{"ok":true,"tier":"free","catalog_version":"2026.05.08","date_released":"2026-05-08T17:31:07.6877Z","total_entries":1590,"returned":50,"most_recent":[{"cveID":"CVE-2026-42208","vendorProject":"BerriAI","product":"LiteLLM","vulnerabilityName":"BerriAI LiteLLM SQL Injection Vulnerability","dateAdded":"2026-05-08","shortDescription":"BerriAI LiteLLM contains a SQL injection vulnerability that allows an attacker to read data from the proxy's database and potentially modify it, leading to unauthorised access to the proxy and the credentials it manages.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-05-11","knownRansomwareCampaignUse":"Unknown","notes":"https://github.com/BerriAI/litellm/security/advisories/GHSA-r75f-5x8p-qvmc ; https://nvd.nist.gov/vuln/detail/CVE-2026-42208","cwes":["CWE-89"]},{"cveID":"CVE-2026-6973","vendorProject":"Ivanti","product":"Endpoint Manager Mobile (EPMM)","vulnerabilityName":"Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability","dateAdded":"2026-05-07","shortDescription":"Ivanti Endpoint Manager Mobile (EPMM) contains an improper input validation vulnerability that allows a remotely authenticated user with administrative access to achieve remote code execution.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-05-10","knownRansomwareCampaignUse":"Unknown","notes":"https://hub.ivanti.com/s/article/May-2026-Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-Multiple-CVEs?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2026-6973","cwes":["CWE-20"]},{"cveID":"CVE-2026-0300","vendorProject":"Palo Alto Networks","product":"PAN-OS","vulnerabilityName":"Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability","dateAdded":"2026-05-06","shortDescription":"Palo Alto Networks PAN-OS contains an out-of-bounds write vulnerability in the User-ID Authentication Portal (aka Captive Portal) service that can allow an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.    Until the vendor releases an official fix, the following workaround should be implemented:  - Restrict User-ID Authentication Portal access to only trusted zones.  - Disable User-ID Authentication Portal if not required.","dueDate":"2026-05-09","knownRansomwareCampaignUse":"Unknown","notes":"https://security.paloaltonetworks.com/CVE-2026-0300 ; https://nvd.nist.gov/vuln/detail/CVE-2026-0300","cwes":["CWE-787"]},{"cveID":"CVE-2026-31431","vendorProject":"Linux","product":"Kernel","vulnerabilityName":"Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability","dateAdded":"2026-05-01","shortDescription":"Linux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation.","requiredAction":"\"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-05-15","knownRansomwareCampaignUse":"Unknown","notes":"https://lore.kernel.org/linux-cve-announce/2026042214-CVE-2026-31431-3d65@gregkh/; https://xint.io/blog/copy-fail-linux-distributions#the-fix-6 ; https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/about/ ; https://nvd.nist.gov/vuln/detail/CVE-2026-31431","cwes":["CWE-669"]},{"cveID":"CVE-2026-41940","vendorProject":"WebPros","product":"cPanel & WHM and WP2 (WordPress Squared)","vulnerabilityName":"WebPros cPanel & WHM and WP2 (WordPress Squared) Missing Authentication for Critical Function Vulnerability","dateAdded":"2026-04-30","shortDescription":"WebPros cPanel & WHM (WebHost Manager) and WP2 (WordPress Squared) contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-05-03","knownRansomwareCampaignUse":"Known","notes":"https://support.cpanel.net/hc/en-us/articles/40073787579671-cPanel-WHM-Security-Update-04-28-2026 ; https://docs.cpanel.net/release-notes/release-notes/ ; https://docs.wpsquared.com/changelogs/versions/changelog/#13617 ; https://nvd.nist.gov/vuln/detail/CVE-2026-41940\"","cwes":["CWE-306"]},{"cveID":"CVE-2024-1708","vendorProject":"ConnectWise","product":"ScreenConnect","vulnerabilityName":"ConnectWise ScreenConnect Path Traversal Vulnerability","dateAdded":"2026-04-28","shortDescription":"ConnectWise ScreenConnect contains a path traversal vulnerability which could allow an attacker to execute remote code or directly impact confidential data and critical systems.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-05-12","knownRansomwareCampaignUse":"Unknown","notes":"https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8 ; https://nvd.nist.gov/vuln/detail/CVE-2024-1708","cwes":["CWE-22"]},{"cveID":"CVE-2026-32202","vendorProject":"Microsoft","product":"Windows","vulnerabilityName":"Microsoft Windows Protection Mechanism Failure Vulnerability","dateAdded":"2026-04-28","shortDescription":"Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-05-12","knownRansomwareCampaignUse":"Unknown","notes":"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-32202 ; https://nvd.nist.gov/vuln/detail/CVE-2026-32202","cwes":["CWE-693"]},{"cveID":"CVE-2024-57726","vendorProject":"SimpleHelp ","product":"SimpleHelp","vulnerabilityName":"SimpleHelp Missing Authorization Vulnerability","dateAdded":"2026-04-24","shortDescription":"SimpleHelp contains a missing authorization vulnerability that could allow low-privileged technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-05-08","knownRansomwareCampaignUse":"Unknown","notes":"https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier ; https://nvd.nist.gov/vuln/detail/CVE-2024-57726","cwes":["CWE-862"]},{"cveID":"CVE-2024-57728","vendorProject":"SimpleHelp ","product":"SimpleHelp","vulnerabilityName":"SimpleHelp Path Traversal Vulnerability","dateAdded":"2026-04-24","shortDescription":"SimpleHelp contains a path traversal vulnerability that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-05-08","knownRansomwareCampaignUse":"Unknown","notes":"https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier ; https://nvd.nist.gov/vuln/detail/CVE-2024-57728","cwes":["CWE-22"]},{"cveID":"CVE-2024-7399","vendorProject":"Samsung","product":"MagicINFO 9 Server","vulnerabilityName":"Samsung MagicINFO 9 Server Path Traversal Vulnerability","dateAdded":"2026-04-24","shortDescription":"Samsung MagicINFO 9 Server contains a path traversal vulnerability that could allow an attacker to write arbitrary files as system authority.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-05-08","knownRansomwareCampaignUse":"Unknown","notes":"https://security.samsungtv.com/securityUpdates ; https://nvd.nist.gov/vuln/detail/CVE-2024-7399","cwes":["CWE-22","CWE-434"]},{"cveID":"CVE-2025-29635","vendorProject":"D-Link","product":"DIR-823X","vulnerabilityName":"D-Link DIR-823X Command Injection Vulnerability","dateAdded":"2026-04-24","shortDescription":"D-Link DIR-823X contains a command injection vulnerability that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-05-08","knownRansomwareCampaignUse":"Unknown","notes":"https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10469 ; https://nvd.nist.gov/vuln/detail/CVE-2025-29635","cwes":["CWE-77"]},{"cveID":"CVE-2026-39987","vendorProject":"Marimo","product":"Marimo","vulnerabilityName":"Marimo Remote Code Execution Vulnerability","dateAdded":"2026-04-23","shortDescription":"Marimo contains an pre-authorization remote code execution vulnerability, allowing an unauthenticated attacked to shell access and execute arbitrary system commands.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-05-07","knownRansomwareCampaignUse":"Unknown","notes":"https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc ; https://nvd.nist.gov/vuln/detail/CVE-2026-39987","cwes":["CWE-306"]},{"cveID":"CVE-2026-33825","vendorProject":"Microsoft","product":"Defender","vulnerabilityName":"Microsoft Defender Insufficient Granularity of Access Control Vulnerability","dateAdded":"2026-04-22","shortDescription":"Microsoft Defender contains an insufficient granularity of access control vulnerability that could allow an authorized attacker to escalate privileges locally.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-05-06","knownRansomwareCampaignUse":"Unknown","notes":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825 ; https://nvd.nist.gov/vuln/detail/CVE-2026-33825","cwes":["CWE-1220"]},{"cveID":"CVE-2023-27351","vendorProject":"PaperCut","product":"NG/MF","vulnerabilityName":"PaperCut NG/MF Improper Authentication Vulnerability","dateAdded":"2026-04-20","shortDescription":"PaperCut NG/MF contains an improper authentication vulnerability that could allow remote attackers to bypass authentication on affected installations via the SecurityRequestFilter class.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-05-04","knownRansomwareCampaignUse":"Known","notes":"https://www.papercut.com/kb/Main/PO-1216-and-PO-1219 ; https://nvd.nist.gov/vuln/detail/CVE-2023-27351","cwes":["CWE-287"]},{"cveID":"CVE-2024-27199","vendorProject":"JetBrains","product":"TeamCity","vulnerabilityName":"JetBrains TeamCity Relative Path Traversal Vulnerability","dateAdded":"2026-04-20","shortDescription":"JetBrains TeamCity contains a relative path traversal vulnerability that could allow limited admin actions to be performed.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-05-04","knownRansomwareCampaignUse":"Known","notes":"https://www.jetbrains.com/privacy-security/issues-fixed/ ; https://blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-27199","cwes":["CWE-23"]},{"cveID":"CVE-2025-2749","vendorProject":"Kentico","product":"Kentico Xperience","vulnerabilityName":"Kentico Xperience Path Traversal Vulnerability","dateAdded":"2026-04-20","shortDescription":"Kentico Xperience contains a path traversal vulnerability that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-05-04","knownRansomwareCampaignUse":"Unknown","notes":"https://devnet.kentico.com/download/hotfixes ; https://nvd.nist.gov/vuln/detail/CVE-2025-2749","cwes":["CWE-22","CWE-434"]},{"cveID":"CVE-2025-32975","vendorProject":"Quest","product":"KACE Systems Management Appliance (SMA)","vulnerabilityName":"Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability","dateAdded":"2026-04-20","shortDescription":"Quest KACE Systems Management Appliance (SMA) contains an improper authentication vulnerability that could allow attackers to impersonate legitimate users without valid credentials.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-05-04","knownRansomwareCampaignUse":"Unknown","notes":"https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978 ; https://nvd.nist.gov/vuln/detail/CVE-2025-32975","cwes":["CWE-287"]},{"cveID":"CVE-2025-48700","vendorProject":"Synacor","product":"Zimbra Collaboration Suite (ZCS)","vulnerabilityName":"Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability","dateAdded":"2026-04-20","shortDescription":"Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that could allow attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-23","knownRansomwareCampaignUse":"Unknown","notes":"https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories ; https://nvd.nist.gov/vuln/detail/CVE-2025-48700","cwes":["CWE-79"]},{"cveID":"CVE-2026-20122","vendorProject":"Cisco","product":"Catalyst SD-WAN Manger","vulnerabilityName":"Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability","dateAdded":"2026-04-20","shortDescription":"Cisco Catalyst SD-WAN Manager contains an incorrect use of privileged APIs vulnerability due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges.","requiredAction":"Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.","dueDate":"2026-04-23","knownRansomwareCampaignUse":"Unknown","notes":"CISA Mitigation Instructions: https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems ; https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v ; https://nvd.nist.gov/vuln/detail/CVE-2026-20122","cwes":["CWE-648"]},{"cveID":"CVE-2026-20128","vendorProject":"Cisco","product":"Catalyst SD-WAN Manager","vulnerabilityName":"Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability","dateAdded":"2026-04-20","shortDescription":"Cisco Catalyst SD-WAN Manager contains a storing passwords in a recoverable format vulnerability that allows an authenticated, local attacker to gain DCA user privileges by accessing a credential file for the DCA user on the filesystem as a low-privileged user.","requiredAction":"Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.","dueDate":"2026-04-23","knownRansomwareCampaignUse":"Unknown","notes":"CISA Mitigation Instructions: https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems ; https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v ; https://nvd.nist.gov/vuln/detail/CVE-2026-20128","cwes":["CWE-257"]},{"cveID":"CVE-2026-20133","vendorProject":"Cisco","product":"Catalyst SD-WAN Manager","vulnerabilityName":"Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability","dateAdded":"2026-04-20","shortDescription":"Cisco Catalyst SD-WAN Manager contains an exposure of sensitive information to an unauthorized actor vulnerability that could allow remote attackers to view sensitive information on affected systems.","requiredAction":"Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.","dueDate":"2026-04-23","knownRansomwareCampaignUse":"Unknown","notes":"CISA Mitigation Instructions: https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems ; https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v ; https://nvd.nist.gov/vuln/detail/CVE-2026-20133","cwes":["CWE-200"]},{"cveID":"CVE-2026-34197","vendorProject":"Apache","product":"ActiveMQ","vulnerabilityName":"Apache ActiveMQ Improper Input Validation Vulnerability","dateAdded":"2026-04-16","shortDescription":"Apache ActiveMQ contains an improper input validation vulnerability that allows for code injection.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-30","knownRansomwareCampaignUse":"Unknown","notes":"https://activemq.apache.org/security-advisories.data/CVE-2026-34197-announcement.txt ; https://nvd.nist.gov/vuln/detail/CVE-2026-34197","cwes":["CWE-20","CWE-94"]},{"cveID":"CVE-2009-0238","vendorProject":"Microsoft","product":"Office","vulnerabilityName":"Microsoft Office Remote Code Execution","dateAdded":"2026-04-14","shortDescription":"Microsoft Office Excel contains a remote code execution vulnerability that could allow an attacker to take complete control of an affected system if a user opens a specially crafted Excel file that includes a malformed object.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-28","knownRansomwareCampaignUse":"Unknown","notes":"https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009 ; https://nvd.nist.gov/vuln/detail/CVE-2009-0238","cwes":["CWE-94"]},{"cveID":"CVE-2026-32201","vendorProject":"Microsoft","product":"SharePoint Server","vulnerabilityName":"Microsoft SharePoint Server Improper Input Validation Vulnerability","dateAdded":"2026-04-14","shortDescription":"Microsoft SharePoint Server contains an improper input validation vulnerability that allows an unauthorized attacker to perform spoofing over a network.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-28","knownRansomwareCampaignUse":"Unknown","notes":"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-32201 ; https://nvd.nist.gov/vuln/detail/CVE-2026-32201","cwes":["CWE-20"]},{"cveID":"CVE-2012-1854","vendorProject":"Microsoft","product":"Visual Basic for Applications (VBA)","vulnerabilityName":"Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability","dateAdded":"2026-04-13","shortDescription":"Microsoft Visual Basic for Applications (VBA) contains an insecure library loading vulnerability that could allow for remote code execution.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-27","knownRansomwareCampaignUse":"Unknown","notes":"https://learn.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-046 ; https://nvd.nist.gov/vuln/detail/CVE-2012-1854","cwes":["CWE-426"]},{"cveID":"CVE-2020-9715","vendorProject":"Adobe","product":"Acrobat","vulnerabilityName":"Adobe Acrobat Use-After-Free Vulnerability","dateAdded":"2026-04-13","shortDescription":"Adobe Acrobat contains a use-after-free vulnerability that allows for code execution","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-27","knownRansomwareCampaignUse":"Unknown","notes":"https://helpx.adobe.com/security/products/acrobat/apsb20-48.html ; https://nvd.nist.gov/vuln/detail/CVE-2020-9715","cwes":["CWE-416"]},{"cveID":"CVE-2023-21529","vendorProject":"Microsoft","product":"Exchange Server","vulnerabilityName":"Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability","dateAdded":"2026-04-13","shortDescription":"Microsoft Exchange Server contains a deserialization of untrusted data that allows an authenticated attacker to achieve remote code execution.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-27","knownRansomwareCampaignUse":"Known","notes":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21529 ; https://nvd.nist.gov/vuln/detail/CVE-2023-21529","cwes":["CWE-502"]},{"cveID":"CVE-2023-36424","vendorProject":"Microsoft","product":"Windows","vulnerabilityName":"Microsoft Windows Out-of-Bounds Read Vulnerability","dateAdded":"2026-04-13","shortDescription":"Microsoft Windows Common Log File System Driver contains an out-of-bounds read vulnerability that could allow a threat actor for privileges escalation","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-27","knownRansomwareCampaignUse":"Unknown","notes":"https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-36424 ; https://nvd.nist.gov/vuln/detail/CVE-2023-36424","cwes":["CWE-125"]},{"cveID":"CVE-2025-60710","vendorProject":"Microsoft","product":"Windows","vulnerabilityName":"Microsoft Windows Link Following Vulnerability","dateAdded":"2026-04-13","shortDescription":"Microsoft Windows contains a link following vulnerability that allows for privilege escalation","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-27","knownRansomwareCampaignUse":"Unknown","notes":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60710 ; https://nvd.nist.gov/vuln/detail/CVE-2025-60710","cwes":["CWE-59"]},{"cveID":"CVE-2026-21643","vendorProject":"Fortinet","product":"FortiClient EMS","vulnerabilityName":"Fortinet FortiClient EMS SQL Injection Vulnerability","dateAdded":"2026-04-13","shortDescription":"Fortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-16","knownRansomwareCampaignUse":"Unknown","notes":"https://fortiguard.fortinet.com/psirt/FG-IR-25-1142 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21643","cwes":["CWE-89"]},{"cveID":"CVE-2026-34621","vendorProject":"Adobe","product":"Acrobat and Reader","vulnerabilityName":"Adobe Acrobat and Reader Prototype Pollution Vulnerability","dateAdded":"2026-04-13","shortDescription":"Adobe Acrobat and Reader contain a prototype pollution vulnerability that allows for arbitrary code execution.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-27","knownRansomwareCampaignUse":"Unknown","notes":"https://helpx.adobe.com/security/products/acrobat/apsb26-43.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-34621","cwes":["CWE-1321"]},{"cveID":"CVE-2026-1340","vendorProject":"Ivanti","product":"Endpoint Manager Mobile (EPMM)","vulnerabilityName":"Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability","dateAdded":"2026-04-08","shortDescription":"Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-11","knownRansomwareCampaignUse":"Unknown","notes":"Please adhere to Ivanti's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Ivanti products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as possible. For more information please see: https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US ; https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0S-5.noarch.rpm ; https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0L-5.noarch.rpm ; https://nvd.nist.gov/vuln/detail/CVE-2026-1340","cwes":["CWE-94"]},{"cveID":"CVE-2026-35616","vendorProject":"Fortinet","product":"FortiClient EMS","vulnerabilityName":"Fortinet FortiClient EMS Improper Access Control Vulnerability","dateAdded":"2026-04-06","shortDescription":"Fortinet FortiClient EMS contains an improper access control vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-09","knownRansomwareCampaignUse":"Unknown","notes":"Please adhere to Fortinet's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Fortinet products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: https://fortiguard.fortinet.com/psirt/FG-IR-26-099 ; https://nvd.nist.gov/vuln/detail/CVE-2026-35616","cwes":["CWE-284"]},{"cveID":"CVE-2026-3502","vendorProject":"TrueConf","product":"Client","vulnerabilityName":"TrueConf Client Download of Code Without Integrity Check Vulnerability","dateAdded":"2026-04-02","shortDescription":"TrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-16","knownRansomwareCampaignUse":"Unknown","notes":"https://trueconf.com/blog/update/trueconf-8-5 ; https://trueconf.com/downloads/windows.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-3502","cwes":["CWE-494"]},{"cveID":"CVE-2026-5281","vendorProject":"Google","product":"Dawn","vulnerabilityName":"Google Dawn Use-After-Free Vulnerability","dateAdded":"2026-04-01","shortDescription":"Google Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. This vulnerability could affect multiple Chromium-based products including, but not limited to, Google Chrome, Microsoft Edge, and Opera.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-15","knownRansomwareCampaignUse":"Unknown","notes":"This vulnerability affects an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-5281 ","cwes":["CWE-416"]},{"cveID":"CVE-2026-3055","vendorProject":"Citrix","product":"NetScaler","vulnerabilityName":"Citrix NetScaler Out-of-Bounds Read Vulnerability","dateAdded":"2026-03-30","shortDescription":"Citrix NetScaler ADC (formerly Citrix ADC), NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC FIPS and NDcPP contain an out-of-bounds reads vulnerability when configured as a SAML IDP leading to memory overread.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-02","knownRansomwareCampaignUse":"Unknown","notes":"https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300&articleURL=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2026_3055_and_CVE_2026_4368 ; https://nvd.nist.gov/vuln/detail/CVE-2026-3055","cwes":["CWE-125"]},{"cveID":"CVE-2025-53521","vendorProject":"F5","product":"BIG-IP","vulnerabilityName":"F5 BIG-IP Stack-Based Buffer Overflow Vulnerability","dateAdded":"2026-03-27","shortDescription":"F5 BIG-IP APM contains a stack-based buffer overflow vulnerability that could allow a threat actor to achieve remote code execution.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-03-30","knownRansomwareCampaignUse":"Unknown","notes":"Please adhere to F5’s guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible F5 products affected by this vulnerability. For more information please see: https://my.f5.com/manage/s/article/K000156741 ; https://my.f5.com/manage/s/article/K000160486 ; https://my.f5.com/manage/s/article/K11438344 ; https://nvd.nist.gov/vuln/detail/CVE-2025-53521","cwes":["CWE-121"]},{"cveID":"CVE-2026-33634","vendorProject":"Aquasecurity","product":"Trivy","vulnerabilityName":"Aquasecurity Trivy Embedded Malicious Code Vulnerability","dateAdded":"2026-03-26","shortDescription":"Aquasecurity Trivy contains an embedded malicious code vulnerability that could allow an attacker to gain access to everything in the CI/CD environment, including all tokens, SSH keys, cloud credentials, database passwords, and any sensitive configuration in memory.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-09","knownRansomwareCampaignUse":"Unknown","notes":"This vulnerability involves a supply‑chain compromise in a product that may be used across multiple products and environments. Additional vendor‑provided guidance must be followed to ensure full remediation. For more information, please see: https://github.com/advisories/GHSA-69fq-xp46-6x23 ; https://nvd.nist.gov/vuln/detail/CVE-2026-33634","cwes":["CWE-506"]},{"cveID":"CVE-2026-33017","vendorProject":"Langflow","product":"Langflow","vulnerabilityName":"Langflow Code Injection Vulnerability","dateAdded":"2026-03-25","shortDescription":"Langflow contains a code injection vulnerability that could allow building public flows without requiring authentication.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-08","knownRansomwareCampaignUse":"Unknown","notes":"https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx ; https://nvd.nist.gov/vuln/detail/CVE-2026-33017","cwes":["CWE-94","CWE-95","CWE-306"]},{"cveID":"CVE-2025-31277","vendorProject":"Apple","product":"Multiple Products","vulnerabilityName":"Apple Multiple Products Buffer Overflow Vulnerability","dateAdded":"2026-03-20","shortDescription":"Apple Safari, iOS, watchOS, visionOS, iPadOS, macOS, and tvOS contain a buffer overflow vulnerability that could allow the processing of maliciously crafted web content which may lead to memory corruption.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-03","knownRansomwareCampaignUse":"Unknown","notes":"https://support.apple.com/en-us/124147 ; https://support.apple.com/en-us/124149 ; https://support.apple.com/en-us/124152 ; https://support.apple.com/en-us/124153 ; https://support.apple.com/en-us/124155 ; https://nvd.nist.gov/vuln/detail/CVE-2025-31277","cwes":["CWE-119"]},{"cveID":"CVE-2025-32432","vendorProject":"Craft CMS","product":"Craft CMS","vulnerabilityName":"Craft CMS Code Injection Vulnerability","dateAdded":"2026-03-20","shortDescription":"Craft CMS contains a code injection vulnerability that allows a remote attacker to execute arbitrary code.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-03","knownRansomwareCampaignUse":"Unknown","notes":"https://craftcms.com/knowledge-base/craft-cms-cve-2025-32432 ; https://github.com/craftcms/cms/security/advisories/GHSA-f3gw-9ww9-jmc3 ; https://nvd.nist.gov/vuln/detail/CVE-2025-32432","cwes":["CWE-94"]},{"cveID":"CVE-2025-43510","vendorProject":"Apple","product":"Multiple Products","vulnerabilityName":"Apple Multiple Products Improper Locking Vulnerability","dateAdded":"2026-03-20","shortDescription":"Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability that could allow a malicious application to cause unexpected changes in memory shared between processes.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-03","knownRansomwareCampaignUse":"Unknown","notes":"https://support.apple.com/en-us/125632 ; https://support.apple.com/en-us/125633 ; https://support.apple.com/en-us/125634 ; https://support.apple.com/en-us/125635 ; https://support.apple.com/en-us/125636 ; https://support.apple.com/en-us/125637 ; https://support.apple.com/en-us/125638 ; https://support.apple.com/en-us/125639 ; https://nvd.nist.gov/vuln/detail/CVE-2025-43510","cwes":["CWE-667"]},{"cveID":"CVE-2025-43520","vendorProject":"Apple","product":"Multiple Products","vulnerabilityName":"Apple Multiple Products Classic Buffer Overflow Vulnerability","dateAdded":"2026-03-20","shortDescription":"Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain a classic buffer overflow vulnerability which could allow a malicious application to cause unexpected system termination or write kernel memory.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-03","knownRansomwareCampaignUse":"Unknown","notes":"https://support.apple.com/en-us/125632 ; https://support.apple.com/en-us/125633 ; https://support.apple.com/en-us/125634 ; https://support.apple.com/en-us/125635 ; https://support.apple.com/en-us/125636 ; https://support.apple.com/en-us/125637 ; https://support.apple.com/en-us/125638 ; https://support.apple.com/en-us/125639 ; https://nvd.nist.gov/vuln/detail/CVE-2025-43520","cwes":["CWE-120"]},{"cveID":"CVE-2025-54068","vendorProject":"Laravel","product":"Livewire","vulnerabilityName":"Laravel Livewire Code Injection Vulnerability","dateAdded":"2026-03-20","shortDescription":"Laravel Livewire contain a code injection vulnerability that could allow unauthenticated attackers to achieve remote command execution in specific scenarios.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-03","knownRansomwareCampaignUse":"Unknown","notes":"https://github.com/livewire/livewire/security/advisories/GHSA-29cq-5w36-x7w3 ; https://github.com/livewire/livewire/commit/ef04be759da41b14d2d129e670533180a44987dc ; https://nvd.nist.gov/vuln/detail/CVE-2025-54068","cwes":["CWE-94"]},{"cveID":"CVE-2026-20131","vendorProject":"Cisco","product":"Secure Firewall Management Center (FMC)","vulnerabilityName":"Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability","dateAdded":"2026-03-19","shortDescription":"Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management contain a deserialization of untrusted data vulnerability in the web-based management interface that could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-03-22","knownRansomwareCampaignUse":"Known","notes":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh ; https://nvd.nist.gov/vuln/detail/CVE-2026-20131","cwes":["CWE-502"]},{"cveID":"CVE-2025-66376","vendorProject":"Synacor","product":"Zimbra Collaboration Suite (ZCS)","vulnerabilityName":"Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability","dateAdded":"2026-03-18","shortDescription":"Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability in the Classic UI where attackers could abuse Cascading Style Sheets (CSS) @import directives in email HTML.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-01","knownRansomwareCampaignUse":"Unknown","notes":"https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories ; https://nvd.nist.gov/vuln/detail/CVE-2025-66376","cwes":["CWE-79"]},{"cveID":"CVE-2026-20963","vendorProject":"Microsoft","product":"SharePoint","vulnerabilityName":"Microsoft SharePoint Deserialization of Untrusted Data Vulnerability","dateAdded":"2026-03-18","shortDescription":"Microsoft SharePoint contains a deserialization of untrusted data vulnerability that allows an unauthorized attacker to execute code over a network.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-03-21","knownRansomwareCampaignUse":"Unknown","notes":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20963 ; https://nvd.nist.gov/vuln/detail/CVE-2026-20963","cwes":["CWE-502"]},{"cveID":"CVE-2025-47813","vendorProject":"Wing FTP Server","product":"Wing FTP Server","vulnerabilityName":"Wing FTP Server Information Disclosure Vulnerability","dateAdded":"2026-03-16","shortDescription":"Wing FTP Server contains a generation of error message containing sensitive information vulnerability when using a long value in the UID cookie.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-03-30","knownRansomwareCampaignUse":"Unknown","notes":"https://www.wftpserver.com/serverhistory.htm ; https://nvd.nist.gov/vuln/detail/CVE-2025-47813","cwes":["CWE-209"]},{"cveID":"CVE-2026-3909","vendorProject":"Google","product":"Skia","vulnerabilityName":"Google Skia Out-of-Bounds Write Vulnerability","dateAdded":"2026-03-13","shortDescription":"Google Skia contains an out-of-bounds write vulnerability that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-03-27","knownRansomwareCampaignUse":"Unknown","notes":"This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-3909","cwes":["CWE-787"]},{"cveID":"CVE-2026-3910","vendorProject":"Google","product":"Chromium V8","vulnerabilityName":"Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability","dateAdded":"2026-03-13","shortDescription":"Google Chromium V8 contains an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-03-27","knownRansomwareCampaignUse":"Unknown","notes":"https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_12.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-3910","cwes":["CWE-119"]}],"last_capture":{"last_run":"2026-05-09T06:30:21.358Z","catalog_version":"2026.05.08","catalog_date_released":"2026-05-08T17:31:07.6877Z","total_entries":1590,"newly_added_today":0},"attribution":{"source":"CISA Known Exploited Vulnerabilities Catalog","source_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog","publisher":"Cybersecurity and Infrastructure Security Agency (US Government)","license":"US Government public domain (17 USC §105)","redistribution":"commercial-permitted","notice":"CISA KEV is a US Government work in the public domain. No restrictions on use, reproduction, or distribution."},"premium":{"full_catalog":"/api/premium/security/kev/full","added_series":"/api/premium/security/kev/series?from=&to=","credits_per_call":1,"note":"Free tier returns 50 most-recent entries. Premium /full returns the full untruncated catalog; premium /series returns daily added-entries across a date range up to 90 days."}}