@blamejs/exceptd-skills 0.12.41 → 0.13.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +124 -0
- package/bin/exceptd.js +52 -44
- package/data/_indexes/_meta.json +49 -49
- package/data/_indexes/activity-feed.json +2 -2
- package/data/_indexes/catalog-summaries.json +2 -2
- package/data/_indexes/chains.json +1531 -575
- package/data/_indexes/jurisdiction-map.json +15 -4
- package/data/_indexes/section-offsets.json +1244 -1244
- package/data/_indexes/token-budget.json +173 -173
- package/data/atlas-ttps.json +55 -11
- package/data/attack-techniques.json +124 -19
- package/data/cve-catalog.json +194 -27
- package/data/cwe-catalog.json +15 -5
- package/data/framework-control-gaps.json +32 -10
- package/data/playbooks/ai-api.json +5 -0
- package/data/playbooks/cicd-pipeline-compromise.json +970 -0
- package/data/playbooks/cloud-iam-incident.json +4 -1
- package/data/playbooks/cred-stores.json +10 -0
- package/data/playbooks/framework.json +16 -0
- package/data/playbooks/hardening.json +4 -0
- package/data/playbooks/identity-sso-compromise.json +951 -0
- package/data/playbooks/idp-incident.json +3 -0
- package/data/playbooks/kernel.json +6 -0
- package/data/playbooks/llm-tool-use-exfil.json +963 -0
- package/data/playbooks/mcp.json +6 -0
- package/data/playbooks/runtime.json +4 -0
- package/data/playbooks/sbom.json +13 -0
- package/data/playbooks/secrets.json +6 -0
- package/data/playbooks/webhook-callback-abuse.json +916 -0
- package/data/zeroday-lessons.json +178 -0
- package/lib/cross-ref-api.js +33 -13
- package/lib/cve-curation.js +12 -1
- package/lib/exit-codes.js +29 -0
- package/lib/lint-skills.js +24 -2
- package/lib/refresh-external.js +17 -1
- package/lib/scoring.js +55 -0
- package/lib/source-advisories.js +281 -0
- package/manifest.json +83 -83
- package/orchestrator/index.js +207 -24
- package/package.json +1 -1
- package/sbom.cdx.json +134 -79
- package/scripts/predeploy.js +7 -13
- package/scripts/refresh-reverse-refs.js +86 -0
- package/scripts/refresh-sbom.js +21 -4
- package/skills/age-gates-child-safety/skill.md +1 -5
- package/skills/ai-attack-surface/skill.md +11 -4
- package/skills/ai-c2-detection/skill.md +11 -2
- package/skills/ai-risk-management/skill.md +4 -2
- package/skills/api-security/skill.md +7 -8
- package/skills/attack-surface-pentest/skill.md +2 -2
- package/skills/cloud-iam-incident/skill.md +1 -5
- package/skills/cloud-security/skill.md +0 -4
- package/skills/compliance-theater/skill.md +10 -2
- package/skills/container-runtime-security/skill.md +1 -3
- package/skills/dlp-gap-analysis/skill.md +3 -4
- package/skills/email-security-anti-phishing/skill.md +1 -8
- package/skills/exploit-scoring/skill.md +7 -2
- package/skills/framework-gap-analysis/skill.md +1 -1
- package/skills/fuzz-testing-strategy/skill.md +1 -2
- package/skills/global-grc/skill.md +3 -2
- package/skills/identity-assurance/skill.md +1 -3
- package/skills/idp-incident-response/skill.md +1 -4
- package/skills/incident-response-playbook/skill.md +1 -5
- package/skills/kernel-lpe-triage/skill.md +2 -2
- package/skills/mcp-agent-trust/skill.md +13 -3
- package/skills/mlops-security/skill.md +2 -3
- package/skills/ot-ics-security/skill.md +0 -3
- package/skills/policy-exception-gen/skill.md +11 -3
- package/skills/pqc-first/skill.md +4 -2
- package/skills/rag-pipeline-security/skill.md +2 -0
- package/skills/ransomware-response/skill.md +1 -5
- package/skills/researcher/skill.md +4 -3
- package/skills/sector-energy/skill.md +0 -4
- package/skills/sector-federal-government/skill.md +2 -3
- package/skills/sector-financial/skill.md +1 -4
- package/skills/sector-healthcare/skill.md +0 -5
- package/skills/sector-telecom/skill.md +0 -4
- package/skills/security-maturity-tiers/skill.md +1 -2
- package/skills/skill-update-loop/skill.md +4 -3
- package/skills/supply-chain-integrity/skill.md +4 -3
- package/skills/threat-model-currency/skill.md +1 -1
- package/skills/threat-modeling-methodology/skill.md +2 -1
- package/skills/webapp-security/skill.md +0 -5
package/data/cve-catalog.json
CHANGED
|
@@ -37,7 +37,13 @@
|
|
|
37
37
|
"vendor_advisory_field_added": "2026-05-11",
|
|
38
38
|
"vendor_advisory_note": "Each CVE carries a structured vendor_advisories array (vendor, advisory_id, url, severity, published_date) for downstream consumers that route by vendor advisory. Unknown advisory IDs are null with the canonical vendor CVE-resolver URL — never fabricated. Existing free-form references are preserved in verification_sources; vendor_advisories is additive.",
|
|
39
39
|
"active_exploitation_vocabulary": {
|
|
40
|
-
"values": [
|
|
40
|
+
"values": [
|
|
41
|
+
"confirmed",
|
|
42
|
+
"suspected",
|
|
43
|
+
"theoretical",
|
|
44
|
+
"none",
|
|
45
|
+
"unknown"
|
|
46
|
+
],
|
|
41
47
|
"definitions": {
|
|
42
48
|
"confirmed": "Active in-the-wild exploitation observed and attributed",
|
|
43
49
|
"suspected": "Indicators consistent with exploitation; attribution incomplete",
|
|
@@ -49,7 +55,7 @@
|
|
|
49
55
|
"ai_discovery_methodology": {
|
|
50
56
|
"field_added": "2026-05-15",
|
|
51
57
|
"agents_md_target": "Hard Rule #7 — '41% of 2025 zero-days were AI-discovered'. Catalog target rate floor: 0.40.",
|
|
52
|
-
"current_rate": 0.
|
|
58
|
+
"current_rate": 0.154,
|
|
53
59
|
"current_floor_enforced_by_test": 0.15,
|
|
54
60
|
"ladder_to_target": [
|
|
55
61
|
0.15,
|
|
@@ -1460,8 +1466,6 @@
|
|
|
1460
1466
|
"rwep_correction_note": "RWEP bump:v0.12.29 ai-discovery audit re-attributed to ai_discovered=true; ai_factor advanced from 0 to 15; rwep raised by 15 from 20 to 35."
|
|
1461
1467
|
},
|
|
1462
1468
|
"CVE-2024-21626": {
|
|
1463
|
-
"_draft": true,
|
|
1464
|
-
"_auto_imported": true,
|
|
1465
1469
|
"ai_assisted_weaponization": false,
|
|
1466
1470
|
"name": "runc /proc/self/fd leak (Leaky Vessels)",
|
|
1467
1471
|
"type": "container-escape",
|
|
@@ -1522,8 +1526,6 @@
|
|
|
1522
1526
|
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: +5 (75 -> 80)."
|
|
1523
1527
|
},
|
|
1524
1528
|
"CVE-2024-3094": {
|
|
1525
|
-
"_draft": true,
|
|
1526
|
-
"_auto_imported": true,
|
|
1527
1529
|
"ai_assisted_weaponization": false,
|
|
1528
1530
|
"name": "xz-utils liblzma backdoor",
|
|
1529
1531
|
"type": "supply-chain-backdoor",
|
|
@@ -1595,7 +1597,7 @@
|
|
|
1595
1597
|
},
|
|
1596
1598
|
"CVE-2024-3154": {
|
|
1597
1599
|
"_draft": true,
|
|
1598
|
-
"
|
|
1600
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + Red Hat Bugzilla; CWE-20 and ATT&CK T1611 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1599
1601
|
"ai_assisted_weaponization": false,
|
|
1600
1602
|
"name": "CRI-O arbitrary kernel-module load",
|
|
1601
1603
|
"type": "container-escape",
|
|
@@ -1662,7 +1664,7 @@
|
|
|
1662
1664
|
},
|
|
1663
1665
|
"CVE-2023-43472": {
|
|
1664
1666
|
"_draft": true,
|
|
1665
|
-
"
|
|
1667
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + Protect AI Huntr advisory; ATLAS AML.T0016 and CWE-22 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1666
1668
|
"ai_assisted_weaponization": false,
|
|
1667
1669
|
"name": "MLflow path-traversal arbitrary file read",
|
|
1668
1670
|
"type": "path-traversal",
|
|
@@ -1723,7 +1725,7 @@
|
|
|
1723
1725
|
},
|
|
1724
1726
|
"CVE-2020-10148": {
|
|
1725
1727
|
"_draft": true,
|
|
1726
|
-
"
|
|
1728
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + CISA AA20-352A; CWE-287 and ATT&CK T1190/T1078 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1727
1729
|
"ai_assisted_weaponization": false,
|
|
1728
1730
|
"name": "SolarWinds Orion API authentication bypass (SUNBURST chain)",
|
|
1729
1731
|
"type": "auth-bypass",
|
|
@@ -1786,7 +1788,7 @@
|
|
|
1786
1788
|
},
|
|
1787
1789
|
"CVE-2023-3519": {
|
|
1788
1790
|
"_draft": true,
|
|
1789
|
-
"
|
|
1791
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + Citrix CTX561482 + CISA AA23-201A; CWE-787 and ATT&CK T1190 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1790
1792
|
"ai_assisted_weaponization": false,
|
|
1791
1793
|
"name": "Citrix NetScaler ADC/Gateway unauth RCE (CitrixBleed precursor)",
|
|
1792
1794
|
"type": "RCE",
|
|
@@ -1851,7 +1853,7 @@
|
|
|
1851
1853
|
},
|
|
1852
1854
|
"CVE-2024-1709": {
|
|
1853
1855
|
"_draft": true,
|
|
1854
|
-
"
|
|
1856
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + ConnectWise advisory; ATT&CK T1190/T1078 refs resolve (cwe_refs empty but ATT&CK satisfies the resolve-at-least-one requirement). Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1855
1857
|
"ai_assisted_weaponization": false,
|
|
1856
1858
|
"name": "ConnectWise ScreenConnect auth-bypass",
|
|
1857
1859
|
"type": "auth-bypass",
|
|
@@ -1910,7 +1912,7 @@
|
|
|
1910
1912
|
},
|
|
1911
1913
|
"CVE-2026-20182": {
|
|
1912
1914
|
"_draft": true,
|
|
1913
|
-
"
|
|
1915
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against CISA KEV + Rapid7 disclosure; CWE-287 and ATT&CK T1190/T1078 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1914
1916
|
"ai_assisted_weaponization": false,
|
|
1915
1917
|
"name": "Cisco SD-WAN authentication bypass to admin",
|
|
1916
1918
|
"type": "auth-bypass",
|
|
@@ -1974,7 +1976,7 @@
|
|
|
1974
1976
|
},
|
|
1975
1977
|
"CVE-2024-40635": {
|
|
1976
1978
|
"_draft": true,
|
|
1977
|
-
"
|
|
1979
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + Snyk SNYK-GOLANG-GITHUBCOMCONTAINERDCONTAINERDV2PKGOCI-9479987; ATT&CK T1525 ref resolves (cwe_refs empty but ATT&CK satisfies). Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1978
1980
|
"ai_assisted_weaponization": false,
|
|
1979
1981
|
"name": "containerd integer overflow IP mask leak",
|
|
1980
1982
|
"type": "information-disclosure",
|
|
@@ -2033,8 +2035,6 @@
|
|
|
2033
2035
|
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: 0."
|
|
2034
2036
|
},
|
|
2035
2037
|
"MAL-2026-TANSTACK-MINI": {
|
|
2036
|
-
"_draft": true,
|
|
2037
|
-
"_auto_imported": true,
|
|
2038
2038
|
"ai_assisted_weaponization": false,
|
|
2039
2039
|
"name": "Mini Shai-Hulud (TanStack worm)",
|
|
2040
2040
|
"type": "supply-chain-worm",
|
|
@@ -2102,11 +2102,16 @@
|
|
|
2102
2102
|
],
|
|
2103
2103
|
"last_updated": "2026-05-15",
|
|
2104
2104
|
"discovery_attribution_note": "Same incident-class as CVE-2026-45321 (Mini Shai-Hulud); discovery by ecosystem detection across multiple firms (Snyk, Wiz, StepSecurity, Socket, Orca, JFrog) within minutes of the 2026-05-11 publish window. No AI-tool discovery attribution on the defender side. Source: https://snyk.io/blog/tanstack-npm-packages-compromised/.",
|
|
2105
|
-
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
|
|
2105
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields.",
|
|
2106
|
+
"related_threats": [
|
|
2107
|
+
"MAL-2026-SHAI-HULUD-OSS"
|
|
2108
|
+
],
|
|
2109
|
+
"related_threats_note": "MAL-2026-TANSTACK-MINI is a Mini-Shai-Hulud-wave incident (Microsoft Security Research, 2026-05-11). The framework was open-sourced 2026-05-12 (MAL-2026-SHAI-HULUD-OSS) — TanStack predates the public release by ~24h. Same threat-actor authorship class; same registry-pivot tradecraft."
|
|
2106
2110
|
},
|
|
2107
2111
|
"MAL-2026-ANTHROPIC-MCP-STDIO": {
|
|
2108
2112
|
"_draft": true,
|
|
2109
|
-
"
|
|
2113
|
+
"_quarantine": true,
|
|
2114
|
+
"_quarantine_reason": "Duplicate of CVE-2026-30623 (Anthropic MCP SDK stdio command-injection). This entry was the pre-CVE-assignment embargoed placeholder for the OX Security MCP stdio command-injection disclosure (Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok); the embargo lifted with the April 2026 vendor advisory and the issue received CVE-2026-30623. Canonical id: CVE-2026-30623. Retained as _draft: true so the validator treats it as a non-failing draft warning; downstream tooling should filter on _quarantine: true and skip these entries.",
|
|
2110
2115
|
"ai_assisted_weaponization": false,
|
|
2111
2116
|
"name": "Anthropic SDK MCP STDIO command-injection (embargoed)",
|
|
2112
2117
|
"type": "command-injection",
|
|
@@ -2175,7 +2180,7 @@
|
|
|
2175
2180
|
},
|
|
2176
2181
|
"CVE-2026-GTIG-AI-2FA": {
|
|
2177
2182
|
"_draft": true,
|
|
2178
|
-
"
|
|
2183
|
+
"_draft_reason": "Placeholder entry — affected product is unnamed under GTIG embargo and affected_versions is set to \"pending-disclosure\". The key itself is not a real CVE identifier (GTIG-tracked, no MITRE assignment yet). Hard Rule #1 fields cannot be verified against a vendor advisory until the embargo lifts and a real CVE id is assigned. Re-triage once GTIG/MITRE publishes the canonical id and affected-product list.",
|
|
2179
2184
|
"name": "GTIG-tracked AI-built 2FA-bypass zero-day (placeholder)",
|
|
2180
2185
|
"type": "auth-bypass",
|
|
2181
2186
|
"cvss_score": 8.1,
|
|
@@ -2248,7 +2253,7 @@
|
|
|
2248
2253
|
},
|
|
2249
2254
|
"CVE-2026-30623": {
|
|
2250
2255
|
"_draft": true,
|
|
2251
|
-
"
|
|
2256
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + OX Security advisory (Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok); CWE-78/88, ATLAS AML.T0040 and ATT&CK T1059 refs resolve. This entry is the published successor of the quarantined MAL-2026-ANTHROPIC-MCP-STDIO placeholder. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2252
2257
|
"ai_assisted_weaponization": false,
|
|
2253
2258
|
"name": "Anthropic MCP SDK stdio command-injection",
|
|
2254
2259
|
"type": "command-injection",
|
|
@@ -2315,7 +2320,7 @@
|
|
|
2315
2320
|
},
|
|
2316
2321
|
"CVE-2025-12686": {
|
|
2317
2322
|
"_draft": true,
|
|
2318
|
-
"
|
|
2323
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + Synacktiv Pwn2Own writeup; CWE-78 and ATT&CK T1190 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2319
2324
|
"ai_assisted_weaponization": false,
|
|
2320
2325
|
"name": "Synology BeeStation unauth RCE (Pwn2Own Ireland 2025)",
|
|
2321
2326
|
"type": "RCE",
|
|
@@ -2375,7 +2380,7 @@
|
|
|
2375
2380
|
},
|
|
2376
2381
|
"CVE-2025-62847": {
|
|
2377
2382
|
"_draft": true,
|
|
2378
|
-
"
|
|
2383
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + ZDI Pwn2Own Ireland 2025 day-one results + DEVCORE Research Team attribution; CWE-78 and ATT&CK T1190 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2379
2384
|
"ai_assisted_weaponization": false,
|
|
2380
2385
|
"name": "QNAP QTS/QuTS hero RCE (Pwn2Own Ireland 2025, chain 1/3)",
|
|
2381
2386
|
"type": "RCE",
|
|
@@ -2437,7 +2442,7 @@
|
|
|
2437
2442
|
},
|
|
2438
2443
|
"CVE-2025-62848": {
|
|
2439
2444
|
"_draft": true,
|
|
2440
|
-
"
|
|
2445
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + ZDI Pwn2Own Ireland 2025 day-one results + DEVCORE Research Team attribution; CWE-94 and ATT&CK T1190 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2441
2446
|
"ai_assisted_weaponization": false,
|
|
2442
2447
|
"name": "QNAP QTS/QuTS hero RCE (Pwn2Own Ireland 2025, chain 2/3)",
|
|
2443
2448
|
"type": "RCE",
|
|
@@ -2499,7 +2504,7 @@
|
|
|
2499
2504
|
},
|
|
2500
2505
|
"CVE-2025-62849": {
|
|
2501
2506
|
"_draft": true,
|
|
2502
|
-
"
|
|
2507
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + ZDI Pwn2Own Ireland 2025 day-one results + DEVCORE Research Team attribution; CWE-269 and ATT&CK T1068 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2503
2508
|
"ai_assisted_weaponization": false,
|
|
2504
2509
|
"name": "QNAP QTS/QuTS hero RCE (Pwn2Own Ireland 2025, chain 3/3)",
|
|
2505
2510
|
"type": "RCE",
|
|
@@ -2561,7 +2566,7 @@
|
|
|
2561
2566
|
},
|
|
2562
2567
|
"CVE-2025-59389": {
|
|
2563
2568
|
"_draft": true,
|
|
2564
|
-
"
|
|
2569
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + QNAP QSA-25-48 + ZDI Pwn2Own attribution (Sina Kheirkhah, Summoning Team); CWE-78 and ATT&CK T1190 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2565
2570
|
"ai_assisted_weaponization": false,
|
|
2566
2571
|
"name": "QNAP Hyper Data Protector critical RCE (Pwn2Own Ireland 2025)",
|
|
2567
2572
|
"type": "RCE",
|
|
@@ -2622,7 +2627,7 @@
|
|
|
2622
2627
|
},
|
|
2623
2628
|
"CVE-2025-11837": {
|
|
2624
2629
|
"_draft": true,
|
|
2625
|
-
"
|
|
2630
|
+
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + QNAP QSA-25-47 + Pwn2Own attribution (Chumy Tsai, CyCraft Technology); CWE-94 and ATT&CK T1059/T1554 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2626
2631
|
"ai_assisted_weaponization": false,
|
|
2627
2632
|
"name": "QNAP Malware Remover code-injection",
|
|
2628
2633
|
"type": "code-injection",
|
|
@@ -2683,8 +2688,6 @@
|
|
|
2683
2688
|
"discovery_attribution_note": "Pwn2Own Ireland 2025 — Chumy Tsai of CyCraft Technology demonstrated the code-injection on QNAP TS-453E ($20,000 award). Named-human researcher via ZDI credit; no AI-tool attribution. Source: https://www.qnap.com/en/security-advisory/qsa-25-47 and https://cybersecuritynews.com/qnap-zero-day-vulnerabilities-exploited/."
|
|
2684
2689
|
},
|
|
2685
2690
|
"CVE-2026-42945": {
|
|
2686
|
-
"_draft": true,
|
|
2687
|
-
"_auto_imported": true,
|
|
2688
2691
|
"name": "NGINX Rift",
|
|
2689
2692
|
"type": "RCE",
|
|
2690
2693
|
"cvss_score": 9.2,
|
|
@@ -3565,5 +3568,169 @@
|
|
|
3565
3568
|
"remediation_status": "removed_from_registry",
|
|
3566
3569
|
"remediation_note": "npm removed all 3 malicious versions (9.1.6, 9.2.3, 12.0.1) within ~2 hours of publication on 2026-05-14. Publisher account atiertant was deactivated. The expired-domain TTP (atlantis-software.net re-registered via Namecheap on 2026-05-07 after Jan 2025 expiry) remains the novel attack class to defend against — see zeroday-lessons NEW-CTRL-047 (PACKAGE-MAINTAINER-DOMAIN-EXPIRY-MONITORING).",
|
|
3567
3570
|
"remediation_status_verified_at": "2026-05-16"
|
|
3571
|
+
},
|
|
3572
|
+
"CVE-2026-46333": {
|
|
3573
|
+
"name": "ssh-keysign-pwn",
|
|
3574
|
+
"type": "LPE-via-info-disclosure",
|
|
3575
|
+
"cvss_score": 7,
|
|
3576
|
+
"cvss_vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
3577
|
+
"cvss_note": "Operator estimate pending NVD enrichment. Local + low privilege + no UI + root file read + chained privesc via /etc/shadow → AC:H reflects the ~100-2000-attempt race window which lowers practical exploitation but does not gate it.",
|
|
3578
|
+
"cisa_kev": false,
|
|
3579
|
+
"cisa_kev_date": null,
|
|
3580
|
+
"cisa_kev_due_date": null,
|
|
3581
|
+
"poc_available": true,
|
|
3582
|
+
"poc_description": "_SiCk published two working exploits within hours of the Qualys disclosure on 2026-05-14: one that reads /etc/ssh/ssh_host_*_key via ssh-keysign exit-race, one that reads /etc/shadow via chage -l exit-race. Both target the same kernel pidfd_getfd race; the setuid binary is the carrier, not the bug. ~100-2000 attempts succeed in practice — deterministic enough for adversary tradecraft.",
|
|
3583
|
+
"ai_discovered": false,
|
|
3584
|
+
"ai_discovery_notes": "Qualys Threat Research Unit human research. The underlying logic flaw was originally surfaced in a 2020 patch proposal by Jann Horn that was never merged; Qualys identified the exploitable consequence six years later.",
|
|
3585
|
+
"ai_assisted_weaponization": false,
|
|
3586
|
+
"active_exploitation": "none",
|
|
3587
|
+
"active_exploitation_notes": "No in-the-wild observations as of T+3 days post-disclosure. Two public PoCs (_SiCk). Expectation: KEV listing within weeks once exploitation observed; until then, theoretical-with-deterministic-PoC class.",
|
|
3588
|
+
"affected": "Linux kernel — all distributions shipping a kernel built without the 2020 Jann Horn patch proposal (effectively every distribution for ~6 years until 2026-05-14). Confirmed affected: RHEL 7-10, AlmaLinux 8/9/10, CloudLinux 7h/8/9/10, Rocky Linux 8/9, Ubuntu 20.04-24.04 LTS (pre-USN), Debian 11-12 (pre-DSA), Amazon Linux 2/2023, SUSE 15. The setuid carrier binaries (ssh-keysign + chage) ship on every Linux system with OpenSSH and shadow-utils installed.",
|
|
3589
|
+
"affected_versions": [
|
|
3590
|
+
"linux-kernel < 7.0.8",
|
|
3591
|
+
"linux-kernel < 6.18.31 (6.18.x branch)",
|
|
3592
|
+
"linux-kernel < 6.12.89 (6.12.x branch)",
|
|
3593
|
+
"linux-kernel < 6.6.139 (6.6.x branch)",
|
|
3594
|
+
"linux-kernel < 6.1.173 (6.1.x branch)",
|
|
3595
|
+
"linux-kernel < 5.15.207 (5.15.x branch)",
|
|
3596
|
+
"linux-kernel < 5.10.256 (5.10.x branch)"
|
|
3597
|
+
],
|
|
3598
|
+
"vector": "ptrace exit-race. exit_mm() runs before exit_files() during privileged-process shutdown. In the microsecond window between the two, task->mm == NULL while the fd table still holds the privileged file handles. The pre-fix __ptrace_may_access() skipped its get_dumpable() check when mm == NULL and silently authorized UID-matched access. An unprivileged attacker races ssh-keysign or chage exit, calls pidfd_getfd(2) to duplicate the still-open file descriptors, and reads /etc/ssh/ssh_host_*_key or /etc/shadow as if it were root. Yama ptrace_scope does NOT mitigate because the bypass is at the kernel access-check layer, not the LSM layer.",
|
|
3599
|
+
"complexity": "race-condition",
|
|
3600
|
+
"complexity_notes": "Race window is microseconds wide but the exploit loops automatically; 100-2000 attempts typically succeed. Once the fd is captured, the read is deterministic. Class similar to Dirty COW but file-read rather than file-write primitive.",
|
|
3601
|
+
"patch_available": true,
|
|
3602
|
+
"patch_required_reboot": true,
|
|
3603
|
+
"live_patch_available": false,
|
|
3604
|
+
"live_patch_tools": [
|
|
3605
|
+
"KernelCare (in active build as of 2026-05-15; release ETA pending)"
|
|
3606
|
+
],
|
|
3607
|
+
"live_patch_notes": "Upstream commit 31e62c2ebbfd (ptrace: slightly saner get_dumpable() logic) merged 2026-05-14. Kernel point releases 7.0.8 / 6.18.31 / 6.12.89 / 6.6.139 / 6.1.173 / 5.15.207 / 5.10.256 published 2026-05-15. Distribution backports: AlmaLinux 8/9/10 ALSA-2026:A008/A009/A010 (2026-05-16 production), CloudLinux 7h/8/9/10 (2026-05-15 beta / 2026-05-17 production). KernelCare livepatch in build; Canonical Livepatch / kpatch status not yet documented at T+3 days. RHEL backport not yet observed in primary sources; check access.redhat.com/security/cve.",
|
|
3608
|
+
"framework_control_gaps": {
|
|
3609
|
+
"NIST-800-53-SI-2": "30-day critical patch SLA is an exploitation window for a Linux kernel LPE with two public PoCs. Reboot-required mitigation breaks the maintenance-window assumption built into SI-2 implementations.",
|
|
3610
|
+
"ISO-27001-2022-A.8.8": "'Appropriate timescales' undefined; standard 30-day interpretation is unsafe for a kernel info-disclosure with public PoC. No requirement to track sysctl-based mitigation (kernel.user_ptrace=0) as a compensating control.",
|
|
3611
|
+
"NIS2-Art21-patch-management": "Art. 21(2)(c) patch-management measures undefined for fast-cycle kernel LPEs with public PoC. No guidance on sysctl or SUID-removal as interim measures.",
|
|
3612
|
+
"DORA-Art-9": "ICT incident management presumes vendor-patch cadence; reboot-required class breaks the standard SLA.",
|
|
3613
|
+
"UK-CAF-B4": "System security principle silent on sysctl-based mitigation OR SUID-removal as compensating controls.",
|
|
3614
|
+
"AU-ISM-1546": "Essential 8 patch-applications maturity ML3 = 48h is still long for a deterministic-with-loop kernel LPE; reboot-required nature compounds the maintenance-window cost.",
|
|
3615
|
+
"ISO-27001-2022-A.5.7": "Threat-intelligence control collects feeds but does not require the operational pivot (sysctl kernel.user_ptrace=0) when intel shows a same-family CVE with public PoC."
|
|
3616
|
+
},
|
|
3617
|
+
"atlas_refs": [],
|
|
3618
|
+
"attack_refs": [
|
|
3619
|
+
"T1068"
|
|
3620
|
+
],
|
|
3621
|
+
"rwep_score": 30,
|
|
3622
|
+
"rwep_factors": {
|
|
3623
|
+
"cisa_kev": 0,
|
|
3624
|
+
"poc_available": 20,
|
|
3625
|
+
"ai_factor": 0,
|
|
3626
|
+
"active_exploitation": 0,
|
|
3627
|
+
"blast_radius": 25,
|
|
3628
|
+
"patch_available": -15,
|
|
3629
|
+
"live_patch_available": 0,
|
|
3630
|
+
"reboot_required": 0
|
|
3631
|
+
},
|
|
3632
|
+
"rwep_notes": "RWEP 30 today (T+3). Score will jump to 50 (+25 KEV) on CISA KEV listing — expected within weeks once exploitation observed. Reboot-required nature adds operator friction not captured in RWEP — practical exposure window is longer than the math suggests because reboot scheduling lags kernel-package availability. blast_radius 25 reflects every Linux host running setuid ssh-keysign or chage (every default OpenSSH + shadow-utils install). Live-patch credit deferred until KernelCare ships.",
|
|
3633
|
+
"cwe_refs": [
|
|
3634
|
+
"CWE-672",
|
|
3635
|
+
"CWE-362"
|
|
3636
|
+
],
|
|
3637
|
+
"source_verified": "2026-05-17",
|
|
3638
|
+
"verification_sources": [
|
|
3639
|
+
"https://cybersecuritynews.com/linux-kernel-vulnerability-ssh-keysign-pwn/",
|
|
3640
|
+
"https://www.gotekky.com/guides/security/cve-2026-46333-ssh-keysign-pwn-linux-kernel/",
|
|
3641
|
+
"https://blog.cloudlinux.com/ptrace-exit-race-cve-2026-46333-mitigation-and-kernel-update",
|
|
3642
|
+
"https://almalinux.org/blog/2026-05-15-ssh-keysign-pwn-cve-2026-46333/",
|
|
3643
|
+
"https://9to5linux.com/six-year-old-linux-kernel-flaw-lets-unprivileged-users-read-root-owned-files",
|
|
3644
|
+
"https://www.phoronix.com/news/Linux-ssh-keysign-pwn",
|
|
3645
|
+
"https://needhelp.icu/blogs/ssh-keysign-pwn",
|
|
3646
|
+
"https://hackingpassion.com/ssh-keysign-pwn-cve-2026-46333/"
|
|
3647
|
+
],
|
|
3648
|
+
"_draft": false,
|
|
3649
|
+
"last_updated": "2026-05-17",
|
|
3650
|
+
"discovery_attribution_note": "Qualys Threat Research Unit human research, publicly disclosed 2026-05-14. The underlying logic flaw was originally surfaced in a 2020 patch proposal by Jann Horn that was never merged; Qualys identified the exploitable consequence six years later. No AI involvement on either the discovery or weaponization side."
|
|
3651
|
+
},
|
|
3652
|
+
"MAL-2026-SHAI-HULUD-OSS": {
|
|
3653
|
+
"name": "Shai-Hulud worm framework (TeamPCP open-source release)",
|
|
3654
|
+
"type": "malicious-framework-release",
|
|
3655
|
+
"cvss_score": 9.8,
|
|
3656
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
|
3657
|
+
"cvss_note": "CVSS scored as a malicious package family: AV:N (npm registry), PR:N (no auth required to install), UI:R (user runs npm install), S:C (developer workstation → cloud/registry/AI-assistant credential blast radius). Same severity profile as MAL-2026-TANSTACK-MINI and MAL-2026-NODE-IPC-STEALER. RWEP scoring captures the operational risk more accurately than CVSS for the framework class.",
|
|
3658
|
+
"cisa_kev": false,
|
|
3659
|
+
"cisa_kev_date": null,
|
|
3660
|
+
"cisa_kev_due_date": null,
|
|
3661
|
+
"poc_available": true,
|
|
3662
|
+
"poc_description": "The framework IS the PoC — TeamPCP open-sourced the complete Shai-Hulud worm to GitHub on 2026-05-12 under MIT license, with deployment instructions. Repository naming pattern: \"A Gift From TeamPCP\". Associated accounts observed: agwagwagwa, headdirt, tmechen. Commit timestamps falsified to 2099-01-01 as an obfuscation marker. Modular TypeScript / Bun toolkit for credential harvesting + supply-chain poisoning + encrypted exfil; targets CI/CD pipelines and developer workstations. Within hours of release, Ox Security observed third-party copycat modifications already in deployment.",
|
|
3663
|
+
"ai_discovered": false,
|
|
3664
|
+
"ai_discovery_notes": "Threat-actor framework, not a discovery. TeamPCP describes the framework as \"vibe coded\" — operator-generated rather than AI-generated. Adoption-side: AI-coding-assistant config files (Claude Code, Cursor, Codeium, Anthropic CLI) are explicit exfil targets — the framework reads ~/.cursor/mcp.json, ~/.codeium/windsurf/mcp_config.json, ~/.claude/settings.json, and adds Claude Code startup hooks to execute the malware when Claude starts. AI-assistant-installed-but-not-AI-discovered.",
|
|
3665
|
+
"ai_assisted_weaponization": true,
|
|
3666
|
+
"ai_assist_weaponization_notes": "TeamPCP self-describes the codebase as \"vibe coded\" — AI-coding-assistant-mediated authoring. BreachForums + TeamPCP launched a $1,000 USD (Monero) bounty contest concurrent with the release, judged on downstream supply-chain impact, accelerating copycat weaponization.",
|
|
3667
|
+
"active_exploitation": "confirmed",
|
|
3668
|
+
"active_exploitation_notes": "Copycat modifications observed by Ox Security within hours of the 2026-05-12 release. Mini Shai-Hulud wave (Microsoft Security Research, 2026-05-11) compromised 170+ npm packages + 2 PyPI packages across 404 malicious versions. MAL-2026-TANSTACK-MINI in this catalog is an in-the-wild Shai-Hulud-class incident. Continuous active exploitation expected through 2026.",
|
|
3669
|
+
"affected": "npm registry (170+ confirmed packages in May 2026 wave), PyPI (2 confirmed), GitHub Actions runners, developer workstations with credentials staged in ~/.aws, ~/.config/gcloud, ~/.kube, ~/.ssh, ~/.cursor, ~/.codeium, ~/.claude, ~/.npmrc. Any package-registry account whose maintainer workstation runs the framework. Any AI-assistant config file with API tokens or MCP server credentials.",
|
|
3670
|
+
"affected_versions": [
|
|
3671
|
+
"shai-hulud-framework all forks post-2026-05-12"
|
|
3672
|
+
],
|
|
3673
|
+
"vector": "Self-replicating npm worm with maintainer-account-pivot. Phase 1: credential harvest via package post-install OR require-time activation (variant-dependent) reads cloud + AI-assistant + version-control configs from operator HOME. Phase 2: stolen npm token authenticates to registry as compromised maintainer; enumerates other packages owned by same maintainer; injects malware; publishes new compromised versions. Phase 3: encrypted exfil to attacker-controlled GitHub repos matching the \"A Gift From TeamPCP\" naming pattern + secondary C2 channels. Phase 4 (variant-dependent): local-environment wipe — destructive opt-in by attacker.",
|
|
3674
|
+
"complexity": "turnkey post-source-release",
|
|
3675
|
+
"complexity_notes": "Pre-2026-05-12 the framework required reverse-engineering effort by would-be operators. Post-release ships with deployment instructions; the BreachForums contest provides operational support. Barrier-to-entry collapsed from high (custom-tradecraft research) to low (clone + deploy).",
|
|
3676
|
+
"patch_available": false,
|
|
3677
|
+
"patch_required_reboot": false,
|
|
3678
|
+
"live_patch_available": false,
|
|
3679
|
+
"live_patch_tools": [],
|
|
3680
|
+
"live_patch_notes": "Patching does not apply — this is a malicious framework, not a vulnerability. Defensive posture is detection + ingestion-side blocking + maintainer credential rotation. npm tool-trust controls (--ignore-scripts, Verdaccio proxy, install-time hash pinning) reduce blast radius for consumers; do NOT protect maintainer-side compromise.",
|
|
3681
|
+
"framework_control_gaps": {
|
|
3682
|
+
"NIST-800-218-SSDF-PW.4": "PW.4 secure-development tooling assumes the maintainer workstation is trusted; Shai-Hulud invalidates by exfiltrating maintainer credentials BEFORE the malicious publish. SSDF has no compensating control for compromised-maintainer-republish.",
|
|
3683
|
+
"NIST-800-53-SR-3": "SR-3 supply-chain risk management treats package-registry compromise as upstream risk; Shai-Hulud is maintainer-side compromise that LOOKS LIKE legitimate publish. SR-3 controls catch tampered upstream but not legitimately-authenticated malicious upstream.",
|
|
3684
|
+
"EU-CRA-Art13": "CRA Article 13 vulnerability-handling treats malicious upgrades as outside scope; the framework explicitly targets the legitimate update channel.",
|
|
3685
|
+
"NIS2-Art21-supply-chain": "Art. 21(2)(d) supply-chain risk measures undefined for self-replicating worm distribution. No guidance on maintainer-credential isolation or registry-side authentication monitoring.",
|
|
3686
|
+
"DORA-Art28": "ICT third-party risk management presumes vendor due-diligence; OSS maintainer compromise is outside the vendor-contract framing.",
|
|
3687
|
+
"UK-CAF-B4": "System security principle silent on registry-side authentication monitoring for downstream consumers.",
|
|
3688
|
+
"AU-ISM-1808": "Software-supply-chain controls assume vendor-side SBOM truth; Shai-Hulud invalidates by publishing under legitimate maintainer identity.",
|
|
3689
|
+
"SLSA-v1.0-Build-L3": "SLSA L3 build provenance is technically valid for Shai-Hulud-poisoned packages — the malicious build IS provenance-attested under the compromised maintainer's legitimate identity. L3 catches tampered upstream; it does NOT catch legitimately-authenticated malicious upstream."
|
|
3690
|
+
},
|
|
3691
|
+
"atlas_refs": [
|
|
3692
|
+
"AML.T0010"
|
|
3693
|
+
],
|
|
3694
|
+
"attack_refs": [
|
|
3695
|
+
"T1195.002",
|
|
3696
|
+
"T1078",
|
|
3697
|
+
"T1567",
|
|
3698
|
+
"T1485"
|
|
3699
|
+
],
|
|
3700
|
+
"rwep_score": 70,
|
|
3701
|
+
"rwep_factors": {
|
|
3702
|
+
"cisa_kev": 0,
|
|
3703
|
+
"poc_available": 20,
|
|
3704
|
+
"ai_factor": 15,
|
|
3705
|
+
"active_exploitation": 20,
|
|
3706
|
+
"blast_radius": 15,
|
|
3707
|
+
"patch_available": 0,
|
|
3708
|
+
"live_patch_available": 0,
|
|
3709
|
+
"reboot_required": 0
|
|
3710
|
+
},
|
|
3711
|
+
"rwep_notes": "RWEP 70 — high. cisa_kev not applicable (KEV is CVE-only). poc_available: the framework IS the PoC. ai_factor: AI-coding-assistant-mediated authoring + AI-assistant config files as exfil target. active_exploitation: confirmed via Mini Shai-Hulud wave + TanStack-class incidents. blast_radius: every npm-using engineering org + every AI-assistant-using developer workstation. No patch direction — defensive posture is detection + maintainer credential rotation + ingest-side controls.",
|
|
3712
|
+
"cwe_refs": [
|
|
3713
|
+
"CWE-506",
|
|
3714
|
+
"CWE-829"
|
|
3715
|
+
],
|
|
3716
|
+
"source_verified": "2026-05-17",
|
|
3717
|
+
"verification_sources": [
|
|
3718
|
+
"https://www.theregister.com/security/2026/05/13/malware-crew-teampcp-open-sources-its-shai-hulud-worm-on-github/5239319",
|
|
3719
|
+
"https://www.ox.security/blog/shai-hulud-open-source-malware-github/",
|
|
3720
|
+
"https://www.securityweek.com/teampcp-ups-the-game-releases-shai-hulud-worms-source-code/",
|
|
3721
|
+
"https://www.reversinglabs.com/blog/the-shai-hulud-code-drop",
|
|
3722
|
+
"https://socket.dev/blog/teampcp-supply-chain-attack-contest",
|
|
3723
|
+
"https://industrialcyber.co/ransomware/vect-formalizes-breachforums-and-teampcp-alliance-to-push-model-for-industrialized-ransomware-scale-raas-operations/",
|
|
3724
|
+
"https://www.scworld.com/news/teampcp-releases-vibe-coded-shai-hulud-source-code-issues-challenge",
|
|
3725
|
+
"https://securitylabs.datadoghq.com/articles/shai-hulud-open-source-framework-static-analysis/",
|
|
3726
|
+
"https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/",
|
|
3727
|
+
"https://unit42.paloaltonetworks.com/npm-supply-chain-attack/",
|
|
3728
|
+
"https://www.microsoft.com/en-us/security/blog/2025/12/09/shai-hulud-2-0-guidance-for-detecting-investigating-and-defending-against-the-supply-chain-attack/",
|
|
3729
|
+
"https://www.cisa.gov/news-events/alerts/2025/09/23/widespread-supply-chain-compromise-impacting-npm-ecosystem",
|
|
3730
|
+
"https://www.wiz.io/blog/shai-hulud-2-0-ongoing-supply-chain-attack",
|
|
3731
|
+
"https://snyk.io/blog/tanstack-npm-packages-compromised/"
|
|
3732
|
+
],
|
|
3733
|
+
"last_updated": "2026-05-17",
|
|
3734
|
+
"discovery_attribution_note": "TeamPCP threat-actor framework, not a vulnerability discovery. The framework was open-sourced 2026-05-12 on GitHub under MIT license by the same actor group responsible for the September 2025 / November 2025 / May 2026 Shai-Hulud npm-worm waves. TeamPCP self-describes the framework as \"vibe coded\" — AI-coding-assistant-mediated authoring. Adoption-side weaponization is accelerated by AI coding assistants + the BreachForums-hosted $1,000 USD bounty contest."
|
|
3568
3735
|
}
|
|
3569
3736
|
}
|
package/data/cwe-catalog.json
CHANGED
|
@@ -949,7 +949,8 @@
|
|
|
949
949
|
"kernel-lpe-triage"
|
|
950
950
|
],
|
|
951
951
|
"evidence_cves": [
|
|
952
|
-
"CVE-2026-33825"
|
|
952
|
+
"CVE-2026-33825",
|
|
953
|
+
"CVE-2026-46333"
|
|
953
954
|
],
|
|
954
955
|
"framework_controls_partially_addressing": [
|
|
955
956
|
"NIST-800-53-SI-16",
|
|
@@ -1127,8 +1128,11 @@
|
|
|
1127
1128
|
],
|
|
1128
1129
|
"skills_referencing": [],
|
|
1129
1130
|
"evidence_cves": [
|
|
1131
|
+
"CVE-2024-3094",
|
|
1130
1132
|
"MAL-2026-3083",
|
|
1131
|
-
"MAL-2026-NODE-IPC-STEALER"
|
|
1133
|
+
"MAL-2026-NODE-IPC-STEALER",
|
|
1134
|
+
"MAL-2026-SHAI-HULUD-OSS",
|
|
1135
|
+
"MAL-2026-TANSTACK-MINI"
|
|
1132
1136
|
],
|
|
1133
1137
|
"framework_controls_partially_addressing": [
|
|
1134
1138
|
"NIST-800-53-SA-12",
|
|
@@ -1222,7 +1226,8 @@
|
|
|
1222
1226
|
"kernel-lpe-triage"
|
|
1223
1227
|
],
|
|
1224
1228
|
"evidence_cves": [
|
|
1225
|
-
"CVE-2026-46300"
|
|
1229
|
+
"CVE-2026-46300",
|
|
1230
|
+
"CVE-2026-46333"
|
|
1226
1231
|
],
|
|
1227
1232
|
"framework_controls_partially_addressing": [
|
|
1228
1233
|
"NIST-800-53-SI-16",
|
|
@@ -1349,6 +1354,7 @@
|
|
|
1349
1354
|
],
|
|
1350
1355
|
"evidence_cves": [
|
|
1351
1356
|
"CVE-2026-0300",
|
|
1357
|
+
"CVE-2026-42945",
|
|
1352
1358
|
"CVE-2026-43500",
|
|
1353
1359
|
"CVE-2026-46300"
|
|
1354
1360
|
],
|
|
@@ -1415,7 +1421,8 @@
|
|
|
1415
1421
|
"supply-chain-integrity"
|
|
1416
1422
|
],
|
|
1417
1423
|
"evidence_cves": [
|
|
1418
|
-
"MAL-2026-NODE-IPC-STEALER"
|
|
1424
|
+
"MAL-2026-NODE-IPC-STEALER",
|
|
1425
|
+
"MAL-2026-SHAI-HULUD-OSS"
|
|
1419
1426
|
],
|
|
1420
1427
|
"framework_controls_partially_addressing": [
|
|
1421
1428
|
"NIST-800-53-SA-12",
|
|
@@ -1656,6 +1663,7 @@
|
|
|
1656
1663
|
"supply-chain-integrity"
|
|
1657
1664
|
],
|
|
1658
1665
|
"evidence_cves": [
|
|
1666
|
+
"CVE-2024-3094",
|
|
1659
1667
|
"MAL-2026-NODE-IPC-STEALER"
|
|
1660
1668
|
],
|
|
1661
1669
|
"framework_controls_partially_addressing": [
|
|
@@ -1688,7 +1696,9 @@
|
|
|
1688
1696
|
"sector-federal-government",
|
|
1689
1697
|
"supply-chain-integrity"
|
|
1690
1698
|
],
|
|
1691
|
-
"evidence_cves": [
|
|
1699
|
+
"evidence_cves": [
|
|
1700
|
+
"MAL-2026-TANSTACK-MINI"
|
|
1701
|
+
],
|
|
1692
1702
|
"framework_controls_partially_addressing": [
|
|
1693
1703
|
"NIST-800-53-SA-12",
|
|
1694
1704
|
"NIST-800-53-SI-2",
|
|
@@ -388,7 +388,8 @@
|
|
|
388
388
|
"status": "open",
|
|
389
389
|
"opened_date": "2026-05-13",
|
|
390
390
|
"evidence_cves": [
|
|
391
|
-
"CVE-2026-45321"
|
|
391
|
+
"CVE-2026-45321",
|
|
392
|
+
"MAL-2026-SHAI-HULUD-OSS"
|
|
392
393
|
],
|
|
393
394
|
"atlas_refs": [
|
|
394
395
|
"AML.T0010",
|
|
@@ -724,10 +725,14 @@
|
|
|
724
725
|
"status": "open",
|
|
725
726
|
"opened_date": "2026-05-13",
|
|
726
727
|
"evidence_cves": [
|
|
728
|
+
"CVE-2024-3094",
|
|
727
729
|
"CVE-2026-42897",
|
|
730
|
+
"CVE-2026-42945",
|
|
728
731
|
"CVE-2026-45321",
|
|
729
732
|
"MAL-2026-3083",
|
|
730
|
-
"MAL-2026-NODE-IPC-STEALER"
|
|
733
|
+
"MAL-2026-NODE-IPC-STEALER",
|
|
734
|
+
"MAL-2026-SHAI-HULUD-OSS",
|
|
735
|
+
"MAL-2026-TANSTACK-MINI"
|
|
731
736
|
],
|
|
732
737
|
"atlas_refs": [
|
|
733
738
|
"AML.T0010",
|
|
@@ -1099,6 +1104,7 @@
|
|
|
1099
1104
|
"status": "open",
|
|
1100
1105
|
"opened_date": "2026-04-01",
|
|
1101
1106
|
"evidence_cves": [
|
|
1107
|
+
"CVE-2024-3094",
|
|
1102
1108
|
"CVE-2026-30615"
|
|
1103
1109
|
],
|
|
1104
1110
|
"atlas_refs": [
|
|
@@ -1135,7 +1141,9 @@
|
|
|
1135
1141
|
"evidence_cves": [
|
|
1136
1142
|
"CVE-2026-0300",
|
|
1137
1143
|
"CVE-2026-31431",
|
|
1138
|
-
"CVE-2026-
|
|
1144
|
+
"CVE-2026-42945",
|
|
1145
|
+
"CVE-2026-46300",
|
|
1146
|
+
"CVE-2026-46333"
|
|
1139
1147
|
],
|
|
1140
1148
|
"atlas_refs": [],
|
|
1141
1149
|
"attack_refs": [
|
|
@@ -1314,6 +1322,7 @@
|
|
|
1314
1322
|
"CVE-2026-39884",
|
|
1315
1323
|
"CVE-2026-45321",
|
|
1316
1324
|
"CVE-2026-46300",
|
|
1325
|
+
"CVE-2026-46333",
|
|
1317
1326
|
"MAL-2026-3083"
|
|
1318
1327
|
],
|
|
1319
1328
|
"atlas_refs": [],
|
|
@@ -1699,9 +1708,11 @@
|
|
|
1699
1708
|
"CVE-2026-32202",
|
|
1700
1709
|
"CVE-2026-33825",
|
|
1701
1710
|
"CVE-2026-42897",
|
|
1711
|
+
"CVE-2026-42945",
|
|
1702
1712
|
"CVE-2026-43284",
|
|
1703
1713
|
"CVE-2026-43500",
|
|
1704
1714
|
"CVE-2026-46300",
|
|
1715
|
+
"CVE-2026-46333",
|
|
1705
1716
|
"CVE-2026-6973"
|
|
1706
1717
|
],
|
|
1707
1718
|
"atlas_refs": [],
|
|
@@ -2316,9 +2327,11 @@
|
|
|
2316
2327
|
"status": "open",
|
|
2317
2328
|
"opened_date": "2026-05-11",
|
|
2318
2329
|
"evidence_cves": [
|
|
2330
|
+
"CVE-2024-3094",
|
|
2319
2331
|
"CVE-2026-45321",
|
|
2320
2332
|
"MAL-2026-3083",
|
|
2321
|
-
"MAL-2026-NODE-IPC-STEALER"
|
|
2333
|
+
"MAL-2026-NODE-IPC-STEALER",
|
|
2334
|
+
"MAL-2026-SHAI-HULUD-OSS"
|
|
2322
2335
|
],
|
|
2323
2336
|
"atlas_refs": [
|
|
2324
2337
|
"AML.T0010",
|
|
@@ -3653,7 +3666,8 @@
|
|
|
3653
3666
|
"status": "open",
|
|
3654
3667
|
"opened_date": "2026-05-15",
|
|
3655
3668
|
"evidence_cves": [
|
|
3656
|
-
"CVE-2026-0300"
|
|
3669
|
+
"CVE-2026-0300",
|
|
3670
|
+
"CVE-2026-42945"
|
|
3657
3671
|
],
|
|
3658
3672
|
"atlas_refs": [],
|
|
3659
3673
|
"attack_refs": [
|
|
@@ -3689,7 +3703,9 @@
|
|
|
3689
3703
|
"evidence_cves": [
|
|
3690
3704
|
"CVE-2026-0300",
|
|
3691
3705
|
"CVE-2026-42897",
|
|
3692
|
-
"CVE-2026-
|
|
3706
|
+
"CVE-2026-42945",
|
|
3707
|
+
"CVE-2026-46300",
|
|
3708
|
+
"CVE-2026-46333"
|
|
3693
3709
|
],
|
|
3694
3710
|
"atlas_refs": [],
|
|
3695
3711
|
"attack_refs": [
|
|
@@ -3963,7 +3979,9 @@
|
|
|
3963
3979
|
"status": "open",
|
|
3964
3980
|
"opened_date": "2026-05-17",
|
|
3965
3981
|
"evidence_cves": [
|
|
3966
|
-
"CVE-2026-46300"
|
|
3982
|
+
"CVE-2026-46300",
|
|
3983
|
+
"CVE-2026-46333",
|
|
3984
|
+
"MAL-2026-SHAI-HULUD-OSS"
|
|
3967
3985
|
],
|
|
3968
3986
|
"atlas_refs": [],
|
|
3969
3987
|
"attack_refs": [
|
|
@@ -3994,7 +4012,8 @@
|
|
|
3994
4012
|
"status": "open",
|
|
3995
4013
|
"opened_date": "2026-05-17",
|
|
3996
4014
|
"evidence_cves": [
|
|
3997
|
-
"CVE-2026-46300"
|
|
4015
|
+
"CVE-2026-46300",
|
|
4016
|
+
"CVE-2026-46333"
|
|
3998
4017
|
],
|
|
3999
4018
|
"atlas_refs": [],
|
|
4000
4019
|
"attack_refs": [
|
|
@@ -4025,7 +4044,8 @@
|
|
|
4025
4044
|
"status": "open",
|
|
4026
4045
|
"opened_date": "2026-05-17",
|
|
4027
4046
|
"evidence_cves": [
|
|
4028
|
-
"CVE-2026-46300"
|
|
4047
|
+
"CVE-2026-46300",
|
|
4048
|
+
"CVE-2026-46333"
|
|
4029
4049
|
],
|
|
4030
4050
|
"atlas_refs": [
|
|
4031
4051
|
"AML.T0010"
|
|
@@ -4058,7 +4078,9 @@
|
|
|
4058
4078
|
"status": "open",
|
|
4059
4079
|
"opened_date": "2026-05-17",
|
|
4060
4080
|
"evidence_cves": [
|
|
4061
|
-
"MAL-2026-NODE-IPC-STEALER"
|
|
4081
|
+
"MAL-2026-NODE-IPC-STEALER",
|
|
4082
|
+
"MAL-2026-SHAI-HULUD-OSS",
|
|
4083
|
+
"MAL-2026-TANSTACK-MINI"
|
|
4062
4084
|
],
|
|
4063
4085
|
"atlas_refs": [
|
|
4064
4086
|
"AML.T0010",
|