{"type":"bundle","id":"bundle--fih-1775324870178","spec_version":"2.1","objects":[{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0000-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3502","pattern":"[vulnerability:name = 'CVE-2026-3502']","pattern_type":"stix","valid_from":"2026-04-04T16:42:38.000Z","labels":["cve"],"external_references":[{"source_name":"Security Affairs","url":"https://securityaffairs.com/190341/security/u-s-cisa-adds-a-flaw-in-trueconf-client-to-its-known-exploited-vulnerabilities-catalog.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0001-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-35616","pattern":"[vulnerability:name = 'CVE-2026-35616']","pattern_type":"stix","valid_from":"2026-04-04T14:09:54.000Z","labels":["cve"],"external_references":[{"source_name":"Help Net Security","url":"https://www.helpnetsecurity.com/2026/04/04/forticlient-ems-zero-day-cve-2026-35616/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0002-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-5281","pattern":"[vulnerability:name = 'CVE-2026-5281']","pattern_type":"stix","valid_from":"2026-04-03T17:29:30.000Z","labels":["cve"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4154235/google-patches-fourth-chrome-zero-day-so-far-this-year.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0003-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2699","pattern":"[vulnerability:name = 'CVE-2026-2699']","pattern_type":"stix","valid_from":"2026-04-03T15:17:56.000Z","labels":["cve"],"external_references":[{"source_name":"SC Media","url":"https://www.scworld.com/brief/progress-sharefile-vulnerabilities-allow-unauthenticated-file-exfiltration"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0004-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2701","pattern":"[vulnerability:name = 'CVE-2026-2701']","pattern_type":"stix","valid_from":"2026-04-03T15:17:56.000Z","labels":["cve"],"external_references":[{"source_name":"SC Media","url":"https://www.scworld.com/brief/progress-sharefile-vulnerabilities-allow-unauthenticated-file-exfiltration"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0005-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20093","pattern":"[vulnerability:name = 'CVE-2026-20093']","pattern_type":"stix","valid_from":"2026-04-03T12:59:22.000Z","labels":["cve"],"external_references":[{"source_name":"Help Net Security","url":"https://www.helpnetsecurity.com/2026/04/03/cisco-imc-vulnerability-cve-2026-20093/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0006-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2699","pattern":"[vulnerability:name = 'CVE-2026-2699']","pattern_type":"stix","valid_from":"2026-04-03T12:52:55.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/new-progress-sharefile-flaws-expose-servers/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0007-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2701","pattern":"[vulnerability:name = 'CVE-2026-2701']","pattern_type":"stix","valid_from":"2026-04-03T12:52:55.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/new-progress-sharefile-flaws-expose-servers/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0008-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3502","pattern":"[vulnerability:name = 'CVE-2026-3502']","pattern_type":"stix","valid_from":"2026-04-03T10:49:09.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/cisa-includes-trueconf-security-flaw-in-kev-catalog/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0009-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-53521","pattern":"[vulnerability:name = 'CVE-2025-53521']","pattern_type":"stix","valid_from":"2026-04-03T10:40:25.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/14000-f5-big-ip-apm-instances-exposed-online/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0010-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-55182","pattern":"[vulnerability:name = 'CVE-2025-55182']","pattern_type":"stix","valid_from":"2026-04-03T06:49:02.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/attackers-abuse-react2shell-flaw/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--6232622d-0011-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"b2b-contenthub.com","pattern":"[domain-name:value = 'b2b-contenthub.com']","pattern_type":"stix","valid_from":"2026-04-03T04:38:00.000Z","labels":["domain"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/3492511/extended-detection-and-response-losungendie-11-besten-xdr-tools.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0012-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://b2b-contenthub.com/wp-content/uploads/2025/02/original2cso_ArtemisDiana.jpg?quality=50&strip=all","pattern":"[url:value = 'https://b2b-contenthub.com/wp-content/uploads/2025/02/original2cso_ArtemisDiana.jpg?quality=50&strip=all']","pattern_type":"stix","valid_from":"2026-04-03T04:38:00.000Z","labels":["url"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/3492511/extended-detection-and-response-losungendie-11-besten-xdr-tools.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0013-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://b2b-contenthub.com/wp-content/uploads/2025/02/original2cso_ArtemisDiana.jpg?resize=300%2C168&quality=50&strip=all","pattern":"[url:value = 'https://b2b-contenthub.com/wp-content/uploads/2025/02/original2cso_ArtemisDiana.jpg?resize=300%2C168&quality=50&strip=all']","pattern_type":"stix","valid_from":"2026-04-03T04:38:00.000Z","labels":["url"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/3492511/extended-detection-and-response-losungendie-11-besten-xdr-tools.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0014-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://b2b-contenthub.com/wp-content/uploads/2025/02/original2cso_ArtemisDiana.jpg?resize=768%2C432&quality=50&strip=all","pattern":"[url:value = 'https://b2b-contenthub.com/wp-content/uploads/2025/02/original2cso_ArtemisDiana.jpg?resize=768%2C432&quality=50&strip=all']","pattern_type":"stix","valid_from":"2026-04-03T04:38:00.000Z","labels":["url"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/3492511/extended-detection-and-response-losungendie-11-besten-xdr-tools.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0015-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://b2b-contenthub.com/wp-content/uploads/2025/02/original2cso_ArtemisDiana.jpg?resize=1024%2C576&quality=50&strip=all","pattern":"[url:value = 'https://b2b-contenthub.com/wp-content/uploads/2025/02/original2cso_ArtemisDiana.jpg?resize=1024%2C576&quality=50&strip=all']","pattern_type":"stix","valid_from":"2026-04-03T04:38:00.000Z","labels":["url"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/3492511/extended-detection-and-response-losungendie-11-besten-xdr-tools.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--6d656e64-0016-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"mend.io","pattern":"[domain-name:value = 'mend.io']","pattern_type":"stix","valid_from":"2026-04-03T04:00:58.000Z","labels":["domain"],"external_references":[{"source_name":"Help Net Security","url":"https://www.helpnetsecurity.com/2026/04/03/new-infosec-products-of-the-month-march-2026/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0017-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://isc.sans.edu/podcastdetail/9878,","pattern":"[url:value = 'https://isc.sans.edu/podcastdetail/9878,']","pattern_type":"stix","valid_from":"2026-04-03T02:00:02.000Z","labels":["url"],"external_references":[{"source_name":"SANS ISC","url":"https://isc.sans.edu/diary/rss/32862"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0018-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-5281","pattern":"[vulnerability:name = 'CVE-2026-5281']","pattern_type":"stix","valid_from":"2026-04-02T23:11:21.000Z","labels":["cve"],"external_references":[{"source_name":"SC Media","url":"https://www.scworld.com/brief/actively-exploited-chrome-zero-day-patched"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0019-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20093","pattern":"[vulnerability:name = 'CVE-2026-20093']","pattern_type":"stix","valid_from":"2026-04-02T22:26:37.000Z","labels":["cve"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4154052/cisco-fixes-critical-imc-auth-bypass-present-in-many-products.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0020-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-55182","pattern":"[vulnerability:name = 'CVE-2025-55182']","pattern_type":"stix","valid_from":"2026-04-02T19:30:00.000Z","labels":["cve"],"external_references":[{"source_name":"The Hacker News","url":"https://thehackernews.com/2026/04/hackers-exploit-cve-2025-55182-to.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0021-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20093","pattern":"[vulnerability:name = 'CVE-2026-20093']","pattern_type":"stix","valid_from":"2026-04-02T17:04:38.000Z","labels":["cve"],"external_references":[{"source_name":"Security Affairs","url":"https://securityaffairs.com/190295/security/cisco-fixed-critical-and-high-severity-flaws.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0022-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20093","pattern":"[vulnerability:name = 'CVE-2026-20093']","pattern_type":"stix","valid_from":"2026-04-02T15:21:00.000Z","labels":["cve"],"external_references":[{"source_name":"The Hacker News","url":"https://thehackernews.com/2026/04/cisco-patches-98-cvss-imc-and-ssm-flaws.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0023-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://github.com/vitejs/vite].","pattern":"[url:value = 'https://github.com/vitejs/vite].']","pattern_type":"stix","valid_from":"2026-04-02T14:49:00.000Z","labels":["url"],"external_references":[{"source_name":"SANS ISC","url":"https://isc.sans.edu/diary/rss/32860"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0024-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-30208","pattern":"[vulnerability:name = 'CVE-2025-30208']","pattern_type":"stix","valid_from":"2026-04-02T14:49:00.000Z","labels":["cve"],"external_references":[{"source_name":"SANS ISC","url":"https://isc.sans.edu/diary/rss/32860"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0025-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-7741","pattern":"[vulnerability:name = 'CVE-2025-7741']","pattern_type":"stix","valid_from":"2026-04-02T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-092-02"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0026-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-10492","pattern":"[vulnerability:name = 'CVE-2025-10492']","pattern_type":"stix","valid_from":"2026-04-02T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-092-03"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0027-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3502","pattern":"[vulnerability:name = 'CVE-2026-3502']","pattern_type":"stix","valid_from":"2026-04-02T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/alerts/2026/04/02/cisa-adds-one-known-exploited-vulnerability-catalog"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0028-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-5281","pattern":"[vulnerability:name = 'CVE-2026-5281']","pattern_type":"stix","valid_from":"2026-04-02T09:16:35.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/cisa-alert-on-chrome-zero-day/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--6f75746c-0029-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"outlook.com","pattern":"[domain-name:value = 'outlook.com']","pattern_type":"stix","valid_from":"2026-04-02T09:12:12.000Z","labels":["domain"],"external_references":[{"source_name":"BleepingComputer","url":"https://www.bleepingcomputer.com/news/microsoft/microsoft-links-classic-outlook-bug-to-email-delivery-issues/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0030-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3502","pattern":"[vulnerability:name = 'CVE-2026-3502']","pattern_type":"stix","valid_from":"2026-04-02T08:57:18.000Z","labels":["cve"],"external_references":[{"source_name":"Help Net Security","url":"https://www.helpnetsecurity.com/2026/04/02/trueconf-zero-day-vulnerability-cyber-espionage/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0031-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20160","pattern":"[vulnerability:name = 'CVE-2026-20160']","pattern_type":"stix","valid_from":"2026-04-02T06:50:27.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/cisco-smart-software-manager-flaw/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0032-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-1579","pattern":"[vulnerability:name = 'CVE-2026-1579']","pattern_type":"stix","valid_from":"2026-04-02T06:46:42.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/critical-px4-autopilot-vulnerability/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0033-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20093","pattern":"[vulnerability:name = 'CVE-2026-20093']","pattern_type":"stix","valid_from":"2026-04-02T05:26:45.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/cisco-warns-of-critical-imc-vulnerability/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0034-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3991","pattern":"[vulnerability:name = 'CVE-2026-3991']","pattern_type":"stix","valid_from":"2026-04-02T05:02:39.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/symantec-dlp-agent-flaw/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0035-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3775","pattern":"[vulnerability:name = 'CVE-2026-3775']","pattern_type":"stix","valid_from":"2026-04-02T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-251/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0036-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21518","pattern":"[vulnerability:name = 'CVE-2026-21518']","pattern_type":"stix","valid_from":"2026-04-02T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-253/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0037-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-4698","pattern":"[vulnerability:name = 'CVE-2026-4698']","pattern_type":"stix","valid_from":"2026-04-02T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-252/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--6232622d-0038-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"b2b-contenthub.com","pattern":"[domain-name:value = 'b2b-contenthub.com']","pattern_type":"stix","valid_from":"2026-04-02T04:00:00.000Z","labels":["domain"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4093704/tools-um-mcp-server-abzusichern.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0039-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://b2b-contenthub.com/wp-content/uploads/2025/11/Gorodenkoff_shutterstock_2324952347_16z9.jpg?quality=50&strip=all","pattern":"[url:value = 'https://b2b-contenthub.com/wp-content/uploads/2025/11/Gorodenkoff_shutterstock_2324952347_16z9.jpg?quality=50&strip=all']","pattern_type":"stix","valid_from":"2026-04-02T04:00:00.000Z","labels":["url"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4093704/tools-um-mcp-server-abzusichern.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0040-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://b2b-contenthub.com/wp-content/uploads/2025/11/Gorodenkoff_shutterstock_2324952347_16z9.jpg?resize=300%2C168&quality=50&strip=all","pattern":"[url:value = 'https://b2b-contenthub.com/wp-content/uploads/2025/11/Gorodenkoff_shutterstock_2324952347_16z9.jpg?resize=300%2C168&quality=50&strip=all']","pattern_type":"stix","valid_from":"2026-04-02T04:00:00.000Z","labels":["url"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4093704/tools-um-mcp-server-abzusichern.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0041-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://b2b-contenthub.com/wp-content/uploads/2025/11/Gorodenkoff_shutterstock_2324952347_16z9.jpg?resize=768%2C432&quality=50&strip=all","pattern":"[url:value = 'https://b2b-contenthub.com/wp-content/uploads/2025/11/Gorodenkoff_shutterstock_2324952347_16z9.jpg?resize=768%2C432&quality=50&strip=all']","pattern_type":"stix","valid_from":"2026-04-02T04:00:00.000Z","labels":["url"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4093704/tools-um-mcp-server-abzusichern.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0042-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://b2b-contenthub.com/wp-content/uploads/2025/11/Gorodenkoff_shutterstock_","pattern":"[url:value = 'https://b2b-contenthub.com/wp-content/uploads/2025/11/Gorodenkoff_shutterstock_']","pattern_type":"stix","valid_from":"2026-04-02T04:00:00.000Z","labels":["url"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4093704/tools-um-mcp-server-abzusichern.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0043-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://isc.sans.edu/podcastdetail/9876,","pattern":"[url:value = 'https://isc.sans.edu/podcastdetail/9876,']","pattern_type":"stix","valid_from":"2026-04-02T02:00:02.000Z","labels":["url"],"external_references":[{"source_name":"SANS ISC","url":"https://isc.sans.edu/diary/rss/32858"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0044-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-5281","pattern":"[vulnerability:name = 'CVE-2026-5281']","pattern_type":"stix","valid_from":"2026-04-01T23:30:12.000Z","labels":["cve"],"external_references":[{"source_name":"Security Affairs","url":"https://securityaffairs.com/190282/security/u-s-cisa-adds-a-flaw-in-google-dawn-to-its-known-exploited-vulnerabilities-catalog.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0045-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-5281","pattern":"[vulnerability:name = 'CVE-2026-5281']","pattern_type":"stix","valid_from":"2026-04-01T20:41:11.000Z","labels":["cve"],"external_references":[{"source_name":"Security Affairs","url":"https://securityaffairs.com/190265/hacking/google-fixes-fourth-actively-exploited-chrome-zero-day-of-2026.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0046-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3502","pattern":"[vulnerability:name = 'CVE-2026-3502']","pattern_type":"stix","valid_from":"2026-04-01T15:53:54.000Z","labels":["cve"],"external_references":[{"source_name":"SC Media","url":"https://www.scworld.com/brief/attacks-with-trueconf-zero-day-hit-southeast-asian-governments"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0047-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-5281","pattern":"[vulnerability:name = 'CVE-2026-5281']","pattern_type":"stix","valid_from":"2026-04-01T14:36:39.000Z","labels":["cve"],"external_references":[{"source_name":"SecurityWeek","url":"https://www.securityweek.com/exploited-zero-day-among-21-vulnerabilities-patched-in-chrome/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0048-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-5281","pattern":"[vulnerability:name = 'CVE-2026-5281']","pattern_type":"stix","valid_from":"2026-04-01T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/alerts/2026/04/01/cisa-adds-one-known-exploited-vulnerability-catalog"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0049-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-5281","pattern":"[vulnerability:name = 'CVE-2026-5281']","pattern_type":"stix","valid_from":"2026-04-01T11:42:00.000Z","labels":["cve"],"external_references":[{"source_name":"The Hacker News","url":"https://thehackernews.com/2026/04/new-chrome-zero-day-cve-2026-5281-under.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0050-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-5281","pattern":"[vulnerability:name = 'CVE-2026-5281']","pattern_type":"stix","valid_from":"2026-04-01T11:27:11.000Z","labels":["cve"],"external_references":[{"source_name":"Help Net Security","url":"https://www.helpnetsecurity.com/2026/04/01/google-chrome-zero-day-cve-2026-5281/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0051-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-34982","pattern":"[vulnerability:name = 'CVE-2026-34982']","pattern_type":"stix","valid_from":"2026-04-01T11:15:17.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/vim-modeline-vulnerability-arbitrary-os-command-execution/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--73687574-0052-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"shutterstock.com","pattern":"[domain-name:value = 'shutterstock.com']","pattern_type":"stix","valid_from":"2026-04-01T10:56:52.000Z","labels":["domain"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4153080/hacker-zielen-auf-exilportal-iranwire-2.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0053-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-33026","pattern":"[vulnerability:name = 'CVE-2026-33026']","pattern_type":"stix","valid_from":"2026-04-01T08:46:12.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/poc-exploit-code-published-for-nginx-ui/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0054-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3502","pattern":"[vulnerability:name = 'CVE-2026-3502']","pattern_type":"stix","valid_from":"2026-04-01T06:12:29.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/trueconf-vulnerability-under-active-exploitation/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0055-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21962","pattern":"[vulnerability:name = 'CVE-2026-21962']","pattern_type":"stix","valid_from":"2026-04-01T04:48:30.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/hackers-exploit-critical-weblogic-rce-vulnerabilities/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--73687574-0056-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"shutterstock.com","pattern":"[domain-name:value = 'shutterstock.com']","pattern_type":"stix","valid_from":"2026-04-01T04:00:00.000Z","labels":["domain"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/3492897/attack-surface-management-losungen-9-tools-um-ihre-angriffsflache-zu-managen.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0057-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://isc.sans.edu/podcastdetail/9874,","pattern":"[url:value = 'https://isc.sans.edu/podcastdetail/9874,']","pattern_type":"stix","valid_from":"2026-04-01T02:05:11.000Z","labels":["url"],"external_references":[{"source_name":"SANS ISC","url":"https://isc.sans.edu/diary/rss/32852"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--676d6169-0058-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"gmail.com","pattern":"[domain-name:value = 'gmail.com']","pattern_type":"stix","valid_from":"2026-03-31T23:13:56.000Z","labels":["domain"],"external_references":[{"source_name":"BleepingComputer","url":"https://www.bleepingcomputer.com/news/google/google-now-allows-you-to-change-your-gmailcom-address/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0059-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21643","pattern":"[vulnerability:name = 'CVE-2026-21643']","pattern_type":"stix","valid_from":"2026-03-31T20:35:19.000Z","labels":["cve"],"external_references":[{"source_name":"SC Media","url":"https://www.scworld.com/brief/critical-fortinet-forticlient-ems-vulnerability-under-attack"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0060-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-53521","pattern":"[vulnerability:name = 'CVE-2025-53521']","pattern_type":"stix","valid_from":"2026-03-31T18:46:36.000Z","labels":["cve"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4152658/5-month-old-f5-big-ip-dos-bug-becomes-critical-rce-exploited-in-the-wild.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0061-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-53521","pattern":"[vulnerability:name = 'CVE-2025-53521']","pattern_type":"stix","valid_from":"2026-03-31T17:46:36.000Z","labels":["cve"],"external_references":[{"source_name":"SC Media","url":"https://www.scworld.com/brief/f5-big-ip-apm-systems-vulnerable-to-critical-remote-code-execution-flaw"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0062-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3502","pattern":"[vulnerability:name = 'CVE-2026-3502']","pattern_type":"stix","valid_from":"2026-03-31T16:03:00.000Z","labels":["cve"],"external_references":[{"source_name":"The Hacker News","url":"https://thehackernews.com/2026/03/trueconf-zero-day-exploited-in-attacks.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0063-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3502","pattern":"[vulnerability:name = 'CVE-2026-3502']","pattern_type":"stix","valid_from":"2026-03-31T13:16:50.000Z","labels":["cve"],"external_references":[{"source_name":"Check Point Research","url":"https://research.checkpoint.com/2026/operation-truechaos-0-day-exploitation-against-southeast-asian-government-targets/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0064-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3356","pattern":"[vulnerability:name = 'CVE-2026-3356']","pattern_type":"stix","valid_from":"2026-03-31T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-090-01"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0065-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-53521","pattern":"[vulnerability:name = 'CVE-2025-53521']","pattern_type":"stix","valid_from":"2026-03-31T11:36:21.000Z","labels":["cve"],"external_references":[{"source_name":"HackRead","url":"https://hackread.com/critical-f5-big-ip-flaw-upgrad-to-9-8-rce-exploited/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0066-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3055","pattern":"[vulnerability:name = 'CVE-2026-3055']","pattern_type":"stix","valid_from":"2026-03-31T09:31:41.000Z","labels":["cve"],"external_references":[{"source_name":"Security Affairs","url":"https://securityaffairs.com/190197/security/u-s-cisa-adds-a-flaw-in-citrix-netscaler-to-its-known-exploited-vulnerabilities-catalog.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0067-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-53521","pattern":"[vulnerability:name = 'CVE-2025-53521']","pattern_type":"stix","valid_from":"2026-03-31T08:45:00.000Z","labels":["cve"],"external_references":[{"source_name":"Infosecurity Magazine","url":"https://www.infosecurity-magazine.com/news/ncsc-urges-immediate-patching-f5/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--73687574-0068-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"shutterstock.com","pattern":"[domain-name:value = 'shutterstock.com']","pattern_type":"stix","valid_from":"2026-03-31T07:16:58.000Z","labels":["domain"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4152271/fahndung-nach-cyberkriminellen-130-firmen-attackiert-2.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0069-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20929","pattern":"[vulnerability:name = 'CVE-2026-20929']","pattern_type":"stix","valid_from":"2026-03-31T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CrowdStrike Blog","url":"https://www.crowdstrike.com/en-us/blog/detecting-kerberos-relay-attack-via-dns-cname-abuse/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0070-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-23092","pattern":"[vulnerability:name = 'CVE-2026-23092']","pattern_type":"stix","valid_from":"2026-03-31T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-250/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0071-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://isc.sans.edu/podcastdetail/9872,","pattern":"[url:value = 'https://isc.sans.edu/podcastdetail/9872,']","pattern_type":"stix","valid_from":"2026-03-31T02:00:02.000Z","labels":["url"],"external_references":[{"source_name":"SANS ISC","url":"https://isc.sans.edu/diary/rss/32848"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0072-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21643","pattern":"[vulnerability:name = 'CVE-2026-21643']","pattern_type":"stix","valid_from":"2026-03-30T23:19:24.000Z","labels":["cve"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4152117/fortinet-hit-by-another-exploited-cybersecurity-flaw.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0073-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3055","pattern":"[vulnerability:name = 'CVE-2026-3055']","pattern_type":"stix","valid_from":"2026-03-30T18:28:37.000Z","labels":["cve"],"external_references":[{"source_name":"BleepingComputer","url":"https://www.bleepingcomputer.com/news/security/critical-citrix-netscaler-memory-flaw-actively-exploited-in-attacks/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0074-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21643","pattern":"[vulnerability:name = 'CVE-2026-21643']","pattern_type":"stix","valid_from":"2026-03-30T12:19:10.000Z","labels":["cve"],"external_references":[{"source_name":"Help Net Security","url":"https://www.helpnetsecurity.com/2026/03/30/forticlient-ems-cve-2026-21643-reported-exploitation/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0075-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3055","pattern":"[vulnerability:name = 'CVE-2026-3055']","pattern_type":"stix","valid_from":"2026-03-30T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/alerts/2026/03/30/cisa-adds-one-known-exploited-vulnerability-catalog"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0076-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3055","pattern":"[vulnerability:name = 'CVE-2026-3055']","pattern_type":"stix","valid_from":"2026-03-30T10:45:00.000Z","labels":["cve"],"external_references":[{"source_name":"Infosecurity Magazine","url":"https://www.infosecurity-magazine.com/news/critical-citrix-netscaler/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0077-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21643","pattern":"[vulnerability:name = 'CVE-2026-21643']","pattern_type":"stix","valid_from":"2026-03-30T10:43:26.000Z","labels":["cve"],"external_references":[{"source_name":"Security Affairs","url":"https://securityaffairs.com/190158/security/critical-fortinet-forticlient-ems-flaw-exploited-for-remote-code-execution.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0078-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21643","pattern":"[vulnerability:name = 'CVE-2026-21643']","pattern_type":"stix","valid_from":"2026-03-30T09:38:45.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/critical-fortinet-forticlient-ems-vulnerability-2/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0079-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3055","pattern":"[vulnerability:name = 'CVE-2026-3055']","pattern_type":"stix","valid_from":"2026-03-30T05:41:24.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/hackers-probe-citrix-netscaler-systems-cve-2026-3055-exploitation/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0080-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20695","pattern":"[vulnerability:name = 'CVE-2026-20695']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-231/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0081-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20690","pattern":"[vulnerability:name = 'CVE-2026-20690']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-230/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0082-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3691","pattern":"[vulnerability:name = 'CVE-2026-3691']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-229/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0083-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3690","pattern":"[vulnerability:name = 'CVE-2026-3690']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-228/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0084-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3689","pattern":"[vulnerability:name = 'CVE-2026-3689']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-227/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0085-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2024-13088","pattern":"[vulnerability:name = 'CVE-2024-13088']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-244/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0086-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-62842","pattern":"[vulnerability:name = 'CVE-2025-62842']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-243/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0087-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-62840","pattern":"[vulnerability:name = 'CVE-2025-62840']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-242/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0088-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-62846","pattern":"[vulnerability:name = 'CVE-2025-62846']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-241/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0089-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-62845","pattern":"[vulnerability:name = 'CVE-2025-62845']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-240/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0090-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-62844","pattern":"[vulnerability:name = 'CVE-2025-62844']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-239/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0091-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2023-6270","pattern":"[vulnerability:name = 'CVE-2023-6270']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-238/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0092-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-62843","pattern":"[vulnerability:name = 'CVE-2025-62843']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-237/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0093-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0954","pattern":"[vulnerability:name = 'CVE-2026-0954']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-236/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0094-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0957","pattern":"[vulnerability:name = 'CVE-2026-0957']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-235/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0095-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0956","pattern":"[vulnerability:name = 'CVE-2026-0956']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-234/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0096-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0955","pattern":"[vulnerability:name = 'CVE-2026-0955']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-233/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0097-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-40277","pattern":"[vulnerability:name = 'CVE-2025-40277']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-232/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0098-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-5058","pattern":"[vulnerability:name = 'CVE-2026-5058']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-246/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0099-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-5059","pattern":"[vulnerability:name = 'CVE-2026-5059']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-245/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0100-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-5055","pattern":"[vulnerability:name = 'CVE-2026-5055']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-249/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0101-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-5054","pattern":"[vulnerability:name = 'CVE-2026-5054']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-248/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0102-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-5053","pattern":"[vulnerability:name = 'CVE-2026-5053']","pattern_type":"stix","valid_from":"2026-03-30T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-247/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0103-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://isc.sans.edu/podcastdetail/9870,","pattern":"[url:value = 'https://isc.sans.edu/podcastdetail/9870,']","pattern_type":"stix","valid_from":"2026-03-30T02:00:02.000Z","labels":["url"],"external_references":[{"source_name":"SANS ISC","url":"https://isc.sans.edu/diary/rss/32844"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--72617770-0104-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"rawpixel.com","pattern":"[domain-name:value = 'rawpixel.com']","pattern_type":"stix","valid_from":"2026-03-30T00:07:00.000Z","labels":["domain"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/3493645/data-security-posture-management-die-besten-dspm-tools.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--73687574-0105-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"shutterstock.com","pattern":"[domain-name:value = 'shutterstock.com']","pattern_type":"stix","valid_from":"2026-03-30T00:07:00.000Z","labels":["domain"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/3493645/data-security-posture-management-die-besten-dspm-tools.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0106-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3055","pattern":"[vulnerability:name = 'CVE-2026-3055']","pattern_type":"stix","valid_from":"2026-03-29T13:33:57.000Z","labels":["cve"],"external_references":[{"source_name":"Security Affairs","url":"https://securityaffairs.com/190131/hacking/urgent-alert-netscaler-bug-cve-2026-3055-probed-by-attackers-could-leak-sensitive-data.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0107-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3055","pattern":"[vulnerability:name = 'CVE-2026-3055']","pattern_type":"stix","valid_from":"2026-03-28T09:11:00.000Z","labels":["cve"],"external_references":[{"source_name":"The Hacker News","url":"https://thehackernews.com/2026/03/citrix-netscaler-under-active-recon-for.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0108-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-53521","pattern":"[vulnerability:name = 'CVE-2025-53521']","pattern_type":"stix","valid_from":"2026-03-28T09:02:09.000Z","labels":["cve"],"external_references":[{"source_name":"Help Net Security","url":"https://www.helpnetsecurity.com/2026/03/28/big-ip-apm-vulnerability-cve-2025-53521-exploited/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0109-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-53521","pattern":"[vulnerability:name = 'CVE-2025-53521']","pattern_type":"stix","valid_from":"2026-03-28T07:33:15.000Z","labels":["cve"],"external_references":[{"source_name":"Security Affairs","url":"https://securityaffairs.com/190076/uncategorized/u-s-cisa-adds-a-flaw-in-f5-big-ip-amp-to-its-known-exploited-vulnerabilities-catalog.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0110-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-53521","pattern":"[vulnerability:name = 'CVE-2025-53521']","pattern_type":"stix","valid_from":"2026-03-28T07:07:00.000Z","labels":["cve"],"external_references":[{"source_name":"The Hacker News","url":"https://thehackernews.com/2026/03/cisa-adds-cve-2025-53521-to-kev-after.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0111-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-4681","pattern":"[vulnerability:name = 'CVE-2026-4681']","pattern_type":"stix","valid_from":"2026-03-27T14:58:30.000Z","labels":["cve"],"external_references":[{"source_name":"Security Affairs","url":"https://securityaffairs.com/190049/security/cisa-and-bsi-warn-orgs-of-critical-ptc-windchill-and-flexplm-flaw.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0112-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-53521","pattern":"[vulnerability:name = 'CVE-2025-53521']","pattern_type":"stix","valid_from":"2026-03-27T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/alerts/2026/03/27/cisa-adds-one-known-exploited-vulnerability-catalog"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--73687574-0113-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"shutterstock.com","pattern":"[domain-name:value = 'shutterstock.com']","pattern_type":"stix","valid_from":"2026-03-27T10:58:49.000Z","labels":["domain"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4151169/cyberangriff-auf-die-linke.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0114-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-33017","pattern":"[vulnerability:name = 'CVE-2026-33017']","pattern_type":"stix","valid_from":"2026-03-27T10:43:12.000Z","labels":["cve"],"external_references":[{"source_name":"Help Net Security","url":"https://www.helpnetsecurity.com/2026/03/27/cve-2026-33017-cve-2026-33634-exploited/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0115-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-33634","pattern":"[vulnerability:name = 'CVE-2026-33634']","pattern_type":"stix","valid_from":"2026-03-27T10:43:12.000Z","labels":["cve"],"external_references":[{"source_name":"Help Net Security","url":"https://www.helpnetsecurity.com/2026/03/27/cve-2026-33017-cve-2026-33634-exploited/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0116-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-33634","pattern":"[vulnerability:name = 'CVE-2026-33634']","pattern_type":"stix","valid_from":"2026-03-27T10:14:48.000Z","labels":["cve"],"external_references":[{"source_name":"Security Affairs","url":"https://securityaffairs.com/190044/security/u-s-cisa-adds-an-aquasecurity-trivy-flaw-to-its-known-exploited-vulnerabilities-catalog.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0117-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-33634","pattern":"[vulnerability:name = 'CVE-2026-33634']","pattern_type":"stix","valid_from":"2026-03-27T09:47:59.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/cisa-adds-critical-aquasecurity-trivy-scanner-vulnerability/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0118-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-4681","pattern":"[vulnerability:name = 'CVE-2026-4681']","pattern_type":"stix","valid_from":"2026-03-27T09:21:14.000Z","labels":["cve"],"external_references":[{"source_name":"SecurityWeek","url":"https://www.securityweek.com/cisa-flags-critical-ptc-vulnerability-that-had-german-police-mobilized/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0119-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20817","pattern":"[vulnerability:name = 'CVE-2026-20817']","pattern_type":"stix","valid_from":"2026-03-27T06:26:21.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/windows-error-reporting-vulnerability/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0120-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3608","pattern":"[vulnerability:name = 'CVE-2026-3608']","pattern_type":"stix","valid_from":"2026-03-27T05:08:47.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/isc-issues-critical-warning-over-kea-dhcp-vulnerability/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--73687574-0121-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"shutterstock.com","pattern":"[domain-name:value = 'shutterstock.com']","pattern_type":"stix","valid_from":"2026-03-27T03:36:00.000Z","labels":["domain"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/3491733/was-ist-social-engineering.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0122-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://isc.sans.edu/podcastdetail/9868,","pattern":"[url:value = 'https://isc.sans.edu/podcastdetail/9868,']","pattern_type":"stix","valid_from":"2026-03-27T02:00:02.000Z","labels":["url"],"external_references":[{"source_name":"SANS ISC","url":"https://isc.sans.edu/diary/rss/32836"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0123-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-33017","pattern":"[vulnerability:name = 'CVE-2026-33017']","pattern_type":"stix","valid_from":"2026-03-26T21:05:01.000Z","labels":["cve"],"external_references":[{"source_name":"Security Affairs","url":"https://securityaffairs.com/190018/security/u-s-cisa-adds-a-langflow-flaw-to-its-known-exploited-vulnerabilities-catalog.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0124-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-33017","pattern":"[vulnerability:name = 'CVE-2026-33017']","pattern_type":"stix","valid_from":"2026-03-26T19:17:43.000Z","labels":["cve"],"external_references":[{"source_name":"BleepingComputer","url":"https://www.bleepingcomputer.com/news/security/cisa-new-langflow-flaw-actively-exploited-to-hijack-ai-workflows/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--626f6f6b-0125-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"booking.com","pattern":"[domain-name:value = 'booking.com']","pattern_type":"stix","valid_from":"2026-03-26T15:07:22.000Z","labels":["domain"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/clickfix-attack-exploits-windows/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0126-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-33017","pattern":"[vulnerability:name = 'CVE-2026-33017']","pattern_type":"stix","valid_from":"2026-03-26T12:15:31.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/cisa-issues-urgent-warning-on-langflow-code-injection-vulnerability/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0127-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3587","pattern":"[vulnerability:name = 'CVE-2026-3587']","pattern_type":"stix","valid_from":"2026-03-26T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-085-01"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0128-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-4681","pattern":"[vulnerability:name = 'CVE-2026-4681']","pattern_type":"stix","valid_from":"2026-03-26T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-085-03"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0129-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-70614","pattern":"[vulnerability:name = 'CVE-2025-70614']","pattern_type":"stix","valid_from":"2026-03-26T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-085-02"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0130-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-33634","pattern":"[vulnerability:name = 'CVE-2026-33634']","pattern_type":"stix","valid_from":"2026-03-26T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/alerts/2026/03/26/cisa-adds-one-known-exploited-vulnerability-catalog"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0131-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-1995","pattern":"[vulnerability:name = 'CVE-2026-1995']","pattern_type":"stix","valid_from":"2026-03-26T09:03:09.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/idrive-for-windows-vulnerability/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0132-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2023-32434","pattern":"[vulnerability:name = 'CVE-2023-32434']","pattern_type":"stix","valid_from":"2026-03-26T08:00:19.000Z","labels":["cve"],"external_references":[{"source_name":"Kaspersky Securelist","url":"https://securelist.com/coruna-framework-updated-operation-triangulation-exploit/119228/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0133-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2023-38606","pattern":"[vulnerability:name = 'CVE-2023-38606']","pattern_type":"stix","valid_from":"2026-03-26T08:00:19.000Z","labels":["cve"],"external_references":[{"source_name":"Kaspersky Securelist","url":"https://securelist.com/coruna-framework-updated-operation-triangulation-exploit/119228/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0134-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-33634","pattern":"[vulnerability:name = 'CVE-2026-33634']","pattern_type":"stix","valid_from":"2026-03-26T06:47:09.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/microsoft-to-detect-defend-against-trivy-supply-chain-attack/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0135-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20131","pattern":"[vulnerability:name = 'CVE-2026-20131']","pattern_type":"stix","valid_from":"2026-03-26T04:56:59.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/cisco-secure-firewall-vulnerability-3/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--73687574-0136-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"shutterstock.com","pattern":"[domain-name:value = 'shutterstock.com']","pattern_type":"stix","valid_from":"2026-03-26T04:01:00.000Z","labels":["domain"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/3493920/10-essenzielle-masnahmen-fur-physische-sicherheit.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0137-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://isc.sans.edu/podcastdetail/9866,","pattern":"[url:value = 'https://isc.sans.edu/podcastdetail/9866,']","pattern_type":"stix","valid_from":"2026-03-26T02:00:02.000Z","labels":["url"],"external_references":[{"source_name":"SANS ISC","url":"https://isc.sans.edu/diary/rss/32832"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0138-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3055","pattern":"[vulnerability:name = 'CVE-2026-3055']","pattern_type":"stix","valid_from":"2026-03-25T23:55:18.000Z","labels":["cve"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4150224/new-critical-citrix-netscaler-hole-of-similar-severity-to-citrixbleed2-says-expert.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0139-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20114","pattern":"[vulnerability:name = 'CVE-2026-20114']","pattern_type":"stix","valid_from":"2026-03-25T18:28:24.000Z","labels":["cve"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4150185/chained-vulnerabilities-in-cisco-catalyst-switches-could-induce-denial-of-service-2.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0140-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20110","pattern":"[vulnerability:name = 'CVE-2026-20110']","pattern_type":"stix","valid_from":"2026-03-25T18:28:24.000Z","labels":["cve"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4150185/chained-vulnerabilities-in-cisco-catalyst-switches-could-induce-denial-of-service-2.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0141-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-15517","pattern":"[vulnerability:name = 'CVE-2025-15517']","pattern_type":"stix","valid_from":"2026-03-25T14:44:41.000Z","labels":["cve"],"external_references":[{"source_name":"Security Affairs","url":"https://securityaffairs.com/189980/iot/patch-now-tp-link-archer-nx-routers-vulnerable-to-firmware-takeover.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0142-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-4404","pattern":"[vulnerability:name = 'CVE-2026-4404']","pattern_type":"stix","valid_from":"2026-03-25T12:15:38.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/goharbor-issues-urgent-patch/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0143-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-33017","pattern":"[vulnerability:name = 'CVE-2026-33017']","pattern_type":"stix","valid_from":"2026-03-25T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/alerts/2026/03/25/cisa-adds-one-known-exploited-vulnerability-catalog"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0144-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-32647","pattern":"[vulnerability:name = 'CVE-2026-32647']","pattern_type":"stix","valid_from":"2026-03-25T10:59:25.000Z","labels":["cve"],"external_references":[{"source_name":"GBHackers","url":"https://gbhackers.com/f5-nginx-plus-open-source-flaw/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--73687574-0145-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"shutterstock.com","pattern":"[domain-name:value = 'shutterstock.com']","pattern_type":"stix","valid_from":"2026-03-25T04:00:00.000Z","labels":["domain"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4025731/empathie-trifft-it-sicherheit-der-weg-zu-gelebter-compliance.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0146-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://isc.sans.edu/podcastdetail/9864,","pattern":"[url:value = 'https://isc.sans.edu/podcastdetail/9864,']","pattern_type":"stix","valid_from":"2026-03-25T02:00:03.000Z","labels":["url"],"external_references":[{"source_name":"SANS ISC","url":"https://isc.sans.edu/diary/rss/32828"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--73656b6f-0147-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"sekoia.io","pattern":"[domain-name:value = 'sekoia.io']","pattern_type":"stix","valid_from":"2026-03-25T01:08:54.000Z","labels":["domain"],"external_references":[{"source_name":"SC Media","url":"https://www.scworld.com/resource/sekoia-ios-georges-bossert-on-avoiding-making-socs-faster-at-being-wrong"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--626f6f6b-0148-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"booking.com","pattern":"[domain-name:value = 'booking.com']","pattern_type":"stix","valid_from":"2026-03-25T00:00:00.000Z","labels":["domain"],"external_references":[{"source_name":"Recorded Future","url":"https://www.recordedfuture.com/research/clickfix-campaigns-targeting-windows-and-macos"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--6232622d-0149-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"b2b-contenthub.com","pattern":"[domain-name:value = 'b2b-contenthub.com']","pattern_type":"stix","valid_from":"2026-03-24T13:38:11.000Z","labels":["domain"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4149357/ddos-angriffe-haben-sich-verdoppelt.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0150-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://b2b-contenthub.com/wp-content/uploads/2026/03/DDoS-Attack-COunt_16-9.png?quality=50&strip=all","pattern":"[url:value = 'https://b2b-contenthub.com/wp-content/uploads/2026/03/DDoS-Attack-COunt_16-9.png?quality=50&strip=all']","pattern_type":"stix","valid_from":"2026-03-24T13:38:11.000Z","labels":["url"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4149357/ddos-angriffe-haben-sich-verdoppelt.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0151-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://b2b-contenthub.com/wp-content/uploads/2026/03/DDoS-Attack-COunt_16-9.png?resize=300%2C168&quality=50&strip=all","pattern":"[url:value = 'https://b2b-contenthub.com/wp-content/uploads/2026/03/DDoS-Attack-COunt_16-9.png?resize=300%2C168&quality=50&strip=all']","pattern_type":"stix","valid_from":"2026-03-24T13:38:11.000Z","labels":["url"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4149357/ddos-angriffe-haben-sich-verdoppelt.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0152-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://b2b-contenthub.com/wp-content/uploads/2026/03/DDoS-Attack-COunt_16-9.png?resize=768%2C432&quality=50&strip=all","pattern":"[url:value = 'https://b2b-contenthub.com/wp-content/uploads/2026/03/DDoS-Attack-COunt_16-9.png?resize=768%2C432&quality=50&strip=all']","pattern_type":"stix","valid_from":"2026-03-24T13:38:11.000Z","labels":["url"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4149357/ddos-angriffe-haben-sich-verdoppelt.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0153-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://b2b-contenthub.com/wp-content/uploads/2026/03/DDoS-Attack-COunt_16-9.png?resize=1024%2C576&quality=50&strip=all","pattern":"[url:value = 'https://b2b-contenthub.com/wp-content/uploads/2026/03/DDoS-Attack-COunt_16-9.png?resize=1024%2C576&quality=50&strip=all']","pattern_type":"stix","valid_from":"2026-03-24T13:38:11.000Z","labels":["url"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/4149357/ddos-angriffe-haben-sich-verdoppelt.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0154-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3055","pattern":"[vulnerability:name = 'CVE-2026-3055']","pattern_type":"stix","valid_from":"2026-03-24T12:46:49.000Z","labels":["cve"],"external_references":[{"source_name":"Security Affairs","url":"https://securityaffairs.com/189908/security/citrix-netscaler-critical-flaw-could-leak-data-update-now.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0155-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2417","pattern":"[vulnerability:name = 'CVE-2026-2417']","pattern_type":"stix","valid_from":"2026-03-24T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-083-01"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0156-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-49844","pattern":"[vulnerability:name = 'CVE-2025-49844']","pattern_type":"stix","valid_from":"2026-03-24T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-083-03"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0157-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-46817","pattern":"[vulnerability:name = 'CVE-2025-46817']","pattern_type":"stix","valid_from":"2026-03-24T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-083-03"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0158-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-46818","pattern":"[vulnerability:name = 'CVE-2025-46818']","pattern_type":"stix","valid_from":"2026-03-24T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-083-03"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0159-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-46819","pattern":"[vulnerability:name = 'CVE-2025-46819']","pattern_type":"stix","valid_from":"2026-03-24T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-083-03"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--7777772e-0160-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"www.se.com","pattern":"[domain-name:value = 'www.se.com']","pattern_type":"stix","valid_from":"2026-03-24T12:00:00.000Z","labels":["domain"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-083-02"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0161-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://www.se.com/ww/en/product-range/63680-ecostruxure-foxboro-dcs/](https://www.se.com/ww/en/product-range/63680-ecostruxure-foxboro-dcs/))","pattern":"[url:value = 'https://www.se.com/ww/en/product-range/63680-ecostruxure-foxboro-dcs/](https://www.se.com/ww/en/product-range/63680-ecostruxure-foxboro-dcs/))']","pattern_type":"stix","valid_from":"2026-03-24T12:00:00.000Z","labels":["url"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-083-02"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0162-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3650","pattern":"[vulnerability:name = 'CVE-2026-3650']","pattern_type":"stix","valid_from":"2026-03-24T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-medical-advisories/icsma-26-083-01"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0163-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3055","pattern":"[vulnerability:name = 'CVE-2026-3055']","pattern_type":"stix","valid_from":"2026-03-24T05:59:00.000Z","labels":["cve"],"external_references":[{"source_name":"The Hacker News","url":"https://thehackernews.com/2026/03/citrix-urges-patching-critical.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0164-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-4368","pattern":"[vulnerability:name = 'CVE-2026-4368']","pattern_type":"stix","valid_from":"2026-03-24T05:59:00.000Z","labels":["cve"],"external_references":[{"source_name":"The Hacker News","url":"https://thehackernews.com/2026/03/citrix-urges-patching-critical.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--73687574-0165-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"shutterstock.com","pattern":"[domain-name:value = 'shutterstock.com']","pattern_type":"stix","valid_from":"2026-03-24T03:34:00.000Z","labels":["domain"],"external_references":[{"source_name":"CSO Online","url":"https://www.csoonline.com/article/3495826/iso-und-isms-darum-gehen-security-zertifizierungen-schief.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0166-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://isc.sans.edu/podcastdetail/9862,","pattern":"[url:value = 'https://isc.sans.edu/podcastdetail/9862,']","pattern_type":"stix","valid_from":"2026-03-24T02:00:02.000Z","labels":["url"],"external_references":[{"source_name":"SANS ISC","url":"https://isc.sans.edu/diary/rss/32822"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0167-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-62843","pattern":"[vulnerability:name = 'CVE-2025-62843']","pattern_type":"stix","valid_from":"2026-03-23T20:49:23.000Z","labels":["cve"],"external_references":[{"source_name":"Security Affairs","url":"https://securityaffairs.com/189871/security/qnap-fixed-four-vulnerabilities-demonstrated-at-pwn2own-ireland-2025.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0168-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-62846","pattern":"[vulnerability:name = 'CVE-2025-62846']","pattern_type":"stix","valid_from":"2026-03-23T20:49:23.000Z","labels":["cve"],"external_references":[{"source_name":"Security Affairs","url":"https://securityaffairs.com/189871/security/qnap-fixed-four-vulnerabilities-demonstrated-at-pwn2own-ireland-2025.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0169-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3055","pattern":"[vulnerability:name = 'CVE-2026-3055']","pattern_type":"stix","valid_from":"2026-03-23T19:30:51.000Z","labels":["cve"],"external_references":[{"source_name":"Rapid7 Blog","url":"https://www.rapid7.com/blog/post/etr-cve-2026-3055-citrix-netscaler-adc-and-netscaler-gateway-out-of-bounds-read"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0170-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20131","pattern":"[vulnerability:name = 'CVE-2026-20131']","pattern_type":"stix","valid_from":"2026-03-23T10:30:00.000Z","labels":["cve"],"external_references":[{"source_name":"Infosecurity Magazine","url":"https://www.infosecurity-magazine.com/news/cisa-orders-us-government-patch/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0171-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-32975","pattern":"[vulnerability:name = 'CVE-2025-32975']","pattern_type":"stix","valid_from":"2026-03-23T06:15:00.000Z","labels":["cve"],"external_references":[{"source_name":"The Hacker News","url":"https://thehackernews.com/2026/03/hackers-exploit-cve-2025-32975-cvss-100.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0172-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-58487","pattern":"[vulnerability:name = 'CVE-2025-58487']","pattern_type":"stix","valid_from":"2026-03-23T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-225/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0173-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-58486","pattern":"[vulnerability:name = 'CVE-2025-58486']","pattern_type":"stix","valid_from":"2026-03-23T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-224/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0174-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-58488","pattern":"[vulnerability:name = 'CVE-2025-58488']","pattern_type":"stix","valid_from":"2026-03-23T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-223/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0175-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-14233","pattern":"[vulnerability:name = 'CVE-2025-14233']","pattern_type":"stix","valid_from":"2026-03-23T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-222/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0176-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://isc.sans.edu/podcastdetail/9860,","pattern":"[url:value = 'https://isc.sans.edu/podcastdetail/9860,']","pattern_type":"stix","valid_from":"2026-03-23T02:00:02.000Z","labels":["url"],"external_references":[{"source_name":"SANS ISC","url":"https://isc.sans.edu/diary/rss/32818"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0177-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21992","pattern":"[vulnerability:name = 'CVE-2026-21992']","pattern_type":"stix","valid_from":"2026-03-21T10:24:00.000Z","labels":["cve"],"external_references":[{"source_name":"The Hacker News","url":"https://thehackernews.com/2026/03/oracle-patches-critical-cve-2026-21992.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0178-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-31277","pattern":"[vulnerability:name = 'CVE-2025-31277']","pattern_type":"stix","valid_from":"2026-03-21T08:25:00.000Z","labels":["cve"],"external_references":[{"source_name":"The Hacker News","url":"https://thehackernews.com/2026/03/cisa-flags-apple-craft-cms-laravel-bugs.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0179-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-33017","pattern":"[vulnerability:name = 'CVE-2026-33017']","pattern_type":"stix","valid_from":"2026-03-20T15:15:00.000Z","labels":["cve"],"external_references":[{"source_name":"The Hacker News","url":"https://thehackernews.com/2026/03/critical-langflow-flaw-cve-2026-33017.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--6170702e-0180-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"app.gainsight.com","pattern":"[domain-name:value = 'app.gainsight.com']","pattern_type":"stix","valid_from":"2026-03-20T13:00:00.000Z","labels":["domain"],"external_references":[{"source_name":"Rapid7 Blog","url":"https://www.rapid7.com/blog/post/ve-cve-2026-31381-cve-2026-31382-gainsight-assist-information-disclosure-xss-fixed"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0181-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-31381","pattern":"[vulnerability:name = 'CVE-2026-31381']","pattern_type":"stix","valid_from":"2026-03-20T13:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Rapid7 Blog","url":"https://www.rapid7.com/blog/post/ve-cve-2026-31381-cve-2026-31382-gainsight-assist-information-disclosure-xss-fixed"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0182-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-31382","pattern":"[vulnerability:name = 'CVE-2026-31382']","pattern_type":"stix","valid_from":"2026-03-20T13:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Rapid7 Blog","url":"https://www.rapid7.com/blog/post/ve-cve-2026-31381-cve-2026-31382-gainsight-assist-information-disclosure-xss-fixed"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0183-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-31277","pattern":"[vulnerability:name = 'CVE-2025-31277']","pattern_type":"stix","valid_from":"2026-03-20T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/alerts/2026/03/20/cisa-adds-five-known-exploited-vulnerabilities-catalog"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0184-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-32432","pattern":"[vulnerability:name = 'CVE-2025-32432']","pattern_type":"stix","valid_from":"2026-03-20T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/alerts/2026/03/20/cisa-adds-five-known-exploited-vulnerabilities-catalog"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0185-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-43510","pattern":"[vulnerability:name = 'CVE-2025-43510']","pattern_type":"stix","valid_from":"2026-03-20T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/alerts/2026/03/20/cisa-adds-five-known-exploited-vulnerabilities-catalog"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0186-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-43520","pattern":"[vulnerability:name = 'CVE-2025-43520']","pattern_type":"stix","valid_from":"2026-03-20T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/alerts/2026/03/20/cisa-adds-five-known-exploited-vulnerabilities-catalog"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0187-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-54068","pattern":"[vulnerability:name = 'CVE-2025-54068']","pattern_type":"stix","valid_from":"2026-03-20T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/alerts/2026/03/20/cisa-adds-five-known-exploited-vulnerabilities-catalog"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0188-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21992","pattern":"[vulnerability:name = 'CVE-2026-21992']","pattern_type":"stix","valid_from":"2026-03-20T07:58:50.000Z","labels":["cve"],"external_references":[{"source_name":"Tenable Blog","url":"https://www.tenable.com/blog/cve-2026-21992-critical-out-of-band-oracle-identity-manager-and-oracle-web-services-manager"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0189-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://isc.sans.edu/podcastdetail/9858,","pattern":"[url:value = 'https://isc.sans.edu/podcastdetail/9858,']","pattern_type":"stix","valid_from":"2026-03-20T02:00:02.000Z","labels":["url"],"external_references":[{"source_name":"SANS ISC","url":"https://isc.sans.edu/diary/rss/32814"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0190-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20131","pattern":"[vulnerability:name = 'CVE-2026-20131']","pattern_type":"stix","valid_from":"2026-03-19T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/alerts/2026/03/19/cisa-adds-one-known-exploited-vulnerability-catalog"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0191-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3888","pattern":"[vulnerability:name = 'CVE-2026-3888']","pattern_type":"stix","valid_from":"2026-03-19T08:03:04.000Z","labels":["cve"],"external_references":[{"source_name":"Information Security Buzz","url":"https://informationsecuritybuzz.com/ubuntu-snap-bug-opens-to-root-compromise/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0192-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-66376","pattern":"[vulnerability:name = 'CVE-2025-66376']","pattern_type":"stix","valid_from":"2026-03-19T06:05:00.000Z","labels":["cve"],"external_references":[{"source_name":"The Hacker News","url":"https://thehackernews.com/2026/03/cisa-warns-of-zimbra-sharepoint-flaw.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0193-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-4154","pattern":"[vulnerability:name = 'CVE-2026-4154']","pattern_type":"stix","valid_from":"2026-03-19T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-221/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0194-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-4153","pattern":"[vulnerability:name = 'CVE-2026-4153']","pattern_type":"stix","valid_from":"2026-03-19T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-220/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0195-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-4152","pattern":"[vulnerability:name = 'CVE-2026-4152']","pattern_type":"stix","valid_from":"2026-03-19T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-219/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0196-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-4151","pattern":"[vulnerability:name = 'CVE-2026-4151']","pattern_type":"stix","valid_from":"2026-03-19T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-218/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0197-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-4150","pattern":"[vulnerability:name = 'CVE-2026-4150']","pattern_type":"stix","valid_from":"2026-03-19T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-217/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--68747470-0198-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"https://isc.sans.edu/podcastdetail/9856,","pattern":"[url:value = 'https://isc.sans.edu/podcastdetail/9856,']","pattern_type":"stix","valid_from":"2026-03-19T02:00:03.000Z","labels":["url"],"external_references":[{"source_name":"SANS ISC","url":"https://isc.sans.edu/diary/rss/32812"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0199-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20131","pattern":"[vulnerability:name = 'CVE-2026-20131']","pattern_type":"stix","valid_from":"2026-03-18T16:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"The Hacker News","url":"https://thehackernews.com/2026/03/interlock-ransomware-exploits-cisco-fmc.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0200-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20131","pattern":"[vulnerability:name = 'CVE-2026-20131']","pattern_type":"stix","valid_from":"2026-03-18T15:57:45.000Z","labels":["cve"],"external_references":[{"source_name":"AWS Security Blog","url":"https://aws.amazon.com/blogs/security/amazon-threat-intelligence-teams-identify-interlock-ransomware-campaign-targeting-enterprise-firewalls/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0201-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3888","pattern":"[vulnerability:name = 'CVE-2026-3888']","pattern_type":"stix","valid_from":"2026-03-18T15:45:00.000Z","labels":["cve"],"external_references":[{"source_name":"Infosecurity Magazine","url":"https://www.infosecurity-magazine.com/news/ubuntu-flaw-enables-root-access/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0202-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-32746","pattern":"[vulnerability:name = 'CVE-2026-32746']","pattern_type":"stix","valid_from":"2026-03-18T12:30:00.000Z","labels":["cve"],"external_references":[{"source_name":"The Hacker News","url":"https://thehackernews.com/2026/03/critical-telnetd-flaw-cve-2026-32746.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0203-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-66376","pattern":"[vulnerability:name = 'CVE-2025-66376']","pattern_type":"stix","valid_from":"2026-03-18T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/alerts/2026/03/18/cisa-adds-one-known-exploited-vulnerability-catalog"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0204-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20963","pattern":"[vulnerability:name = 'CVE-2026-20963']","pattern_type":"stix","valid_from":"2026-03-18T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/alerts/2026/03/18/cisa-adds-one-known-exploited-vulnerability-catalog-0"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0205-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3888","pattern":"[vulnerability:name = 'CVE-2026-3888']","pattern_type":"stix","valid_from":"2026-03-18T08:08:00.000Z","labels":["cve"],"external_references":[{"source_name":"The Hacker News","url":"https://thehackernews.com/2026/03/ubuntu-cve-2026-3888-bug-lets-attackers.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0206-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20643","pattern":"[vulnerability:name = 'CVE-2026-20643']","pattern_type":"stix","valid_from":"2026-03-18T06:31:00.000Z","labels":["cve"],"external_references":[{"source_name":"The Hacker News","url":"https://thehackernews.com/2026/03/apple-fixes-webkit-vulnerability.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0207-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21514","pattern":"[vulnerability:name = 'CVE-2026-21514']","pattern_type":"stix","valid_from":"2026-03-17T22:00:41.000Z","labels":["cve"],"external_references":[{"source_name":"Tenable Blog","url":"https://www.tenable.com/blog/faq-on-cve-2026-21514-ole-bypass-n-day-in-microsoft-word"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0208-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21514","pattern":"[vulnerability:name = 'CVE-2026-21514']","pattern_type":"stix","valid_from":"2026-03-17T21:59:07.000Z","labels":["cve"],"external_references":[{"source_name":"Tenable Blog","url":"https://www.tenable.com/blog/operation-epic-fury-why-exposure-data-changes-everything-about-irans-cyber-kinetic-campaign"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0209-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3888","pattern":"[vulnerability:name = 'CVE-2026-3888']","pattern_type":"stix","valid_from":"2026-03-17T19:20:02.000Z","labels":["cve"],"external_references":[{"source_name":"Qualys Blog","url":"https://blog.qualys.com/vulnerabilities-threat-research/2026/03/17/cve-2026-3888-important-snap-flaw-enables-local-privilege-escalation-to-root"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0210-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-47813","pattern":"[vulnerability:name = 'CVE-2025-47813']","pattern_type":"stix","valid_from":"2026-03-17T05:23:00.000Z","labels":["cve"],"external_references":[{"source_name":"The Hacker News","url":"https://thehackernews.com/2026/03/cisa-flags-actively-exploited-wing-ftp.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0211-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-62847","pattern":"[vulnerability:name = 'CVE-2025-62847']","pattern_type":"stix","valid_from":"2026-03-17T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-216/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0212-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-47813","pattern":"[vulnerability:name = 'CVE-2025-47813']","pattern_type":"stix","valid_from":"2026-03-16T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/alerts/2026/03/16/cisa-adds-one-known-exploited-vulnerability-catalog"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0213-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-4158","pattern":"[vulnerability:name = 'CVE-2026-4158']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-215/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0214-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2049","pattern":"[vulnerability:name = 'CVE-2026-2049']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-214/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0215-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2046","pattern":"[vulnerability:name = 'CVE-2026-2046']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-213/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0216-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-13957","pattern":"[vulnerability:name = 'CVE-2025-13957']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-212/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0217-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-1361","pattern":"[vulnerability:name = 'CVE-2026-1361']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-211/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0218-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-21079","pattern":"[vulnerability:name = 'CVE-2025-21079']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-210/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0219-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-21079","pattern":"[vulnerability:name = 'CVE-2025-21079']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-209/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0220-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-14237","pattern":"[vulnerability:name = 'CVE-2025-14237']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-208/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0221-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-14236","pattern":"[vulnerability:name = 'CVE-2025-14236']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-207/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0222-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-14235","pattern":"[vulnerability:name = 'CVE-2025-14235']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-206/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0223-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-14234","pattern":"[vulnerability:name = 'CVE-2025-14234']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-205/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0224-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-14232","pattern":"[vulnerability:name = 'CVE-2025-14232']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-204/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0225-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-14231","pattern":"[vulnerability:name = 'CVE-2025-14231']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-203/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0226-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-59389","pattern":"[vulnerability:name = 'CVE-2025-59389']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-202/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0227-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-59388","pattern":"[vulnerability:name = 'CVE-2025-59388']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-201/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0228-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-62849","pattern":"[vulnerability:name = 'CVE-2025-62849']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-200/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0229-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-62848","pattern":"[vulnerability:name = 'CVE-2025-62848']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-199/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0230-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-11837","pattern":"[vulnerability:name = 'CVE-2025-11837']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-198/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0231-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-4157","pattern":"[vulnerability:name = 'CVE-2026-4157']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-197/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0232-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-4156","pattern":"[vulnerability:name = 'CVE-2026-4156']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-196/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0233-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-4155","pattern":"[vulnerability:name = 'CVE-2026-4155']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-195/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0234-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21527","pattern":"[vulnerability:name = 'CVE-2026-21527']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-194/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0235-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2022-1972","pattern":"[vulnerability:name = 'CVE-2022-1972']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-193/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0236-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-4149","pattern":"[vulnerability:name = 'CVE-2026-4149']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-192/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0237-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2022-32250","pattern":"[vulnerability:name = 'CVE-2022-32250']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-191/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0238-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-41238","pattern":"[vulnerability:name = 'CVE-2025-41238']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-190/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0239-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-41236","pattern":"[vulnerability:name = 'CVE-2025-41236']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-189/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0240-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-41237","pattern":"[vulnerability:name = 'CVE-2025-41237']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-188/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0241-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2022-45188","pattern":"[vulnerability:name = 'CVE-2022-45188']","pattern_type":"stix","valid_from":"2026-03-16T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-187/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0242-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-71243","pattern":"[vulnerability:name = 'CVE-2025-71243']","pattern_type":"stix","valid_from":"2026-03-13T19:06:41.000Z","labels":["cve"],"external_references":[{"source_name":"Rapid7 Blog","url":"https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-03-13-2026"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0243-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3909","pattern":"[vulnerability:name = 'CVE-2026-3909']","pattern_type":"stix","valid_from":"2026-03-13T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/alerts/2026/03/13/cisa-adds-two-known-exploited-vulnerabilities-catalog"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0244-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3910","pattern":"[vulnerability:name = 'CVE-2026-3910']","pattern_type":"stix","valid_from":"2026-03-13T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/alerts/2026/03/13/cisa-adds-two-known-exploited-vulnerabilities-catalog"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0245-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-24858","pattern":"[vulnerability:name = 'CVE-2026-24858']","pattern_type":"stix","valid_from":"2026-03-12T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-02"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0246-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-55018","pattern":"[vulnerability:name = 'CVE-2025-55018']","pattern_type":"stix","valid_from":"2026-03-12T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-02"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0247-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-62439","pattern":"[vulnerability:name = 'CVE-2025-62439']","pattern_type":"stix","valid_from":"2026-03-12T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-02"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0248-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-64157","pattern":"[vulnerability:name = 'CVE-2025-64157']","pattern_type":"stix","valid_from":"2026-03-12T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-02"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0249-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2024-29857","pattern":"[vulnerability:name = 'CVE-2024-29857']","pattern_type":"stix","valid_from":"2026-03-12T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-03"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0250-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2024-30171","pattern":"[vulnerability:name = 'CVE-2024-30171']","pattern_type":"stix","valid_from":"2026-03-12T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-03"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0251-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2024-30172","pattern":"[vulnerability:name = 'CVE-2024-30172']","pattern_type":"stix","valid_from":"2026-03-12T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-03"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0252-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2024-41996","pattern":"[vulnerability:name = 'CVE-2024-41996']","pattern_type":"stix","valid_from":"2026-03-12T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-03"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0253-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-6965","pattern":"[vulnerability:name = 'CVE-2025-6965']","pattern_type":"stix","valid_from":"2026-03-12T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-03"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0254-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-7783","pattern":"[vulnerability:name = 'CVE-2025-7783']","pattern_type":"stix","valid_from":"2026-03-12T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-03"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0255-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-9230","pattern":"[vulnerability:name = 'CVE-2025-9230']","pattern_type":"stix","valid_from":"2026-03-12T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-03"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0256-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-9232","pattern":"[vulnerability:name = 'CVE-2025-9232']","pattern_type":"stix","valid_from":"2026-03-12T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-03"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0257-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-9670","pattern":"[vulnerability:name = 'CVE-2025-9670']","pattern_type":"stix","valid_from":"2026-03-12T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-03"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0258-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-13913","pattern":"[vulnerability:name = 'CVE-2025-13913']","pattern_type":"stix","valid_from":"2026-03-12T12:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"CISA Advisories","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-06"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--6173702e-0259-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"asp.net","pattern":"[domain-name:value = 'asp.net']","pattern_type":"stix","valid_from":"2026-03-10T17:59:53.000Z","labels":["domain"],"external_references":[{"source_name":"Tenable Blog","url":"https://www.tenable.com/blog/microsofts-march-2026-patch-tuesday-addresses-83-cves-cve-2026-21262-cve-2026-26127"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0260-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21262","pattern":"[vulnerability:name = 'CVE-2026-21262']","pattern_type":"stix","valid_from":"2026-03-10T17:59:53.000Z","labels":["cve"],"external_references":[{"source_name":"Tenable Blog","url":"https://www.tenable.com/blog/microsofts-march-2026-patch-tuesday-addresses-83-cves-cve-2026-21262-cve-2026-26127"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0261-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-26127","pattern":"[vulnerability:name = 'CVE-2026-26127']","pattern_type":"stix","valid_from":"2026-03-10T17:59:53.000Z","labels":["cve"],"external_references":[{"source_name":"Tenable Blog","url":"https://www.tenable.com/blog/microsofts-march-2026-patch-tuesday-addresses-83-cves-cve-2026-21262-cve-2026-26127"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0262-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-26030","pattern":"[vulnerability:name = 'CVE-2026-26030']","pattern_type":"stix","valid_from":"2026-03-10T17:59:53.000Z","labels":["cve"],"external_references":[{"source_name":"Tenable Blog","url":"https://www.tenable.com/blog/microsofts-march-2026-patch-tuesday-addresses-83-cves-cve-2026-21262-cve-2026-26127"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0263-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-24018","pattern":"[vulnerability:name = 'CVE-2026-24018']","pattern_type":"stix","valid_from":"2026-03-10T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-186/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0264-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-25181","pattern":"[vulnerability:name = 'CVE-2026-25181']","pattern_type":"stix","valid_from":"2026-03-10T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-185/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0265-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-24289","pattern":"[vulnerability:name = 'CVE-2026-24289']","pattern_type":"stix","valid_from":"2026-03-10T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-184/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0266-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-24285","pattern":"[vulnerability:name = 'CVE-2026-24285']","pattern_type":"stix","valid_from":"2026-03-10T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-183/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0267-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-24285","pattern":"[vulnerability:name = 'CVE-2026-24285']","pattern_type":"stix","valid_from":"2026-03-10T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-182/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0268-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-24285","pattern":"[vulnerability:name = 'CVE-2026-24285']","pattern_type":"stix","valid_from":"2026-03-10T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-181/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0269-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-23668","pattern":"[vulnerability:name = 'CVE-2026-23668']","pattern_type":"stix","valid_from":"2026-03-10T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-180/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0270-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-23668","pattern":"[vulnerability:name = 'CVE-2026-23668']","pattern_type":"stix","valid_from":"2026-03-10T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-179/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0271-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-23668","pattern":"[vulnerability:name = 'CVE-2026-23668']","pattern_type":"stix","valid_from":"2026-03-10T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-178/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0272-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-26364","pattern":"[vulnerability:name = 'CVE-2026-26364']","pattern_type":"stix","valid_from":"2026-03-10T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-177/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0273-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20616","pattern":"[vulnerability:name = 'CVE-2026-20616']","pattern_type":"stix","valid_from":"2026-03-10T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-176/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0274-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20634","pattern":"[vulnerability:name = 'CVE-2026-20634']","pattern_type":"stix","valid_from":"2026-03-10T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-175/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0275-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20675","pattern":"[vulnerability:name = 'CVE-2026-20675']","pattern_type":"stix","valid_from":"2026-03-10T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-174/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0276-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20611","pattern":"[vulnerability:name = 'CVE-2026-20611']","pattern_type":"stix","valid_from":"2026-03-10T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-173/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0277-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3839","pattern":"[vulnerability:name = 'CVE-2026-3839']","pattern_type":"stix","valid_from":"2026-03-09T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-172/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0278-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3838","pattern":"[vulnerability:name = 'CVE-2026-3838']","pattern_type":"stix","valid_from":"2026-03-09T05:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-171/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0279-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3086","pattern":"[vulnerability:name = 'CVE-2026-3086']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-170/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0280-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3084","pattern":"[vulnerability:name = 'CVE-2026-3084']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-169/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0281-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2921","pattern":"[vulnerability:name = 'CVE-2026-2921']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-168/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0282-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3085","pattern":"[vulnerability:name = 'CVE-2026-3085']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-167/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0283-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3083","pattern":"[vulnerability:name = 'CVE-2026-3083']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-166/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0284-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2922","pattern":"[vulnerability:name = 'CVE-2026-2922']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-165/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0285-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2920","pattern":"[vulnerability:name = 'CVE-2026-2920']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-164/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0286-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3082","pattern":"[vulnerability:name = 'CVE-2026-3082']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-163/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0287-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3081","pattern":"[vulnerability:name = 'CVE-2026-3081']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-162/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0288-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2923","pattern":"[vulnerability:name = 'CVE-2026-2923']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-161/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0289-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3562","pattern":"[vulnerability:name = 'CVE-2026-3562']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-160/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0290-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3561","pattern":"[vulnerability:name = 'CVE-2026-3561']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-159/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0291-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3560","pattern":"[vulnerability:name = 'CVE-2026-3560']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-158/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0292-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3559","pattern":"[vulnerability:name = 'CVE-2026-3559']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-157/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0293-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3558","pattern":"[vulnerability:name = 'CVE-2026-3558']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-156/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0294-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3557","pattern":"[vulnerability:name = 'CVE-2026-3557']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-155/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0295-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3556","pattern":"[vulnerability:name = 'CVE-2026-3556']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-154/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0296-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3555","pattern":"[vulnerability:name = 'CVE-2026-3555']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-153/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0297-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-15558","pattern":"[vulnerability:name = 'CVE-2025-15558']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-152/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0298-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-3094","pattern":"[vulnerability:name = 'CVE-2026-3094']","pattern_type":"stix","valid_from":"2026-03-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-151/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0299-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-28400","pattern":"[vulnerability:name = 'CVE-2026-28400']","pattern_type":"stix","valid_from":"2026-03-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-150/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0300-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-71218","pattern":"[vulnerability:name = 'CVE-2025-71218']","pattern_type":"stix","valid_from":"2026-03-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-149/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0301-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-71209","pattern":"[vulnerability:name = 'CVE-2025-71209']","pattern_type":"stix","valid_from":"2026-03-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-148/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0302-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-71208","pattern":"[vulnerability:name = 'CVE-2025-71208']","pattern_type":"stix","valid_from":"2026-03-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-147/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0303-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-71207","pattern":"[vulnerability:name = 'CVE-2025-71207']","pattern_type":"stix","valid_from":"2026-03-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-146/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0304-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-71206","pattern":"[vulnerability:name = 'CVE-2025-71206']","pattern_type":"stix","valid_from":"2026-03-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-145/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0305-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-71205","pattern":"[vulnerability:name = 'CVE-2025-71205']","pattern_type":"stix","valid_from":"2026-03-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-144/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0306-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-71217","pattern":"[vulnerability:name = 'CVE-2025-71217']","pattern_type":"stix","valid_from":"2026-03-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-143/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0307-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-71216","pattern":"[vulnerability:name = 'CVE-2025-71216']","pattern_type":"stix","valid_from":"2026-03-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-142/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0308-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-71215","pattern":"[vulnerability:name = 'CVE-2025-71215']","pattern_type":"stix","valid_from":"2026-03-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-141/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0309-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-71213","pattern":"[vulnerability:name = 'CVE-2025-71213']","pattern_type":"stix","valid_from":"2026-03-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-140/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0310-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-71214","pattern":"[vulnerability:name = 'CVE-2025-71214']","pattern_type":"stix","valid_from":"2026-03-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-139/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0311-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-71212","pattern":"[vulnerability:name = 'CVE-2025-71212']","pattern_type":"stix","valid_from":"2026-03-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-138/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0312-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-71211","pattern":"[vulnerability:name = 'CVE-2025-71211']","pattern_type":"stix","valid_from":"2026-03-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-137/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0313-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-71210","pattern":"[vulnerability:name = 'CVE-2025-71210']","pattern_type":"stix","valid_from":"2026-03-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-136/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0314-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-27794","pattern":"[vulnerability:name = 'CVE-2026-27794']","pattern_type":"stix","valid_from":"2026-03-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-135/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0315-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-23600","pattern":"[vulnerability:name = 'CVE-2026-23600']","pattern_type":"stix","valid_from":"2026-03-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-134/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0316-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-26975","pattern":"[vulnerability:name = 'CVE-2026-26975']","pattern_type":"stix","valid_from":"2026-03-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-133/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0317-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0628","pattern":"[vulnerability:name = 'CVE-2026-0628']","pattern_type":"stix","valid_from":"2026-03-02T11:00:36.000Z","labels":["cve"],"external_references":[{"source_name":"Unit 42","url":"https://unit42.paloaltonetworks.com/gemini-live-in-chrome-hijacking/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0318-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-59536","pattern":"[vulnerability:name = 'CVE-2025-59536']","pattern_type":"stix","valid_from":"2026-02-25T13:58:39.000Z","labels":["cve"],"external_references":[{"source_name":"Check Point Research","url":"https://research.checkpoint.com/2026/rce-and-api-token-exfiltration-through-claude-code-project-files-cve-2025-59536/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0319-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21852","pattern":"[vulnerability:name = 'CVE-2026-21852']","pattern_type":"stix","valid_from":"2026-02-25T13:58:39.000Z","labels":["cve"],"external_references":[{"source_name":"Check Point Research","url":"https://research.checkpoint.com/2026/rce-and-api-token-exfiltration-through-claude-code-project-files-cve-2025-59536/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0320-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-25656","pattern":"[vulnerability:name = 'CVE-2026-25656']","pattern_type":"stix","valid_from":"2026-02-25T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-132/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0321-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-25655","pattern":"[vulnerability:name = 'CVE-2026-25655']","pattern_type":"stix","valid_from":"2026-02-25T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-131/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0322-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2493","pattern":"[vulnerability:name = 'CVE-2026-2493']","pattern_type":"stix","valid_from":"2026-02-25T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-130/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0323-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2491","pattern":"[vulnerability:name = 'CVE-2026-2491']","pattern_type":"stix","valid_from":"2026-02-25T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-129/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0324-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21634","pattern":"[vulnerability:name = 'CVE-2026-21634']","pattern_type":"stix","valid_from":"2026-02-25T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-128/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0325-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21633","pattern":"[vulnerability:name = 'CVE-2026-21633']","pattern_type":"stix","valid_from":"2026-02-25T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-127/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0326-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21633","pattern":"[vulnerability:name = 'CVE-2026-21633']","pattern_type":"stix","valid_from":"2026-02-25T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-126/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0327-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2664","pattern":"[vulnerability:name = 'CVE-2026-2664']","pattern_type":"stix","valid_from":"2026-02-25T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-125/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0328-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-15060","pattern":"[vulnerability:name = 'CVE-2025-15060']","pattern_type":"stix","valid_from":"2026-02-25T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-124/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0329-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2040","pattern":"[vulnerability:name = 'CVE-2026-2040']","pattern_type":"stix","valid_from":"2026-02-19T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-122/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0330-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2048","pattern":"[vulnerability:name = 'CVE-2026-2048']","pattern_type":"stix","valid_from":"2026-02-19T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-121/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0331-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2047","pattern":"[vulnerability:name = 'CVE-2026-2047']","pattern_type":"stix","valid_from":"2026-02-19T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-120/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0332-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2045","pattern":"[vulnerability:name = 'CVE-2026-2045']","pattern_type":"stix","valid_from":"2026-02-19T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-119/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0333-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2044","pattern":"[vulnerability:name = 'CVE-2026-2044']","pattern_type":"stix","valid_from":"2026-02-19T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-118/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0334-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2490","pattern":"[vulnerability:name = 'CVE-2026-2490']","pattern_type":"stix","valid_from":"2026-02-19T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-117/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0335-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2492","pattern":"[vulnerability:name = 'CVE-2026-2492']","pattern_type":"stix","valid_from":"2026-02-19T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-116/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0336-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-62676","pattern":"[vulnerability:name = 'CVE-2025-62676']","pattern_type":"stix","valid_from":"2026-02-19T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-115/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0337-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-1335","pattern":"[vulnerability:name = 'CVE-2026-1335']","pattern_type":"stix","valid_from":"2026-02-19T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-114/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0338-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-1334","pattern":"[vulnerability:name = 'CVE-2026-1334']","pattern_type":"stix","valid_from":"2026-02-19T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-113/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0339-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-1333","pattern":"[vulnerability:name = 'CVE-2026-1333']","pattern_type":"stix","valid_from":"2026-02-19T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-112/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0340-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2635","pattern":"[vulnerability:name = 'CVE-2026-2635']","pattern_type":"stix","valid_from":"2026-02-19T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-111/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0341-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-60037","pattern":"[vulnerability:name = 'CVE-2025-60037']","pattern_type":"stix","valid_from":"2026-02-19T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-110/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0342-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-60038","pattern":"[vulnerability:name = 'CVE-2025-60038']","pattern_type":"stix","valid_from":"2026-02-19T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-110/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0343-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-60035","pattern":"[vulnerability:name = 'CVE-2025-60035']","pattern_type":"stix","valid_from":"2026-02-19T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-109/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0344-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-60036","pattern":"[vulnerability:name = 'CVE-2025-60036']","pattern_type":"stix","valid_from":"2026-02-19T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-108/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0345-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0875","pattern":"[vulnerability:name = 'CVE-2026-0875']","pattern_type":"stix","valid_from":"2026-02-18T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-107/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0346-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0874","pattern":"[vulnerability:name = 'CVE-2026-0874']","pattern_type":"stix","valid_from":"2026-02-18T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-106/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0347-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-22769","pattern":"[vulnerability:name = 'CVE-2026-22769']","pattern_type":"stix","valid_from":"2026-02-17T14:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Mandiant Blog","url":"https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0348-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2033","pattern":"[vulnerability:name = 'CVE-2026-2033']","pattern_type":"stix","valid_from":"2026-02-13T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-105/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0349-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2034","pattern":"[vulnerability:name = 'CVE-2026-2034']","pattern_type":"stix","valid_from":"2026-02-13T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-104/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0350-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21956","pattern":"[vulnerability:name = 'CVE-2026-21956']","pattern_type":"stix","valid_from":"2026-02-13T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-103/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0351-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21957","pattern":"[vulnerability:name = 'CVE-2026-21957']","pattern_type":"stix","valid_from":"2026-02-13T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-102/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0352-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21963","pattern":"[vulnerability:name = 'CVE-2026-21963']","pattern_type":"stix","valid_from":"2026-02-13T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-101/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0353-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21985","pattern":"[vulnerability:name = 'CVE-2026-21985']","pattern_type":"stix","valid_from":"2026-02-13T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-100/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0354-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21984","pattern":"[vulnerability:name = 'CVE-2026-21984']","pattern_type":"stix","valid_from":"2026-02-13T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-099/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0355-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21955","pattern":"[vulnerability:name = 'CVE-2026-21955']","pattern_type":"stix","valid_from":"2026-02-13T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-098/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0356-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21983","pattern":"[vulnerability:name = 'CVE-2026-21983']","pattern_type":"stix","valid_from":"2026-02-13T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-097/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0357-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-1283","pattern":"[vulnerability:name = 'CVE-2026-1283']","pattern_type":"stix","valid_from":"2026-02-13T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-096/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0358-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-1284","pattern":"[vulnerability:name = 'CVE-2026-1284']","pattern_type":"stix","valid_from":"2026-02-13T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-095/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0359-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-13845","pattern":"[vulnerability:name = 'CVE-2025-13845']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-094/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0360-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-13845","pattern":"[vulnerability:name = 'CVE-2025-13845']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-093/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0361-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-13845","pattern":"[vulnerability:name = 'CVE-2025-13845']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-092/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0362-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-13845","pattern":"[vulnerability:name = 'CVE-2025-13845']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-091/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0363-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-13845","pattern":"[vulnerability:name = 'CVE-2025-13845']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-090/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0364-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-13845","pattern":"[vulnerability:name = 'CVE-2025-13845']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-089/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0365-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-13845","pattern":"[vulnerability:name = 'CVE-2025-13845']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-088/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0366-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-13845","pattern":"[vulnerability:name = 'CVE-2025-13845']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-087/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0367-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-13845","pattern":"[vulnerability:name = 'CVE-2025-13845']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-086/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0368-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-13845","pattern":"[vulnerability:name = 'CVE-2025-13845']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-085/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0369-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-13845","pattern":"[vulnerability:name = 'CVE-2025-13845']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-084/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0370-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21249","pattern":"[vulnerability:name = 'CVE-2026-21249']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-083/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0371-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21527","pattern":"[vulnerability:name = 'CVE-2026-21527']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-082/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0372-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-21235","pattern":"[vulnerability:name = 'CVE-2026-21235']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-081/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0373-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-1603","pattern":"[vulnerability:name = 'CVE-2026-1603']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-080/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0374-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-1602","pattern":"[vulnerability:name = 'CVE-2026-1602']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-079/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0375-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2035","pattern":"[vulnerability:name = 'CVE-2026-2035']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-078/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0376-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2039","pattern":"[vulnerability:name = 'CVE-2026-2039']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-077/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0377-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2036","pattern":"[vulnerability:name = 'CVE-2026-2036']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-076/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0378-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2038","pattern":"[vulnerability:name = 'CVE-2026-2038']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-075/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0379-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2037","pattern":"[vulnerability:name = 'CVE-2026-2037']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-074/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0380-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2041","pattern":"[vulnerability:name = 'CVE-2026-2041']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-073/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0381-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2043","pattern":"[vulnerability:name = 'CVE-2026-2043']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-072/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0382-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-2042","pattern":"[vulnerability:name = 'CVE-2026-2042']","pattern_type":"stix","valid_from":"2026-02-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-071/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0383-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-61808","pattern":"[vulnerability:name = 'CVE-2025-61808']","pattern_type":"stix","valid_from":"2026-02-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-070/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0384-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0777","pattern":"[vulnerability:name = 'CVE-2026-0777']","pattern_type":"stix","valid_from":"2026-02-06T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-069/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0385-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-14740","pattern":"[vulnerability:name = 'CVE-2025-14740']","pattern_type":"stix","valid_from":"2026-02-05T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-068/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0386-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-14740","pattern":"[vulnerability:name = 'CVE-2025-14740']","pattern_type":"stix","valid_from":"2026-02-05T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-067/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0387-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-65079","pattern":"[vulnerability:name = 'CVE-2025-65079']","pattern_type":"stix","valid_from":"2026-02-05T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-066/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0388-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-65080","pattern":"[vulnerability:name = 'CVE-2025-65080']","pattern_type":"stix","valid_from":"2026-02-05T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-065/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0389-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-65081","pattern":"[vulnerability:name = 'CVE-2025-65081']","pattern_type":"stix","valid_from":"2026-02-05T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-064/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0390-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-65077","pattern":"[vulnerability:name = 'CVE-2025-65077']","pattern_type":"stix","valid_from":"2026-02-05T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-063/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0391-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-65078","pattern":"[vulnerability:name = 'CVE-2025-65078']","pattern_type":"stix","valid_from":"2026-02-05T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-062/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0392-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-8088","pattern":"[vulnerability:name = 'CVE-2025-8088']","pattern_type":"stix","valid_from":"2026-02-04T13:57:37.000Z","labels":["cve"],"external_references":[{"source_name":"Check Point Research","url":"https://research.checkpoint.com/2026/amaranth-dragon-weaponizes-cve-2025-8088-for-targeted-espionage/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0393-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-33201","pattern":"[vulnerability:name = 'CVE-2025-33201']","pattern_type":"stix","valid_from":"2026-02-04T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-061/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0394-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-24149","pattern":"[vulnerability:name = 'CVE-2026-24149']","pattern_type":"stix","valid_from":"2026-02-04T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-060/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0395-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-66374","pattern":"[vulnerability:name = 'CVE-2025-66374']","pattern_type":"stix","valid_from":"2026-02-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-059/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0396-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-66589","pattern":"[vulnerability:name = 'CVE-2025-66589']","pattern_type":"stix","valid_from":"2026-02-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-058/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0397-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-46298","pattern":"[vulnerability:name = 'CVE-2025-46298']","pattern_type":"stix","valid_from":"2026-02-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-057/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0398-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-43283","pattern":"[vulnerability:name = 'CVE-2025-43283']","pattern_type":"stix","valid_from":"2026-02-03T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-056/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0399-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-13447","pattern":"[vulnerability:name = 'CVE-2025-13447']","pattern_type":"stix","valid_from":"2026-02-02T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-055/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0400-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-13447","pattern":"[vulnerability:name = 'CVE-2025-13447']","pattern_type":"stix","valid_from":"2026-02-02T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-054/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0401-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-13447","pattern":"[vulnerability:name = 'CVE-2025-13447']","pattern_type":"stix","valid_from":"2026-02-02T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-053/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0402-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-13444","pattern":"[vulnerability:name = 'CVE-2025-13444']","pattern_type":"stix","valid_from":"2026-02-02T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-052/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0403-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-13447","pattern":"[vulnerability:name = 'CVE-2025-13447']","pattern_type":"stix","valid_from":"2026-02-02T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-051/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0404-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2024-54529","pattern":"[vulnerability:name = 'CVE-2024-54529']","pattern_type":"stix","valid_from":"2026-01-30T08:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Google Project Zero","url":"https://projectzero.google/2026/01/sound-barrier-2.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0405-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-31235","pattern":"[vulnerability:name = 'CVE-2025-31235']","pattern_type":"stix","valid_from":"2026-01-30T08:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Google Project Zero","url":"https://projectzero.google/2026/01/sound-barrier-2.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0406-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0797","pattern":"[vulnerability:name = 'CVE-2026-0797']","pattern_type":"stix","valid_from":"2026-01-30T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-050/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0407-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0975","pattern":"[vulnerability:name = 'CVE-2026-0975']","pattern_type":"stix","valid_from":"2026-01-28T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-049/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0408-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-67685","pattern":"[vulnerability:name = 'CVE-2025-67685']","pattern_type":"stix","valid_from":"2026-01-28T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-048/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0409-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-29867","pattern":"[vulnerability:name = 'CVE-2025-29867']","pattern_type":"stix","valid_from":"2026-01-28T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-047/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0410-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20026","pattern":"[vulnerability:name = 'CVE-2026-20026']","pattern_type":"stix","valid_from":"2026-01-28T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-046/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0411-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20027","pattern":"[vulnerability:name = 'CVE-2026-20027']","pattern_type":"stix","valid_from":"2026-01-28T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-045/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0412-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-8088","pattern":"[vulnerability:name = 'CVE-2025-8088']","pattern_type":"stix","valid_from":"2026-01-27T14:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Mandiant Blog","url":"https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0413-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-20871","pattern":"[vulnerability:name = 'CVE-2026-20871']","pattern_type":"stix","valid_from":"2026-01-13T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-044/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0414-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-55182","pattern":"[vulnerability:name = 'CVE-2025-55182']","pattern_type":"stix","valid_from":"2026-01-13T00:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Recorded Future","url":"https://www.recordedfuture.com/blog/december-2025-cve-landscape"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0415-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0775","pattern":"[vulnerability:name = 'CVE-2026-0775']","pattern_type":"stix","valid_from":"2026-01-12T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-043/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0416-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0773","pattern":"[vulnerability:name = 'CVE-2026-0773']","pattern_type":"stix","valid_from":"2026-01-09T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-042/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0417-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0778","pattern":"[vulnerability:name = 'CVE-2026-0778']","pattern_type":"stix","valid_from":"2026-01-09T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-041/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0418-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0776","pattern":"[vulnerability:name = 'CVE-2026-0776']","pattern_type":"stix","valid_from":"2026-01-09T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-040/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0419-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0774","pattern":"[vulnerability:name = 'CVE-2026-0774']","pattern_type":"stix","valid_from":"2026-01-09T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-039/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0420-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0772","pattern":"[vulnerability:name = 'CVE-2026-0772']","pattern_type":"stix","valid_from":"2026-01-09T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-038/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0421-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0771","pattern":"[vulnerability:name = 'CVE-2026-0771']","pattern_type":"stix","valid_from":"2026-01-09T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-037/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0422-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0770","pattern":"[vulnerability:name = 'CVE-2026-0770']","pattern_type":"stix","valid_from":"2026-01-09T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-036/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0423-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0769","pattern":"[vulnerability:name = 'CVE-2026-0769']","pattern_type":"stix","valid_from":"2026-01-09T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-035/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0424-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0768","pattern":"[vulnerability:name = 'CVE-2026-0768']","pattern_type":"stix","valid_from":"2026-01-09T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-034/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0425-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0767","pattern":"[vulnerability:name = 'CVE-2026-0767']","pattern_type":"stix","valid_from":"2026-01-09T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-033/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0426-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0766","pattern":"[vulnerability:name = 'CVE-2026-0766']","pattern_type":"stix","valid_from":"2026-01-09T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-032/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0427-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0765","pattern":"[vulnerability:name = 'CVE-2026-0765']","pattern_type":"stix","valid_from":"2026-01-09T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-031/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0428-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0764","pattern":"[vulnerability:name = 'CVE-2026-0764']","pattern_type":"stix","valid_from":"2026-01-09T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-030/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0429-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0763","pattern":"[vulnerability:name = 'CVE-2026-0763']","pattern_type":"stix","valid_from":"2026-01-09T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-029/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0430-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0762","pattern":"[vulnerability:name = 'CVE-2026-0762']","pattern_type":"stix","valid_from":"2026-01-09T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-028/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0431-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2026-0761","pattern":"[vulnerability:name = 'CVE-2026-0761']","pattern_type":"stix","valid_from":"2026-01-09T06:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Zero Day Initiative","url":"http://www.zerodayinitiative.com/advisories/ZDI-26-027/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0432-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-50165","pattern":"[vulnerability:name = 'CVE-2025-50165']","pattern_type":"stix","valid_from":"2025-12-22T09:55:00.000Z","labels":["cve"],"external_references":[{"source_name":"WeLiveSecurity","url":"https://www.welivesecurity.com/en/eset-research/revisiting-cve-2025-50165-critical-flaw-windows-imaging-component/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--756b722e-0433-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"ukr.net","pattern":"[domain-name:value = 'ukr.net']","pattern_type":"stix","valid_from":"2025-12-17T00:00:00.000Z","labels":["domain"],"external_references":[{"source_name":"Recorded Future","url":"https://www.recordedfuture.com/research/bluedeltas-persistent-campaign-against-ukrnet"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0434-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2017-3558","pattern":"[vulnerability:name = 'CVE-2017-3558']","pattern_type":"stix","valid_from":"2025-12-16T09:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Google Project Zero","url":"https://projectzero.google/2025/12/thinking-outside-the-box.html"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0435-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2025-55182","pattern":"[vulnerability:name = 'CVE-2025-55182']","pattern_type":"stix","valid_from":"2025-12-12T14:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"Mandiant Blog","url":"https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182/"}]},{"type":"indicator","spec_version":"2.1","id":"indicator--4356452d-0436-0000-0000-000000000000","created":"2026-04-04T17:47:50.174Z","modified":"2026-04-04T17:47:50.174Z","name":"CVE-2024-7344","pattern":"[vulnerability:name = 'CVE-2024-7344']","pattern_type":"stix","valid_from":"2025-09-12T09:00:00.000Z","labels":["cve"],"external_references":[{"source_name":"WeLiveSecurity","url":"https://www.welivesecurity.com/en/eset-research/introducing-hybridpetya-petya-notpetya-copycat-uefi-secure-boot-bypass/"}]}]}