@blamejs/exceptd-skills 0.13.0 → 0.13.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +67 -0
- package/bin/exceptd.js +35 -6
- package/data/_indexes/_meta.json +26 -26
- package/data/_indexes/activity-feed.json +3 -3
- package/data/_indexes/catalog-summaries.json +3 -3
- package/data/_indexes/chains.json +2868 -700
- package/data/_indexes/frequency.json +8 -0
- package/data/_indexes/section-offsets.json +517 -517
- package/data/_indexes/token-budget.json +66 -66
- package/data/atlas-ttps.json +3 -0
- package/data/attack-techniques.json +35 -7
- package/data/cve-catalog.json +177 -31
- package/data/cwe-catalog.json +26 -6
- package/data/framework-control-gaps.json +310 -8
- package/data/zeroday-lessons.json +996 -0
- package/lib/lint-skills.js +50 -1
- package/lib/refresh-external.js +7 -0
- package/lib/source-advisories.js +281 -0
- package/manifest.json +60 -60
- package/orchestrator/index.js +183 -1
- package/package.json +1 -1
- package/sbom.cdx.json +59 -37
- package/scripts/check-test-count.js +146 -0
- package/scripts/predeploy.js +16 -0
- package/skills/age-gates-child-safety/skill.md +1 -0
- package/skills/ai-risk-management/skill.md +1 -0
- package/skills/defensive-countermeasure-mapping/skill.md +1 -0
- package/skills/email-security-anti-phishing/skill.md +1 -0
- package/skills/fuzz-testing-strategy/skill.md +1 -0
- package/skills/mlops-security/skill.md +1 -0
- package/skills/ot-ics-security/skill.md +1 -0
- package/skills/researcher/skill.md +1 -0
- package/skills/sector-energy/skill.md +1 -0
- package/skills/sector-federal-government/skill.md +1 -0
- package/skills/sector-telecom/skill.md +1 -0
- package/skills/skill-update-loop/skill.md +1 -0
- package/skills/threat-model-currency/skill.md +1 -0
- package/skills/threat-modeling-methodology/skill.md +1 -0
- package/skills/webapp-security/skill.md +1 -0
- package/skills/zeroday-gap-learn/skill.md +1 -0
package/data/cve-catalog.json
CHANGED
|
@@ -37,7 +37,13 @@
|
|
|
37
37
|
"vendor_advisory_field_added": "2026-05-11",
|
|
38
38
|
"vendor_advisory_note": "Each CVE carries a structured vendor_advisories array (vendor, advisory_id, url, severity, published_date) for downstream consumers that route by vendor advisory. Unknown advisory IDs are null with the canonical vendor CVE-resolver URL — never fabricated. Existing free-form references are preserved in verification_sources; vendor_advisories is additive.",
|
|
39
39
|
"active_exploitation_vocabulary": {
|
|
40
|
-
"values": [
|
|
40
|
+
"values": [
|
|
41
|
+
"confirmed",
|
|
42
|
+
"suspected",
|
|
43
|
+
"theoretical",
|
|
44
|
+
"none",
|
|
45
|
+
"unknown"
|
|
46
|
+
],
|
|
41
47
|
"definitions": {
|
|
42
48
|
"confirmed": "Active in-the-wild exploitation observed and attributed",
|
|
43
49
|
"suspected": "Indicators consistent with exploitation; attribution incomplete",
|
|
@@ -49,7 +55,7 @@
|
|
|
49
55
|
"ai_discovery_methodology": {
|
|
50
56
|
"field_added": "2026-05-15",
|
|
51
57
|
"agents_md_target": "Hard Rule #7 — '41% of 2025 zero-days were AI-discovered'. Catalog target rate floor: 0.40.",
|
|
52
|
-
"current_rate": 0.
|
|
58
|
+
"current_rate": 0.154,
|
|
53
59
|
"current_floor_enforced_by_test": 0.15,
|
|
54
60
|
"ladder_to_target": [
|
|
55
61
|
0.15,
|
|
@@ -1590,8 +1596,6 @@
|
|
|
1590
1596
|
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
|
|
1591
1597
|
},
|
|
1592
1598
|
"CVE-2024-3154": {
|
|
1593
|
-
"_draft": true,
|
|
1594
|
-
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + Red Hat Bugzilla; CWE-20 and ATT&CK T1611 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1595
1599
|
"ai_assisted_weaponization": false,
|
|
1596
1600
|
"name": "CRI-O arbitrary kernel-module load",
|
|
1597
1601
|
"type": "container-escape",
|
|
@@ -1657,8 +1661,6 @@
|
|
|
1657
1661
|
"discovery_attribution_note": "Reported by the OpenShift / CRI-O upstream security team via Red Hat Bugzilla 2272532; no individual researcher byline in the public advisory and no AI-tool credit. Bug class (systemd property injection through pod annotations) is conventional argument-injection. Source: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-3154."
|
|
1658
1662
|
},
|
|
1659
1663
|
"CVE-2023-43472": {
|
|
1660
|
-
"_draft": true,
|
|
1661
|
-
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + Protect AI Huntr advisory; ATLAS AML.T0016 and CWE-22 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1662
1664
|
"ai_assisted_weaponization": false,
|
|
1663
1665
|
"name": "MLflow path-traversal arbitrary file read",
|
|
1664
1666
|
"type": "path-traversal",
|
|
@@ -1718,8 +1720,6 @@
|
|
|
1718
1720
|
"discovery_attribution_note": "Discovered by Joseph Beeton, senior security researcher at Contrast Security, via the Protect AI Huntr bug bounty program. Named human researcher; no AI-tool credited. Source: https://securityonline.info/cve-2023-43472-critical-vulnerability-uncovered-in-mlflow/ and https://github.com/advisories/GHSA-wqxf-447m-6f5f."
|
|
1719
1721
|
},
|
|
1720
1722
|
"CVE-2020-10148": {
|
|
1721
|
-
"_draft": true,
|
|
1722
|
-
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + CISA AA20-352A; CWE-287 and ATT&CK T1190/T1078 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1723
1723
|
"ai_assisted_weaponization": false,
|
|
1724
1724
|
"name": "SolarWinds Orion API authentication bypass (SUNBURST chain)",
|
|
1725
1725
|
"type": "auth-bypass",
|
|
@@ -1781,8 +1781,6 @@
|
|
|
1781
1781
|
"discovery_attribution_note": "Discovered during the SUNBURST incident-response investigation by FireEye / Mandiant analysts (publicly attributed to the Mandiant team rather than a single researcher) and corroborated by SolarWinds engineering. Documented in CISA AA20-352A and the CERT/CC VU#843464. Named human teams; pre-AI-tooling era for vendor-side attribution. Source: https://kb.cert.org/vuls/id/843464."
|
|
1782
1782
|
},
|
|
1783
1783
|
"CVE-2023-3519": {
|
|
1784
|
-
"_draft": true,
|
|
1785
|
-
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + Citrix CTX561482 + CISA AA23-201A; CWE-787 and ATT&CK T1190 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1786
1784
|
"ai_assisted_weaponization": false,
|
|
1787
1785
|
"name": "Citrix NetScaler ADC/Gateway unauth RCE (CitrixBleed precursor)",
|
|
1788
1786
|
"type": "RCE",
|
|
@@ -1846,8 +1844,6 @@
|
|
|
1846
1844
|
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: +5 (75 -> 80)."
|
|
1847
1845
|
},
|
|
1848
1846
|
"CVE-2024-1709": {
|
|
1849
|
-
"_draft": true,
|
|
1850
|
-
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + ConnectWise advisory; ATT&CK T1190/T1078 refs resolve (cwe_refs empty but ATT&CK satisfies the resolve-at-least-one requirement). Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1851
1847
|
"ai_assisted_weaponization": false,
|
|
1852
1848
|
"name": "ConnectWise ScreenConnect auth-bypass",
|
|
1853
1849
|
"type": "auth-bypass",
|
|
@@ -1905,8 +1901,6 @@
|
|
|
1905
1901
|
"discovery_attribution_note": "Discovered by ConnectWise security engineering and externally reported by Huntress + GreyNoise via in-wild exploitation telemetry within 24 hours of the 2024-02 Patch Tuesday. No individual researcher byline; vendor-internal discovery. No AI-tool credited. Source: https://www.upguard.com/blog/screenconnect-cve-2024."
|
|
1906
1902
|
},
|
|
1907
1903
|
"CVE-2026-20182": {
|
|
1908
|
-
"_draft": true,
|
|
1909
|
-
"_draft_reason": "Hard Rule #1 fields all present and verified against CISA KEV + Rapid7 disclosure; CWE-287 and ATT&CK T1190/T1078 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1910
1904
|
"ai_assisted_weaponization": false,
|
|
1911
1905
|
"name": "Cisco SD-WAN authentication bypass to admin",
|
|
1912
1906
|
"type": "auth-bypass",
|
|
@@ -1969,8 +1963,6 @@
|
|
|
1969
1963
|
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: 0."
|
|
1970
1964
|
},
|
|
1971
1965
|
"CVE-2024-40635": {
|
|
1972
|
-
"_draft": true,
|
|
1973
|
-
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + Snyk SNYK-GOLANG-GITHUBCOMCONTAINERDCONTAINERDV2PKGOCI-9479987; ATT&CK T1525 ref resolves (cwe_refs empty but ATT&CK satisfies). Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
1974
1966
|
"ai_assisted_weaponization": false,
|
|
1975
1967
|
"name": "containerd integer overflow IP mask leak",
|
|
1976
1968
|
"type": "information-disclosure",
|
|
@@ -2096,7 +2088,11 @@
|
|
|
2096
2088
|
],
|
|
2097
2089
|
"last_updated": "2026-05-15",
|
|
2098
2090
|
"discovery_attribution_note": "Same incident-class as CVE-2026-45321 (Mini Shai-Hulud); discovery by ecosystem detection across multiple firms (Snyk, Wiz, StepSecurity, Socket, Orca, JFrog) within minutes of the 2026-05-11 publish window. No AI-tool discovery attribution on the defender side. Source: https://snyk.io/blog/tanstack-npm-packages-compromised/.",
|
|
2099
|
-
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
|
|
2091
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields.",
|
|
2092
|
+
"related_threats": [
|
|
2093
|
+
"MAL-2026-SHAI-HULUD-OSS"
|
|
2094
|
+
],
|
|
2095
|
+
"related_threats_note": "MAL-2026-TANSTACK-MINI is a Mini-Shai-Hulud-wave incident (Microsoft Security Research, 2026-05-11). The framework was open-sourced 2026-05-12 (MAL-2026-SHAI-HULUD-OSS) — TanStack predates the public release by ~24h. Same threat-actor authorship class; same registry-pivot tradecraft."
|
|
2100
2096
|
},
|
|
2101
2097
|
"MAL-2026-ANTHROPIC-MCP-STDIO": {
|
|
2102
2098
|
"_draft": true,
|
|
@@ -2242,8 +2238,6 @@
|
|
|
2242
2238
|
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
|
|
2243
2239
|
},
|
|
2244
2240
|
"CVE-2026-30623": {
|
|
2245
|
-
"_draft": true,
|
|
2246
|
-
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + OX Security advisory (Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok); CWE-78/88, ATLAS AML.T0040 and ATT&CK T1059 refs resolve. This entry is the published successor of the quarantined MAL-2026-ANTHROPIC-MCP-STDIO placeholder. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2247
2241
|
"ai_assisted_weaponization": false,
|
|
2248
2242
|
"name": "Anthropic MCP SDK stdio command-injection",
|
|
2249
2243
|
"type": "command-injection",
|
|
@@ -2309,8 +2303,6 @@
|
|
|
2309
2303
|
"discovery_attribution_note": "OX Security advisory 2026-04-15; researchers Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok. Same disclosure cluster as CVE-2026-30615. Named-human research; no AI-tool credit. Source: https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-critical-systemic-vulnerability-at-the-core-of-the-mcp/."
|
|
2310
2304
|
},
|
|
2311
2305
|
"CVE-2025-12686": {
|
|
2312
|
-
"_draft": true,
|
|
2313
|
-
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + Synacktiv Pwn2Own writeup; CWE-78 and ATT&CK T1190 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2314
2306
|
"ai_assisted_weaponization": false,
|
|
2315
2307
|
"name": "Synology BeeStation unauth RCE (Pwn2Own Ireland 2025)",
|
|
2316
2308
|
"type": "RCE",
|
|
@@ -2369,8 +2361,6 @@
|
|
|
2369
2361
|
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: -5 (50 -> 45)."
|
|
2370
2362
|
},
|
|
2371
2363
|
"CVE-2025-62847": {
|
|
2372
|
-
"_draft": true,
|
|
2373
|
-
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + ZDI Pwn2Own Ireland 2025 day-one results + DEVCORE Research Team attribution; CWE-78 and ATT&CK T1190 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2374
2364
|
"ai_assisted_weaponization": false,
|
|
2375
2365
|
"name": "QNAP QTS/QuTS hero RCE (Pwn2Own Ireland 2025, chain 1/3)",
|
|
2376
2366
|
"type": "RCE",
|
|
@@ -2431,8 +2421,6 @@
|
|
|
2431
2421
|
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: -5 (45 -> 40)."
|
|
2432
2422
|
},
|
|
2433
2423
|
"CVE-2025-62848": {
|
|
2434
|
-
"_draft": true,
|
|
2435
|
-
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + ZDI Pwn2Own Ireland 2025 day-one results + DEVCORE Research Team attribution; CWE-94 and ATT&CK T1190 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2436
2424
|
"ai_assisted_weaponization": false,
|
|
2437
2425
|
"name": "QNAP QTS/QuTS hero RCE (Pwn2Own Ireland 2025, chain 2/3)",
|
|
2438
2426
|
"type": "RCE",
|
|
@@ -2493,8 +2481,6 @@
|
|
|
2493
2481
|
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: -5 (45 -> 40)."
|
|
2494
2482
|
},
|
|
2495
2483
|
"CVE-2025-62849": {
|
|
2496
|
-
"_draft": true,
|
|
2497
|
-
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + ZDI Pwn2Own Ireland 2025 day-one results + DEVCORE Research Team attribution; CWE-269 and ATT&CK T1068 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2498
2484
|
"ai_assisted_weaponization": false,
|
|
2499
2485
|
"name": "QNAP QTS/QuTS hero RCE (Pwn2Own Ireland 2025, chain 3/3)",
|
|
2500
2486
|
"type": "RCE",
|
|
@@ -2555,8 +2541,6 @@
|
|
|
2555
2541
|
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: -5 (40 -> 35)."
|
|
2556
2542
|
},
|
|
2557
2543
|
"CVE-2025-59389": {
|
|
2558
|
-
"_draft": true,
|
|
2559
|
-
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + QNAP QSA-25-48 + ZDI Pwn2Own attribution (Sina Kheirkhah, Summoning Team); CWE-78 and ATT&CK T1190 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2560
2544
|
"ai_assisted_weaponization": false,
|
|
2561
2545
|
"name": "QNAP Hyper Data Protector critical RCE (Pwn2Own Ireland 2025)",
|
|
2562
2546
|
"type": "RCE",
|
|
@@ -2616,8 +2600,6 @@
|
|
|
2616
2600
|
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: 0."
|
|
2617
2601
|
},
|
|
2618
2602
|
"CVE-2025-11837": {
|
|
2619
|
-
"_draft": true,
|
|
2620
|
-
"_draft_reason": "Hard Rule #1 fields all present and verified against NVD + QNAP QSA-25-47 + Pwn2Own attribution (Chumy Tsai, CyCraft Technology); CWE-94 and ATT&CK T1059/T1554 refs resolve. Blocked from verification by missing matching entry in data/zeroday-lessons.json (rule #6: zero-day learning is live). Add the lesson entry, then flip _draft to false.",
|
|
2621
2603
|
"ai_assisted_weaponization": false,
|
|
2622
2604
|
"name": "QNAP Malware Remover code-injection",
|
|
2623
2605
|
"type": "code-injection",
|
|
@@ -3558,5 +3540,169 @@
|
|
|
3558
3540
|
"remediation_status": "removed_from_registry",
|
|
3559
3541
|
"remediation_note": "npm removed all 3 malicious versions (9.1.6, 9.2.3, 12.0.1) within ~2 hours of publication on 2026-05-14. Publisher account atiertant was deactivated. The expired-domain TTP (atlantis-software.net re-registered via Namecheap on 2026-05-07 after Jan 2025 expiry) remains the novel attack class to defend against — see zeroday-lessons NEW-CTRL-047 (PACKAGE-MAINTAINER-DOMAIN-EXPIRY-MONITORING).",
|
|
3560
3542
|
"remediation_status_verified_at": "2026-05-16"
|
|
3543
|
+
},
|
|
3544
|
+
"CVE-2026-46333": {
|
|
3545
|
+
"name": "ssh-keysign-pwn",
|
|
3546
|
+
"type": "LPE-via-info-disclosure",
|
|
3547
|
+
"cvss_score": 7,
|
|
3548
|
+
"cvss_vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
3549
|
+
"cvss_note": "Operator estimate pending NVD enrichment. Local + low privilege + no UI + root file read + chained privesc via /etc/shadow → AC:H reflects the ~100-2000-attempt race window which lowers practical exploitation but does not gate it.",
|
|
3550
|
+
"cisa_kev": false,
|
|
3551
|
+
"cisa_kev_date": null,
|
|
3552
|
+
"cisa_kev_due_date": null,
|
|
3553
|
+
"poc_available": true,
|
|
3554
|
+
"poc_description": "_SiCk published two working exploits within hours of the Qualys disclosure on 2026-05-14: one that reads /etc/ssh/ssh_host_*_key via ssh-keysign exit-race, one that reads /etc/shadow via chage -l exit-race. Both target the same kernel pidfd_getfd race; the setuid binary is the carrier, not the bug. ~100-2000 attempts succeed in practice — deterministic enough for adversary tradecraft.",
|
|
3555
|
+
"ai_discovered": false,
|
|
3556
|
+
"ai_discovery_notes": "Qualys Threat Research Unit human research. The underlying logic flaw was originally surfaced in a 2020 patch proposal by Jann Horn that was never merged; Qualys identified the exploitable consequence six years later.",
|
|
3557
|
+
"ai_assisted_weaponization": false,
|
|
3558
|
+
"active_exploitation": "none",
|
|
3559
|
+
"active_exploitation_notes": "No in-the-wild observations as of T+3 days post-disclosure. Two public PoCs (_SiCk). Expectation: KEV listing within weeks once exploitation observed; until then, theoretical-with-deterministic-PoC class.",
|
|
3560
|
+
"affected": "Linux kernel — all distributions shipping a kernel built without the 2020 Jann Horn patch proposal (effectively every distribution for ~6 years until 2026-05-14). Confirmed affected: RHEL 7-10, AlmaLinux 8/9/10, CloudLinux 7h/8/9/10, Rocky Linux 8/9, Ubuntu 20.04-24.04 LTS (pre-USN), Debian 11-12 (pre-DSA), Amazon Linux 2/2023, SUSE 15. The setuid carrier binaries (ssh-keysign + chage) ship on every Linux system with OpenSSH and shadow-utils installed.",
|
|
3561
|
+
"affected_versions": [
|
|
3562
|
+
"linux-kernel < 7.0.8",
|
|
3563
|
+
"linux-kernel < 6.18.31 (6.18.x branch)",
|
|
3564
|
+
"linux-kernel < 6.12.89 (6.12.x branch)",
|
|
3565
|
+
"linux-kernel < 6.6.139 (6.6.x branch)",
|
|
3566
|
+
"linux-kernel < 6.1.173 (6.1.x branch)",
|
|
3567
|
+
"linux-kernel < 5.15.207 (5.15.x branch)",
|
|
3568
|
+
"linux-kernel < 5.10.256 (5.10.x branch)"
|
|
3569
|
+
],
|
|
3570
|
+
"vector": "ptrace exit-race. exit_mm() runs before exit_files() during privileged-process shutdown. In the microsecond window between the two, task->mm == NULL while the fd table still holds the privileged file handles. The pre-fix __ptrace_may_access() skipped its get_dumpable() check when mm == NULL and silently authorized UID-matched access. An unprivileged attacker races ssh-keysign or chage exit, calls pidfd_getfd(2) to duplicate the still-open file descriptors, and reads /etc/ssh/ssh_host_*_key or /etc/shadow as if it were root. Yama ptrace_scope does NOT mitigate because the bypass is at the kernel access-check layer, not the LSM layer.",
|
|
3571
|
+
"complexity": "race-condition",
|
|
3572
|
+
"complexity_notes": "Race window is microseconds wide but the exploit loops automatically; 100-2000 attempts typically succeed. Once the fd is captured, the read is deterministic. Class similar to Dirty COW but file-read rather than file-write primitive.",
|
|
3573
|
+
"patch_available": true,
|
|
3574
|
+
"patch_required_reboot": true,
|
|
3575
|
+
"live_patch_available": false,
|
|
3576
|
+
"live_patch_tools": [
|
|
3577
|
+
"KernelCare (in active build as of 2026-05-15; release ETA pending)"
|
|
3578
|
+
],
|
|
3579
|
+
"live_patch_notes": "Upstream commit 31e62c2ebbfd (ptrace: slightly saner get_dumpable() logic) merged 2026-05-14. Kernel point releases 7.0.8 / 6.18.31 / 6.12.89 / 6.6.139 / 6.1.173 / 5.15.207 / 5.10.256 published 2026-05-15. Distribution backports: AlmaLinux 8/9/10 ALSA-2026:A008/A009/A010 (2026-05-16 production), CloudLinux 7h/8/9/10 (2026-05-15 beta / 2026-05-17 production). KernelCare livepatch in build; Canonical Livepatch / kpatch status not yet documented at T+3 days. RHEL backport not yet observed in primary sources; check access.redhat.com/security/cve.",
|
|
3580
|
+
"framework_control_gaps": {
|
|
3581
|
+
"NIST-800-53-SI-2": "30-day critical patch SLA is an exploitation window for a Linux kernel LPE with two public PoCs. Reboot-required mitigation breaks the maintenance-window assumption built into SI-2 implementations.",
|
|
3582
|
+
"ISO-27001-2022-A.8.8": "'Appropriate timescales' undefined; standard 30-day interpretation is unsafe for a kernel info-disclosure with public PoC. No requirement to track sysctl-based mitigation (kernel.user_ptrace=0) as a compensating control.",
|
|
3583
|
+
"NIS2-Art21-patch-management": "Art. 21(2)(c) patch-management measures undefined for fast-cycle kernel LPEs with public PoC. No guidance on sysctl or SUID-removal as interim measures.",
|
|
3584
|
+
"DORA-Art-9": "ICT incident management presumes vendor-patch cadence; reboot-required class breaks the standard SLA.",
|
|
3585
|
+
"UK-CAF-B4": "System security principle silent on sysctl-based mitigation OR SUID-removal as compensating controls.",
|
|
3586
|
+
"AU-ISM-1546": "Essential 8 patch-applications maturity ML3 = 48h is still long for a deterministic-with-loop kernel LPE; reboot-required nature compounds the maintenance-window cost.",
|
|
3587
|
+
"ISO-27001-2022-A.5.7": "Threat-intelligence control collects feeds but does not require the operational pivot (sysctl kernel.user_ptrace=0) when intel shows a same-family CVE with public PoC."
|
|
3588
|
+
},
|
|
3589
|
+
"atlas_refs": [],
|
|
3590
|
+
"attack_refs": [
|
|
3591
|
+
"T1068"
|
|
3592
|
+
],
|
|
3593
|
+
"rwep_score": 30,
|
|
3594
|
+
"rwep_factors": {
|
|
3595
|
+
"cisa_kev": 0,
|
|
3596
|
+
"poc_available": 20,
|
|
3597
|
+
"ai_factor": 0,
|
|
3598
|
+
"active_exploitation": 0,
|
|
3599
|
+
"blast_radius": 25,
|
|
3600
|
+
"patch_available": -15,
|
|
3601
|
+
"live_patch_available": 0,
|
|
3602
|
+
"reboot_required": 0
|
|
3603
|
+
},
|
|
3604
|
+
"rwep_notes": "RWEP 30 today (T+3). Score will jump to 50 (+25 KEV) on CISA KEV listing — expected within weeks once exploitation observed. Reboot-required nature adds operator friction not captured in RWEP — practical exposure window is longer than the math suggests because reboot scheduling lags kernel-package availability. blast_radius 25 reflects every Linux host running setuid ssh-keysign or chage (every default OpenSSH + shadow-utils install). Live-patch credit deferred until KernelCare ships.",
|
|
3605
|
+
"cwe_refs": [
|
|
3606
|
+
"CWE-672",
|
|
3607
|
+
"CWE-362"
|
|
3608
|
+
],
|
|
3609
|
+
"source_verified": "2026-05-17",
|
|
3610
|
+
"verification_sources": [
|
|
3611
|
+
"https://cybersecuritynews.com/linux-kernel-vulnerability-ssh-keysign-pwn/",
|
|
3612
|
+
"https://www.gotekky.com/guides/security/cve-2026-46333-ssh-keysign-pwn-linux-kernel/",
|
|
3613
|
+
"https://blog.cloudlinux.com/ptrace-exit-race-cve-2026-46333-mitigation-and-kernel-update",
|
|
3614
|
+
"https://almalinux.org/blog/2026-05-15-ssh-keysign-pwn-cve-2026-46333/",
|
|
3615
|
+
"https://9to5linux.com/six-year-old-linux-kernel-flaw-lets-unprivileged-users-read-root-owned-files",
|
|
3616
|
+
"https://www.phoronix.com/news/Linux-ssh-keysign-pwn",
|
|
3617
|
+
"https://needhelp.icu/blogs/ssh-keysign-pwn",
|
|
3618
|
+
"https://hackingpassion.com/ssh-keysign-pwn-cve-2026-46333/"
|
|
3619
|
+
],
|
|
3620
|
+
"_draft": false,
|
|
3621
|
+
"last_updated": "2026-05-17",
|
|
3622
|
+
"discovery_attribution_note": "Qualys Threat Research Unit human research, publicly disclosed 2026-05-14. The underlying logic flaw was originally surfaced in a 2020 patch proposal by Jann Horn that was never merged; Qualys identified the exploitable consequence six years later. No AI involvement on either the discovery or weaponization side."
|
|
3623
|
+
},
|
|
3624
|
+
"MAL-2026-SHAI-HULUD-OSS": {
|
|
3625
|
+
"name": "Shai-Hulud worm framework (TeamPCP open-source release)",
|
|
3626
|
+
"type": "malicious-framework-release",
|
|
3627
|
+
"cvss_score": 9.8,
|
|
3628
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
|
3629
|
+
"cvss_note": "CVSS scored as a malicious package family: AV:N (npm registry), PR:N (no auth required to install), UI:R (user runs npm install), S:C (developer workstation → cloud/registry/AI-assistant credential blast radius). Same severity profile as MAL-2026-TANSTACK-MINI and MAL-2026-NODE-IPC-STEALER. RWEP scoring captures the operational risk more accurately than CVSS for the framework class.",
|
|
3630
|
+
"cisa_kev": false,
|
|
3631
|
+
"cisa_kev_date": null,
|
|
3632
|
+
"cisa_kev_due_date": null,
|
|
3633
|
+
"poc_available": true,
|
|
3634
|
+
"poc_description": "The framework IS the PoC — TeamPCP open-sourced the complete Shai-Hulud worm to GitHub on 2026-05-12 under MIT license, with deployment instructions. Repository naming pattern: \"A Gift From TeamPCP\". Associated accounts observed: agwagwagwa, headdirt, tmechen. Commit timestamps falsified to 2099-01-01 as an obfuscation marker. Modular TypeScript / Bun toolkit for credential harvesting + supply-chain poisoning + encrypted exfil; targets CI/CD pipelines and developer workstations. Within hours of release, Ox Security observed third-party copycat modifications already in deployment.",
|
|
3635
|
+
"ai_discovered": false,
|
|
3636
|
+
"ai_discovery_notes": "Threat-actor framework, not a discovery. TeamPCP describes the framework as \"vibe coded\" — operator-generated rather than AI-generated. Adoption-side: AI-coding-assistant config files (Claude Code, Cursor, Codeium, Anthropic CLI) are explicit exfil targets — the framework reads ~/.cursor/mcp.json, ~/.codeium/windsurf/mcp_config.json, ~/.claude/settings.json, and adds Claude Code startup hooks to execute the malware when Claude starts. AI-assistant-installed-but-not-AI-discovered.",
|
|
3637
|
+
"ai_assisted_weaponization": true,
|
|
3638
|
+
"ai_assist_weaponization_notes": "TeamPCP self-describes the codebase as \"vibe coded\" — AI-coding-assistant-mediated authoring. BreachForums + TeamPCP launched a $1,000 USD (Monero) bounty contest concurrent with the release, judged on downstream supply-chain impact, accelerating copycat weaponization.",
|
|
3639
|
+
"active_exploitation": "confirmed",
|
|
3640
|
+
"active_exploitation_notes": "Copycat modifications observed by Ox Security within hours of the 2026-05-12 release. Mini Shai-Hulud wave (Microsoft Security Research, 2026-05-11) compromised 170+ npm packages + 2 PyPI packages across 404 malicious versions. MAL-2026-TANSTACK-MINI in this catalog is an in-the-wild Shai-Hulud-class incident. Continuous active exploitation expected through 2026.",
|
|
3641
|
+
"affected": "npm registry (170+ confirmed packages in May 2026 wave), PyPI (2 confirmed), GitHub Actions runners, developer workstations with credentials staged in ~/.aws, ~/.config/gcloud, ~/.kube, ~/.ssh, ~/.cursor, ~/.codeium, ~/.claude, ~/.npmrc. Any package-registry account whose maintainer workstation runs the framework. Any AI-assistant config file with API tokens or MCP server credentials.",
|
|
3642
|
+
"affected_versions": [
|
|
3643
|
+
"shai-hulud-framework all forks post-2026-05-12"
|
|
3644
|
+
],
|
|
3645
|
+
"vector": "Self-replicating npm worm with maintainer-account-pivot. Phase 1: credential harvest via package post-install OR require-time activation (variant-dependent) reads cloud + AI-assistant + version-control configs from operator HOME. Phase 2: stolen npm token authenticates to registry as compromised maintainer; enumerates other packages owned by same maintainer; injects malware; publishes new compromised versions. Phase 3: encrypted exfil to attacker-controlled GitHub repos matching the \"A Gift From TeamPCP\" naming pattern + secondary C2 channels. Phase 4 (variant-dependent): local-environment wipe — destructive opt-in by attacker.",
|
|
3646
|
+
"complexity": "turnkey post-source-release",
|
|
3647
|
+
"complexity_notes": "Pre-2026-05-12 the framework required reverse-engineering effort by would-be operators. Post-release ships with deployment instructions; the BreachForums contest provides operational support. Barrier-to-entry collapsed from high (custom-tradecraft research) to low (clone + deploy).",
|
|
3648
|
+
"patch_available": false,
|
|
3649
|
+
"patch_required_reboot": false,
|
|
3650
|
+
"live_patch_available": false,
|
|
3651
|
+
"live_patch_tools": [],
|
|
3652
|
+
"live_patch_notes": "Patching does not apply — this is a malicious framework, not a vulnerability. Defensive posture is detection + ingestion-side blocking + maintainer credential rotation. npm tool-trust controls (--ignore-scripts, Verdaccio proxy, install-time hash pinning) reduce blast radius for consumers; do NOT protect maintainer-side compromise.",
|
|
3653
|
+
"framework_control_gaps": {
|
|
3654
|
+
"NIST-800-218-SSDF-PW.4": "PW.4 secure-development tooling assumes the maintainer workstation is trusted; Shai-Hulud invalidates by exfiltrating maintainer credentials BEFORE the malicious publish. SSDF has no compensating control for compromised-maintainer-republish.",
|
|
3655
|
+
"NIST-800-53-SR-3": "SR-3 supply-chain risk management treats package-registry compromise as upstream risk; Shai-Hulud is maintainer-side compromise that LOOKS LIKE legitimate publish. SR-3 controls catch tampered upstream but not legitimately-authenticated malicious upstream.",
|
|
3656
|
+
"EU-CRA-Art13": "CRA Article 13 vulnerability-handling treats malicious upgrades as outside scope; the framework explicitly targets the legitimate update channel.",
|
|
3657
|
+
"NIS2-Art21-supply-chain": "Art. 21(2)(d) supply-chain risk measures undefined for self-replicating worm distribution. No guidance on maintainer-credential isolation or registry-side authentication monitoring.",
|
|
3658
|
+
"DORA-Art28": "ICT third-party risk management presumes vendor due-diligence; OSS maintainer compromise is outside the vendor-contract framing.",
|
|
3659
|
+
"UK-CAF-B4": "System security principle silent on registry-side authentication monitoring for downstream consumers.",
|
|
3660
|
+
"AU-ISM-1808": "Software-supply-chain controls assume vendor-side SBOM truth; Shai-Hulud invalidates by publishing under legitimate maintainer identity.",
|
|
3661
|
+
"SLSA-v1.0-Build-L3": "SLSA L3 build provenance is technically valid for Shai-Hulud-poisoned packages — the malicious build IS provenance-attested under the compromised maintainer's legitimate identity. L3 catches tampered upstream; it does NOT catch legitimately-authenticated malicious upstream."
|
|
3662
|
+
},
|
|
3663
|
+
"atlas_refs": [
|
|
3664
|
+
"AML.T0010"
|
|
3665
|
+
],
|
|
3666
|
+
"attack_refs": [
|
|
3667
|
+
"T1195.002",
|
|
3668
|
+
"T1078",
|
|
3669
|
+
"T1567",
|
|
3670
|
+
"T1485"
|
|
3671
|
+
],
|
|
3672
|
+
"rwep_score": 70,
|
|
3673
|
+
"rwep_factors": {
|
|
3674
|
+
"cisa_kev": 0,
|
|
3675
|
+
"poc_available": 20,
|
|
3676
|
+
"ai_factor": 15,
|
|
3677
|
+
"active_exploitation": 20,
|
|
3678
|
+
"blast_radius": 15,
|
|
3679
|
+
"patch_available": 0,
|
|
3680
|
+
"live_patch_available": 0,
|
|
3681
|
+
"reboot_required": 0
|
|
3682
|
+
},
|
|
3683
|
+
"rwep_notes": "RWEP 70 — high. cisa_kev not applicable (KEV is CVE-only). poc_available: the framework IS the PoC. ai_factor: AI-coding-assistant-mediated authoring + AI-assistant config files as exfil target. active_exploitation: confirmed via Mini Shai-Hulud wave + TanStack-class incidents. blast_radius: every npm-using engineering org + every AI-assistant-using developer workstation. No patch direction — defensive posture is detection + maintainer credential rotation + ingest-side controls.",
|
|
3684
|
+
"cwe_refs": [
|
|
3685
|
+
"CWE-506",
|
|
3686
|
+
"CWE-829"
|
|
3687
|
+
],
|
|
3688
|
+
"source_verified": "2026-05-17",
|
|
3689
|
+
"verification_sources": [
|
|
3690
|
+
"https://www.theregister.com/security/2026/05/13/malware-crew-teampcp-open-sources-its-shai-hulud-worm-on-github/5239319",
|
|
3691
|
+
"https://www.ox.security/blog/shai-hulud-open-source-malware-github/",
|
|
3692
|
+
"https://www.securityweek.com/teampcp-ups-the-game-releases-shai-hulud-worms-source-code/",
|
|
3693
|
+
"https://www.reversinglabs.com/blog/the-shai-hulud-code-drop",
|
|
3694
|
+
"https://socket.dev/blog/teampcp-supply-chain-attack-contest",
|
|
3695
|
+
"https://industrialcyber.co/ransomware/vect-formalizes-breachforums-and-teampcp-alliance-to-push-model-for-industrialized-ransomware-scale-raas-operations/",
|
|
3696
|
+
"https://www.scworld.com/news/teampcp-releases-vibe-coded-shai-hulud-source-code-issues-challenge",
|
|
3697
|
+
"https://securitylabs.datadoghq.com/articles/shai-hulud-open-source-framework-static-analysis/",
|
|
3698
|
+
"https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/",
|
|
3699
|
+
"https://unit42.paloaltonetworks.com/npm-supply-chain-attack/",
|
|
3700
|
+
"https://www.microsoft.com/en-us/security/blog/2025/12/09/shai-hulud-2-0-guidance-for-detecting-investigating-and-defending-against-the-supply-chain-attack/",
|
|
3701
|
+
"https://www.cisa.gov/news-events/alerts/2025/09/23/widespread-supply-chain-compromise-impacting-npm-ecosystem",
|
|
3702
|
+
"https://www.wiz.io/blog/shai-hulud-2-0-ongoing-supply-chain-attack",
|
|
3703
|
+
"https://snyk.io/blog/tanstack-npm-packages-compromised/"
|
|
3704
|
+
],
|
|
3705
|
+
"last_updated": "2026-05-17",
|
|
3706
|
+
"discovery_attribution_note": "TeamPCP threat-actor framework, not a vulnerability discovery. The framework was open-sourced 2026-05-12 on GitHub under MIT license by the same actor group responsible for the September 2025 / November 2025 / May 2026 Shai-Hulud npm-worm waves. TeamPCP self-describes the framework as \"vibe coded\" — AI-coding-assistant-mediated authoring. Adoption-side weaponization is accelerated by AI coding assistants + the BreachForums-hosted $1,000 USD bounty contest."
|
|
3561
3707
|
}
|
|
3562
3708
|
}
|
package/data/cwe-catalog.json
CHANGED
|
@@ -47,6 +47,7 @@
|
|
|
47
47
|
"fuzz-testing-strategy"
|
|
48
48
|
],
|
|
49
49
|
"evidence_cves": [
|
|
50
|
+
"CVE-2024-3154",
|
|
50
51
|
"CVE-2026-6973"
|
|
51
52
|
],
|
|
52
53
|
"framework_controls_partially_addressing": [
|
|
@@ -81,7 +82,9 @@
|
|
|
81
82
|
"mcp-agent-trust",
|
|
82
83
|
"webapp-security"
|
|
83
84
|
],
|
|
84
|
-
"evidence_cves": [
|
|
85
|
+
"evidence_cves": [
|
|
86
|
+
"CVE-2023-43472"
|
|
87
|
+
],
|
|
85
88
|
"framework_controls_partially_addressing": [
|
|
86
89
|
"NIST-800-53-AC-3",
|
|
87
90
|
"NIST-800-53-SI-10",
|
|
@@ -148,6 +151,10 @@
|
|
|
148
151
|
"webapp-security"
|
|
149
152
|
],
|
|
150
153
|
"evidence_cves": [
|
|
154
|
+
"CVE-2025-12686",
|
|
155
|
+
"CVE-2025-59389",
|
|
156
|
+
"CVE-2025-62847",
|
|
157
|
+
"CVE-2026-30623",
|
|
151
158
|
"CVE-2026-39987"
|
|
152
159
|
],
|
|
153
160
|
"framework_controls_partially_addressing": [
|
|
@@ -211,6 +218,7 @@
|
|
|
211
218
|
],
|
|
212
219
|
"skills_referencing": [],
|
|
213
220
|
"evidence_cves": [
|
|
221
|
+
"CVE-2026-30623",
|
|
214
222
|
"CVE-2026-39884"
|
|
215
223
|
],
|
|
216
224
|
"framework_controls_partially_addressing": [
|
|
@@ -277,6 +285,8 @@
|
|
|
277
285
|
"webapp-security"
|
|
278
286
|
],
|
|
279
287
|
"evidence_cves": [
|
|
288
|
+
"CVE-2025-11837",
|
|
289
|
+
"CVE-2025-62848",
|
|
280
290
|
"CVE-2026-6973",
|
|
281
291
|
"MAL-2026-3083"
|
|
282
292
|
],
|
|
@@ -463,7 +473,9 @@
|
|
|
463
473
|
"idp-incident-response",
|
|
464
474
|
"webapp-security"
|
|
465
475
|
],
|
|
466
|
-
"evidence_cves": [
|
|
476
|
+
"evidence_cves": [
|
|
477
|
+
"CVE-2025-62849"
|
|
478
|
+
],
|
|
467
479
|
"framework_controls_partially_addressing": [
|
|
468
480
|
"NIST-800-53-AC-6",
|
|
469
481
|
"ISO-27001-2022-A.8.2"
|
|
@@ -532,7 +544,10 @@
|
|
|
532
544
|
"sector-telecom",
|
|
533
545
|
"webapp-security"
|
|
534
546
|
],
|
|
535
|
-
"evidence_cves": [
|
|
547
|
+
"evidence_cves": [
|
|
548
|
+
"CVE-2020-10148",
|
|
549
|
+
"CVE-2026-20182"
|
|
550
|
+
],
|
|
536
551
|
"framework_controls_partially_addressing": [
|
|
537
552
|
"NIST-800-53-IA-2",
|
|
538
553
|
"NIST-800-53-IA-8",
|
|
@@ -949,7 +964,8 @@
|
|
|
949
964
|
"kernel-lpe-triage"
|
|
950
965
|
],
|
|
951
966
|
"evidence_cves": [
|
|
952
|
-
"CVE-2026-33825"
|
|
967
|
+
"CVE-2026-33825",
|
|
968
|
+
"CVE-2026-46333"
|
|
953
969
|
],
|
|
954
970
|
"framework_controls_partially_addressing": [
|
|
955
971
|
"NIST-800-53-SI-16",
|
|
@@ -1130,6 +1146,7 @@
|
|
|
1130
1146
|
"CVE-2024-3094",
|
|
1131
1147
|
"MAL-2026-3083",
|
|
1132
1148
|
"MAL-2026-NODE-IPC-STEALER",
|
|
1149
|
+
"MAL-2026-SHAI-HULUD-OSS",
|
|
1133
1150
|
"MAL-2026-TANSTACK-MINI"
|
|
1134
1151
|
],
|
|
1135
1152
|
"framework_controls_partially_addressing": [
|
|
@@ -1224,7 +1241,8 @@
|
|
|
1224
1241
|
"kernel-lpe-triage"
|
|
1225
1242
|
],
|
|
1226
1243
|
"evidence_cves": [
|
|
1227
|
-
"CVE-2026-46300"
|
|
1244
|
+
"CVE-2026-46300",
|
|
1245
|
+
"CVE-2026-46333"
|
|
1228
1246
|
],
|
|
1229
1247
|
"framework_controls_partially_addressing": [
|
|
1230
1248
|
"NIST-800-53-SI-16",
|
|
@@ -1350,6 +1368,7 @@
|
|
|
1350
1368
|
"kernel-lpe-triage"
|
|
1351
1369
|
],
|
|
1352
1370
|
"evidence_cves": [
|
|
1371
|
+
"CVE-2023-3519",
|
|
1353
1372
|
"CVE-2026-0300",
|
|
1354
1373
|
"CVE-2026-42945",
|
|
1355
1374
|
"CVE-2026-43500",
|
|
@@ -1418,7 +1437,8 @@
|
|
|
1418
1437
|
"supply-chain-integrity"
|
|
1419
1438
|
],
|
|
1420
1439
|
"evidence_cves": [
|
|
1421
|
-
"MAL-2026-NODE-IPC-STEALER"
|
|
1440
|
+
"MAL-2026-NODE-IPC-STEALER",
|
|
1441
|
+
"MAL-2026-SHAI-HULUD-OSS"
|
|
1422
1442
|
],
|
|
1423
1443
|
"framework_controls_partially_addressing": [
|
|
1424
1444
|
"NIST-800-53-SA-12",
|