4802
|
},
|
|
2971
4803
|
{
|
|
2972
|
-
"id": "NIST-800-53-
|
|
4804
|
+
"id": "NIST-800-53-CM-7",
|
|
2973
4805
|
"framework": "NIST SP 800-53 Rev 5",
|
|
2974
|
-
"control_name": "
|
|
4806
|
+
"control_name": "Least Functionality"
|
|
2975
4807
|
},
|
|
2976
4808
|
{
|
|
2977
|
-
"id": "NIST-800-53-
|
|
2978
|
-
"framework": "NIST
|
|
2979
|
-
"control_name": "
|
|
4809
|
+
"id": "NIST-800-53-IA-5-Federated",
|
|
4810
|
+
"framework": "NIST 800-53 Rev.5",
|
|
4811
|
+
"control_name": "Authenticator Management — federated-trust extension"
|
|
2980
4812
|
},
|
|
2981
4813
|
{
|
|
2982
|
-
"id": "NIST-800-53-
|
|
4814
|
+
"id": "NIST-800-53-SA-12",
|
|
2983
4815
|
"framework": "NIST SP 800-53 Rev 5",
|
|
2984
|
-
"control_name": "
|
|
4816
|
+
"control_name": "Supply Chain Protection"
|
|
2985
4817
|
},
|
|
2986
4818
|
{
|
|
2987
|
-
"id": "NIST-
|
|
2988
|
-
"framework": "NIST
|
|
2989
|
-
"control_name": "
|
|
4819
|
+
"id": "NIST-AI-RMF-MEASURE-2.5",
|
|
4820
|
+
"framework": "NIST AI RMF 1.0",
|
|
4821
|
+
"control_name": "AI system to human interaction evaluation"
|
|
4822
|
+
},
|
|
4823
|
+
{
|
|
4824
|
+
"id": "OFAC-Sanctions-Threat-Actor-Negotiation",
|
|
4825
|
+
"framework": "US Treasury OFAC + EU sanctions overlay + UK OFSI",
|
|
4826
|
+
"control_name": "Sanctions screening on ransomware-payment / threat-actor negotiation"
|
|
4827
|
+
},
|
|
4828
|
+
{
|
|
4829
|
+
"id": "OWASP-ASVS-v5.0-V14",
|
|
4830
|
+
"framework": "OWASP ASVS v5.0",
|
|
4831
|
+
"control_name": "Configuration verification"
|
|
2990
4832
|
},
|
|
2991
4833
|
{
|
|
2992
4834
|
"id": "OWASP-LLM-Top-10-2025-LLM01",
|
|
@@ -2994,69 +4836,78 @@
|
|
|
2994
4836
|
"control_name": "Prompt Injection"
|
|
2995
4837
|
},
|
|
2996
4838
|
{
|
|
2997
|
-
"id": "OWASP-LLM-Top-10-2025-
|
|
4839
|
+
"id": "OWASP-LLM-Top-10-2025-LLM08",
|
|
2998
4840
|
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
2999
|
-
"control_name": "
|
|
4841
|
+
"control_name": "Vector and Embedding Weaknesses"
|
|
3000
4842
|
},
|
|
3001
4843
|
{
|
|
3002
|
-
"id": "
|
|
3003
|
-
"framework": "
|
|
3004
|
-
"control_name": "
|
|
4844
|
+
"id": "SLSA-v1.0-Build-L3",
|
|
4845
|
+
"framework": "SLSA v1.0 (Supply-chain Levels for Software Artifacts) — Build Track",
|
|
4846
|
+
"control_name": "Hardened build platform with non-falsifiable provenance"
|
|
3005
4847
|
},
|
|
3006
4848
|
{
|
|
3007
|
-
"id": "SOC2-CC6-
|
|
4849
|
+
"id": "SOC2-CC6-OAuth-Consent",
|
|
3008
4850
|
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
3009
|
-
"control_name": "Logical and Physical Access Controls"
|
|
4851
|
+
"control_name": "Logical and Physical Access Controls — OAuth consent extension"
|
|
3010
4852
|
},
|
|
3011
4853
|
{
|
|
3012
|
-
"id": "SOC2-
|
|
4854
|
+
"id": "SOC2-CC9-vendor-management",
|
|
3013
4855
|
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
3014
|
-
"control_name": "
|
|
4856
|
+
"control_name": "Risk Mitigation — Vendor and Business Partner Risk"
|
|
4857
|
+
},
|
|
4858
|
+
{
|
|
4859
|
+
"id": "SPDX-v3.0-SBOM",
|
|
4860
|
+
"framework": "SPDX v3.0 (ISO/IEC 5962-aligned SBOM standard)",
|
|
4861
|
+
"control_name": "Software Package Data Exchange — SBOM"
|
|
4862
|
+
},
|
|
4863
|
+
{
|
|
4864
|
+
"id": "SWIFT-CSCF-v2026-1.1",
|
|
4865
|
+
"framework": "SWIFT Customer Security Controls Framework v2026",
|
|
4866
|
+
"control_name": "SWIFT Environment Protection"
|
|
4867
|
+
},
|
|
4868
|
+
{
|
|
4869
|
+
"id": "UK-CAF-B2-IdP-Tenant",
|
|
4870
|
+
"framework": "UK NCSC CAF",
|
|
4871
|
+
"control_name": "Identity and Access Control — IdP-tenant control-plane extension"
|
|
4872
|
+
},
|
|
4873
|
+
{
|
|
4874
|
+
"id": "VEX-CSAF-v2.1",
|
|
4875
|
+
"framework": "VEX via OASIS CSAF 2.1 (Common Security Advisory Framework)",
|
|
4876
|
+
"control_name": "Vulnerability Exploitability eXchange profile"
|
|
3015
4877
|
}
|
|
3016
4878
|
],
|
|
3017
4879
|
"attack_refs": [
|
|
3018
4880
|
"T1059",
|
|
3019
4881
|
"T1068",
|
|
3020
|
-
"T1071",
|
|
3021
4882
|
"T1078",
|
|
3022
|
-
"
|
|
4883
|
+
"T1078.004",
|
|
4884
|
+
"T1098.001",
|
|
3023
4885
|
"T1190",
|
|
3024
|
-
"
|
|
3025
|
-
"
|
|
3026
|
-
"
|
|
3027
|
-
"
|
|
3028
|
-
"
|
|
3029
|
-
"
|
|
4886
|
+
"T1195.001",
|
|
4887
|
+
"T1195.002",
|
|
4888
|
+
"T1199",
|
|
4889
|
+
"T1505",
|
|
4890
|
+
"T1554",
|
|
4891
|
+
"T1556.007",
|
|
4892
|
+
"T1565",
|
|
4893
|
+
"T1567",
|
|
4894
|
+
"T1606.002",
|
|
4895
|
+
"T1610",
|
|
4896
|
+
"T1611"
|
|
3030
4897
|
],
|
|
3031
4898
|
"rfc_refs": [
|
|
3032
|
-
"RFC-
|
|
3033
|
-
"RFC-
|
|
3034
|
-
"RFC-
|
|
4899
|
+
"RFC-6749",
|
|
4900
|
+
"RFC-7519",
|
|
4901
|
+
"RFC-7591",
|
|
4902
|
+
"RFC-8032",
|
|
3035
4903
|
"RFC-8446",
|
|
3036
|
-
"RFC-
|
|
4904
|
+
"RFC-8725",
|
|
3037
4905
|
"RFC-9114",
|
|
3038
|
-
"RFC-9180",
|
|
3039
4906
|
"RFC-9421",
|
|
3040
|
-
"RFC-
|
|
4907
|
+
"RFC-9700"
|
|
3041
4908
|
]
|
|
3042
4909
|
}
|
|
3043
4910
|
},
|
|
3044
|
-
"MAL-2026-NODE-IPC-STEALER": {
|
|
3045
|
-
"name": "node-ipc credential-stealer (expired-domain account-recovery compromise)",
|
|
3046
|
-
"rwep": 43,
|
|
3047
|
-
"cvss": 9.8,
|
|
3048
|
-
"cisa_kev": false,
|
|
3049
|
-
"epss_score": null,
|
|
3050
|
-
"referencing_skills": [],
|
|
3051
|
-
"chain": {
|
|
3052
|
-
"cwes": [],
|
|
3053
|
-
"atlas": [],
|
|
3054
|
-
"d3fend": [],
|
|
3055
|
-
"framework_gaps": [],
|
|
3056
|
-
"attack_refs": [],
|
|
3057
|
-
"rfc_refs": []
|
|
3058
|
-
}
|
|
3059
|
-
},
|
|
3060
4911
|
"CWE-20": {
|
|
3061
4912
|
"name": "Improper Input Validation",
|
|
3062
4913
|
"category": "Validation",
|
|
@@ -3112,8 +4963,9 @@
|
|
|
3112
4963
|
"rfc_refs": []
|
|
3113
4964
|
},
|
|
3114
4965
|
"related_cves": [
|
|
3115
|
-
"CVE-
|
|
3116
|
-
"
|
|
4966
|
+
"CVE-2026-45321",
|
|
4967
|
+
"MAL-2026-3083",
|
|
4968
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
3117
4969
|
]
|
|
3118
4970
|
},
|
|
3119
4971
|
"CWE-22": {
|
|
@@ -3323,7 +5175,13 @@
|
|
|
3323
5175
|
"related_cves": [
|
|
3324
5176
|
"CVE-2025-53773",
|
|
3325
5177
|
"CVE-2026-30615",
|
|
3326
|
-
"CVE-2026-31431"
|
|
5178
|
+
"CVE-2026-31431",
|
|
5179
|
+
"CVE-2026-39884",
|
|
5180
|
+
"CVE-2026-42208",
|
|
5181
|
+
"CVE-2026-45321",
|
|
5182
|
+
"CVE-2026-46300",
|
|
5183
|
+
"MAL-2026-3083",
|
|
5184
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
3327
5185
|
]
|
|
3328
5186
|
},
|
|
3329
5187
|
"CWE-77": {
|
|
@@ -3500,7 +5358,12 @@
|
|
|
3500
5358
|
},
|
|
3501
5359
|
"related_cves": [
|
|
3502
5360
|
"CVE-2025-53773",
|
|
3503
|
-
"CVE-2026-30615"
|
|
5361
|
+
"CVE-2026-30615",
|
|
5362
|
+
"CVE-2026-39884",
|
|
5363
|
+
"CVE-2026-42208",
|
|
5364
|
+
"CVE-2026-45321",
|
|
5365
|
+
"MAL-2026-3083",
|
|
5366
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
3504
5367
|
]
|
|
3505
5368
|
},
|
|
3506
5369
|
"CWE-78": {
|
|
@@ -3630,9 +5493,13 @@
|
|
|
3630
5493
|
]
|
|
3631
5494
|
},
|
|
3632
5495
|
"related_cves": [
|
|
3633
|
-
"CVE-
|
|
3634
|
-
"CVE-2026-
|
|
3635
|
-
"CVE-2026-
|
|
5496
|
+
"CVE-2026-31431",
|
|
5497
|
+
"CVE-2026-39884",
|
|
5498
|
+
"CVE-2026-42208",
|
|
5499
|
+
"CVE-2026-45321",
|
|
5500
|
+
"CVE-2026-46300",
|
|
5501
|
+
"MAL-2026-3083",
|
|
5502
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
3636
5503
|
]
|
|
3637
5504
|
},
|
|
3638
5505
|
"CWE-79": {
|
|
@@ -3751,9 +5618,13 @@
|
|
|
3751
5618
|
]
|
|
3752
5619
|
},
|
|
3753
5620
|
"related_cves": [
|
|
3754
|
-
"CVE-
|
|
3755
|
-
"CVE-2026-
|
|
3756
|
-
"CVE-2026-
|
|
5621
|
+
"CVE-2026-31431",
|
|
5622
|
+
"CVE-2026-39884",
|
|
5623
|
+
"CVE-2026-42208",
|
|
5624
|
+
"CVE-2026-45321",
|
|
5625
|
+
"CVE-2026-46300",
|
|
5626
|
+
"MAL-2026-3083",
|
|
5627
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
3757
5628
|
]
|
|
3758
5629
|
},
|
|
3759
5630
|
"CWE-88": {
|
|
@@ -3886,9 +5757,13 @@
|
|
|
3886
5757
|
]
|
|
3887
5758
|
},
|
|
3888
5759
|
"related_cves": [
|
|
3889
|
-
"CVE-
|
|
3890
|
-
"CVE-2026-
|
|
3891
|
-
"CVE-2026-
|
|
5760
|
+
"CVE-2026-31431",
|
|
5761
|
+
"CVE-2026-39884",
|
|
5762
|
+
"CVE-2026-42208",
|
|
5763
|
+
"CVE-2026-45321",
|
|
5764
|
+
"CVE-2026-46300",
|
|
5765
|
+
"MAL-2026-3083",
|
|
5766
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
3892
5767
|
]
|
|
3893
5768
|
},
|
|
3894
5769
|
"CWE-94": {
|
|
@@ -4126,7 +6001,12 @@
|
|
|
4126
6001
|
"CVE-2025-53773",
|
|
4127
6002
|
"CVE-2026-30615",
|
|
4128
6003
|
"CVE-2026-32202",
|
|
4129
|
-
"CVE-2026-33825"
|
|
6004
|
+
"CVE-2026-33825",
|
|
6005
|
+
"CVE-2026-39884",
|
|
6006
|
+
"CVE-2026-42208",
|
|
6007
|
+
"CVE-2026-45321",
|
|
6008
|
+
"MAL-2026-3083",
|
|
6009
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
4130
6010
|
]
|
|
4131
6011
|
},
|
|
4132
6012
|
"CWE-123": {
|
|
@@ -4257,16 +6137,19 @@
|
|
|
4257
6137
|
]
|
|
4258
6138
|
},
|
|
4259
6139
|
"related_cves": [
|
|
4260
|
-
"CVE-2025-53773",
|
|
4261
6140
|
"CVE-2026-0300",
|
|
4262
|
-
"CVE-2026-30615",
|
|
4263
6141
|
"CVE-2026-31431",
|
|
4264
6142
|
"CVE-2026-32202",
|
|
4265
6143
|
"CVE-2026-33825",
|
|
6144
|
+
"CVE-2026-39884",
|
|
4266
6145
|
"CVE-2026-42897",
|
|
4267
6146
|
"CVE-2026-43284",
|
|
4268
6147
|
"CVE-2026-43500",
|
|
4269
|
-
"CVE-2026-
|
|
6148
|
+
"CVE-2026-45321",
|
|
6149
|
+
"CVE-2026-46300",
|
|
6150
|
+
"CVE-2026-6973",
|
|
6151
|
+
"MAL-2026-3083",
|
|
6152
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
4270
6153
|
]
|
|
4271
6154
|
},
|
|
4272
6155
|
"CWE-200": {
|
|
@@ -4480,8 +6363,13 @@
|
|
|
4480
6363
|
"related_cves": [
|
|
4481
6364
|
"CVE-2025-53773",
|
|
4482
6365
|
"CVE-2026-30615",
|
|
6366
|
+
"CVE-2026-39884",
|
|
6367
|
+
"CVE-2026-42208",
|
|
6368
|
+
"CVE-2026-42897",
|
|
4483
6369
|
"CVE-2026-43284",
|
|
4484
|
-
"CVE-2026-
|
|
6370
|
+
"CVE-2026-45321",
|
|
6371
|
+
"MAL-2026-3083",
|
|
6372
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
4485
6373
|
]
|
|
4486
6374
|
},
|
|
4487
6375
|
"CWE-250": {
|
|
@@ -4817,7 +6705,13 @@
|
|
|
4817
6705
|
"related_cves": [
|
|
4818
6706
|
"CVE-2025-53773",
|
|
4819
6707
|
"CVE-2026-30615",
|
|
4820
|
-
"CVE-2026-31431"
|
|
6708
|
+
"CVE-2026-31431",
|
|
6709
|
+
"CVE-2026-39884",
|
|
6710
|
+
"CVE-2026-42208",
|
|
6711
|
+
"CVE-2026-45321",
|
|
6712
|
+
"CVE-2026-46300",
|
|
6713
|
+
"MAL-2026-3083",
|
|
6714
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
4821
6715
|
]
|
|
4822
6716
|
},
|
|
4823
6717
|
"CWE-284": {
|
|
@@ -4923,7 +6817,9 @@
|
|
|
4923
6817
|
}
|
|
4924
6818
|
]
|
|
4925
6819
|
},
|
|
4926
|
-
"related_cves": [
|
|
6820
|
+
"related_cves": [
|
|
6821
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
6822
|
+
]
|
|
4927
6823
|
},
|
|
4928
6824
|
"CWE-287": {
|
|
4929
6825
|
"name": "Improper Authentication",
|
|
@@ -5367,7 +7263,13 @@
|
|
|
5367
7263
|
"related_cves": [
|
|
5368
7264
|
"CVE-2025-53773",
|
|
5369
7265
|
"CVE-2026-30615",
|
|
5370
|
-
"CVE-2026-31431"
|
|
7266
|
+
"CVE-2026-31431",
|
|
7267
|
+
"CVE-2026-39884",
|
|
7268
|
+
"CVE-2026-42208",
|
|
7269
|
+
"CVE-2026-45321",
|
|
7270
|
+
"CVE-2026-46300",
|
|
7271
|
+
"MAL-2026-3083",
|
|
7272
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
5371
7273
|
]
|
|
5372
7274
|
},
|
|
5373
7275
|
"CWE-306": {
|
|
@@ -5560,7 +7462,11 @@
|
|
|
5560
7462
|
"related_cves": [
|
|
5561
7463
|
"CVE-2025-53773",
|
|
5562
7464
|
"CVE-2026-30615",
|
|
5563
|
-
"CVE-2026-31431"
|
|
7465
|
+
"CVE-2026-31431",
|
|
7466
|
+
"CVE-2026-39884",
|
|
7467
|
+
"CVE-2026-45321",
|
|
7468
|
+
"CVE-2026-46300",
|
|
7469
|
+
"MAL-2026-3083"
|
|
5564
7470
|
]
|
|
5565
7471
|
},
|
|
5566
7472
|
"CWE-310": {
|
|
@@ -5683,8 +7589,7 @@
|
|
|
5683
7589
|
]
|
|
5684
7590
|
},
|
|
5685
7591
|
"related_cves": [
|
|
5686
|
-
"CVE-2026-43284"
|
|
5687
|
-
"CVE-2026-43500"
|
|
7592
|
+
"CVE-2026-43284"
|
|
5688
7593
|
]
|
|
5689
7594
|
},
|
|
5690
7595
|
"CWE-328": {
|
|
@@ -5952,7 +7857,10 @@
|
|
|
5952
7857
|
},
|
|
5953
7858
|
"related_cves": [
|
|
5954
7859
|
"CVE-2025-53773",
|
|
5955
|
-
"CVE-2026-30615"
|
|
7860
|
+
"CVE-2026-30615",
|
|
7861
|
+
"CVE-2026-45321",
|
|
7862
|
+
"MAL-2026-3083",
|
|
7863
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
5956
7864
|
]
|
|
5957
7865
|
},
|
|
5958
7866
|
"CWE-352": {
|
|
@@ -6174,7 +8082,13 @@
|
|
|
6174
8082
|
"related_cves": [
|
|
6175
8083
|
"CVE-2025-53773",
|
|
6176
8084
|
"CVE-2026-30615",
|
|
6177
|
-
"CVE-2026-31431"
|
|
8085
|
+
"CVE-2026-31431",
|
|
8086
|
+
"CVE-2026-39884",
|
|
8087
|
+
"CVE-2026-42208",
|
|
8088
|
+
"CVE-2026-45321",
|
|
8089
|
+
"CVE-2026-46300",
|
|
8090
|
+
"MAL-2026-3083",
|
|
8091
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
6178
8092
|
]
|
|
6179
8093
|
},
|
|
6180
8094
|
"CWE-353": {
|
|
@@ -6305,16 +8219,19 @@
|
|
|
6305
8219
|
]
|
|
6306
8220
|
},
|
|
6307
8221
|
"related_cves": [
|
|
6308
|
-
"CVE-2025-53773",
|
|
6309
8222
|
"CVE-2026-0300",
|
|
6310
|
-
"CVE-2026-30615",
|
|
6311
8223
|
"CVE-2026-31431",
|
|
6312
8224
|
"CVE-2026-32202",
|
|
6313
8225
|
"CVE-2026-33825",
|
|
8226
|
+
"CVE-2026-39884",
|
|
6314
8227
|
"CVE-2026-42897",
|
|
6315
8228
|
"CVE-2026-43284",
|
|
6316
8229
|
"CVE-2026-43500",
|
|
6317
|
-
"CVE-2026-
|
|
8230
|
+
"CVE-2026-45321",
|
|
8231
|
+
"CVE-2026-46300",
|
|
8232
|
+
"CVE-2026-6973",
|
|
8233
|
+
"MAL-2026-3083",
|
|
8234
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
6318
8235
|
]
|
|
6319
8236
|
},
|
|
6320
8237
|
"CWE-416": {
|
|
@@ -6431,16 +8348,19 @@
|
|
|
6431
8348
|
]
|
|
6432
8349
|
},
|
|
6433
8350
|
"related_cves": [
|
|
6434
|
-
"CVE-2025-53773",
|
|
6435
8351
|
"CVE-2026-0300",
|
|
6436
|
-
"CVE-2026-30615",
|
|
6437
8352
|
"CVE-2026-31431",
|
|
6438
8353
|
"CVE-2026-32202",
|
|
6439
8354
|
"CVE-2026-33825",
|
|
8355
|
+
"CVE-2026-39884",
|
|
6440
8356
|
"CVE-2026-42897",
|
|
6441
8357
|
"CVE-2026-43284",
|
|
6442
8358
|
"CVE-2026-43500",
|
|
6443
|
-
"CVE-2026-
|
|
8359
|
+
"CVE-2026-45321",
|
|
8360
|
+
"CVE-2026-46300",
|
|
8361
|
+
"CVE-2026-6973",
|
|
8362
|
+
"MAL-2026-3083",
|
|
8363
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
6444
8364
|
]
|
|
6445
8365
|
},
|
|
6446
8366
|
"CWE-426": {
|
|
@@ -6652,7 +8572,13 @@
|
|
|
6652
8572
|
"related_cves": [
|
|
6653
8573
|
"CVE-2025-53773",
|
|
6654
8574
|
"CVE-2026-30615",
|
|
6655
|
-
"CVE-2026-31431"
|
|
8575
|
+
"CVE-2026-31431",
|
|
8576
|
+
"CVE-2026-39884",
|
|
8577
|
+
"CVE-2026-42208",
|
|
8578
|
+
"CVE-2026-45321",
|
|
8579
|
+
"CVE-2026-46300",
|
|
8580
|
+
"MAL-2026-3083",
|
|
8581
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
6656
8582
|
]
|
|
6657
8583
|
},
|
|
6658
8584
|
"CWE-494": {
|
|
@@ -6842,7 +8768,10 @@
|
|
|
6842
8768
|
},
|
|
6843
8769
|
"related_cves": [
|
|
6844
8770
|
"CVE-2025-53773",
|
|
6845
|
-
"CVE-2026-30615"
|
|
8771
|
+
"CVE-2026-30615",
|
|
8772
|
+
"CVE-2026-45321",
|
|
8773
|
+
"MAL-2026-3083",
|
|
8774
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
6846
8775
|
]
|
|
6847
8776
|
},
|
|
6848
8777
|
"CWE-502": {
|
|
@@ -7024,8 +8953,12 @@
|
|
|
7024
8953
|
]
|
|
7025
8954
|
},
|
|
7026
8955
|
"related_cves": [
|
|
7027
|
-
"CVE-
|
|
7028
|
-
"CVE-2026-
|
|
8956
|
+
"CVE-2026-30615",
|
|
8957
|
+
"CVE-2026-39884",
|
|
8958
|
+
"CVE-2026-42208",
|
|
8959
|
+
"CVE-2026-45321",
|
|
8960
|
+
"MAL-2026-3083",
|
|
8961
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
7029
8962
|
]
|
|
7030
8963
|
},
|
|
7031
8964
|
"CWE-506": {
|
|
@@ -7211,7 +9144,9 @@
|
|
|
7211
9144
|
}
|
|
7212
9145
|
]
|
|
7213
9146
|
},
|
|
7214
|
-
"related_cves": [
|
|
9147
|
+
"related_cves": [
|
|
9148
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
9149
|
+
]
|
|
7215
9150
|
},
|
|
7216
9151
|
"CWE-669": {
|
|
7217
9152
|
"name": "Incorrect Resource Transfer Between Spheres",
|
|
@@ -7317,10 +9252,14 @@
|
|
|
7317
9252
|
"CVE-2026-31431",
|
|
7318
9253
|
"CVE-2026-32202",
|
|
7319
9254
|
"CVE-2026-33825",
|
|
9255
|
+
"CVE-2026-39884",
|
|
7320
9256
|
"CVE-2026-42897",
|
|
7321
9257
|
"CVE-2026-43284",
|
|
7322
9258
|
"CVE-2026-43500",
|
|
7323
|
-
"CVE-2026-
|
|
9259
|
+
"CVE-2026-45321",
|
|
9260
|
+
"CVE-2026-46300",
|
|
9261
|
+
"CVE-2026-6973",
|
|
9262
|
+
"MAL-2026-3083"
|
|
7324
9263
|
]
|
|
7325
9264
|
},
|
|
7326
9265
|
"CWE-732": {
|
|
@@ -7597,7 +9536,13 @@
|
|
|
7597
9536
|
"related_cves": [
|
|
7598
9537
|
"CVE-2025-53773",
|
|
7599
9538
|
"CVE-2026-30615",
|
|
7600
|
-
"CVE-2026-31431"
|
|
9539
|
+
"CVE-2026-31431",
|
|
9540
|
+
"CVE-2026-39884",
|
|
9541
|
+
"CVE-2026-42208",
|
|
9542
|
+
"CVE-2026-45321",
|
|
9543
|
+
"CVE-2026-46300",
|
|
9544
|
+
"MAL-2026-3083",
|
|
9545
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
7601
9546
|
]
|
|
7602
9547
|
},
|
|
7603
9548
|
"CWE-759": {
|
|
@@ -7810,10 +9755,15 @@
|
|
|
7810
9755
|
"CVE-2026-31431",
|
|
7811
9756
|
"CVE-2026-32202",
|
|
7812
9757
|
"CVE-2026-33825",
|
|
9758
|
+
"CVE-2026-39884",
|
|
7813
9759
|
"CVE-2026-42897",
|
|
7814
9760
|
"CVE-2026-43284",
|
|
7815
9761
|
"CVE-2026-43500",
|
|
7816
|
-
"CVE-2026-
|
|
9762
|
+
"CVE-2026-45321",
|
|
9763
|
+
"CVE-2026-46300",
|
|
9764
|
+
"CVE-2026-6973",
|
|
9765
|
+
"MAL-2026-3083",
|
|
9766
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
7817
9767
|
]
|
|
7818
9768
|
},
|
|
7819
9769
|
"CWE-798": {
|
|
@@ -8101,7 +10051,11 @@
|
|
|
8101
10051
|
"related_cves": [
|
|
8102
10052
|
"CVE-2025-53773",
|
|
8103
10053
|
"CVE-2026-30615",
|
|
8104
|
-
"CVE-2026-31431"
|
|
10054
|
+
"CVE-2026-31431",
|
|
10055
|
+
"CVE-2026-39884",
|
|
10056
|
+
"CVE-2026-45321",
|
|
10057
|
+
"CVE-2026-46300",
|
|
10058
|
+
"MAL-2026-3083"
|
|
8105
10059
|
]
|
|
8106
10060
|
},
|
|
8107
10061
|
"CWE-829": {
|
|
@@ -8214,8 +10168,10 @@
|
|
|
8214
10168
|
]
|
|
8215
10169
|
},
|
|
8216
10170
|
"related_cves": [
|
|
8217
|
-
"CVE-
|
|
8218
|
-
"CVE-2026-
|
|
10171
|
+
"CVE-2026-30615",
|
|
10172
|
+
"CVE-2026-45321",
|
|
10173
|
+
"MAL-2026-3083",
|
|
10174
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
8219
10175
|
]
|
|
8220
10176
|
},
|
|
8221
10177
|
"CWE-862": {
|
|
@@ -8394,7 +10350,12 @@
|
|
|
8394
10350
|
},
|
|
8395
10351
|
"related_cves": [
|
|
8396
10352
|
"CVE-2025-53773",
|
|
8397
|
-
"CVE-2026-30615"
|
|
10353
|
+
"CVE-2026-30615",
|
|
10354
|
+
"CVE-2026-39884",
|
|
10355
|
+
"CVE-2026-42208",
|
|
10356
|
+
"CVE-2026-45321",
|
|
10357
|
+
"MAL-2026-3083",
|
|
10358
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
8398
10359
|
]
|
|
8399
10360
|
},
|
|
8400
10361
|
"CWE-863": {
|
|
@@ -8664,7 +10625,12 @@
|
|
|
8664
10625
|
},
|
|
8665
10626
|
"related_cves": [
|
|
8666
10627
|
"CVE-2025-53773",
|
|
8667
|
-
"CVE-2026-30615"
|
|
10628
|
+
"CVE-2026-30615",
|
|
10629
|
+
"CVE-2026-39884",
|
|
10630
|
+
"CVE-2026-42208",
|
|
10631
|
+
"CVE-2026-45321",
|
|
10632
|
+
"MAL-2026-3083",
|
|
10633
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
8668
10634
|
]
|
|
8669
10635
|
},
|
|
8670
10636
|
"CWE-916": {
|
|
@@ -8963,7 +10929,13 @@
|
|
|
8963
10929
|
"related_cves": [
|
|
8964
10930
|
"CVE-2025-53773",
|
|
8965
10931
|
"CVE-2026-30615",
|
|
8966
|
-
"CVE-2026-31431"
|
|
10932
|
+
"CVE-2026-31431",
|
|
10933
|
+
"CVE-2026-39884",
|
|
10934
|
+
"CVE-2026-42208",
|
|
10935
|
+
"CVE-2026-45321",
|
|
10936
|
+
"CVE-2026-46300",
|
|
10937
|
+
"MAL-2026-3083",
|
|
10938
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
8967
10939
|
]
|
|
8968
10940
|
},
|
|
8969
10941
|
"CWE-1037": {
|
|
@@ -9015,8 +10987,11 @@
|
|
|
9015
10987
|
"rfc_refs": []
|
|
9016
10988
|
},
|
|
9017
10989
|
"related_cves": [
|
|
9018
|
-
"CVE-
|
|
9019
|
-
"CVE-2026-
|
|
10990
|
+
"CVE-2026-31431",
|
|
10991
|
+
"CVE-2026-39884",
|
|
10992
|
+
"CVE-2026-45321",
|
|
10993
|
+
"CVE-2026-46300",
|
|
10994
|
+
"MAL-2026-3083"
|
|
9020
10995
|
]
|
|
9021
10996
|
},
|
|
9022
10997
|
"CWE-1039": {
|
|
@@ -9148,9 +11123,10 @@
|
|
|
9148
11123
|
},
|
|
9149
11124
|
"related_cves": [
|
|
9150
11125
|
"CVE-2025-53773",
|
|
9151
|
-
"CVE-2026-30615",
|
|
9152
11126
|
"CVE-2026-32202",
|
|
9153
|
-
"CVE-2026-33825"
|
|
11127
|
+
"CVE-2026-33825",
|
|
11128
|
+
"CVE-2026-39884",
|
|
11129
|
+
"CVE-2026-42208"
|
|
9154
11130
|
]
|
|
9155
11131
|
},
|
|
9156
11132
|
"CWE-1188": {
|
|
@@ -9303,7 +11279,12 @@
|
|
|
9303
11279
|
},
|
|
9304
11280
|
"related_cves": [
|
|
9305
11281
|
"CVE-2025-53773",
|
|
9306
|
-
"CVE-2026-30615"
|
|
11282
|
+
"CVE-2026-30615",
|
|
11283
|
+
"CVE-2026-39884",
|
|
11284
|
+
"CVE-2026-42208",
|
|
11285
|
+
"CVE-2026-45321",
|
|
11286
|
+
"MAL-2026-3083",
|
|
11287
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
9307
11288
|
]
|
|
9308
11289
|
},
|
|
9309
11290
|
"CWE-1357": {
|
|
@@ -9459,10 +11440,13 @@
|
|
|
9459
11440
|
]
|
|
9460
11441
|
},
|
|
9461
11442
|
"related_cves": [
|
|
9462
|
-
"CVE-2025-53773",
|
|
9463
11443
|
"CVE-2026-0300",
|
|
9464
11444
|
"CVE-2026-30615",
|
|
9465
|
-
"CVE-2026-31431"
|
|
11445
|
+
"CVE-2026-31431",
|
|
11446
|
+
"CVE-2026-45321",
|
|
11447
|
+
"CVE-2026-46300",
|
|
11448
|
+
"MAL-2026-3083",
|
|
11449
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
9466
11450
|
]
|
|
9467
11451
|
},
|
|
9468
11452
|
"CWE-1395": {
|
|
@@ -9678,7 +11662,12 @@
|
|
|
9678
11662
|
"related_cves": [
|
|
9679
11663
|
"CVE-2025-53773",
|
|
9680
11664
|
"CVE-2026-30615",
|
|
9681
|
-
"CVE-2026-31431"
|
|
11665
|
+
"CVE-2026-31431",
|
|
11666
|
+
"CVE-2026-39884",
|
|
11667
|
+
"CVE-2026-45321",
|
|
11668
|
+
"CVE-2026-46300",
|
|
11669
|
+
"MAL-2026-3083",
|
|
11670
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
9682
11671
|
]
|
|
9683
11672
|
},
|
|
9684
11673
|
"CWE-1426": {
|
|
@@ -9925,8 +11914,13 @@
|
|
|
9925
11914
|
"CVE-2026-30615",
|
|
9926
11915
|
"CVE-2026-32202",
|
|
9927
11916
|
"CVE-2026-33825",
|
|
11917
|
+
"CVE-2026-39884",
|
|
11918
|
+
"CVE-2026-42208",
|
|
11919
|
+
"CVE-2026-42897",
|
|
9928
11920
|
"CVE-2026-43284",
|
|
9929
|
-
"CVE-2026-
|
|
11921
|
+
"CVE-2026-45321",
|
|
11922
|
+
"MAL-2026-3083",
|
|
11923
|
+
"MAL-2026-NODE-IPC-STEALER"
|
|
9930
11924
|
]
|
|
9931
11925
|
}
|
|
9932
11926
|
}
|