Top Exploited Vulnerabilities
The most actively exploited vulnerabilities across the companies tracked by Rankiteo. Aggregated from real incident data to help you prioritize patching.
4180
Vulnerabilities Tracked
3248
Critical Severity
584
High Severity
5,548
Total Exposures
Vulnerability Rankings
| # | Vulnerability | Severity | CVSS | Incidents | Attack Type |
|---|---|---|---|---|---|
| 1 | Human Error | critical | 10.0 | 137 | Awareness Campaign, Data Leak, Phishing |
| 2 | Unauthorized Access | critical | 10.0 | 79 | Data Exfiltration, Security Concerns, Data Breach |
| 3 | Email Account | critical | 8.5 | 54 | Phishing Scam, Data Breach |
| 4 | Physical Security | critical | 10.0 | 40 | Data Theft, Data Breach |
| 5 | Lack of Multi-Factor Authentication (MFA) | critical | 10.0 | 34 | defacement, cyber espionage, Unauthorized Access |
| 6 | Human | critical | 10.0 | 31 | Phishing, Data Breach |
| 7 | Email Account Compromise | critical | 10.0 | 28 | Data Breach |
| 8 | Misconfiguration | critical | 10.0 | 28 | Data Leak, worm-driven campaign, Data Breach |
| 9 | Improper Access Control | critical | 10.0 | 28 | data breach, Data Exposure, SCADA Tampering / Insider Threat |
| 10 | Employee Email Account | critical | 8.5 | 27 | Data Breach |
| 11 | Unauthorized Access to Email Account | critical | 10.0 | 21 | Data Theft, Data Breach |
| 12 | Social Engineering | critical | 10.0 | 20 | Business Email Compromise (BEC), Phishing Scam, Phishing |
| 13 | Insider Threat | critical | 10.0 | 18 | Data Leak, Data Breach, Unauthorized Access |
| 14 | SQL Injection | critical | 10.0 | 15 | SQL Injection, Data Breach |
| 15 | MOVEit software vulnerability | critical | 10.0 | 15 | Data Breach |
| 16 | Website Vulnerability | critical | 10.0 | 14 | Data Breach |
| 17 | unpatched systems | critical | 10.0 | 14 | Data Breach, cyber espionage, Cyberattack |
| 18 | Unsecured Database | critical | 10.0 | 13 | Data Leak, Data Exposure, Data Breach |
| 19 | Improper Data Handling | critical | 10.0 | 13 | data breach, Data Exposure, Data Breach |
| 20 | Weak password | critical | 10.0 | 13 | Data Breach, Phishing, Awareness Campaign, Phishing |
| 21 | Human Error (Phishing Susceptibility) | critical | 10.0 | 12 | cybercrime, Data Breach (Phishing), Phishing |
| 22 | Weak or Stolen Credentials | critical | 10.0 | 11 | Data Breach (General Discussion), ransomware, Data Breach |
| 23 | Unencrypted Data | critical | 10.0 | 11 | Awareness Campaign, data breach, Data Breach |
| 24 | Lack of Physical Security | critical | 10.0 | 11 | cybercrime, Data Leak, Data Breach |
| 25 | Lack of Password Protection | critical | 10.0 | 11 | Data Exposure, Data Breach |
| 26 | Compromised Email Account | critical | 10.0 | 11 | Data Breach |
| 27 | Unsecured cloud environment | critical | 10.0 | 10 | Data Breach |
| 28 | CVE-2024-57727 | critical | 10.0 | 10 | Supply-Chain Attack, ransomware, Ransomware |
| 29 | Previously unknown vulnerability | critical | 10.0 | 10 | Ransomware, Ransomware Attack, Data Breach |
| 30 | Human Error (Social Engineering) | critical | 10.0 | 10 | Cyber Extortion, Phishing, Data Breach |
| 31 | Unsecured Laptop | critical | 10.0 | 9 | Data Breach |
| 32 | lack of access controls | critical | 10.0 | 9 | Data Leak, Data Breach, ransomware |
| 33 | MOVEit Transfer application vulnerability | critical | 8.5 | 9 | Data Breach |
| 34 | Unknown | critical | 10.0 | 8 | Data Leak, Data Breach, Malware |
| 35 | Unencrypted Laptop | critical | 10.0 | 8 | Data Breach |
| 36 | Stolen Credentials | critical | 10.0 | 8 | Supply Chain Attack, Data Breach, Extortion, Destructive Cyberattack |
| 37 | Weak Access Controls | critical | 10.0 | 8 | cyber attack, Unauthorized Access and Data Manipulation, Data Breach |
| 38 | Weak Password Policies | critical | 10.0 | 8 | DDoS Attack, Data Breach, cyber espionage |
| 39 | Unencrypted Data Storage | critical | 8.5 | 8 | Data Security Incident, Data Breach |
| 40 | Inadequately secured network | critical | 10.0 | 7 | Data Breach |
| 41 | Unprotected Database | critical | 10.0 | 7 | Data Leak, Data Exposure, Data Breach |
| 42 | Zero-day vulnerability | critical | 10.0 | 7 | Cyber Attack, Ransomware Attack, Data Breach |
| 43 | MOVEit file transfer software | critical | 10.0 | 7 | Ransomware, Ransomware Attack, Data Breach |
| 44 | Compromised Credentials | critical | 10.0 | 7 | Quantum Computing Threat, Data Breach |
| 45 | Unpatched vulnerability | critical | 10.0 | 7 | Data Breach, Ransomware, Ransomware, Ransomware Attack |
| 46 | Inadequate Access Controls | critical | 10.0 | 7 | Data Breach, Data Breach Risk, unauthorized access |
| 47 | MOVEit Transfer software | critical | 8.5 | 7 | Data Breach |
| 48 | Configuration Error | critical | 8.5 | 7 | Data Leak, Data Breach |
| 49 | Email Compromise | critical | 8.5 | 7 | Data Breach |
| 50 | MOVEit Transfer software vulnerability | critical | 8.5 | 7 | Data Breach |
| 51 | Weak OAuth Token Security | critical | 10.0 | 6 | Supply Chain Attack, Data Breach |
| 52 | MOVEit Transfer application | critical | 10.0 | 6 | Data Breach |
| 53 | CVE-2024-57728 | critical | 10.0 | 6 | Supply-Chain Attack, Ransomware, ransomware |
| 54 | CVE-2024-57726 | critical | 10.0 | 6 | Supply-Chain Attack, Ransomware, ransomware |
| 55 | Human Factor | critical | 10.0 | 6 | Data Theft, Phishing Attack, Social Engineering, Ransomware |
| 56 | Lack of Multi-Factor Authentication (MFA) Enforcement | critical | 10.0 | 6 | Phishing, phishing, Account Takeover (ATO) |
| 57 | Lack of Multifactor Authentication (MFA) | critical | 10.0 | 6 | Cybersecurity Incident, cyberespionage, Data Breach |
| 58 | MOVEit Transfer | critical | 8.5 | 6 | Cyber Attack, Data Breach |
| 59 | Weak or Reused Passwords | critical | 8.5 | 6 | Account Compromise, Credential-Stuffing Attack, Data Breach |
| 60 | Unauthorized Data Transfer | critical | 8.0 | 6 | Data Breach |
| 61 | CVE-2025-55182 (React2Shell) | critical | 10.0 | 5 | Remote Code Execution (RCE), Ransomware, Vulnerability Exploitation |
| 62 | Phishing | critical | 10.0 | 5 | Phishing Scam, Phishing, Authentication Security Improvement |
| 63 | Human Error (Phishing) | critical | 10.0 | 5 | Targeted Attack, Targeted Cyberattack, Data Breach |
| 64 | MOVEit file transfer software vulnerability | critical | 10.0 | 5 | Cyber Attack, Ransomware |
| 65 | React2Shell | critical | 10.0 | 5 | Web Traffic Hijacking, Data Breach, Ransomware |
| 66 | Lack of MFA | critical | 10.0 | 5 | Compliance Failure, Social Engineering, Ransomware |
| 67 | CVE-2025-61882 (Oracle E-Business Suite) | critical | 10.0 | 5 | Data Breach, Ransomware, Cybercriminal Alliance Formation, Data Breach |
| 68 | CVE-2025-61882 | critical | 10.0 | 5 | Cyberattack, ransomware, Data Breach |
| 69 | CVE-2023-34362 | critical | 10.0 | 5 | Data Breach and Ransomware Attack, Ransomware, Data Breach |
| 70 | Online Payment System | critical | 10.0 | 5 | Data Breach |
| 71 | Zero-day vulnerabilities | critical | 10.0 | 5 | Zero-day Exploit, Cyber Espionage, Ransomware |
| 72 | Unsecured cloud storage | critical | 10.0 | 5 | Data Leak, data breach, Data Exposure |
| 73 | Software Vulnerability | critical | 10.0 | 5 | Cyber Attack, Data Breach |
| 74 | Human Vulnerability | critical | 10.0 | 5 | Sex Trafficking and Deepfake Pornography, Phishing, Data Breach |
| 75 | outdated software | critical | 10.0 | 5 | phishing, ransomware, Ransomware |
| 76 | MOVEit Transfer programme | critical | 8.5 | 5 | Data Breach |
| 77 | Lack of Authentication | critical | 8.5 | 5 | Data Leak, Data Exposure |
| 78 | Human (Employee Email Compromise) | critical | 8.5 | 5 | Data Breach |
| 79 | Password Reuse | critical | 8.5 | 5 | Credential Theft, Credential Leak, Password Reuse Attack |
| 80 | Inadequate security measures | critical | 8.5 | 5 | Data Breach |
| 81 | Lack of encryption and password protection | critical | 8.5 | 5 | data breach, Data Exposure, Data Breach |
| 82 | Email Phishing | high | 6.0 | 5 | Data Breach |
| 83 | Email Phishing Scam | high | 6.0 | 5 | Data Breach |
| 84 | CVE-2025-47812 | critical | 10.0 | 4 | Remote Code Execution, Remote Code Execution (RCE), Vulnerability Exploitation |
| 85 | Weak or Compromised Credentials | critical | 10.0 | 4 | Cyberattack, Data Breach |
| 86 | CVE-2025-11953 | critical | 10.0 | 4 | Remote Code Execution (RCE), OS Command Injection |
| 87 | CVE-2025-53770 | critical | 10.0 | 4 | Cyberattack, Ransomware, Ransomware Attack |
| 88 | Unknown vulnerability | critical | 10.0 | 4 | Data Breach, Ransomware, Ransomware Attack, Data Breach |
| 89 | CVE-2025-49704 | critical | 10.0 | 4 | Cyberattack, Cyber Espionage, Ransomware |
| 90 | CVE-2025-49706 | critical | 10.0 | 4 | Cyberattack, Cyber Espionage, Ransomware |
| 91 | Internal Access | critical | 10.0 | 4 | Data Theft, Data Breach |
| 92 | Zero-day vulnerability in MOVEit Transfer programme | critical | 10.0 | 4 | Data Breach |
| 93 | Cloudbleed | critical | 10.0 | 4 | Data Breach |
| 94 | SonicWall firewall vulnerability | critical | 10.0 | 4 | Ransomware, Data Breach |
| 95 | MOVEit Transfer tool | critical | 10.0 | 4 | Data Breach |
| 96 | human trust | critical | 10.0 | 4 | phishing, fraud, social engineering |
| 97 | CVE-2023-27532 | critical | 10.0 | 4 | Ransomware Attack, ransomware, Ransomware |
| 98 | Web Application Vulnerability | critical | 10.0 | 4 | Cyber Attack, Data Breach |
| 99 | Security breach on a third-party vendor | critical | 10.0 | 4 | Data Breach |
| 100 | MOVEit | critical | 10.0 | 4 | Ransomware, Data Breach |
| 101 | Insufficient Employee Training | critical | 10.0 | 4 | Data Breach Risk, Cyber Attack, Data Breach |
| 102 | MOVEit file transfer software vulnerabilities | critical | 10.0 | 4 | Data Breach, Unauthorized Access, Ransomware Attack, Data Breach |
| 103 | Lack of Network Segmentation | critical | 10.0 | 4 | Cyberattack, Cyber-Physical Attack, cyber-espionage |
| 104 | Network Vulnerability | critical | 10.0 | 4 | Ransomware Attack, Data Breach |
| 105 | Insecure Direct Object Reference (IDOR) | critical | 10.0 | 4 | unauthorized access, Data Breach |
| 106 | Publicly Accessible Server | critical | 10.0 | 4 | data exposure, Data Exposure, Data Breach |
| 107 | Weak email security | critical | 10.0 | 4 | defacement, Cyberattack, Data Breach |
| 108 | Inadequate employee training | critical | 10.0 | 4 | phishing, Data Leakage, Data Breach |
| 109 | Point-of-Sale System | critical | 10.0 | 4 | Data Breach |
| 110 | Coding Error | critical | 8.5 | 4 | Data Breach |
| 111 | Lack of Encryption | critical | 8.5 | 4 | Data Breach |
| 112 | MOVEit Transfer vulnerability | critical | 8.5 | 4 | Data Breach |
| 113 | Compromised login credentials | critical | 8.5 | 4 | Data Breach |
| 114 | Unauthorized Access by Former Employee | critical | 8.5 | 4 | Data Breach |
| 115 | Unsecured Server | critical | 8.5 | 4 | Data Leak, Data Breach |
| 116 | Compromised Employee Email Account | critical | 8.5 | 4 | Data Breach |
| 117 | CVE-2021-36942 (PetitPotam) | critical | 10.0 | 3 | Cyber Espionage |
| 118 | Weak/Stolen Credentials | critical | 10.0 | 3 | Data Breach |
| 119 | CVE-2024-7029 | critical | 10.0 | 3 | Malware, Botnet |
| 120 | Weak Authentication System | critical | 10.0 | 3 | Data Breach |
| 121 | External System Breach | critical | 10.0 | 3 | Data Breach |
| 122 | Stolen Employee Credentials | critical | 10.0 | 3 | Data Breach |
| 123 | Excessive Permissions | critical | 10.0 | 3 | Malware Infiltration, Data Breach |
| 124 | Weak Password Security | critical | 10.0 | 3 | Data Breach |
| 125 | CVE-2026-21509 | critical | 10.0 | 3 | Zero-day exploitation, Zero-Day Vulnerability |
| 126 | CVE-2025-53771 | critical | 10.0 | 3 | Ransomware, Ransomware Attack |
| 127 | CVE-2024-40711 | critical | 10.0 | 3 | Vulnerability, ransomware, Ransomware |
| 128 | SQL Injection Flaws | critical | 10.0 | 3 | Data Breach |
| 129 | Lack of Oversight | critical | 10.0 | 3 | Data Breach (Alleged), Data Breach, Unauthorized Disclosure |
| 130 | Weak or Reused Credentials | critical | 10.0 | 3 | Unauthorized Access, Data Breach |
| 131 | Lack of Role-Based Access Control (RBAC) | critical | 10.0 | 3 | Data Breach Risk, Data Breach |
| 132 | Microsoft Exchange Server | critical | 10.0 | 3 | Ransomware, Cyber Espionage, Security Breach |
| 133 | Lack of Data Encryption | critical | 10.0 | 3 | Data Breach |
| 134 | Third-party software vulnerability | critical | 10.0 | 3 | Ransomware Attack, Data Breach |
| 135 | unpatched software | critical | 10.0 | 3 | Ransomware, general cybersecurity awareness, ransomware |
| 136 | legacy systems | critical | 10.0 | 3 | Ransomware, Cyberattack, ransomware |
| 137 | outdated systems | critical | 10.0 | 3 | Ransomware, data breach, ransomware |
| 138 | weak endpoint security | critical | 10.0 | 3 | data breach, ransomware, Data Breach |
| 139 | Unpatched vulnerabilities | critical | 10.0 | 3 | ransomware, Ransomware, Cyber Threat Alert |
| 140 | Weak Credential Management | critical | 10.0 | 3 | Data Breach |
| 141 | Improper Email Handling | critical | 10.0 | 3 | Data Breach |
| 142 | Employee Credentials | critical | 10.0 | 3 | Data Breach, Phishing, Data Breach |
| 143 | Lack of Cybersecurity Expertise | critical | 10.0 | 3 | ransomware, Data Breach |
| 144 | Zero-day exploit | critical | 10.0 | 3 | Ransomware, Compliance Failure, Data Breach |
| 145 | Poor Network Segmentation | critical | 10.0 | 3 | cyber attack, Ransomware |
| 146 | Misconfigured Amazon S3 bucket | critical | 9.0 | 3 | Data Breach |
| 147 | Point of Sale Systems | critical | 8.5 | 3 | Data Breach |
| 148 | MOVEit Transfer solution | critical | 8.5 | 3 | Data Breach |
| 149 | MOVEit Transfer server | critical | 8.5 | 3 | Data Breach |
| 150 | Security Vulnerability | critical | 8.5 | 3 | Data Breach |
| 151 | Physical Theft | critical | 8.5 | 3 | Data Breach |
| 152 | Third-party service provider | critical | 8.5 | 3 | Data Breach |
| 153 | Inadequate Data Protection Measures | critical | 8.5 | 3 | Data Breach |
| 154 | Weak security controls | critical | 8.5 | 3 | Ransomware, Data Breach |
| 155 | human trust (social engineering) | critical | 8.5 | 3 | Malware, cyber theft, phishing |
| 156 | Third-party vendor vulnerability | critical | 8.5 | 3 | Data Breach |
| 157 | Insufficient Access Controls | critical | 8.5 | 3 | Unauthorized Access, data breach, Data Breach |
| 158 | MOVEit file transfer application | critical | 8.5 | 3 | Data Breach |
| 159 | Publicly Accessible Database | critical | 8.5 | 3 | Data Exposure, Data Breach |
| 160 | Reused Passwords | critical | 8.5 | 3 | Account Compromise, data breach (unverified), Data Breach |
| 161 | Payment Processing System | critical | 8.5 | 3 | Data Breach |
| 162 | Lack of two-factor authentication | high | 6.0 | 3 | Cyber Attack, Data Breach |
| 163 | Email Misconfiguration | high | 6.0 | 3 | Data Breach |
| 164 | Unauthorized Data Access | high | 6.0 | 3 | Data Exfiltration, Data Breach |
| 165 | Weak or Stolen Password | high | 6.0 | 3 | Authentication Security Improvement, Data Breach (Unauthorized Access), Data Breach |
| 166 | Insider Access | low | 0.0 | 3 | Insider Threat, Data Breach |
| 167 | CVE-unknown (MOVEit Transfer zero-day) | critical | 10.0 | 2 | ransomware, Data Breach |
| 168 | Human vulnerability through phishing | critical | 10.0 | 2 | Phishing, Ransomware |
| 169 | inadequate network segmentation | critical | 10.0 | 2 | ransomware |
| 170 | CVE-2025-53770 (ToolShell) | critical | 10.0 | 2 | Cyber Espionage |
| 171 | CVE-2024-1086 | critical | 10.0 | 2 | Privilege Escalation, vulnerability exploitation |
| 172 | Unpatched IoT Devices | critical | 10.0 | 2 | Distributed Denial-of-Service (DDoS) Attack, Data Breach |
| 173 | Known vulnerability that had not been patched | critical | 10.0 | 2 | Ransomware, Data Breach |
| 174 | CVE-2024-21412 | critical | 10.0 | 2 | Cyberattack, Ransomware |
| 175 | Unattended Devices | critical | 10.0 | 2 | Awareness Campaign, Insider Threat |
| 176 | human vulnerability (social engineering) | critical | 10.0 | 2 | phishing, data breach |
| 177 | Zero-day vulnerability in Oracle’s E-Business Suite | critical | 10.0 | 2 | Ransomware |
| 178 | Supply chain vulnerabilities | critical | 10.0 | 2 | Ransomware, Data Breach |
| 179 | MOVEit Transfer zero-day vulnerability | critical | 10.0 | 2 | Data Breach |
| 180 | CVE-2025-4322 | critical | 10.0 | 2 | Privilege Escalation |
| 181 | CVE-2026-23760 | critical | 10.0 | 2 | Ransomware, Remote Code Execution (RCE) |
| 182 | Code Vulnerability | critical | 10.0 | 2 | Data Breach |
| 183 | Remote code execution | critical | 10.0 | 2 | Espionage, Data Privacy and Cybersecurity Advisory |
| 184 | CVE-2021-44026 | critical | 10.0 | 2 | Cyberespionage, Data Breach |
| 185 | CVE-2025-7775 (Citrix NetScaler) | critical | 10.0 | 2 | Ransomware |
| 186 | null | critical | 10.0 | 2 | Data Breach and Ransomware, Data Breach |
| 187 | Infostealer Malware | critical | 10.0 | 2 | Data Breach |
| 188 | CVE-2025-33053 | critical | 10.0 | 2 | Advanced Persistent Threat (APT), Remote Code Execution |
| 189 | Email System | critical | 10.0 | 2 | Data Breach |
| 190 | Oracle eBusiness Suite security flaw | critical | 10.0 | 2 | Data Breach |
| 191 | CVE-2025-54309 | critical | 10.0 | 2 | Zero-Day Exploitation, Zero-Day Vulnerability |
| 192 | Known vulnerability not patched in time | critical | 10.0 | 2 | Ransomware, Data Breach |
| 193 | CVE-2025-1268 | critical | 10.0 | 2 | Vulnerability, Vulnerability and Potential Breach |
| 194 | CVE-2024-50623 | critical | 10.0 | 2 | Ransomware, Data Breach |
| 195 | Oracle eBusiness Suite vulnerability | critical | 10.0 | 2 | Data Breach |
| 196 | CVE-2017-17215 | critical | 10.0 | 2 | Malware, Botnet |
| 197 | Internal Account Compromise | critical | 10.0 | 2 | Data Breach |
| 198 | Improper security configuration | critical | 10.0 | 2 | Data Breach |
| 199 | lack of user awareness | critical | 10.0 | 2 | phishing, social engineering |
| 200 | Cross-Site Scripting (XSS) | critical | 10.0 | 2 | Vulnerability |
| 201 | SonicWall firewall | critical | 10.0 | 2 | Ransomware Attack, Data Breach |
| 202 | Human (Help Desk Personnel) | critical | 10.0 | 2 | Ransomware and Data Theft, Ransomware and Data Breach |
| 203 | Cleo file transfer software | critical | 10.0 | 2 | Ransomware |
| 204 | Lack of Employee Awareness | critical | 10.0 | 2 | Human Error, Data Breach |
| 205 | Signature-Based Detection Gaps | critical | 10.0 | 2 | Supply Chain Attack, Operational Risk |
| 206 | Human vulnerability through impersonation | critical | 10.0 | 2 | Social Engineering Attack, Data Breach |
| 207 | MOVEit Transfer software zero-day vulnerability | critical | 10.0 | 2 | Data Breach |
| 208 | Phished login credentials | critical | 10.0 | 2 | Cyber Attack, Hack |
| 209 | Unauthorized Access to Sensitive Data | critical | 10.0 | 2 | Data Breach |
| 210 | Lack of Multi-Factor Authentication (MFA) (implied) | critical | 10.0 | 2 | Phishing, Ransomware Attack |
| 211 | Unencrypted, non-password-protected database | critical | 10.0 | 2 | Data Leak |
| 212 | Citrix Vulnerability | critical | 10.0 | 2 | Cyberattack |
| 213 | CVE-2017-11882 | critical | 10.0 | 2 | cyber espionage |
| 214 | CVE-2025-6543 | critical | 10.0 | 2 | Cyber Attack, Zero-day exploitation |
| 215 | CVE-2026-0920 | critical | 10.0 | 2 | Backdoor |
| 216 | Lack of Encryption (Data at Rest/In Transit) | critical | 10.0 | 2 | Data Breach (General Discussion), Data Breach |
| 217 | Weak Identity Controls | critical | 10.0 | 2 | EDR/XDR Evasion, Data Breach |
| 218 | CVE-2025-48828 | critical | 10.0 | 2 | Remote Code Execution, Vulnerability Exploitation |
| 219 | Weak OAuth Token Management | critical | 10.0 | 2 | Data Breach |
| 220 | Unauthorized access to an employee’s email account | critical | 10.0 | 2 | Data Breach |
| 221 | CVE-2025-55182 | critical | 10.0 | 2 | Supply Chain Attack, Remote Code Execution (RCE) |
| 222 | CVE-2024-55956 | critical | 10.0 | 2 | Ransomware, Data Breach |
| 223 | CVE-2025-48827 | critical | 10.0 | 2 | Remote Code Execution, Vulnerability Exploitation |
| 224 | Network infrastructure | critical | 10.0 | 2 | Data Breach, Cyber Sabotage |
| 225 | Default or Weak Credentials | critical | 10.0 | 2 | Cloud Security Breach, Cyberattack |
| 226 | Poor Data Governance | critical | 10.0 | 2 | Data Breach |
| 227 | CVE-2025-3248 | critical | 10.0 | 2 | Remote Code Execution, Vulnerability Exploitation |
| 228 | CVE-2024-36401 | critical | 10.0 | 2 | Malware Distribution and Data Exfiltration, Exploitation of Vulnerability |
| 229 | Non-password protected database | critical | 10.0 | 2 | Data Breach |
| 230 | Outdated infrastructure | critical | 10.0 | 2 | GPS spoofing, Ransomware |
| 231 | Weak Password Management | critical | 10.0 | 2 | Malware Infection, Data Breach |
| 232 | CVE-2024-40766 | critical | 10.0 | 2 | Ransomware |
| 233 | Email System Vulnerability | critical | 10.0 | 2 | Data Breach |
| 234 | CVE-2025-49113 | critical | 10.0 | 2 | Remote Code Execution (RCE) |
| 235 | CVE-2025-8110 | critical | 10.0 | 2 | Remote Code Execution (RCE) |
| 236 | ATM network processing | critical | 10.0 | 2 | Data Breach |
| 237 | Outdated operating systems | critical | 10.0 | 2 | Cyberattack, data breach |
| 238 | CVE-2025-61884 (Oracle E-Business Suite Zero-Day) | critical | 10.0 | 2 | data breach, Data Breach |
| 239 | network vulnerabilities | critical | 10.0 | 2 | Ransomware, ransomware |
| 240 | unknown security gap | critical | 10.0 | 2 | ransomware |
| 241 | Phishing Email | critical | 10.0 | 2 | Data Breach |
| 242 | third-party integration risks | critical | 10.0 | 2 | third-party breach, Data Breach |
| 243 | Misconfigured access controls | critical | 10.0 | 2 | Data Privacy and Cybersecurity Advisory, Data Breach |
| 244 | User Trust in App Store | critical | 10.0 | 2 | Malware |
| 245 | Weak authentication | critical | 10.0 | 2 | Ransomware, Data Breach |
| 246 | Known vulnerability | critical | 10.0 | 2 | Data Leak, Ransomware Attack |
| 247 | Weak Authentication Mechanisms | critical | 10.0 | 2 | cybercrime, Data Breach |
| 248 | Cloud Storage Service Vulnerability | critical | 10.0 | 2 | Data Breach |
| 249 | lack_of_MFA | critical | 10.0 | 2 | data_breach, ransomware |
| 250 | Misconfigured system | critical | 10.0 | 2 | Alleged Data Breach, Data Breach |
| 251 | poor password hygiene | critical | 10.0 | 2 | Human Error, ransomware |
| 252 | lack of employee training | critical | 10.0 | 2 | phishing, Ransomware |
| 253 | Online Payment System Vulnerability | critical | 10.0 | 2 | Data Breach |
| 254 | Lack of Signal Authentication | critical | 10.0 | 2 | Data Interception, spoofing |
| 255 | Remote code execution vulnerability | critical | 10.0 | 2 | Remote Code Execution, Remote Code Execution (RCE) |
| 256 | Misconfigured MongoDB database | critical | 10.0 | 2 | Data Exposure, Data Breach |
| 257 | Zero-Day Vulnerability in SonicWall SSL VPN | critical | 10.0 | 2 | Ransomware |
| 258 | Lack of phishing-resistant MFA | critical | 10.0 | 2 | Extortion, Data Breach |
| 259 | Default credentials | critical | 10.0 | 2 | Ransomware, Data Breach |
| 260 | Cloud misconfiguration | critical | 10.0 | 2 | Cloud Misconfiguration Exploitation, Data Breach |
| 261 | Legacy IT Systems | critical | 10.0 | 2 | Cyber Attack, Ransomware Attack |
| 262 | Human error (social engineering susceptibility) | critical | 10.0 | 2 | Ransomware, Data Breach |
| 263 | Lack of multifactor authentication | critical | 10.0 | 2 | Awareness Campaign, Supply Chain Breach |
| 264 | Lack of Package Integrity Verification | critical | 10.0 | 2 | Supply Chain Attack, supply-chain attack |
| 265 | Misconfigured deployments | critical | 10.0 | 2 | Misconfiguration, Ransomware |
| 266 | lack of multi-factor authentication | critical | 10.0 | 2 | general cybersecurity awareness, Data Breach |
| 267 | Software Coding Issue | critical | 8.5 | 2 | Data Breach |
| 268 | Compromised User Account | critical | 8.5 | 2 | Data Breach |
| 269 | Inadequate Vendor Vetting | critical | 8.5 | 2 | Data Breach |
| 270 | CVE-2026-22218 | critical | 8.5 | 2 | Vulnerability Exploitation, Data Breach |
| 271 | Lack of Identity Verification | critical | 8.5 | 2 | Fraud, Data Breach |
| 272 | CVE-2026-23795 | critical | 8.5 | 2 | Supply Chain Attack, XXE (XML External Entity) Vulnerability |
| 273 | Progress Software's MOVEit Transfer software | critical | 8.5 | 2 | Data Breach |
| 274 | Code Injection | critical | 8.5 | 2 | Data Breach |
| 275 | Human Error (Falling for Phishing Scam) | critical | 8.5 | 2 | Data Breach (Phishing), Data Breach |
| 276 | MOVEit Transfer (CVE-2023-34362 or related) | critical | 8.5 | 2 | Data Breach |
| 277 | CVE-2025-55177 (WhatsApp incomplete authorization) | critical | 8.5 | 2 | Zero-day vulnerability, Zero-day exploit |
| 278 | Weak email account security | critical | 8.5 | 2 | Data Breach |
| 279 | CVE-2026-22219 | critical | 8.5 | 2 | Vulnerability Exploitation, Data Breach |
| 280 | Access Control | critical | 8.5 | 2 | Data Breach |
| 281 | Inadvertent Disclosure | critical | 8.5 | 2 | Data Breach |
| 282 | missing authentication | critical | 8.5 | 2 | data breach |
| 283 | CVE-2026-2413 | critical | 8.5 | 2 | SQL Injection |
| 284 | CVE-2025-41244 | critical | 8.5 | 2 | Privilege Escalation |
| 285 | MOVEit web transfer application vulnerability | critical | 8.5 | 2 | Data Breach |
| 286 | Oracle E-Business Suite software vulnerability | critical | 8.5 | 2 | Data Breach |
| 287 | System Configuration Error | critical | 8.5 | 2 | Data Breach |
| 288 | Unprotected Server | critical | 8.5 | 2 | Data Breach |
| 289 | Server Misconfiguration | critical | 8.5 | 2 | Data Breach |
| 290 | CVE-2026-26110 (Type Confusion - CWE-843) | critical | 8.5 | 2 | Vulnerability, Remote Code Execution (RCE) |
| 291 | Insufficient Multi-Factor Authentication (MFA) | critical | 8.5 | 2 | Data Breach |
| 292 | React2Shell vulnerability | critical | 8.5 | 2 | Data Breach |
| 293 | Misconfigured Elasticsearch Database | critical | 8.5 | 2 | Data Leak, Data Exposure |
| 294 | Incorrect privacy settings on a public mapping website | critical | 8.5 | 2 | Data Exposure, Data Breach |
| 295 | CVE-2026-21510 | critical | 8.5 | 2 | Zero-Day Vulnerability |
| 296 | Information Disclosure | critical | 8.5 | 2 | Data Leak, Data Breach |
| 297 | unencrypted sensitive data | critical | 8.5 | 2 | Quantum Computing Threat, data breach |
| 298 | Weak Email Security Controls | critical | 8.5 | 2 | data breach, Data Breach |
| 299 | Improper access controls on Amazon S3 bucket | critical | 8.5 | 2 | Data Breach |
| 300 | Unsecured Amazon S3 Bucket | critical | 8.5 | 2 | Data Breach |
| 301 | CVE-2025-21043 (Out-of-Bounds Write in libimagecodec.quram.so) | critical | 8.5 | 2 | Vulnerability Exploitation |
| 302 | Unsecured MongoDB instance | critical | 8.5 | 2 | Data Exposure, Data Breach |
| 303 | Access Credentials | critical | 8.5 | 2 | Data Breach |
| 304 | Misconfigured Rsync Server | critical | 8.5 | 2 | Data Exposure, Data Breach |
| 305 | Unsecured Flash Drive | critical | 8.5 | 2 | Data Breach |
| 306 | Compromised employee credentials | critical | 8.5 | 2 | Data Breach |
| 307 | Long-Lived Tokens | critical | 8.5 | 2 | Data Breach |
| 308 | Publicly available data | critical | 8.5 | 2 | Data Breach |
| 309 | Missing Access Controls | critical | 8.5 | 2 | Unauthorized Access, Data Exposure |
| 310 | Credential Theft | critical | 8.5 | 2 | Malware, Data Breach |
| 311 | Improper Access Controls (Publicly Accessible Database) | critical | 8.5 | 2 | Data Leak, data breach |
| 312 | Unauthorized code injection | critical | 8.5 | 2 | Data Breach |
| 313 | Lack of Physical Security for Sensitive Device | critical | 8.5 | 2 | Data Breach (Physical Theft) |
| 314 | Misconfigured Elasticsearch Instance | critical | 8.5 | 2 | Data Exposure, Data Breach |
| 315 | GoAnywhere Zero-Day Vulnerability | critical | 8.5 | 2 | Data Breach, Ransomware, Ransomware |
| 316 | Technical Glitch | critical | 8.0 | 2 | Data Breach |
| 317 | Improper Disposal of Sensitive Information | critical | 8.0 | 2 | Data Breach |
| 318 | Identity Theft | critical | 8.0 | 2 | Identity Theft, Data Breach |
| 319 | Unauthorized Data Sharing | critical | 8.0 | 2 | Data Breach |
| 320 | Inadequate Physical Security | high | 7.5 | 2 | physical cyber convergence, Data Breach |
| 321 | Inadvertent Email | high | 6.0 | 2 | Data Breach |
| 322 | Compromised Account Credentials | high | 6.0 | 2 | Unauthorized Access, DNS Manipulation, Data Breach |
| 323 | Loss of Physical Media | high | 6.0 | 2 | Data Breach |
| 324 | MOVEit Transfer service | high | 6.0 | 2 | Data Breach |
| 325 | Website Misconfiguration | high | 6.0 | 2 | Data Exposure, Data Breach |
| 326 | CVE-2018-3952 | high | 6.0 | 2 | Vulnerability Exploit, Vulnerability Exploitation |
| 327 | Unencrypted Payment Card Information | high | 6.0 | 2 | Data Breach |
| 328 | Human Error/Insider Threat | high | 6.0 | 2 | Data Breach |
| 329 | ATM Security | high | 6.0 | 2 | ATM Skimming/Shimming, Data Breach |
| 330 | Corporate Email Account | high | 6.0 | 2 | Data Breach |
| 331 | Unauthorized Access to Employee Email Account | high | 6.0 | 2 | Data Breach |
| 332 | Lack of Multi-Factor Authentication (MFA) on Slack | high | 6.0 | 2 | data breach, Data Breach |
| 333 | Point-of-Sale Device | high | 6.0 | 2 | Data Breach |
| 334 | Compromised Microsoft Office 365 account | high | 6.0 | 2 | Business Email Compromise (BEC), Data Breach |
| 335 | Improper Disposal | medium | 5.0 | 2 | Data Breach |
| 336 | MOVEit Transfer software vulnerabilities | medium | 5.0 | 2 | Data Breach |
| 337 | Tax Filing Software | medium | 5.0 | 2 | Data Breach |
| 338 | Reused credentials | medium | 5.0 | 2 | Data Breach |
| 339 | HTML Injection | medium | 5.0 | 2 | Prompt Injection, Vulnerability Exploitation |
| 340 | Unsecured Physical Records | low | 2.5 | 2 | Data Breach |
| 341 | CVE-2024-7399 | low | 2.5 | 2 | Botnet Infection, Vulnerability Exploitation |
| 342 | CVE-2026-1504 | low | 2.5 | 2 | Vulnerability |
| 343 | Unencrypted POS devices | critical | 10.0 | 1 | Data Breach |
| 344 | Citrix Bleed | critical | 10.0 | 1 | Ransomware Attack |
| 345 | unrestricted RDP/remote tool access | critical | 10.0 | 1 | ransomware |
| 346 | LNK file execution | critical | 10.0 | 1 | spear-phishing |
| 347 | CVE-2025-59470 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 348 | Critical SharePoint Vulnerabilities (July 2025) | critical | 10.0 | 1 | Ransomware Attack |
| 349 | unencrypted storage of sensitive data in an internet-accessible environment | critical | 10.0 | 1 | ransomware |
| 350 | Previously unknown vulnerability in email system | critical | 10.0 | 1 | Ransomware |
| 351 | CVE-2026-25084 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 352 | CVE-2024-8299 | critical | 10.0 | 1 | Vulnerabilities in SCADA Systems |
| 353 | Container escape vulnerabilities (e.g., CVE-2025-23266) | critical | 10.0 | 1 | Malware Framework |
| 354 | Insufficient Vendor Oversight | critical | 10.0 | 1 | Supply Chain Attack |
| 355 | CVE-2025-52691 | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 356 | Unpatched zero-day vulnerability in Oracle E-Business Suite (arbitrary code execution) | critical | 10.0 | 1 | ransomware |
| 357 | Unauthorized access to video lessons | critical | 10.0 | 1 | Data Breach |
| 358 | CVE-2025-0289 in BioNTdrv.sys driver | critical | 10.0 | 1 | Ransomware |
| 359 | Overwhelming a server or website with excessive fake traffic | critical | 10.0 | 1 | DDoS Attack |
| 360 | Vulnerabilities in MOVEit software | critical | 10.0 | 1 | Cyberattack |
| 361 | lack of backups | critical | 10.0 | 1 | data breach |
| 362 | Immutable Log Gaps in AI Pipelines | critical | 10.0 | 1 | Data Breach (AI Models/Applications) |
| 363 | Insecure Data Storage Practices | critical | 10.0 | 1 | Vulnerability Exploitation |
| 364 | Weak vendor security controls | critical | 10.0 | 1 | Ransomware |
| 365 | Insufficient sanitization in serialize and compileMDX functions (CVE-2026-0969) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 366 | Inadequate Reporting Processes | critical | 10.0 | 1 | Data Breach |
| 367 | Weak Identity Management (Lack of Privileged Account Separation) | critical | 10.0 | 1 | Cyber Espionage |
| 368 | Publicly Accessible Executive Profiles (for AI Phishing) | critical | 10.0 | 1 | Supply Chain Attack |
| 369 | Cisco IOS vulnerabilities | critical | 10.0 | 1 | Data Breach |
| 370 | Human Error (Phishing/Vishing) | critical | 10.0 | 1 | Data Breach |
| 371 | Entra ID application registration secrets | critical | 10.0 | 1 | cyberespionage |
| 372 | lack of managed GenAI tools | critical | 10.0 | 1 | ransomware |
| 373 | Poorly Secured ICS Components (PLCs, SCADA, HMIs, Industrial IoTs) | critical | 10.0 | 1 | Cyber-Physical Attack |
| 374 | Manual Recovery Reliance | critical | 10.0 | 1 | Supply Chain Attack |
| 375 | Insufficient Real-Time Monitoring | critical | 10.0 | 1 | Insider Threat |
| 376 | Human behavior | critical | 10.0 | 1 | Illegal intrusion |
| 377 | Inadequate access controls for sensitive spreadsheets | critical | 10.0 | 1 | Data Breach |
| 378 | Human Error (lack of skepticism toward unsolicited interactions) | critical | 10.0 | 1 | Cyber Theft |
| 379 | No rate-limiting or access restrictions on user data | critical | 10.0 | 1 | Data Breach |
| 380 | Misaligned agent workflows | critical | 10.0 | 1 | AI-driven breach |
| 381 | Internal mechanism for helping password-forgetting users reclaim their accounts | critical | 10.0 | 1 | Data Privacy Breach |
| 382 | Poorly maintained systems | critical | 10.0 | 1 | Ransomware |
| 383 | automated package update mechanisms | critical | 10.0 | 1 | supply chain attack |
| 384 | Undisclosed (stolen vulnerability data) | critical | 10.0 | 1 | Data Breach |
| 385 | Microsoft Word 2010 vulnerability | critical | 10.0 | 1 | Cyber Espionage |
| 386 | inadequate least-privilege access controls | critical | 10.0 | 1 | cyberespionage |
| 387 | Embedded Credentials in BIG-IP | critical | 10.0 | 1 | Supply Chain Attack |
| 388 | Recently discovered vulnerability | critical | 10.0 | 1 | Ransomware Attack |
| 389 | Weak SSH credentials | critical | 10.0 | 1 | DDoS Attack |
| 390 | lack of package cooldown periods | critical | 10.0 | 1 | supply chain attack |
| 391 | Database Injection | critical | 10.0 | 1 | Website Defacement |
| 392 | Heap Metadata Corruption | critical | 10.0 | 1 | Memory Corruption Vulnerability |
| 393 | Inadequate Risk Management Exercises | critical | 10.0 | 1 | Data Breach |
| 394 | CVE-2025-30232 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 395 | Unpatched Firmware/Software in Network Perimeter Devices | critical | 10.0 | 1 | Cyber Espionage |
| 396 | Compromised administrative accounts (26 user accounts, including admin-level) | critical | 10.0 | 1 | Ransomware Attack |
| 397 | Exposed Secrets in GitHub Repository | critical | 10.0 | 1 | Data Breach |
| 398 | RC4 encryption (obsolete since 1980s) | critical | 10.0 | 1 | ransomware |
| 399 | Opportunistic TLS | critical | 10.0 | 1 | Cross-protocol Application Layer Desynchronization |
| 400 | CVE-2025-55182 (React2Shell, CVSS 10.0) | critical | 10.0 | 1 | Web Application Exploitation |
| 401 | CVE-2025-32714 (Windows Installer EoP) | critical | 10.0 | 1 | Patch Release |
| 402 | Improper Data Handling Practices | critical | 10.0 | 1 | Data Breach |
| 403 | CVE-2020-12812 | critical | 10.0 | 1 | Ransomware |
| 404 | Undocumented Warbird framework | critical | 10.0 | 1 | Supply Chain Attack |
| 405 | CVE-2017-7921 (CWE-287: Improper Authentication) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 406 | human error (weakness in operational security) | critical | 10.0 | 1 | cyber theft |
| 407 | Compromised Polyfill.io service | critical | 10.0 | 1 | Supply Chain Attack |
| 408 | Misconfigured Email Security Solutions (Mimecast, Proofpoint, Barracuda) | critical | 10.0 | 1 | Data Breach |
| 409 | shadow IT (unapproved third-party tool integrations) | critical | 10.0 | 1 | third-party breach |
| 410 | Trojanized Software Supply Chain | critical | 10.0 | 1 | Targeted Attack |
| 411 | Lack of Robust Backup Systems | critical | 10.0 | 1 | Supply Chain Attack |
| 412 | Insufficient Asset Discovery (IIoT Device Proliferation) | critical | 10.0 | 1 | Cyber-Physical Attack |
| 413 | CVE-2024-53676 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 414 | Remote Code Execution in Imunify360 AV deobfuscation logic (versions before v32.7.4.0) | critical | 10.0 | 1 | Vulnerability |
| 415 | weak MFA implementations (Evilginx tool) | critical | 10.0 | 1 | ransomware |
| 416 | Insufficient ESXi Logging Configurations | critical | 10.0 | 1 | Ransomware Prevention Guide |
| 417 | Lack of strict removable media controls, insufficient monitoring of privileged users | critical | 10.0 | 1 | Insider Threat, Data Exfiltration |
| 418 | Lack of End-to-End Email Encryption | critical | 10.0 | 1 | Data Breach |
| 419 | Race Conditions in Object Destruction | critical | 10.0 | 1 | Memory Corruption Vulnerability |
| 420 | myCare Integrity EMR system | critical | 10.0 | 1 | Data Breach |
| 421 | Type confusion vulnerabilities in Java Card | critical | 10.0 | 1 | Vulnerability Exploitation |
| 422 | CVE-2025-8876 (Command Injection via Improper Input Sanitization) | critical | 10.0 | 1 | Vulnerability Exposure |
| 423 | Weak Data Integrity Checks | critical | 10.0 | 1 | Supply Chain Attack |
| 424 | GitLab Server Misconfiguration (Red Hat) | critical | 10.0 | 1 | Data Breach |
| 425 | Liquidity Token Contracts | critical | 10.0 | 1 | Cyberattack |
| 426 | CVE-2024-56325 | critical | 10.0 | 1 | Vulnerability Exploit |
| 427 | external-facing RDP/VPN misconfigurations | critical | 10.0 | 1 | ransomware |
| 428 | Vulnerability allowing linkage of email addresses and phone numbers to Twitter accounts | critical | 10.0 | 1 | Data Breach |
| 429 | Unsecured GitHub Personal Access Tokens (PATs) | critical | 10.0 | 1 | Supply-Chain Attack |
| 430 | Stolen personal data (Social Security numbers, birthdates, account credentials) | critical | 10.0 | 1 | Data Breach, Identity Fraud, Account Takeover |
| 431 | Insecure Third-Party Integration Controls | critical | 10.0 | 1 | Data Breach |
| 432 | CVE-2025-64328 | critical | 10.0 | 1 | Webshell Deployment |
| 433 | Inadequate Redaction | critical | 10.0 | 1 | Data Breach |
| 434 | Stale service accounts | critical | 10.0 | 1 | Ransomware |
| 435 | Social Media Account Compromise | critical | 10.0 | 1 | Phishing, Social Engineering |
| 436 | XAML deserialization | critical | 10.0 | 1 | Cyber Espionage |
| 437 | Inadequate Data Anonymization in AI Features (e.g., Grok AI) | critical | 10.0 | 1 | Data Breach |
| 438 | Exposed VPN concentrators | critical | 10.0 | 1 | Destructive Cyberattack |
| 439 | Cisco AnyConnect software vulnerability | critical | 10.0 | 1 | Data Breach |
| 440 | CVE-2025-0282 (Ivanti Pulse Connect VPN) | critical | 10.0 | 1 | cyberespionage |
| 441 | Improper data classification procedures | critical | 10.0 | 1 | Data Breach |
| 442 | Insufficient Log Retention/Preservation | critical | 10.0 | 1 | APT (Advanced Persistent Threat) |
| 443 | third-party compromises (35.5% of breaches in 2024) | critical | 10.0 | 1 | ransomware |
| 444 | Lack of encryption or authentication in GPS signals | critical | 10.0 | 1 | GPS spoofing |
| 445 | abuse of legitimate code-signing certificates | critical | 10.0 | 1 | ransomware |
| 446 | Lack of Data Review Process / Gross Negligence | critical | 10.0 | 1 | Data Breach |
| 447 | Inadequate penetration testing | critical | 10.0 | 1 | Data Breach |
| 448 | Cloud Security Gaps | critical | 10.0 | 1 | Cyberattack Surge |
| 449 | Hardcoded Credentials in Binaries | critical | 10.0 | 1 | Supply Chain Attack |
| 450 | Trust in .gov/.police Domain Emails (Bypassing Technical Filters) | critical | 10.0 | 1 | Account Compromise |
| 451 | Kernel driver update | critical | 10.0 | 1 | Software Malfunction |
| 452 | Vehicle Tracking Systems (VTS), Immobilizer systems, Security systems | critical | 10.0 | 1 | Cyber Attack, Satellite Interference, Vehicle Immobilization |
| 453 | Absence of Subresource Integrity (SRI) checks | critical | 10.0 | 1 | Data Breach |
| 454 | cloud security misconfigurations | critical | 10.0 | 1 | cyber espionage |
| 455 | CVE-2025-47950 | critical | 10.0 | 1 | Vulnerability |
| 456 | Inadequate Sandboxing for AI/ML Environments | critical | 10.0 | 1 | Supply Chain Attack |
| 457 | Insecure Withdrawal Locking Mechanism | critical | 10.0 | 1 | Data Breach |
| 458 | Weak Insider Controls | critical | 10.0 | 1 | Data Breach |
| 459 | over-reliance on vendors | critical | 10.0 | 1 | data breach |
| 460 | Failure to randomize hostnames in VMmanager, KMS-enabled unlicensed operation | critical | 10.0 | 1 | ransomware |
| 461 | Lack of adequate detection and response capabilities for drone threats | critical | 10.0 | 1 | Physical Security Threat |
| 462 | Unauthorized Access by Ex-Employee | critical | 10.0 | 1 | Data Breach |
| 463 | accidental exposure of regional blacklist data | critical | 10.0 | 1 | data breach |
| 464 | Misconfigured or stolen OAuth tokens, insufficient monitoring of API access logs | critical | 10.0 | 1 | Supply Chain Attack |
| 465 | Insufficient Access Management | critical | 10.0 | 1 | Data Breach |
| 466 | outdated cybersecurity protocols | critical | 10.0 | 1 | cyber attack |
| 467 | Alert Fatigue and False Positives | critical | 10.0 | 1 | EDR/XDR Evasion |
| 468 | Insufficient access controls, lack of root account protection | critical | 10.0 | 1 | Data Destruction |
| 469 | Authentication Mechanisms | critical | 10.0 | 1 | Data Breach |
| 470 | Human error (opening infected email attachment) | critical | 10.0 | 1 | cyber espionage |
| 471 | weak RDP credentials | critical | 10.0 | 1 | ransomware |
| 472 | CVE-2025-9491 (Windows Shortcut (LNK) file user interface misinterpretation) | critical | 10.0 | 1 | Remote Code Execution |
| 473 | CVE-2025-7026 | critical | 10.0 | 1 | Firmware Vulnerability |
| 474 | Manual Redaction Errors | critical | 10.0 | 1 | Data Leak |
| 475 | Outdated Security Software | critical | 10.0 | 1 | Awareness Campaign |
| 476 | Weak vendor compliance enforcement | critical | 10.0 | 1 | Ransomware |
| 477 | Spring4Shell | critical | 10.0 | 1 | Vulnerability Exploitation |
| 478 | Unknown vulnerability in online platforms | critical | 10.0 | 1 | Data Breach |
| 479 | End-of-support (EoS) devices (ASA 5500-X Series) | critical | 10.0 | 1 | Zero-day exploitation |
| 480 | Internet-exposed databases | critical | 10.0 | 1 | Ransomware |
| 481 | Third-party library bug in Google Chrome | critical | 10.0 | 1 | Zero-Day Exploit |
| 482 | outdated IT infrastructure | critical | 10.0 | 1 | data breach |
| 483 | Outdated encryption, weak cryptographic practices, poor key management | critical | 10.0 | 1 | Cyber Threat Warning |
| 484 | Lack of Centralized Log Management | critical | 10.0 | 1 | Data Breach |
| 485 | CVE-2025-21042 (CVSS 8.8) - Out-of-Bounds Write in libimagecodec.quram.so | critical | 10.0 | 1 | Espionage |
| 486 | Azure Automation Service Vulnerability | critical | 10.0 | 1 | Vulnerability Exploitation |
| 487 | Insecure Remote Work Tools | critical | 10.0 | 1 | Data Breach (General Discussion) |
| 488 | Unauthorized Disclosure of Sensitive Information | critical | 10.0 | 1 | Security Vulnerabilities |
| 489 | CVE-2026-29058 (CWE-78: Improper Neutralization of Special Elements) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 490 | Zero-Day Vulnerabilities (1 new CVE every 17 minutes) | critical | 10.0 | 1 | Ransomware |
| 491 | Manque de sauvegardes régulières | critical | 10.0 | 1 | Cyberattaque ciblée |
| 492 | Procedural errors by Special Agent Aaron Spivack; unsecured server in child exploitation forensic lab | critical | 10.0 | 1 | Data Breach |
| 493 | lack of formal AI-use/data privacy policies | critical | 10.0 | 1 | ransomware |
| 494 | unmanaged devices | critical | 10.0 | 1 | ransomware |
| 495 | Unauthorized access to sensitive databases, insecure data handling | critical | 10.0 | 1 | Data Breach |
| 496 | Data integrity | critical | 10.0 | 1 | Security Concerns |
| 497 | Human error (opening malicious email attachment) | critical | 10.0 | 1 | Phishing Attack |
| 498 | Server Crash | critical | 10.0 | 1 | Vulnerability Exploitation |
| 499 | Sinkclose vulnerability | critical | 10.0 | 1 | Vulnerability Exploitation |
| 500 | Maintenance errors | critical | 10.0 | 1 | Physical Incident |
| 501 | Inadequate Incident Response Plans | critical | 10.0 | 1 | Ransomware |
| 502 | Old vulnerabilities | critical | 10.0 | 1 | Spyware |
| 503 | CVE-2024-20353 (Infinite Loop DoS) | critical | 10.0 | 1 | Cyberattack |
| 504 | Inadequate Data Redaction in Spreadsheets | critical | 10.0 | 1 | Data Breach |
| 505 | improper cloud storage configuration | critical | 10.0 | 1 | ransomware |
| 506 | Claude Code Model Safeguard Bypass | critical | 10.0 | 1 | Espionage |
| 507 | Insecure webcam | critical | 10.0 | 1 | Ransomware |
| 508 | CVE-2025-20362 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 509 | custom network architectures in CERs | critical | 10.0 | 1 | supply chain attack |
| 510 | Unsupported hardware | critical | 10.0 | 1 | Cyberattack |
| 511 | CVE-2024-45347 | critical | 10.0 | 1 | Authentication Bypass Vulnerability |
| 512 | Poorly Secured ICS | critical | 10.0 | 1 | Cyberattack |
| 513 | Absence de formation des employés en cybersécurité | critical | 10.0 | 1 | Cyberattaque ciblée |
| 514 | Custom IoT malware, IOCONTROL | critical | 10.0 | 1 | Cyberattack |
| 515 | Phishing, Malicious Software Deployment | critical | 10.0 | 1 | Data Breach, Ransomware |
| 516 | PCI DSS 4.0.1 compliance gaps in client-side data protection | critical | 10.0 | 1 | Data Breach |
| 517 | Microsoft IIS | critical | 10.0 | 1 | Supply Chain Attack |
| 518 | Over-Permissive Guest/External User Access | critical | 10.0 | 1 | Social Engineering |
| 519 | CVE-2025-61882 (Critical Authentication Bypass in Oracle E-Business Suite) | critical | 10.0 | 1 | Data Breach |
| 520 | Zero-day vulnerabilities (42% weaponized before public disclosure) | critical | 10.0 | 1 | AI-driven cyber threats |
| 521 | CVE-2021-36260 (Hikvision - command injection) | critical | 10.0 | 1 | Cyber Espionage, Reconnaissance |
| 522 | Outdated software in critical sectors (hospitals, governments) | critical | 10.0 | 1 | Extortion |
| 523 | CVE-2025-23320 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 524 | Weak Authentication in Third-Party Platforms | critical | 10.0 | 1 | Data Breach |
| 525 | CVE-2025-12556 (Improper input validation in ICM Viewer’s WebSocket communication) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 526 | OAuth Application Abuse | critical | 10.0 | 1 | Data Breach |
| 527 | Insecure Default Settings | critical | 10.0 | 1 | Vulnerability Exploitation |
| 528 | Insufficient Backup Protocols | critical | 10.0 | 1 | Ransomware |
| 529 | CVE-2025-47167 (Windows KDC Proxy Service Use-After-Free) | critical | 10.0 | 1 | Patch Release |
| 530 | 23 exploits across five attack chains (iOS 13-17.2.1) | critical | 10.0 | 1 | Espionage |
| 531 | Microsoft Entra ID Enterprise Applications (mail.read, full_access_as_app scopes) | critical | 10.0 | 1 | Espionage |
| 532 | Exposed management ports, weak authentication | critical | 10.0 | 1 | Cyber Attack |
| 533 | Compromised IoT devices and routers, primarily Android TVs | critical | 10.0 | 1 | DDoS |
| 534 | systemic weaknesses in data protection | critical | 10.0 | 1 | data breach |
| 535 | PowerShell script abuse | critical | 10.0 | 1 | spear-phishing |
| 536 | Human Trust (Fake CAPTCHA Social Engineering) | critical | 10.0 | 1 | Social Engineering |
| 537 | Poor Access Controls for Sensitive Data | critical | 10.0 | 1 | Data Breach |
| 538 | Improper Handling of Sensitive Material | critical | 10.0 | 1 | Data Breach |
| 539 | Trello | critical | 10.0 | 1 | Data Leak |
| 540 | inadequate data loss prevention controls | critical | 10.0 | 1 | ransomware |
| 541 | SonicWall | critical | 10.0 | 1 | Supply Chain Attack |
| 542 | package registries | critical | 10.0 | 1 | ransomware |
| 543 | Weak governance mechanisms | critical | 10.0 | 1 | DeFi Exploit |
| 544 | External call to 'transfer' function using a fake hash | critical | 10.0 | 1 | Cryptocurrency Theft |
| 545 | Lack of Multi-Factor Authentication (2FA) for OAuth Apps | critical | 10.0 | 1 | Data Breach |
| 546 | Outdated legacy systems | critical | 10.0 | 1 | Cyberattack |
| 547 | CVE-2025-14733 (Out-of-bounds write in iked process) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 548 | Microsoft SharePoint zero-day | critical | 10.0 | 1 | ransomware |
| 549 | Weak DNS Security Extensions (DNSSEC) Implementation | critical | 10.0 | 1 | Domain Hijacking |
| 550 | CVE-2025-1727 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 551 | Inadequate identity verification processes | critical | 10.0 | 1 | Espionage |
| 552 | CVE in Tridium’s Niagara Framework (13 vulnerabilities, Nozomi Networks) | critical | 10.0 | 1 | Cybersecurity Vulnerability Exposure |
| 553 | Lack of AI Agent Safeguards | critical | 10.0 | 1 | Espionage |
| 554 | Lack of Compliance Oversight | critical | 10.0 | 1 | Data Breach |
| 555 | unsecured_API | critical | 10.0 | 1 | ransomware |
| 556 | Passive Storage Component Treatment (Missing Threat Signals) | critical | 10.0 | 1 | Data Breach (AI Models/Applications) |
| 557 | Lack of Password or Encryption | critical | 10.0 | 1 | Data Exposure |
| 558 | Inadequate security controls in femtocell management system, disabled end-to-end encryption | critical | 10.0 | 1 | Malware |
| 559 | Visual Redaction Without Data Removal | critical | 10.0 | 1 | Data Leak |
| 560 | Encrypted master key printed in plain, unencrypted digital language | critical | 10.0 | 1 | Data Breach |
| 561 | CVE-2025-69258 (LoadLibraryEX vulnerability in MsgReceiver.exe) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 562 | CVE-2025-58434 (Unauthenticated Password Reset Token Disclosure in `/api/v1/account/forgot-password`) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 563 | CVE-2025-43200 | critical | 10.0 | 1 | Spyware |
| 564 | Student cybersecurity illiteracy | critical | 10.0 | 1 | Data Breach |
| 565 | Schneider Electric safety equipment | critical | 10.0 | 1 | Cyberattack |
| 566 | Progress Software's MOVEit Transfer vulnerability | critical | 10.0 | 1 | ransomware |
| 567 | Compromised Software Development Tools | critical | 10.0 | 1 | Malware |
| 568 | Browser Sandbox Exploitation (Clipboard Access) | critical | 10.0 | 1 | Social Engineering |
| 569 | weaknesses in AIS (Automatic Identification System) authentication | critical | 10.0 | 1 | AIS spoofing |
| 570 | CVE-2025-22226 | critical | 10.0 | 1 | Ransomware |
| 571 | Over-Privileged Accounts | critical | 10.0 | 1 | Data Breach |
| 572 | enterprise software vulnerabilities | critical | 10.0 | 1 | ransomware |
| 573 | Ivanti Connect Secure | critical | 10.0 | 1 | Vulnerability Exploitation |
| 574 | unrestricted PowerShell usage | critical | 10.0 | 1 | ransomware |
| 575 | DeFi infrastructure weaknesses (historical) | critical | 10.0 | 1 | cyber theft |
| 576 | CVE-2025-49144 | critical | 10.0 | 1 | Privilege Escalation |
| 577 | Protection relays | critical | 10.0 | 1 | Cyber Sabotage |
| 578 | CVE-2019-7192 | critical | 10.0 | 1 | Cyber Intrusion |
| 579 | abuse of Velociraptor tool | critical | 10.0 | 1 | ransomware |
| 580 | CVE-2025-21042 (Samsung Android image processing library) | critical | 10.0 | 1 | spyware |
| 581 | CVE-2025-10035 (Critical, CVSS 10.0) - Deserialization in License Servlet of GoAnywhere MFT | critical | 10.0 | 1 | Vulnerability Exploitation |
| 582 | Unauthorized disclosure of SL2000 and SL3000 certificates | critical | 10.0 | 1 | Data Breach |
| 583 | Weaknesses in maritime navigation security protocols | critical | 10.0 | 1 | GPS spoofing |
| 584 | outdated business continuity plans | critical | 10.0 | 1 | ransomware |
| 585 | Misconfigured Cloud Identity and Access Management (IAM) | critical | 10.0 | 1 | Data Breach |
| 586 | Compromised OAuth token for a Heroku machine account | critical | 10.0 | 1 | Security Breach |
| 587 | Stolen credentials from 2023 Salesloft Drift breach, weak credential management, lack of MFA enforcement | critical | 10.0 | 1 | Data Breach |
| 588 | Hardware Vulnerabilities | critical | 10.0 | 1 | Hardware Vulnerability Exploitation |
| 589 | CVE-2026-0542 | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 590 | AIS protocol lack of authentication | critical | 10.0 | 1 | spoofing |
| 591 | Unmonitored Devices | critical | 10.0 | 1 | Domain Hijacking |
| 592 | lack of package verification in CI/CD pipelines | critical | 10.0 | 1 | supply chain attack |
| 593 | CVE-2025-3935 | critical | 10.0 | 1 | Cyberattack |
| 594 | CVE-2018-13379 | critical | 10.0 | 1 | Ransomware |
| 595 | User Trust in Popular Repositories | critical | 10.0 | 1 | Malware Distribution and Phishing |
| 596 | Known vulnerability in legacy IT infrastructure (unpatched) | critical | 10.0 | 1 | Ransomware, Data Breach |
| 597 | Weak or Compromised RDP Credentials | critical | 10.0 | 1 | Malware |
| 598 | Unpatched IoT/OT Systems | critical | 10.0 | 1 | EDR/XDR Evasion |
| 599 | overlooked vulnerabilities | critical | 10.0 | 1 | ransomware |
| 600 | Previously unknown software flaw (zero-day) | critical | 10.0 | 1 | Cyber Espionage |
| 601 | Insufficient Anomaly Detection | critical | 10.0 | 1 | Data Breach |
| 602 | Client-side file type restrictions without server-side validation | critical | 10.0 | 1 | Cloud Account Takeover |
| 603 | Undocumented WordPress Installation | critical | 10.0 | 1 | Data Breach |
| 604 | human error (accidental download of malware-laced system administration tool) | critical | 10.0 | 1 | ransomware |
| 605 | CVE-2024-40766 (SonicWall SSLVPN improper access control) | critical | 10.0 | 1 | ransomware |
| 606 | DLL sideloading | critical | 10.0 | 1 | Supply Chain Attack |
| 607 | CVE-2025-32713 (Windows Common Log File System Driver EoP) | critical | 10.0 | 1 | Patch Release |
| 608 | Insufficient Employee Training on Vishing | critical | 10.0 | 1 | Data Breach |
| 609 | Exposed Presence/Status Data | critical | 10.0 | 1 | Social Engineering |
| 610 | Public-facing nodes and databases with inadequate security controls | critical | 10.0 | 1 | Research Study |
| 611 | Limited Supply Chain Visibility (beyond first-tier vendors) | critical | 10.0 | 1 | Ransomware |
| 612 | Unencrypted Satellite Backhaul | critical | 10.0 | 1 | Data Interception |
| 613 | Potential Weak Authentication (if credentials were shared) | critical | 10.0 | 1 | Insider Threat |
| 614 | Vulnerability in Cleo's file transfer products | critical | 10.0 | 1 | Ransomware |
| 615 | Improper Access Controls / Platform Misconfiguration | critical | 10.0 | 1 | Data Exposure |
| 616 | User Trust in Browser Prompts (Copy-Paste Commands, Fake Error Messages) | critical | 10.0 | 1 | Browser-Based Attack |
| 617 | Vimar smart home devices | critical | 10.0 | 1 | DDoS Attack |
| 618 | CVE-2025-48057 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 619 | Customer misconfigurations (not AWS vulnerabilities) | critical | 10.0 | 1 | Cyber Espionage, Lateral Movement, Credential Harvesting |
| 620 | Weak Helpdesk Authentication | critical | 10.0 | 1 | Cyber Extortion |
| 621 | Dangling DNS records | critical | 10.0 | 1 | Subdomain Hijacking |
| 622 | Adversarial AI Tactics Against Defensive Models (ENISA 2025) | critical | 10.0 | 1 | Cyber-Physical Attack |
| 623 | Public-Key Cryptography (e.g., RSA, ECC) | critical | 10.0 | 1 | Emerging Threat |
| 624 | Improper security configurations in Windows Named Pipe implementation within the Acer Control Center Service (ACCSvc.exe) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 625 | Obsolete Traditional Detection Systems | critical | 10.0 | 1 | Ransomware |
| 626 | Lack of two-factor authentication (2FA), persistent access to Aeroflot’s infrastructure | critical | 10.0 | 1 | Supply-Chain Attack |
| 627 | Avast Anti-Rootkit driver | critical | 10.0 | 1 | Malware Campaign |
| 628 | visibility gaps | critical | 10.0 | 1 | ransomware |
| 629 | Abuse of Legitimate Tools (BITSAdmin) | critical | 10.0 | 1 | Targeted Attack |
| 630 | Manual SOC inefficiencies | critical | 10.0 | 1 | Data Breach |
| 631 | FortiOS (unspecified CVEs) | critical | 10.0 | 1 | ransomware |
| 632 | CVE-2025-37164 | critical | 10.0 | 1 | Botnet Campaign |
| 633 | Unpatched Systems (Historical) | critical | 10.0 | 1 | Data Breach |
| 634 | failures in basic cyber hygiene | critical | 10.0 | 1 | ransomware |
| 635 | CVE-2026-21902 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 636 | Weak/Reused Passwords (88% of breaches per Verizon DBIR) | critical | 10.0 | 1 | Data Breach |
| 637 | Delegated Administrative Privileges (DAP) in Microsoft cloud solutions | critical | 10.0 | 1 | cyberespionage |
| 638 | Adobe Magento e-commerce platform | critical | 10.0 | 1 | Magecart Attack |
| 639 | CVE-2026-1492 | critical | 10.0 | 1 | Privilege Escalation |
| 640 | CVE-2026-27966 | critical | 10.0 | 1 | Zero-Day Vulnerability |
| 641 | CVE-2025-29927 | critical | 10.0 | 1 | worm-driven campaign |
| 642 | CVE-2024-7014 | critical | 10.0 | 1 | Vulnerability Exploit |
| 643 | SQL Injection Vulnerability | critical | 10.0 | 1 | Data Breach |
| 644 | CVE-2025-30247 (OS Command Injection in Firmware UI) | critical | 10.0 | 1 | Vulnerability |
| 645 | API misconfiguration | critical | 10.0 | 1 | Data Breach |
| 646 | UNECE R155 Non-Compliance (Insecure Deployed Software) | critical | 10.0 | 1 | Cybersecurity Vulnerability Assessment |
| 647 | unpatched Windows SMB flaw (WannaCry) | critical | 10.0 | 1 | ransomware |
| 648 | CVE-2026-21509 (RTF parsing flaw) | critical | 10.0 | 1 | Cyber Espionage |
| 649 | CVE-2025-14894 | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 650 | Lack of Advanced DNS Monitoring | critical | 10.0 | 1 | Domain Hijacking |
| 651 | CVE-2025-2171 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 652 | React2Shell (CVE-2025-29927) | critical | 10.0 | 1 | Cloud Exploitation Campaign |
| 653 | AI system weaknesses | critical | 10.0 | 1 | ransomware |
| 654 | Zero-Day in Oracle E-Business Suite | critical | 10.0 | 1 | Data Breach |
| 655 | unpatched VPN appliances | critical | 10.0 | 1 | ransomware |
| 656 | Security holes in Verizon's systems | critical | 10.0 | 1 | Data Breach |
| 657 | Outdated Software (e.g., Iranian oil tankers) | critical | 10.0 | 1 | Ransomware |
| 658 | Potential CVE-2023-29357 (SharePoint RCE, linked to summer 2023 exploits) | critical | 10.0 | 1 | Data Breach |
| 659 | weak identity management systems | critical | 10.0 | 1 | cyberespionage |
| 660 | CVE-2026-24061 | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 661 | 20 security vulnerabilities identified by Claude LLM | critical | 10.0 | 1 | Data Breach, Cyber Espionage |
| 662 | Untrusted App Sources | critical | 10.0 | 1 | Awareness Campaign |
| 663 | Inadequate safeguards for sensitive data | critical | 10.0 | 1 | Data Breach |
| 664 | Lack of User Awareness for Non-Email Threats | critical | 10.0 | 1 | Social Engineering |
| 665 | weak account/access controls (reactivation of default accounts, new privileged users) | critical | 10.0 | 1 | ransomware |
| 666 | MOVEit Transfer zero-day (Clop gang, 2023) | critical | 10.0 | 1 | ransomware |
| 667 | Physical Infrastructure | critical | 10.0 | 1 | Sabotage |
| 668 | Cross-jurisdictional regulatory gaps | critical | 10.0 | 1 | Cyber-Physical Threat |
| 669 | Weakness in GPS navigation systems (susceptibility to spoofing) | critical | 10.0 | 1 | GPS spoofing |
| 670 | Adreno GPU Driver Vulnerabilities | critical | 10.0 | 1 | Vulnerability |
| 671 | CVE-2026-24512 (Improper handling of `rules.http.paths.path` field in Ingress resources) | critical | 10.0 | 1 | Code Execution Vulnerability |
| 672 | Kernel compromise | critical | 10.0 | 1 | Espionage |
| 673 | Unpatched software, firmware, and operating systems | critical | 10.0 | 1 | Ransomware |
| 674 | Saved Credentials in Browsers/Email Clients | critical | 10.0 | 1 | Account Compromise |
| 675 | Internet-exposed systems | critical | 10.0 | 1 | Cyber Threat Alert |
| 676 | Unknown vulnerabilities in routers and VPN appliances | critical | 10.0 | 1 | Botnet |
| 677 | open ports | critical | 10.0 | 1 | Ransomware |
| 678 | WhatsApp Artifact Exfiltration | critical | 10.0 | 1 | APT (Advanced Persistent Threat) |
| 679 | Excessive agent authority | critical | 10.0 | 1 | AI-driven breach |
| 680 | Unrestricted Access Controls | critical | 10.0 | 1 | Ransomware |
| 681 | Non-password-protected database | critical | 10.0 | 1 | Data Breach |
| 682 | Critical vulnerability in SAP NetWeaver Visual Composer development server | critical | 10.0 | 1 | Zero-day attack |
| 683 | CVE-2025-55241 (Token Validation Failure in Microsoft Entra ID / Azure AD Graph API) | critical | 10.0 | 1 | Privilege Escalation |
| 684 | Trust in fraudulent bank certificates | critical | 10.0 | 1 | Identity Fraud |
| 685 | CVE-2023-38831 | critical | 10.0 | 1 | Cyberespionage |
| 686 | Lack of Browser-Specific Security Controls | critical | 10.0 | 1 | Browser-Based Attack |
| 687 | CVE-2025-20362 (Cisco ASA/Firepower - Privilege Escalation) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 688 | Weak Caller Verification Processes | critical | 10.0 | 1 | Social Engineering |
| 689 | Outdated Operating Systems/Applications | critical | 10.0 | 1 | Malware |
| 690 | weak security in satellite communication systems | critical | 10.0 | 1 | cyberattack |
| 691 | CVE-2022-37055 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 692 | Unpatched bugs in internet-connected cameras | critical | 10.0 | 1 | Espionage |
| 693 | Flaws in Tesla’s Mothership server | critical | 10.0 | 1 | Remote Code Execution |
| 694 | Known flaws in outdated software | critical | 10.0 | 1 | Ransomware |
| 695 | overlooked software vulnerabilities | critical | 10.0 | 1 | ransomware |
| 696 | Oracle E-Business Suite vulnerability (patched post-incident) | critical | 10.0 | 1 | Ransomware |
| 697 | CVE-2025-2502 | critical | 10.0 | 1 | Outage and Vulnerability |
| 698 | CVE-2026-1492 (Privilege Management Flaw in User Registration & Membership Plugin) | critical | 10.0 | 1 | Privilege Escalation |
| 699 | CVE-2025-7742 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 700 | Lack of basic security features such as two-factor authentication | critical | 10.0 | 1 | Data Breach |
| 701 | CVE-2017-9805 (Apache Struts) | critical | 10.0 | 1 | cyberespionage |
| 702 | Default password in Unitronics programmable logic controllers (PLCs) | critical | 10.0 | 1 | Cyberattack |
| 703 | Exposed credentials through configuration API calls | critical | 10.0 | 1 | Vulnerability Exploitation |
| 704 | Exposed network devices and vulnerabilities in OT systems | critical | 10.0 | 1 | Cyberattack on Critical Infrastructure |
| 705 | Leaked credentials | critical | 10.0 | 1 | Cloud Misconfiguration Exploitation |
| 706 | CVE-2025-49154 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 707 | metadata retention in files | critical | 10.0 | 1 | data breach |
| 708 | Improper access controls in Capital One's cloud-based firewall (AWS S3 bucket misconfiguration) | critical | 10.0 | 1 | Data Breach |
| 709 | CVE-2026-0229 | critical | 10.0 | 1 | Denial-of-Service (DoS) |
| 710 | Protection insuffisante des terminaux | critical | 10.0 | 1 | Cyberattaque ciblée |
| 711 | Lack of global standards for D2D services | critical | 10.0 | 1 | Cyber-Physical Threat |
| 712 | authentication_bypass_flaw | critical | 10.0 | 1 | ransomware |
| 713 | Human Vulnerability (Social Engineering via Impersonation) | critical | 10.0 | 1 | Cyber Attack |
| 714 | Software Infrastructure Vulnerability | critical | 10.0 | 1 | Ransomware Attack |
| 715 | Shallow Depth of Baltic Sea (Ease of Anchor Damage) | critical | 10.0 | 1 | Physical Sabotage |
| 716 | Misconfigured WAF | critical | 10.0 | 1 | Data Breach |
| 717 | CVE-2022-41082 | critical | 10.0 | 1 | Ransomware |
| 718 | Design Flaw in 'SAVE' Feature | critical | 10.0 | 1 | Data Leak |
| 719 | unsecured GenAI prompts | critical | 10.0 | 1 | ransomware |
| 720 | Zero-Day in Network Appliances (e.g., VMware vCenter, ESXi) | critical | 10.0 | 1 | Espionage |
| 721 | Third-Party Supplier Weakness | critical | 10.0 | 1 | Ransomware |
| 722 | Data Sharing with Third-Party | critical | 10.0 | 1 | Data Breach |
| 723 | Programming Issue | critical | 10.0 | 1 | Data Exposure |
| 724 | GHSA-7xvx-8pf2-pv5g (CVSS 9.1) | critical | 10.0 | 1 | Sandbox Escape Vulnerability |
| 725 | Security gap in MOVEit Transfer | critical | 10.0 | 1 | Data Breach |
| 726 | Lack of Regular Penetration Testing | critical | 10.0 | 1 | Data Breach |
| 727 | insecure credential storage in CI/CD environments | critical | 10.0 | 1 | supply chain attack |
| 728 | Kerberoasting in Active Directory | critical | 10.0 | 1 | ransomware |
| 729 | Operational Security | critical | 10.0 | 1 | Operational Security Breach |
| 730 | Unspecified vulnerability in third-party call center platform (linked to Salesforce customer management instances) | critical | 10.0 | 1 | Data Breach |
| 731 | Poisoned machine-learning models | critical | 10.0 | 1 | Malware Framework |
| 732 | unpatched or misconfigured endpoints | critical | 10.0 | 1 | ransomware |
| 733 | CVE-2024-36904 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 734 | improper access controls on cloud storage (public bucket setting) | critical | 10.0 | 1 | data breach |
| 735 | Direct Internet Exposure | critical | 10.0 | 1 | Cyber-Physical Attack |
| 736 | Unauthorized remote access, ATM jackpotting, Point-of-sale data compromise | critical | 10.0 | 1 | Cyber Attack |
| 737 | Known vulnerabilities dating back to 2018 | critical | 10.0 | 1 | Espionage |
| 738 | Ivanti Policy Secure | critical | 10.0 | 1 | Vulnerability Exploitation |
| 739 | Delayed Response to Security Alerts | critical | 10.0 | 1 | Data Breach |
| 740 | Exposed Database | critical | 10.0 | 1 | Ransomware Attack |
| 741 | CVE-2022-22948 | critical | 10.0 | 1 | Advanced Persistent Threat (APT) |
| 742 | Fortinet FortiGate appliances | critical | 10.0 | 1 | AI-driven cyberattack tool |
| 743 | CVE-2025-42957 (ABAP Code Injection in SAP S/4HANA) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 744 | Invalid cast vulnerability in .NET Framework serialization processes | critical | 10.0 | 1 | Vulnerability Exploitation |
| 745 | lack of multi-factor authentication for downloads | critical | 10.0 | 1 | ransomware |
| 746 | Outdated network infrastructure | critical | 10.0 | 1 | Data Breach |
| 747 | poor segmentation of payment systems | critical | 10.0 | 1 | ransomware |
| 748 | Critical RCE flaw in Apache Tomcat | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 749 | CVE-2025-0921, CVE-2024-7587 | critical | 10.0 | 1 | Denial-of-Service (DoS) |
| 750 | Poor Spam Filtering | critical | 10.0 | 1 | Ransomware |
| 751 | Fragmented Security Posture (On-Premises vs. Cloud Visibility Gaps) | critical | 10.0 | 1 | Data Breach |
| 752 | Limited Budget/Resources | critical | 10.0 | 1 | Collaborative Initiative |
| 753 | CVE-2023-23397 | critical | 10.0 | 1 | Cyberespionage |
| 754 | Authentication key theft | critical | 10.0 | 1 | Data Breach |
| 755 | Outdated Industrial Control Systems (ICS) | critical | 10.0 | 1 | Cyber Espionage |
| 756 | Ineffective DMARC Protection | critical | 10.0 | 1 | Data Breach |
| 757 | zero-day vulnerabilities in PDF readers | critical | 10.0 | 1 | ransomware |
| 758 | CVE-2023-48788 (Fortinet EMS SQL injection) | critical | 10.0 | 1 | Ransomware |
| 759 | Lack of IT Oversight | critical | 10.0 | 1 | Unauthorized AI Deployment |
| 760 | Misconfigured cloud infrastructure | critical | 10.0 | 1 | Cloud Exploitation Campaign |
| 761 | Output Messenger | critical | 10.0 | 1 | Cyberespionage |
| 762 | Use-After-Free (UAF) | critical | 10.0 | 1 | Memory Corruption Vulnerability |
| 763 | Misconfigured MongoDB databases (lack of authentication, outdated versions) | critical | 10.0 | 1 | Ransomware |
| 764 | Influence of Radical Literature | critical | 10.0 | 1 | Domestic Terrorism |
| 765 | Improper input validation in Gogs codebase | critical | 10.0 | 1 | Zero-Day Exploitation |
| 766 | CVE-2021-33044 (Dahua - authentication bypass) | critical | 10.0 | 1 | Cyber Espionage, Reconnaissance |
| 767 | GraphQL interfaces | critical | 10.0 | 1 | Data Breach |
| 768 | Insufficient insider threat controls | critical | 10.0 | 1 | Data Breach |
| 769 | Microsoft Exchange server vulnerabilities | critical | 10.0 | 1 | Ransomware |
| 770 | Misconfigured or unmonitored edge devices | critical | 10.0 | 1 | Ransomware |
| 771 | Human Error (Credential Sharing/System Access Granted via Deception) | critical | 10.0 | 1 | Data Breach |
| 772 | Browser-Based Credential Storage (Syncing Across Devices) | critical | 10.0 | 1 | Phishing (Non-Email) |
| 773 | CVE-2025-7544 | critical | 10.0 | 1 | Botnet Campaign |
| 774 | Weak private key generation algorithm | critical | 10.0 | 1 | Cryptocurrency Theft |
| 775 | Absence of Memoranda of Agreement (MOAs) with LGUs | critical | 10.0 | 1 | Data Privacy Violation |
| 776 | No AI-Enabled Identity Threat Detection | critical | 10.0 | 1 | Identity Security Crisis |
| 777 | Human-Machine Interfaces (HMIs) | critical | 10.0 | 1 | Cyber Sabotage |
| 778 | Inadequate monitoring for suspicious activity | critical | 10.0 | 1 | Data Breach |
| 779 | Backup Restoration Failures | critical | 10.0 | 1 | Ransomware |
| 780 | Permanent URL Accessibility | critical | 10.0 | 1 | Data Leak |
| 781 | CVE-2026-2256 (Inadequate input sanitization in MS-Agent's 'Shell tool') | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 782 | Inadequate Contractual Security Provisions | critical | 10.0 | 1 | Data Breach |
| 783 | CVE-2025-25181 | critical | 10.0 | 1 | Security Breach |
| 784 | inconsistent security standards across geographies | critical | 10.0 | 1 | supply chain attack |
| 785 | CVE-2025-25012 | critical | 10.0 | 1 | Vulnerability Exploit |
| 786 | publicly exposed personal data (e.g., YouTube videos) | critical | 10.0 | 1 | cyber espionage |
| 787 | Over-reliance on single-source supply chain (China) | critical | 10.0 | 1 | Geopolitical Risk |
| 788 | gaps in patching | critical | 10.0 | 1 | Ransomware |
| 789 | Unspecified CVEs identified via Shodan/Censys scans | critical | 10.0 | 1 | Research Study |
| 790 | Weak Detection/Response Capabilities (SMEs) | critical | 10.0 | 1 | Ransomware |
| 791 | Prompt Injection (indirect) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 792 | Microsoft SharePoint Server Vulnerabilities (On-Premises) | critical | 10.0 | 1 | Data Breach |
| 793 | Poor access controls and credential management for third-party code repositories | critical | 10.0 | 1 | Data Breach |
| 794 | CVE-2026-21509 (Microsoft Office OLE flaw) | critical | 10.0 | 1 | Cyberespionage |
| 795 | Human trust exploitation | critical | 10.0 | 1 | Data Breach |
| 796 | Human Error (Support Staff Tricked via Impersonation) | critical | 10.0 | 1 | Data Breach |
| 797 | CVE-2023-4966 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 798 | third-party tokens | critical | 10.0 | 1 | ransomware |
| 799 | Weak VPN authentication | critical | 10.0 | 1 | Data Breach |
| 800 | Critical CVSS-rated vulnerabilities in legacy and new ICS devices | critical | 10.0 | 1 | Exposure of Critical Infrastructure |
| 801 | Third-party software (Famly) used by Kido nursery chain | critical | 10.0 | 1 | ransomware |
| 802 | Unsecured Infrastructure Controls | critical | 10.0 | 1 | Cyber Attack |
| 803 | CVE-2024-1182 | critical | 10.0 | 1 | Vulnerabilities in SCADA Systems |
| 804 | Lack of Real-Time Monitoring for Undersea Infrastructure | critical | 10.0 | 1 | Physical Sabotage |
| 805 | Kernel-level hooks in EDR products (28+ vendors targeted) | critical | 10.0 | 1 | Ransomware |
| 806 | Lack of Cybersecurity Protocols | critical | 10.0 | 1 | Cybercrime |
| 807 | SynologyPhotos application on BeeStation and DiskStation systems | critical | 10.0 | 1 | Zero-Click Vulnerability |
| 808 | CVE-2021-36380 | critical | 10.0 | 1 | Cyber Attack |
| 809 | Poor Credential Hygiene (GitHub Repository) | critical | 10.0 | 1 | Data Breach |
| 810 | Weaknesses and biases in AI models | critical | 10.0 | 1 | Red-Teaming Event |
| 811 | SAP Netweaver (specific details undisclosed) | critical | 10.0 | 1 | Cyberattack |
| 812 | CVE-2025-15576 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 813 | End-of-Life (EoL) Hardware with No Security Updates | critical | 10.0 | 1 | Cyber Espionage |
| 814 | third-party cybersecurity dependencies | critical | 10.0 | 1 | cyberattack |
| 815 | Volume Shadow Copy Service | critical | 10.0 | 1 | Ransomware |
| 816 | Cybersecurity Staffing Shortages | critical | 10.0 | 1 | Collaborative Initiative |
| 817 | inadequate endpoint protection (Symantec Endpoint Protection failed to fully remediate backdoor) | critical | 10.0 | 1 | ransomware |
| 818 | Microsoft products (17% of exploitations) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 819 | Inadequate cybersecurity training for non-IT staff | critical | 10.0 | 1 | Ransomware |
| 820 | Critical vulnerabilities, unpatched systems, dark web credentials | critical | 10.0 | 1 | Supply Chain Attack |
| 821 | Persistent IT/OT silos | critical | 10.0 | 1 | Cyber Espionage |
| 822 | lack of AIS authentication mechanisms | critical | 10.0 | 1 | sabotage |
| 823 | Weakness in mobile payment verification system (KT) | critical | 10.0 | 1 | Data Breach |
| 824 | Publicly exposed servers and computers | critical | 10.0 | 1 | Cyberattack |
| 825 | Absence of Multi-Factor Authentication (MFA) | critical | 10.0 | 1 | Ransomware |
| 826 | Confluence Server Zero-Day Vulnerability | critical | 10.0 | 1 | Zero-Day Exploit |
| 827 | Unlimited token allowances | critical | 10.0 | 1 | Security Breach |
| 828 | Weak Endpoint Detection | critical | 10.0 | 1 | Targeted Cyberattack |
| 829 | User Registration & Membership WordPress plugin vulnerability | critical | 10.0 | 1 | Authentication Bypass |
| 830 | User Trust in Fake App | critical | 10.0 | 1 | Malware Attack |
| 831 | DNS infrastructure | critical | 10.0 | 1 | Cyberattack |
| 832 | CVE-2023-28252 (Cisco) | critical | 10.0 | 1 | ransomware |
| 833 | CAN bus vulnerabilities in Tesla Model S | critical | 10.0 | 1 | Remote Code Execution |
| 834 | Vulnerability in data exchange platform | critical | 10.0 | 1 | Data Breach |
| 835 | insufficient user education on phishing/social engineering | critical | 10.0 | 1 | cyber espionage |
| 836 | CVE-2025-47953 (Microsoft Office Heap-Based Buffer Overflow) | critical | 10.0 | 1 | Patch Release |
| 837 | Previously unknown vulnerability in the payment processing system | critical | 10.0 | 1 | Data Breach |
| 838 | Poor OAuth Protections | critical | 10.0 | 1 | Data Breach |
| 839 | Insecure Database Configuration | critical | 10.0 | 1 | Data Exposure |
| 840 | visibility gap in EDR/SIEM logs | critical | 10.0 | 1 | ransomware |
| 841 | Weak Password Hashing (Early Breaches like LinkedIn 2012) | critical | 10.0 | 1 | Data Breach |
| 842 | Lack of Secure Boot/Trust Anchor in ASA 5500-X Series | critical | 10.0 | 1 | Zero-day exploitation |
| 843 | 20+ Vulnerabilities | critical | 10.0 | 1 | AI-Powered Cyberattack |
| 844 | Fortinet Fortigate | critical | 10.0 | 1 | Supply Chain Attack |
| 845 | lack of physical security for copper wiring | critical | 10.0 | 1 | physical security breach |
| 846 | Employee Use of Unvetted AI Tools | critical | 10.0 | 1 | Unauthorized AI Deployment |
| 847 | weak supply chain security | critical | 10.0 | 1 | data breach |
| 848 | Software flaw in Tesla's systems | critical | 10.0 | 1 | Hacking |
| 849 | Insecure Backups | critical | 10.0 | 1 | Compliance Failure |
| 850 | Exposed Boot Guard private keys | critical | 10.0 | 1 | Security Breach |
| 851 | CVE-2024-42057 | critical | 10.0 | 1 | Ransomware Attack |
| 852 | CVE-2025-44179 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 853 | weak encryption key management practices | critical | 10.0 | 1 | ransomware |
| 854 | CVE-2025-68947 (NsecSoft NSecKrnl driver) | critical | 10.0 | 1 | Ransomware |
| 855 | Fortinet security devices | critical | 10.0 | 1 | Cyberespionage |
| 856 | unmanaged systems (for data theft and ransomware deployment) | critical | 10.0 | 1 | ransomware |
| 857 | Minimal/No Authentication | critical | 10.0 | 1 | Exposure of Vulnerable Systems |
| 858 | Misconfigured Security Controls | critical | 10.0 | 1 | Malware |
| 859 | Insufficient Identity Security Policies for AI Agents | critical | 10.0 | 1 | Identity Security Crisis |
| 860 | CVE-2026-20965 | critical | 10.0 | 1 | Unauthorized Access |
| 861 | Lack of Business Continuity Plans | critical | 10.0 | 1 | Ransomware |
| 862 | Unpatched Cisco ASA device (last patched in 2024) | critical | 10.0 | 1 | Cyberwarfare |
| 863 | User Trust in App Store and Social Media Ads | critical | 10.0 | 1 | Data Breach |
| 864 | CI/CD pipeline compromise | critical | 10.0 | 1 | supply chain attack |
| 865 | Lack of Rate-Limiting | critical | 10.0 | 1 | Data Breach |
| 866 | Human error (help desk staff tricked into resetting credentials) | critical | 10.0 | 1 | Cyberattack |
| 867 | Expiration of State and Local Cybersecurity Grant Program | critical | 10.0 | 1 | Policy/Regulatory Failure |
| 868 | Over-Permissive API/OAuth Token Access | critical | 10.0 | 1 | Data Breach |
| 869 | Interception and editing of RF signals | critical | 10.0 | 1 | Vulnerability |
| 870 | MOVEit software | critical | 10.0 | 1 | Data Breach |
| 871 | React2Shell (CVE-2025-55182) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 872 | Stolen Credentials (Infostealer Malware) | critical | 10.0 | 1 | Supply Chain Attack |
| 873 | CVE-2024-7694 | critical | 10.0 | 1 | Supply Chain Attack |
| 874 | third-party ecosystem dependencies | critical | 10.0 | 1 | ransomware |
| 875 | Actively exploited CVEs | critical | 10.0 | 1 | Ransomware |
| 876 | CVE-2024-36401 (Critical RCE in GeoServer) | critical | 10.0 | 1 | Cyber Espionage |
| 877 | Improper Use of Collaboration Tools (WhatsApp, Microsoft Forms) | critical | 10.0 | 1 | Data Breach |
| 878 | insufficient physical security for network devices | critical | 10.0 | 1 | cyber-espionage |
| 879 | MOVEit file transfer software zero-day vulnerability | critical | 10.0 | 1 | Ransomware |
| 880 | Memory Injection (persistent threat mechanism) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 881 | Java Vulnerability | critical | 10.0 | 1 | Data Breach |
| 882 | Oracle software vulnerability (identified in September 2023 by NCSC) | critical | 10.0 | 1 | Data Breach, Ransomware |
| 883 | Blind SQL Vulnerability | critical | 10.0 | 1 | Data Breach |
| 884 | Cached Administrative Credentials in Workstation Memory | critical | 10.0 | 1 | Data Breach |
| 885 | limited financial resources for cybersecurity investments | critical | 10.0 | 1 | ransomware |
| 886 | Unpatched vulnerability in the email system | critical | 10.0 | 1 | Ransomware |
| 887 | Poor Access Controls (Lack of Tiered Admin Account Model) | critical | 10.0 | 1 | Data Breach |
| 888 | Outsourced IT support vendor | critical | 10.0 | 1 | Social Engineering |
| 889 | CVE-2025-69264 (CVSS 8.8) | critical | 10.0 | 1 | Supply Chain Attack |
| 890 | Legacy Authentication Methods (Password-Only Logins) | critical | 10.0 | 1 | Browser-Based Attack |
| 891 | CVE-2024-48248 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 892 | Technical know-how gap in solvent extraction | critical | 10.0 | 1 | Geopolitical Risk |
| 893 | Physical accessibility of undersea infrastructure | critical | 10.0 | 1 | Physical sabotage (cyber-physical attack) |
| 894 | Social Engineering / Phishing | critical | 10.0 | 1 | Spear Phishing |
| 895 | Citrix Netscaler ADC/Gateway vulnerabilities | critical | 10.0 | 1 | Ransomware |
| 896 | Cryptographic Protocols | critical | 10.0 | 1 | Cryptographic Risk |
| 897 | Insufficient IT resources | critical | 10.0 | 1 | Cyberattack |
| 898 | Velociraptor CVE-2025-6264 (privilege escalation to arbitrary command execution) | critical | 10.0 | 1 | Ransomware |
| 899 | Spoofable Workflow Notifications | critical | 10.0 | 1 | Social Engineering |
| 900 | Microsoft SharePoint ToolShell vulnerabilities (zero-day, patched post-exploitation) | critical | 10.0 | 1 | Ransomware |
| 901 | Lack of Zero-Trust for Non-Human Identities (AI agents) | critical | 10.0 | 1 | Predictive Analysis |
| 902 | CVE-2019-17571 (Apache Log4j 1.2 deserialization issue) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 903 | CVE-2025-10035 (Critical, CVSS 10.0) in Fortra GoAnywhere MFT | critical | 10.0 | 1 | Vulnerability Exploitation |
| 904 | over-reliance on technological defenses | critical | 10.0 | 1 | phishing |
| 905 | Unprotected Fax Server | critical | 10.0 | 1 | Data Breach |
| 906 | Abstract Threat Perception | critical | 10.0 | 1 | Data Breach |
| 907 | Undetected network vulnerability | critical | 10.0 | 1 | Data Breach |
| 908 | Kickidler employee monitoring tool | critical | 10.0 | 1 | Ransomware |
| 909 | Data encryption software vulnerability | critical | 10.0 | 1 | Data Breach |
| 910 | Human Vulnerability (Insider Threat) | critical | 10.0 | 1 | Insider Threat (Attempted) |
| 911 | Known vulnerabilities in DNN platform | critical | 10.0 | 1 | Data Breach |
| 912 | Decentralized App Ecosystem (Shadow IT, Unmanaged SaaS) | critical | 10.0 | 1 | Browser-Based Attack |
| 913 | Stale Identity Tokens | critical | 10.0 | 1 | Data Breach |
| 914 | Insufficient anti-jam technology | critical | 10.0 | 1 | GPS spoofing |
| 915 | Vulnerabilities in Synology Network-Attached Storage (NAS) devices | critical | 10.0 | 1 | Ransomware |
| 916 | CVE-2026-24423 (Missing Authentication for Critical Function - CWE-306) | critical | 10.0 | 1 | Ransomware |
| 917 | Over-permissioning | critical | 10.0 | 1 | AI-driven breach |
| 918 | Ungoverned AI Systems | critical | 10.0 | 1 | Data Breach |
| 919 | Unsecured cloud environment, lack of proper oversight | critical | 10.0 | 1 | Data Breach |
| 920 | Zero-day vulnerability (claimed by Qilin) | critical | 10.0 | 1 | Ransomware |
| 921 | Provider Edge (PE) routers | critical | 10.0 | 1 | Cyber Espionage |
| 922 | Error by a third-party contractor | critical | 10.0 | 1 | Data Breach |
| 923 | CVE-2021-35587 | critical | 10.0 | 1 | Data Breach |
| 924 | No Backup Strategy | critical | 10.0 | 1 | Ransomware |
| 925 | Software Bug in MCP Server | critical | 10.0 | 1 | Data Exposure |
| 926 | CNAME DNS record | critical | 10.0 | 1 | Data Breach |
| 927 | CVE-2024-57727 (SimpleHelp remote code execution) | critical | 10.0 | 1 | ransomware |
| 928 | legacy systems in healthcare and critical infrastructure | critical | 10.0 | 1 | ransomware |
| 929 | Undisclosed Zero-Day in Oracle E-Business Suite | critical | 10.0 | 1 | Data Breach |
| 930 | Data blind spots | critical | 10.0 | 1 | Ransomware Prediction |
| 931 | Failure to Implement Security Recommendations | critical | 10.0 | 1 | Data Breach |
| 932 | Lack of OT Asset Management | critical | 10.0 | 1 | Ransomware |
| 933 | AI-Enabled Attacks (industrial scale) | critical | 10.0 | 1 | Cyberattack |
| 934 | Missing Alerts | critical | 10.0 | 1 | Data Exposure |
| 935 | Misconfigured OAuth integrations (historical, via Salesloft's Drift) | critical | 10.0 | 1 | Extortion |
| 936 | CVE-2025-22224 | critical | 10.0 | 1 | Ransomware |
| 937 | Absence of Automated Data Loss Prevention (DLP) Tools | critical | 10.0 | 1 | Data Breach |
| 938 | lack of network segmentation (allowed lateral movement) | critical | 10.0 | 1 | ransomware |
| 939 | Over-Reliance on Email-Based Security Controls | critical | 10.0 | 1 | Social Engineering |
| 940 | Remote Control Software Vulnerability | critical | 10.0 | 1 | Phishing Attack |
| 941 | Log4j (CVE-2021-44228) | critical | 10.0 | 1 | ransomware |
| 942 | Human Vulnerability (Phishing/Social Engineering Susceptibility) | critical | 10.0 | 1 | Account Compromise |
| 943 | Unauthorized data transfer to private cloud storage | critical | 10.0 | 1 | Data Breach |
| 944 | Lack of Cybersecurity Preparedness | critical | 10.0 | 1 | Ransomware Attack |
| 945 | Diversité des systèmes OT rendant difficile une protection standardisée | critical | 10.0 | 1 | Cyberattaque ciblée |
| 946 | Lack of proper security policies post-migration due to human error (single employee responsible for manual compilation without second-layer checks) | critical | 10.0 | 1 | data breach |
| 947 | Legacy Firewall Deployments (single point of failure for ecosystems) | critical | 10.0 | 1 | Predictive Analysis |
| 948 | CVE-2026-27685 (Insecure deserialization in SAP NetWeaver Enterprise Portal Administration) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 949 | Systemic weaknesses in U.S. federal cybersecurity posture | critical | 10.0 | 1 | Cyber Espionage |
| 950 | Weak Enforcement of ISO SAE 21434 (Pre-Release Security) | critical | 10.0 | 1 | Cybersecurity Vulnerability Assessment |
| 951 | subdomain vulnerabilities | critical | 10.0 | 1 | data breach |
| 952 | Data Sharing with Third-Party AI Services | critical | 10.0 | 1 | Unauthorized AI Deployment |
| 953 | VMware virtual machines | critical | 10.0 | 1 | Cyberespionage |
| 954 | Weak Supplier Security Controls | critical | 10.0 | 1 | Ransomware |
| 955 | EternalBlue | critical | 10.0 | 1 | Ransomware |
| 956 | Accellion File Transfer Appliance (FTA) vulnerabilities | critical | 10.0 | 1 | Data Breach |
| 957 | Insufficient Access Controls (Assumed) | critical | 10.0 | 1 | Ransomware |
| 958 | CVE-2024-20359 (Privilege Escalation: Admin → Root) | critical | 10.0 | 1 | Cyberattack |
| 959 | zero-day vulnerabilities in SaaS provider cloud environments | critical | 10.0 | 1 | cyberespionage |
| 960 | Broad systemic vulnerabilities including reliance on foreign manufacturing for supply chains, dependency on cyber-vulnerable space systems (GPS, satellite communications), and weaknesses in infrastructure resilience against climate events. | critical | 10.0 | 1 | Ransomware Attack |
| 961 | understaffed municipal services | critical | 10.0 | 1 | physical security breach |
| 962 | Legitimate Cybersecurity Testing Impersonation | critical | 10.0 | 1 | Espionage |
| 963 | Third-party Salesforce CRM integration | critical | 10.0 | 1 | Data Breach |
| 964 | AI System Autonomy (unsupervised decision-making) | critical | 10.0 | 1 | Predictive Analysis |
| 965 | misuse of scientific research cover | critical | 10.0 | 1 | espionage |
| 966 | CVE-2026-2329 (Stack-based buffer overflow in /cgi-bin/api.values.Get endpoint) | critical | 10.0 | 1 | Zero-Day Vulnerability |
| 967 | IoT Device Vulnerabilities | critical | 10.0 | 1 | Cybercrime |
| 968 | Budget Constraints | critical | 10.0 | 1 | Operational Risk |
| 969 | inadequate monitoring of employee activity | critical | 10.0 | 1 | data breach |
| 970 | Inadequate backup testing policy | critical | 10.0 | 1 | Policy Deficiency |
| 971 | Lack of multi-factor authentication, Lack of encryption | critical | 10.0 | 1 | Data Breach, Ransomware |
| 972 | Slow Detection Capabilities | critical | 10.0 | 1 | Data Breach |
| 973 | Misconfigured Elasticsearch Cluster | critical | 10.0 | 1 | Data Breach |
| 974 | Social Engineering (Disguised as Legitimate npm Package) | critical | 10.0 | 1 | Malware Campaign |
| 975 | Off-by-one error in encryption process | critical | 10.0 | 1 | Ransomware |
| 976 | Spear-phishing campaigns | critical | 10.0 | 1 | Data Breach |
| 977 | Known vulnerability in data storage systems | critical | 10.0 | 1 | Ransomware Attack |
| 978 | CVE-2025-20393 | critical | 10.0 | 1 | Cyberattack |
| 979 | Publicly exposed Ollama AI servers without authentication or monitoring | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 980 | insufficient cloud-native security controls | critical | 10.0 | 1 | ransomware |
| 981 | critical and zero-day vulnerabilities in internet-facing network equipment | critical | 10.0 | 1 | ransomware |
| 982 | CVE-2020-3580 (Cisco) | critical | 10.0 | 1 | ransomware |
| 983 | lack of real-time cross-verification of vessel identities | critical | 10.0 | 1 | AIS spoofing |
| 984 | Non-public information disclosure | critical | 10.0 | 1 | Bribery and Fraud |
| 985 | CVE-2025-3052 | critical | 10.0 | 1 | Secure Boot Bypass |
| 986 | lack of system isolation capabilities | critical | 10.0 | 1 | cyberattack |
| 987 | Lack of contractual compliance and oversight, unauthorized offshore access | critical | 10.0 | 1 | Data Breach |
| 988 | Videoconference Invitation | critical | 10.0 | 1 | Data Breach |
| 989 | CVE-2023-6895 (Hikvision - OS command injection) | critical | 10.0 | 1 | Cyber Espionage, Reconnaissance |
| 990 | OAuth vulnerability | critical | 10.0 | 1 | Exploit |
| 991 | Trust in Professional Networking Platforms | critical | 10.0 | 1 | Phishing (Non-Email) |
| 992 | CVE-2026-0755 (ZDI-26-021, ZDI-CAN-27783) | critical | 10.0 | 1 | Zero-Day Vulnerability |
| 993 | Malicious code injection | critical | 10.0 | 1 | Data Breach |
| 994 | known vulnerabilities | critical | 10.0 | 1 | ransomware |
| 995 | Unpatched Self-Managed GitLab Community Edition | critical | 10.0 | 1 | Data Breach |
| 996 | human error (social engineering via phishing) | critical | 10.0 | 1 | cyberespionage |
| 997 | Lack of Access Controls During Layoffs | critical | 10.0 | 1 | Data Breach |
| 998 | Sandbox escape | critical | 10.0 | 1 | Espionage |
| 999 | LOLDrivers (Living Off The Land Drivers) - 'truesight.sys' from RogueKiller AntiRootkit | critical | 10.0 | 1 | ransomware |
| 1000 | Funding constraints | critical | 10.0 | 1 | Data Breach |
| 1001 | missing security patches | critical | 10.0 | 1 | data breach |
| 1002 | Default/Weak Admin Credentials | critical | 10.0 | 1 | Data Breach |
| 1003 | CVE-2018-0171 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1004 | Unvetted Browser Extensions (Cyberhaven Hack, 35+ Extensions in 2024) | critical | 10.0 | 1 | Browser-Based Attack |
| 1005 | misconfigured AWS S3 bucket permissions | critical | 10.0 | 1 | ransomware |
| 1006 | Arbitrary Code Execution | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1007 | Stack Buffer Overflow | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1008 | Phone data hijacking via malicious vCard | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1009 | Stolen secret code for cookie generation | critical | 10.0 | 1 | Data Breach |
| 1010 | CVE-2025-5777 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1011 | Unencrypted and unprotected data accessible on the network | critical | 10.0 | 1 | Data Breach, Ransomware |
| 1012 | Delayed access revocation for terminated employees | critical | 10.0 | 1 | Data Breach, Unauthorized Access, Data Deletion |
| 1013 | Remote Terminal Units (RTUs) | critical | 10.0 | 1 | Cyber Sabotage |
| 1014 | Inadequate Access Controls for PowerSource Portal | critical | 10.0 | 1 | Data Breach |
| 1015 | CVE-2025-52562 | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 1016 | Oracle E-Business Suite vulnerability | critical | 10.0 | 1 | Ransomware |
| 1017 | Unmonitored ESXCLI Command Usage | critical | 10.0 | 1 | Ransomware Prevention Guide |
| 1018 | 200+ vulnerabilities in CISA’s KEV catalog (2024–2025) | critical | 10.0 | 1 | ransomware |
| 1019 | Potential vulnerability in Citrix NetScaler | critical | 10.0 | 1 | Cyberattack |
| 1020 | Human Trust in Browser Update Prompts | critical | 10.0 | 1 | Malware Infection |
| 1021 | Remote desktop gateway vulnerability | critical | 10.0 | 1 | Ransomware |
| 1022 | VMware ESXi infrastructure (Linux ransomware) | critical | 10.0 | 1 | ransomware |
| 1023 | Unintentional Misconfiguration | critical | 10.0 | 1 | Data Exposure |
| 1024 | Cloud Misconfigurations (23% of cloud incidents) | critical | 10.0 | 1 | Ransomware |
| 1025 | Insecure External Storage Device | critical | 10.0 | 1 | Data Breach |
| 1026 | SHA-1 | critical | 10.0 | 1 | Data Breach |
| 1027 | Human vulnerability (tricking employees into divulging credentials) | critical | 10.0 | 1 | Data Breach / Ransomware Attack |
| 1028 | Windows minifilter drivers | critical | 10.0 | 1 | Ransomware |
| 1029 | Exposure management adoption | critical | 10.0 | 1 | Ransomware Prediction |
| 1030 | Complacency in High-Turnover Workforces | critical | 10.0 | 1 | Data Breach |
| 1031 | Unpatched VPN Devices | critical | 10.0 | 1 | Supply Chain Attack |
| 1032 | CVE-2026-25108 | critical | 10.0 | 1 | OS Command Injection |
| 1033 | CVE-2025-68613 | critical | 10.0 | 1 | Botnet Campaign |
| 1034 | CVE-2025-1449 | critical | 10.0 | 1 | Vulnerability Exploit |
| 1035 | Known vulnerability in IT infrastructure | critical | 10.0 | 1 | Data Breach |
| 1036 | Unknown vulnerability in the company's network | critical | 10.0 | 1 | Data Breach |
| 1037 | Shared Accounts | critical | 10.0 | 1 | Data Breach |
| 1038 | Insufficient Contractual Safeguards | critical | 10.0 | 1 | Third-Party Breach |
| 1039 | CVE-2025-20333 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1040 | CVE-2026-20127 (CVSS 10.0) | critical | 10.0 | 1 | Zero-Day Exploitation |
| 1041 | Previously unidentified vulnerability | critical | 10.0 | 1 | Ransomware Attack |
| 1042 | Time-Triggered Ethernet (TTEthernet) vulnerabilities | critical | 10.0 | 1 | Time Synchronization Attack |
| 1043 | Loose Sharing Permissions | critical | 10.0 | 1 | Data Breach Risk |
| 1044 | Oracle zero-day vulnerability | critical | 10.0 | 1 | Ransomware |
| 1045 | Alta Payment Portal | critical | 10.0 | 1 | Data Breach |
| 1046 | Insufficient Real-Time Threat Intelligence | critical | 10.0 | 1 | Domain Hijacking |
| 1047 | Neterbit routers | critical | 10.0 | 1 | DDoS Attack |
| 1048 | GPS signal manipulation | critical | 10.0 | 1 | cyber deception |
| 1049 | CVE-2026-25177 | critical | 10.0 | 1 | Privilege Escalation |
| 1050 | Lack of adequate security measures for USIM data (SK Telecom) | critical | 10.0 | 1 | Data Breach |
| 1051 | Unsecured Network Servers | critical | 10.0 | 1 | Cybersecurity Incident |
| 1052 | Legacy Authentication Protocols (e.g., SAMLjacking) | critical | 10.0 | 1 | Phishing (Non-Email) |
| 1053 | CVE-2025-2857 | critical | 10.0 | 1 | Zero-day Vulnerability |
| 1054 | CVE-2026-27689 (DoS in SAP Supply Chain Management) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 1055 | CVE-2026-21643 | critical | 10.0 | 1 | SQL Injection |
| 1056 | Lack of Standardized Controls | critical | 10.0 | 1 | Collaborative Initiative |
| 1057 | CVE-2023-3519 (Citrix NetScaler) | critical | 10.0 | 1 | cyberespionage |
| 1058 | publicly available data misrepresented as 'secret' (hallucination exploit) | critical | 10.0 | 1 | cyberespionage |
| 1059 | Unsecured Elasticsearch Server | critical | 10.0 | 1 | Data Breach |
| 1060 | Unpatched Systems (Software/Hardware) | critical | 10.0 | 1 | Data Breach |
| 1061 | Over-reliance on server-side WAFs/IDS for client-side threats | critical | 10.0 | 1 | Data Breach |
| 1062 | Insufficient Workforce Training (phishing/social engineering) | critical | 10.0 | 1 | Ransomware |
| 1063 | Memory Leak | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1064 | lack of MFA on critical systems | critical | 10.0 | 1 | ransomware |
| 1065 | Third-Party Supply Chain Weaknesses | critical | 10.0 | 1 | Data Breach |
| 1066 | CitrixBleed2 (CVE not explicitly mentioned but inferred as Citrix NetScaler vulnerability) | critical | 10.0 | 1 | data breach |
| 1067 | MOVEit file-transfer software zero-day vulnerability | critical | 10.0 | 1 | Data Breach |
| 1068 | Human Weakness | critical | 10.0 | 1 | Data Breach |
| 1069 | human vulnerabilities (vishing, native-language social engineering) | critical | 10.0 | 1 | ransomware |
| 1070 | CVE-2026-25108 (OS command injection) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1071 | Insecure RDP configurations | critical | 10.0 | 1 | Ransomware |
| 1072 | File transfer software vulnerability | critical | 10.0 | 1 | Data Breach |
| 1073 | CVE-2024-13804 | critical | 10.0 | 1 | Vulnerability Exploit |
| 1074 | Static Authentication Methods (vulnerable to deepfakes) | critical | 10.0 | 1 | Predictive Analysis |
| 1075 | CVE-2024-37085 (Cisco) | critical | 10.0 | 1 | ransomware |
| 1076 | Website Software | critical | 10.0 | 1 | Data Breach |
| 1077 | CVE-2015-2291 | critical | 10.0 | 1 | Cyberattack |
| 1078 | CVE-2025-34158 (Improper Input Validation) | critical | 10.0 | 1 | Vulnerability Exposure |
| 1079 | SonicWall SSLVPN (Weak MFA/Access Controls) | critical | 10.0 | 1 | Ransomware |
| 1080 | Weaknesses in SolarWinds' Orion platform | critical | 10.0 | 1 | Supply Chain Attack |
| 1081 | unpatched Veeam backup servers | critical | 10.0 | 1 | ransomware |
| 1082 | lack of continuous verification | critical | 10.0 | 1 | phishing |
| 1083 | Misconfiguration of the project’s main smart contract | critical | 10.0 | 1 | Cryptocurrency Heist |
| 1084 | Unidentified network vulnerability | critical | 10.0 | 1 | Ransomware Attack |
| 1085 | Delayed Patch Management | critical | 10.0 | 1 | Data Breach |
| 1086 | Unpatched Software (50% of CVEs in last 5 years) | critical | 10.0 | 1 | Ransomware |
| 1087 | Human Error (Phishing Susceptibility) & Weak Remote Access Controls | critical | 10.0 | 1 | Data Breach (Phishing & Unauthorized Access) |
| 1088 | NVIDIA NeMo Framework Vulnerabilities | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1089 | hijacked_maintainer_account | critical | 10.0 | 1 | ransomware |
| 1090 | Unsecured MSSQL Database | critical | 10.0 | 1 | Data Breach |
| 1091 | Weak Password in Remote-Control System | critical | 10.0 | 1 | Cyberattack |
| 1092 | weak/recycled passwords | critical | 10.0 | 1 | general cybersecurity awareness |
| 1093 | PROMISQROUTE (Prompt-based Router Open-Mode Manipulation Induced via SSRF-like Queries, Reconfiguring Operations Using Trust Evasion) | critical | 10.0 | 1 | AI System Vulnerability |
| 1094 | Authentication keys | critical | 10.0 | 1 | Cyberattack |
| 1095 | Unsecured Database Accessible Without Authentication | critical | 10.0 | 1 | Data Breach |
| 1096 | Web application stack | critical | 10.0 | 1 | Data Breach |
| 1097 | Outdated Android versions | critical | 10.0 | 1 | Malware |
| 1098 | Compromised digital certificate, trusted update infrastructure | critical | 10.0 | 1 | Supply Chain Attack |
| 1099 | Compromised Passwords | critical | 10.0 | 1 | Data Breach |
| 1100 | weak intranet security | critical | 10.0 | 1 | data breach |
| 1101 | Poorly configured firewalls | critical | 10.0 | 1 | Ransomware |
| 1102 | remote access security | critical | 10.0 | 1 | Ransomware |
| 1103 | Improper handling of configuration objects in the `mergeConfig` function (CVE-2026-25639) | critical | 10.0 | 1 | Denial-of-Service (DoS) |
| 1104 | Orion Software Vulnerability | critical | 10.0 | 1 | Software Exploitation |
| 1105 | CVE-2025-49157 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1106 | CVE-2024-37079 (CWE-787 - Out-of-bounds Write) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 1107 | CVE-2025-10035 (GoAnywhere MFT, CVSS 10.0) | critical | 10.0 | 1 | data breach |
| 1108 | CVE-2026-21858 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1109 | Unpatched Domain Controllers (Privilege Escalation Flaw, April 2025) | critical | 10.0 | 1 | Data Breach |
| 1110 | Poor Data Management | critical | 10.0 | 1 | Data Breach |
| 1111 | CVE-2021-36942 (PetitPotam - Windows LSA Spoofing) | critical | 10.0 | 1 | Cyber Espionage |
| 1112 | weak_or_reused_passwords | critical | 10.0 | 1 | ransomware |
| 1113 | abuse of elevated privileges post-compromise (e.g., Trend Vision One uninstaller) | critical | 10.0 | 1 | ransomware |
| 1114 | Improper Access Controls (Shared Credentials) | critical | 10.0 | 1 | Cybersecurity Vulnerability Exposure |
| 1115 | Unsecured communication channels (WhatsApp) | critical | 10.0 | 1 | Data Breach |
| 1116 | Reused Apple ID logins | critical | 10.0 | 1 | Data Breach, Phishing |
| 1117 | CVE-2025-8875 (Insecure Deserialization Leading to Command Execution) | critical | 10.0 | 1 | Vulnerability Exposure |
| 1118 | lack of physical safeguards | critical | 10.0 | 1 | infrastructure vulnerability |
| 1119 | Poor IoT device oversight/management | critical | 10.0 | 1 | Ransomware |
| 1120 | Outdated remote access policies | critical | 10.0 | 1 | Ransomware |
| 1121 | Log4Shell vulnerability in an unpatched VMware Horizon server | critical | 10.0 | 1 | Hacking |
| 1122 | weak supply chain links | critical | 10.0 | 1 | ransomware |
| 1123 | PackageGate Vulnerabilities | critical | 10.0 | 1 | Supply Chain Attack |
| 1124 | Unknown vulnerability in Microsoft SharePoint servers | critical | 10.0 | 1 | Cyber Espionage |
| 1125 | CVE-2026-1731 (OS command injection, CWE-78) | critical | 10.0 | 1 | Zero-Day Vulnerability |
| 1126 | CVE-2025-27507 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1127 | Absence of Multifactor Authentication | critical | 10.0 | 1 | Ransomware |
| 1128 | Poor IAM practices | critical | 10.0 | 1 | Ransomware |
| 1129 | Lack of IP Restrictions on Tokens | critical | 10.0 | 1 | Supply Chain Attack |
| 1130 | SQL Injection in Main Application | critical | 10.0 | 1 | Data Breach |
| 1131 | Lack of identity controls | critical | 10.0 | 1 | AI-driven breach |
| 1132 | GPS reliance | critical | 10.0 | 1 | GPS spoofing (disputed) |
| 1133 | Check Point gateway devices | critical | 10.0 | 1 | Supply Chain Attack |
| 1134 | Unmonitored third-party script dependencies | critical | 10.0 | 1 | Data Breach |
| 1135 | Employee downloaded malware from untrusted source | critical | 10.0 | 1 | Ransomware Attack |
| 1136 | Understaffed security operations | critical | 10.0 | 1 | Data Breach |
| 1137 | CVE-2024-21887 | critical | 10.0 | 1 | Ransomware |
| 1138 | SaaS supply chain blind spots | critical | 10.0 | 1 | Ransomware |
| 1139 | Zero-day vulnerability in Oracle E-Business Suite (EBS) financial application | critical | 10.0 | 1 | Data Breach |
| 1140 | Dependence on GPS/GNSS signals for navigation; lack of spoofing-resistant safeguards | critical | 10.0 | 1 | GNSS spoofing |
| 1141 | Human Trust in Help-Desk Processes | critical | 10.0 | 1 | Cyberattack |
| 1142 | weak insider threat detection | critical | 10.0 | 1 | data breach |
| 1143 | Unlocked AWS S3 bucket | critical | 10.0 | 1 | Data Breach |
| 1144 | Weak vendor credentials | critical | 10.0 | 1 | Data Breach |
| 1145 | Improper Public Access Configuration | critical | 10.0 | 1 | Data Exposure |
| 1146 | CVE-2025-23334 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1147 | Legacy Protocols (NTLM Enabled for Backward Compatibility) | critical | 10.0 | 1 | Data Breach |
| 1148 | Network | critical | 10.0 | 1 | Data Breach |
| 1149 | Long-standing vulnerabilities in SonicWall firewall systems, unmanaged exceptions, temporary rules, unprotected backups, administrative credentials | critical | 10.0 | 1 | Ransomware, Data Breach |
| 1150 | Lack of monitoring for east-west traffic in cloud environments | critical | 10.0 | 1 | Ransomware |
| 1151 | Lack of Visibility into Privileged Account Usage | critical | 10.0 | 1 | Data Breach |
| 1152 | Dependence on unencrypted GPS signals for navigation and communication | critical | 10.0 | 1 | GPS jamming |
| 1153 | Unsecured Kibana Dashboard | critical | 10.0 | 1 | Data Leak |
| 1154 | Insufficient Physical Security for Fiber-Optic Cables | critical | 10.0 | 1 | Cyber Espionage |
| 1155 | Log4Shell (CVE-2021-44228) | critical | 10.0 | 1 | Ransomware Attack |
| 1156 | Public Internet Exposure | critical | 10.0 | 1 | Exposure of Vulnerable Systems |
| 1157 | Default passwords, Outdated software, Lack of manual updates | critical | 10.0 | 1 | Data Breach, Voyeurism, Illegal Content Distribution |
| 1158 | Unpatched Third-Party Integrations (Salesloft Drift) | critical | 10.0 | 1 | Data Breach |
| 1159 | CWE-22: Path Traversal in Docker build context configuration (smithery.yaml) | critical | 10.0 | 1 | Supply Chain Attack |
| 1160 | CVE-2020-12641 | critical | 10.0 | 1 | Cyberespionage |
| 1161 | third-party services and integrations | critical | 10.0 | 1 | ransomware |
| 1162 | AI supply chain threats (e.g., LangFlow RCE) | critical | 10.0 | 1 | Malware Framework |
| 1163 | Driver Vulnerability (eskle.sys for Anti-AV Bypass) | critical | 10.0 | 1 | Social Engineering |
| 1164 | Unauthorized Cloud Storage | critical | 10.0 | 1 | Data Breach (Alleged) |
| 1165 | Weak password policy (single compromised password) | critical | 10.0 | 1 | Ransomware |
| 1166 | Legacy Infrastructure Weaknesses | critical | 10.0 | 1 | Data Breach |
| 1167 | high_risk_assessment_ignored | critical | 10.0 | 1 | data_at_risk |
| 1168 | Poor Vendor/Third-Party Risk Management | critical | 10.0 | 1 | Ransomware |
| 1169 | Poorly Secured OT Systems (e.g., MV Dali electrical blackout) | critical | 10.0 | 1 | Ransomware |
| 1170 | OAuth Token Misuse | critical | 10.0 | 1 | Supply Chain Attack |
| 1171 | Incorrect configuration | critical | 10.0 | 1 | Data Breach |
| 1172 | Progress Software MOVEit Transfer SQL Injection Vulnerability (CVE-2023-34362) | critical | 10.0 | 1 | Data Breach |
| 1173 | AI Model Jailbreak (Disguised Malicious Tasks as Benign) | critical | 10.0 | 1 | Espionage |
| 1174 | Unsecured IoT/Peripheral Devices | critical | 10.0 | 1 | Ransomware |
| 1175 | Improper input sanitization in telnetd authentication mechanism (CWE-20) | critical | 10.0 | 1 | Authentication Bypass |
| 1176 | Incorrect access permissions and configuration settings | critical | 10.0 | 1 | Data Breach |
| 1177 | AI voice cloning limitations | critical | 10.0 | 1 | social engineering |
| 1178 | AnyDesk Remote Access Application | critical | 10.0 | 1 | Data Exfiltration |
| 1179 | Aging hardware | critical | 10.0 | 1 | Hardware Malfunction |
| 1180 | CVE-2025-20333 (Cisco ASA VPN) | critical | 10.0 | 1 | Ransomware |
| 1181 | Publicly accessible management interfaces | critical | 10.0 | 1 | Cloud Exploitation Campaign |
| 1182 | Missing Function-Level Access Control (CWE-639) | critical | 10.0 | 1 | Unauthorized Access |
| 1183 | REST API endpoints | critical | 10.0 | 1 | Data Breach |
| 1184 | CVE-2024-50603 | critical | 10.0 | 1 | Cryptojacking and Backdoor Exploitation |
| 1185 | Lack of real-time detection for initial intrusion (May 14 to August 24) | critical | 10.0 | 1 | Ransomware Attack |
| 1186 | Lack of validation check in ReceiverAxelar contract | critical | 10.0 | 1 | Smart Contract Exploit |
| 1187 | Unpatched Web Applications | critical | 10.0 | 1 | AI-Powered Cyberattack |
| 1188 | Unpatched APIs | critical | 10.0 | 1 | Cyberattack Surge |
| 1189 | Insecure systems | critical | 10.0 | 1 | Ransomware Attack |
| 1190 | Windows Defender Disabling | critical | 10.0 | 1 | Ransomware |
| 1191 | Lack of Monitoring for Renamed Binaries | critical | 10.0 | 1 | APT (Advanced Persistent Threat) |
| 1192 | no password protection on critical servers | critical | 10.0 | 1 | data breach |
| 1193 | compromised laptop (physical or logical access) | critical | 10.0 | 1 | data breach |
| 1194 | CVE-2025-10035 (Critical vulnerability in Fortra's GoAnywhere MFT) | critical | 10.0 | 1 | Ransomware |
| 1195 | Weak Subcontractor Security Postures | critical | 10.0 | 1 | Supply Chain Attack |
| 1196 | Lack of Syslog Forwarding to External Systems | critical | 10.0 | 1 | Ransomware Prevention Guide |
| 1197 | Command Execution as Root | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1198 | Open academic networks | critical | 10.0 | 1 | Data Breach |
| 1199 | Over-Reliance on Reactive Detection (EDR/XDR) | critical | 10.0 | 1 | EDR/XDR Evasion |
| 1200 | Publicly Indexed 'Recent Links' Pages | critical | 10.0 | 1 | Data Leak |
| 1201 | Flaw in smart contract calls | critical | 10.0 | 1 | DeFi Exploit |
| 1202 | Veeam Backup & Replication (VBR) servers | critical | 10.0 | 1 | Ransomware |
| 1203 | Lateral Movement from Contractor to MoD Systems | critical | 10.0 | 1 | Data Breach |
| 1204 | public cloud | critical | 10.0 | 1 | ransomware |
| 1205 | Google Play Store Security | critical | 10.0 | 1 | Malware |
| 1206 | unauthorized remote access | critical | 10.0 | 1 | cyber-physical attack |
| 1207 | CVE-2025-20281 | critical | 10.0 | 1 | Remote Code Execution |
| 1208 | Website Security | critical | 10.0 | 1 | Data Breach |
| 1209 | CVE-2024-8300 | critical | 10.0 | 1 | Vulnerabilities in SCADA Systems |
| 1210 | Windows kernel vulnerabilities | critical | 10.0 | 1 | Data Exfiltration, Ransomware, Extortion |
| 1211 | CVE-2025-47577 | critical | 10.0 | 1 | Software Vulnerability |
| 1212 | supply-chain weakness | critical | 10.0 | 1 | data breach |
| 1213 | Unsecured ElasticSearch Database | critical | 10.0 | 1 | Data Exposure |
| 1214 | Faulty access control mechanisms in Balancer's DeFi protocol | critical | 10.0 | 1 | Cryptocurrency Theft |
| 1215 | CVE-2025-53690 (ViewState Deserialization in Sitecore XM/XP/XC/Managed Cloud) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1216 | Dormant Service Accounts | critical | 10.0 | 1 | Data Breach |
| 1217 | Insecure ICS Protocols (Plaintext Traffic) | critical | 10.0 | 1 | Exposure of Vulnerable Systems |
| 1218 | supply chain trust abuse | critical | 10.0 | 1 | supply chain attack |
| 1219 | Malicious macros in a document titled 'Act.doc' | critical | 10.0 | 1 | Cyberattack |
| 1220 | TerraMaster NAS Vulnerability | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1221 | Lack of Network Segmentation in Targeted Systems | critical | 10.0 | 1 | Distributed Denial of Service (DDoS) |
| 1222 | CVE-2026-24135 | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 1223 | Software Issue | critical | 10.0 | 1 | Data Breach |
| 1224 | CVE-2025-33064 (Windows SMB Improper Access Control) | critical | 10.0 | 1 | Patch Release |
| 1225 | Weak data protections | critical | 10.0 | 1 | Data Breach |
| 1226 | inadequate security of payment systems | critical | 10.0 | 1 | data breach |
| 1227 | Supply-chain vulnerabilities | critical | 10.0 | 1 | Ransomware |
| 1228 | Vulnerability in Ivanti's security products | critical | 10.0 | 1 | Malware |
| 1229 | CVE-2022-29499 | critical | 10.0 | 1 | Ransomware |
| 1230 | CVE-2025-27920 (directory traversal in Output Messenger) | critical | 10.0 | 1 | cyberespionage |
| 1231 | Salesforce OAuth Misconfiguration (via Vishing) | critical | 10.0 | 1 | Data Breach |
| 1232 | SQL injection vulnerability in Navy-SWM database | critical | 10.0 | 1 | data breach |
| 1233 | Unpatched vulnerability in appointment system software | critical | 10.0 | 1 | Data Breach |
| 1234 | token-based publishing model | critical | 10.0 | 1 | supply chain attack |
| 1235 | ProxyLogon (Microsoft Exchange) | critical | 10.0 | 1 | cyberespionage |
| 1236 | weak Wi-Fi security | critical | 10.0 | 1 | cyber-espionage |
| 1237 | CVE-2024-56336 | critical | 10.0 | 1 | Vulnerability |
| 1238 | Lateral Movement via Salesforce OAuth | critical | 10.0 | 1 | Supply Chain Attack |
| 1239 | insufficient encryption | critical | 10.0 | 1 | data breach |
| 1240 | LLM Susceptibility to Prompt Injection | critical | 10.0 | 1 | Prompt Injection |
| 1241 | Lack of BCC usage in group emails | critical | 10.0 | 1 | Data Breach |
| 1242 | publicly available personal data (e.g., photos, job titles) | critical | 10.0 | 1 | social engineering |
| 1243 | Insecure Protocols (e.g., Telnet) | critical | 10.0 | 1 | Cyber Espionage |
| 1244 | Insecure data storage and handling | critical | 10.0 | 1 | Data Breach |
| 1245 | Known vulnerability in cloud storage services | critical | 10.0 | 1 | Data Breach |
| 1246 | CVE-2019-5786 (Google Chrome FileReader) | critical | 10.0 | 1 | Memory Corruption Vulnerability |
| 1247 | Unspecified SQL Server Vulnerabilities | critical | 10.0 | 1 | Cyber Espionage |
| 1248 | Unsegmented Networks | critical | 10.0 | 1 | Data Breach |
| 1249 | Unsecured Data Storage | critical | 10.0 | 1 | Data Breach |
| 1250 | CVE-2023-20269 (Cisco) | critical | 10.0 | 1 | ransomware |
| 1251 | Unmaintained Software (e.g., FreeImage in Audi Vehicles) | critical | 10.0 | 1 | Cybersecurity Vulnerability Assessment |
| 1252 | Microsoft Office Vulnerabilities | critical | 10.0 | 1 | Cyber Espionage |
| 1253 | Weak Authentication (68% of breaches involve credentials) | critical | 10.0 | 1 | Ransomware |
| 1254 | Lack of anti-jamming protection for GPS systems | critical | 10.0 | 1 | GPS jamming |
| 1255 | Gaps in Endpoint Detection and Response (EDR) | critical | 10.0 | 1 | Domain Hijacking |
| 1256 | CVE-2025-69263 (CVSS 7.5) | critical | 10.0 | 1 | Supply Chain Attack |
| 1257 | Lack of domestic rare earth processing capacity | critical | 10.0 | 1 | Geopolitical Risk |
| 1258 | Third-Party Integration Vulnerabilities (Salesforce-connected apps) | critical | 10.0 | 1 | Data Breach |
| 1259 | Legacy network | critical | 10.0 | 1 | Data Breach |
| 1260 | CVE-2025-6000 | critical | 10.0 | 1 | Vulnerability |
| 1261 | budget reductions | critical | 10.0 | 1 | data breach |
| 1262 | CVE-2023-41347 | critical | 10.0 | 1 | botnet |
| 1263 | Weak IoT Device Security (e.g., default credentials, unpatched firmware) | critical | 10.0 | 1 | Distributed Denial of Service (DDoS) |
| 1264 | Abandoned Vercel-hosted URL takeover | critical | 10.0 | 1 | Phishing |
| 1265 | Uncontrolled AI Tool Integration | critical | 10.0 | 1 | Data Breach Risk |
| 1266 | Potential lack of redundant navigation systems | critical | 10.0 | 1 | GPS spoofing (disputed) |
| 1267 | CVE-2025-49155 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1268 | CVE-2024-37079 | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 1269 | Improper access controls and lack of technical safeguards | critical | 10.0 | 1 | Data Breach |
| 1270 | Accessibility Services Permission, Device Admin Permission | critical | 10.0 | 1 | Malware (Ransomware-like) |
| 1271 | Unspecified Cisco ASA Vulnerabilities (ArcaneDoor Campaign) | critical | 10.0 | 1 | Espionage |
| 1272 | Poor visibility in cloud/hybrid environments | critical | 10.0 | 1 | Ransomware |
| 1273 | CVE-2021-26828 | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 1274 | Oracle E-Business Suite | critical | 10.0 | 1 | Ransomware |
| 1275 | Lack of modern defenses | critical | 10.0 | 1 | GPS spoofing |
| 1276 | vulnerable computer systems | critical | 10.0 | 1 | data breach |
| 1277 | CVE-2025-7028 | critical | 10.0 | 1 | Firmware Vulnerability |
| 1278 | Previously unknown vulnerability in file-sharing system | critical | 10.0 | 1 | Ransomware Attack |
| 1279 | Path traversal (CVE-2025-64712) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 1280 | Outdated IT Systems | critical | 10.0 | 1 | Cybercrime |
| 1281 | CVE-2024-38178 | critical | 10.0 | 1 | Cyber Espionage |
| 1282 | Improper Pointer Nullification | critical | 10.0 | 1 | Memory Corruption Vulnerability |
| 1283 | Technical vulnerabilities | critical | 10.0 | 1 | Illegal intrusion |
| 1284 | Mismanagement of sensitive data, lack of secure cloud storage | critical | 10.0 | 1 | Data Breach |
| 1285 | unique implementation flaws | critical | 10.0 | 1 | supply chain attack |
| 1286 | Technical Debt in Legacy OT Systems (15-20 year lifecycles) | critical | 10.0 | 1 | Cyber-Physical Attack |
| 1287 | Adobe Flash Vulnerability | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1288 | Static Zero Trust Policies (Lack of Dynamic Guardrails) | critical | 10.0 | 1 | Data Breach (AI Models/Applications) |
| 1289 | Stolen username and password of a UN employee purchased off the dark web | critical | 10.0 | 1 | Data Breach |
| 1290 | Lack of regular security reviews | critical | 10.0 | 1 | Data Breach |
| 1291 | Lack of Real-Time Identity Data Sync | critical | 10.0 | 1 | Identity Security Crisis |
| 1292 | Stolen Passwords | critical | 10.0 | 1 | Data Breach |
| 1293 | GPS signal susceptibility to jamming | critical | 10.0 | 1 | GPS jamming |
| 1294 | Delayed Breach Detection (avg. 276 days per IBM 2025 report) | critical | 10.0 | 1 | Supply Chain Attack |
| 1295 | Lack of Centralized Logging/Monitoring | critical | 10.0 | 1 | Cyber Espionage |
| 1296 | Lack of real-time threat-sharing incentives | critical | 10.0 | 1 | Policy/Regulatory Failure |
| 1297 | ATM Skimming Devices | critical | 10.0 | 1 | ATM Skimming |
| 1298 | MSP software flaws | critical | 10.0 | 1 | ransomware |
| 1299 | MOVEit Software Vulnerabilities | critical | 10.0 | 1 | Cyber Attack |
| 1300 | Zero-day vulnerability in a third-party application (unspecified) | critical | 10.0 | 1 | Ransomware Attack |
| 1301 | Credential leaks (reused passwords) | critical | 10.0 | 1 | Extortion |
| 1302 | Poor detection of abnormal system activity | critical | 10.0 | 1 | Data Breach |
| 1303 | CVE-2025-5309 | critical | 10.0 | 1 | Remote Code Execution |
| 1304 | Lack of MFA on FortiGate VPN devices | critical | 10.0 | 1 | Destructive Cyberattack |
| 1305 | Unpatched vulnerability in TP-Link Archer routers | critical | 10.0 | 1 | Botnet |
| 1306 | Remote Code Execution (RCE) | critical | 10.0 | 1 | Security Vulnerabilities |
| 1307 | CVE-2017-17562 (GoAhead RCE) | critical | 10.0 | 1 | cyberespionage |
| 1308 | CVE-2025-64111 | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 1309 | CVE-2026-25611 | critical | 10.0 | 1 | Denial of Service (DoS) |
| 1310 | Vulnerabilities present during high-risk phases like satellite deployment, where telemetry, software loadouts, and encryption keys are most exposed. | critical | 10.0 | 1 | Cyber Espionage |
| 1311 | Caching Error | critical | 10.0 | 1 | Data Breach |
| 1312 | Unknown Third-Party Relationships | critical | 10.0 | 1 | Data Breach |
| 1313 | privileged credential abuse | critical | 10.0 | 1 | ransomware |
| 1314 | Poorly secured networks, MFA vulnerabilities | critical | 10.0 | 1 | Cyberattack, Initial Access Brokerage, Ransomware |
| 1315 | Weak or default credentials ('Password123', 'Austal123') purchased on the dark web | critical | 10.0 | 1 | ransomware |
| 1316 | CVE-2021-44228 (Log4j) | critical | 10.0 | 1 | cyberespionage |
| 1317 | IT-OT convergence risks | critical | 10.0 | 1 | Ransomware |
| 1318 | Remote Work Security Blind Spots | critical | 10.0 | 1 | Cybercrime |
| 1319 | Cloud storage platform | critical | 10.0 | 1 | Data Breach |
| 1320 | CVE-2022-41328 | critical | 10.0 | 1 | Advanced Persistent Threat (APT) |
| 1321 | Remote access vulnerabilities | critical | 10.0 | 1 | Ransomware |
| 1322 | Exploitation of Android’s Accessibility Service, Google Play Protect bypass techniques | critical | 10.0 | 1 | Malware (Remote Access Trojan - RAT) |
| 1323 | network vulnerabilities (unspecified) | critical | 10.0 | 1 | ransomware |
| 1324 | VIB Acceptance Level Tampering | critical | 10.0 | 1 | Ransomware Prevention Guide |
| 1325 | Windows Safe Mode vulnerabilities | critical | 10.0 | 1 | Ransomware |
| 1326 | CVE-2025-61882 (Critical, CVSS 9.8) | critical | 10.0 | 1 | Ransomware |
| 1327 | Weak or Missing End-to-End Encryption | critical | 10.0 | 1 | Data Breach |
| 1328 | Unsupervised automation | critical | 10.0 | 1 | AI-driven breach |
| 1329 | SonicWall SSL VPN Vulnerability (Credentials in Backup Files) | critical | 10.0 | 1 | Unauthorized Access |
| 1330 | Information Disclosure Vulnerability | critical | 10.0 | 1 | Information Disclosure |
| 1331 | Unhashed Passwords | critical | 10.0 | 1 | Data Breach |
| 1332 | CVE-2025-52665 (Improper Input Validation in Backup API Endpoint) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 1333 | CVE-2025-61882 (Oracle E-Business Suite Zero-Day) | critical | 10.0 | 1 | Data Breach |
| 1334 | Compromised third-party vendor credentials | critical | 10.0 | 1 | Data Breach |
| 1335 | Poor Endpoint Security | critical | 10.0 | 1 | Data Breach (General Discussion) |
| 1336 | Compromised Okta SSO account | critical | 10.0 | 1 | Data Breach |
| 1337 | developer mistyped dependency installation | critical | 10.0 | 1 | supply chain attack |
| 1338 | Unmanaged OAuth App Permissions (Salesforce, Other SaaS) | critical | 10.0 | 1 | Browser-Based Attack |
| 1339 | CVE-2025-33053 (WebDAV External Control of File Name or Path) | critical | 10.0 | 1 | Patch Release |
| 1340 | Unpatched ICS/OT Systems | critical | 10.0 | 1 | Ransomware |
| 1341 | CVE-2025-61882 (CVSS 9.8) - Oracle E-Business Suite Concurrent Processing Component | critical | 10.0 | 1 | Data Breach |
| 1342 | Microsoft Hyper-V virtualization | critical | 10.0 | 1 | Cyber Espionage |
| 1343 | Code block display bug (hiding malicious instructions) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1344 | Inadequate cybersecurity frameworks for space-based infrastructure | critical | 10.0 | 1 | Cyber-Physical Threat |
| 1345 | SolarWinds Orion Software | critical | 10.0 | 1 | Supply Chain Attack |
| 1346 | Zero-Day Vulnerability in Fortra's GoAnywhere MFT | critical | 10.0 | 1 | Data Breach |
| 1347 | CVE-2020-35730 | critical | 10.0 | 1 | Cyberespionage |
| 1348 | Open Redirect | critical | 10.0 | 1 | Redirect Attack |
| 1349 | CVE-2025-60021 (Inadequate input validation in Apache bRPC heap profiler endpoint) | critical | 10.0 | 1 | Remote Command Injection |
| 1350 | Unauthorized system access via help desk | critical | 10.0 | 1 | Ransomware |
| 1351 | Insufficient Network Segmentation (implied) | critical | 10.0 | 1 | Ransomware Attack |
| 1352 | Over-Permissioned IAM Roles | critical | 10.0 | 1 | Predictive Analysis |
| 1353 | Impersonation of a colleague | critical | 10.0 | 1 | Cyberattack |
| 1354 | Type Confusion via Memory Reuse | critical | 10.0 | 1 | Memory Corruption Vulnerability |
| 1355 | GPS-based navigation and landing systems | critical | 10.0 | 1 | cyber attack |
| 1356 | Insufficient Input Validation (CWE-20) | critical | 10.0 | 1 | Unauthorized Access |
| 1357 | CVE-2023-46604 (Apache ActiveMQ) | critical | 10.0 | 1 | Ransomware |
| 1358 | CVE-2025-42999 | critical | 10.0 | 1 | vulnerability |
| 1359 | Indirect prompt injection | critical | 10.0 | 1 | Data Privacy and Cybersecurity Advisory |
| 1360 | Lack of Data Handling Training | critical | 10.0 | 1 | Data Breach |
| 1361 | Low Digital Literacy in Business Software | critical | 10.0 | 1 | Ransomware Attack |
| 1362 | CVE-2025-26512 | critical | 10.0 | 1 | Privilege Escalation |
| 1363 | At least 20 exploited vulnerabilities | critical | 10.0 | 1 | Data Breach, Cyberattack, AI-Enabled Attack |
| 1364 | Unpatched vulnerability disclosed in December 2024 | critical | 10.0 | 1 | Data Breach |
| 1365 | Improper Credential Management | critical | 10.0 | 1 | Supply Chain Attack |
| 1366 | Compromised Microsoft 365 Account | critical | 10.0 | 1 | Data Breach |
| 1367 | unrestricted access to GitHub Actions environment variables | critical | 10.0 | 1 | supply chain attack |
| 1368 | On Device Fraud (ODF) techniques | critical | 10.0 | 1 | Malware |
| 1369 | Weak Employee Credentials | critical | 10.0 | 1 | Cyberattack Surge |
| 1370 | Security flaw in Neighbors app | critical | 10.0 | 1 | Data Breach |
| 1371 | Absence of Privacy-Enhancing Technologies (PETs) | critical | 10.0 | 1 | Data Breach |
| 1372 | Endpoint Detection and Response (EDR) and antivirus process termination | critical | 10.0 | 1 | Malware, Ransomware |
| 1373 | Inadequate Email Security Protocols | critical | 10.0 | 1 | Data Breach |
| 1374 | Malicious Word documents | critical | 10.0 | 1 | Security Breach |
| 1375 | Insufficient permission checks | critical | 10.0 | 1 | DeFi Exploit |
| 1376 | Poor Email Security Practices | critical | 10.0 | 1 | Data Breach |
| 1377 | AI Training Data Exposure | critical | 10.0 | 1 | Cyber Espionage |
| 1378 | Digitized supply chains | critical | 10.0 | 1 | Cyberattack |
| 1379 | AI guardrail bypass | critical | 10.0 | 1 | AI-powered cyberattack |
| 1380 | Default or Weak ESXi Authentication Mechanisms | critical | 10.0 | 1 | Ransomware Prevention Guide |
| 1381 | CVE-2026-27944 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1382 | Inadequately tested code in Token Bridge smart contracts, lack of secure coding practices, and absence of automated fraud monitoring | critical | 10.0 | 1 | Data Breach, Cryptocurrency Theft |
| 1383 | Single Point of Failure in Critical Workflows | critical | 10.0 | 1 | Supply Chain Attack |
| 1384 | Misconfigured MongoDB instances lacking authentication, typically listening on port 27017 | critical | 10.0 | 1 | Ransomware |
| 1385 | Exposed API endpoints returning call metadata/recordings without authentication | critical | 10.0 | 1 | Data Breach |
| 1386 | CVE-2026-22719 (CWE-77 - Command Injection) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1387 | API Key Exposure | critical | 10.0 | 1 | Supply Chain Attack |
| 1388 | CVE-2023-22527 | critical | 10.0 | 1 | Cryptomining Campaign |
| 1389 | poor cyber defenses in supplier systems | critical | 10.0 | 1 | supply chain attack |
| 1390 | Unpatched Software (e.g., Equifax) | critical | 10.0 | 1 | Data Breach |
| 1391 | AES-CMAC algorithm flaw | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1392 | Reduced CISA staffing (from ~2,500 to <900) | critical | 10.0 | 1 | Policy/Regulatory Failure |
| 1393 | Legitimate account compromise | critical | 10.0 | 1 | Ransomware |
| 1394 | Flaw in SentinelOne's agent upgrade process | critical | 10.0 | 1 | Ransomware |
| 1395 | CVE-2025-34067 (Hikvision - remote code execution) | critical | 10.0 | 1 | Cyber Espionage, Reconnaissance |
| 1396 | EternalBlue (WannaCry, 2017) | critical | 10.0 | 1 | ransomware |
| 1397 | Known vulnerability in database software | critical | 10.0 | 1 | Data Breach |
| 1398 | Azure Data Factory service certificate vulnerability | critical | 10.0 | 1 | Security Flaw |
| 1399 | Identity and Access Control Weaknesses | critical | 10.0 | 1 | Data Breach |
| 1400 | Salesforce Instance Misconfiguration | critical | 10.0 | 1 | Data Breach |
| 1401 | CVE-2025-5086 (Deserialization of Untrusted Data) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1402 | Insufficient Threat Hunting Capabilities | critical | 10.0 | 1 | EDR/XDR Evasion |
| 1403 | CVE-2025-46811 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1404 | Absence of MFA on Congruity’s virtual machines | critical | 10.0 | 1 | Ransomware |
| 1405 | Lack of security monitoring | critical | 10.0 | 1 | Cyberattack |
| 1406 | Stolen Credentials/API Tokens | critical | 10.0 | 1 | Data Breach |
| 1407 | Abuse of Native Windows Utilities (curl, certutil) | critical | 10.0 | 1 | APT (Advanced Persistent Threat) |
| 1408 | CVE-2025-27821 (Out-of-bounds write in HDFS native client) | critical | 10.0 | 1 | Vulnerability |
| 1409 | SQL Injection vulnerabilities in WordPress-powered website | critical | 10.0 | 1 | Data Breach |
| 1410 | Lack of file type limitations | critical | 10.0 | 1 | Data Breach |
| 1411 | prolonged lapses in security oversight | critical | 10.0 | 1 | data breach |
| 1412 | Human vulnerabilities (compromised adviser accounts) | critical | 10.0 | 1 | Data Breach |
| 1413 | CVE-2026-24423 | critical | 10.0 | 1 | Ransomware |
| 1414 | Informant Malfeasance | critical | 10.0 | 1 | Dissemination of Propaganda and Child Abuse Material |
| 1415 | unpatched software (suspected) | critical | 10.0 | 1 | data breach |
| 1416 | public-facing application vulnerabilities | critical | 10.0 | 1 | ransomware |
| 1417 | Exposed long-term IAM user credentials, Lambda function code injection | critical | 10.0 | 1 | Cloud Breach |
| 1418 | CVE-2025-20333 (Cisco ASA/Firepower - RCE) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1419 | Confluence Server Webwork OGNL injection | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1420 | BootROM keys extraction | critical | 10.0 | 1 | Data Breach / Unauthorized Access |
| 1421 | CVE-2024-12686 | critical | 10.0 | 1 | Breach |
| 1422 | Unauthorized access via compromised civil servant credentials | critical | 10.0 | 1 | Data Breach |
| 1423 | unpatched/end-of-life devices | critical | 10.0 | 1 | unauthorized access |
| 1424 | Cultural Gap Between IT/OT Teams | critical | 10.0 | 1 | Cyber-Physical Attack |
| 1425 | Oracle E-Business Suite (EBS) exploit (unspecified) | critical | 10.0 | 1 | potential data breach |
| 1426 | Unpatched Software Vulnerabilities | critical | 10.0 | 1 | Malware |
| 1427 | CVE-2026-0489 (DOM-based XSS in SAP Business One Job Service) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 1428 | Google Docs | critical | 10.0 | 1 | Data Leak |
| 1429 | Data susceptible to interception or misuse during cloud processing | critical | 10.0 | 1 | Privacy Breach |
| 1430 | Endpoint Detection Gaps (EDR Limitations) | critical | 10.0 | 1 | Social Engineering |
| 1431 | Mobile device and app security weaknesses | critical | 10.0 | 1 | Cyber Espionage |
| 1432 | CVE-2023-41348 | critical | 10.0 | 1 | botnet |
| 1433 | CVE-2026-20079 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1434 | CVE-2025-61882 (Oracle E-Business Suite - Unauthenticated RCE) | critical | 10.0 | 1 | Data Breach |
| 1435 | Stored Credentials in Veeam Backup Infrastructure | critical | 10.0 | 1 | Social Engineering |
| 1436 | CVE-2025-53770 (ToolShell SharePoint Flaw) | critical | 10.0 | 1 | Cyber Espionage |
| 1437 | Outdated Junos OS routers | critical | 10.0 | 1 | Espionage |
| 1438 | Weak supply chain controls for hardware distribution | critical | 10.0 | 1 | Espionage |
| 1439 | Tool disparities | critical | 10.0 | 1 | Ransomware Prediction |
| 1440 | Hidden registration form, JSESSIONID manipulation, and lack of server-side token validation | critical | 10.0 | 1 | Privilege Escalation, Remote Code Execution |
| 1441 | Unmanaged machine identities | critical | 10.0 | 1 | Ransomware |
| 1442 | CVE-2025-64175 | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 1443 | inadequate third-party access controls | critical | 10.0 | 1 | data breach |
| 1444 | Outdated accounting infrastructure | critical | 10.0 | 1 | Ransomware |
| 1445 | Internal System Compromise (mechanism unspecified) | critical | 10.0 | 1 | Data Breach |
| 1446 | Unprotected 'Recent Links' feature with predictable URL format, enabling unauthorized data scraping via crawlers | critical | 10.0 | 1 | Data Exposure |
| 1447 | CVE-2021-39935 (CWE-918) | critical | 10.0 | 1 | Server-Side Request Forgery (SSRF) |
| 1448 | Follina | critical | 10.0 | 1 | Zero-Day Vulnerability |
| 1449 | Default Teams App Permissions | critical | 10.0 | 1 | Social Engineering |
| 1450 | Poor Data Residency Enforcement | critical | 10.0 | 1 | Data Breach Risk |
| 1451 | NtQuerySystemInformation abuse (SystemCodeFlowTransition parameter) | critical | 10.0 | 1 | Supply Chain Attack |
| 1452 | Over-Permissive API Access | critical | 10.0 | 1 | Supply Chain Attack |
| 1453 | CVE-2025-1316 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1454 | Oracle Cloud Infrastructure Flaw (from March 2025 breach) | critical | 10.0 | 1 | Data Breach |
| 1455 | Compromised Mailing List | critical | 10.0 | 1 | Phishing |
| 1456 | CVE-2026-27684 (SQL injection in SAP NetWeaver Feedback Notification) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 1457 | CVE-2026-28289 (bypass of CVE-2026-27636) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 1458 | Social Engineering, Excessive Permissions | critical | 10.0 | 1 | Data Breach, Extortion, Harassment |
| 1459 | Lack of browser-layer visibility | critical | 10.0 | 1 | Session Hijacking |
| 1460 | Insufficient Code Review for Open-Source Dependencies | critical | 10.0 | 1 | Supply Chain Attack |
| 1461 | Lack of 'Two Pairs of Eyes' Review (Pre-November 2021) | critical | 10.0 | 1 | Data Breach |
| 1462 | Previously unknown vulnerability in file transfer software | critical | 10.0 | 1 | Data Breach |
| 1463 | CVE-2025-23319 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1464 | Unpatched vulnerabilities in internet-facing applications | critical | 10.0 | 1 | Data Breach |
| 1465 | Lack of Out-of-Band Authentication | critical | 10.0 | 1 | Social Engineering |
| 1466 | Unaddressed software vulnerabilities in CM/ECF system (identified in 2019 after a prior 2020 breach) | critical | 10.0 | 1 | Data Breach |
| 1467 | Insider access to classified systems, Lack of real-time monitoring for data exfiltration | critical | 10.0 | 1 | Insider Threat, Espionage |
| 1468 | Misconfigurations in operational technology (OT) systems | critical | 10.0 | 1 | Exposure of Critical Infrastructure |
| 1469 | Abuse of legitimate software (BitDefender, VLC Media Player, Sangfor) | critical | 10.0 | 1 | Cyber Espionage |
| 1470 | lack of actionable alerting | critical | 10.0 | 1 | ransomware |
| 1471 | Previously unknown RCE vulnerability in Max Messenger’s media processing engine, existing since the beta phase in early 2025 | critical | 10.0 | 1 | Data Breach |
| 1472 | Cyber-Illiterate Student Population | critical | 10.0 | 1 | Data Breach |
| 1473 | Kaseya VSA platform | critical | 10.0 | 1 | Ransomware Attack |
| 1474 | Unguarded Museum | critical | 10.0 | 1 | Theft |
| 1475 | Technical error (premature website publication) | critical | 10.0 | 1 | Data Leak / Unauthorized Disclosure |
| 1476 | CVE-2025-68615 (Buffer Overflow in snmptrapd) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1477 | Weak Authentication (e.g., VPN Passwords) | critical | 10.0 | 1 | Cyber Espionage |
| 1478 | Undisclosed BIG-IP Vulnerabilities (under investigation) | critical | 10.0 | 1 | Supply Chain Attack |
| 1479 | npm supply chain compromise (Nx platform) | critical | 10.0 | 1 | Supply Chain Attack |
| 1480 | Blind Spots in Monitoring | critical | 10.0 | 1 | Ransomware |
| 1481 | Outdated Factory Digital Systems | critical | 10.0 | 1 | Cyberattack Surge |
| 1482 | Systemic weaknesses in government cybersecurity | critical | 10.0 | 1 | Unauthorized Access |
| 1483 | Unsecured BIM/cloud platforms | critical | 10.0 | 1 | Ransomware |
| 1484 | Delayed Incident Notification | critical | 10.0 | 1 | Cybersecurity Incident |
| 1485 | CVE-2024-43468 | critical | 10.0 | 1 | SQL Injection |
| 1486 | Microsoft Outlook vulnerability | critical | 10.0 | 1 | Data Breach |
| 1487 | Malicious form injection | critical | 10.0 | 1 | Data Breach |
| 1488 | Legitimate Administrative Tools (ScreenConnect, AnyDesk, RMM Platforms) | critical | 10.0 | 1 | Social Engineering |
| 1489 | legacy software vulnerabilities | critical | 10.0 | 1 | cyber espionage |
| 1490 | Unpatched Teams Clients | critical | 10.0 | 1 | Social Engineering |
| 1491 | Fragmented security standards across subcontractors | critical | 10.0 | 1 | Ransomware |
| 1492 | Weak Access Controls (e.g., AWS Misconfigurations) | critical | 10.0 | 1 | Unauthorized AI Deployment |
| 1493 | Human Trust, Lack of Investment Verification | critical | 10.0 | 1 | Investment Scam, Money Laundering, Cryptocurrency Fraud |
| 1494 | Outsourced Business Process Provider Vulnerabilities | critical | 10.0 | 1 | Data Breach |
| 1495 | SSO Misconfigurations (e.g., Microsoft Entra, Google Workspace, Okta) | critical | 10.0 | 1 | Phishing (Non-Email) |
| 1496 | Open Academic Networks in Universities | critical | 10.0 | 1 | Data Breach |
| 1497 | Supply Chain Weakness | critical | 10.0 | 1 | Supply Chain Attack |
| 1498 | Tool sprawl and visibility gaps | critical | 10.0 | 1 | Data Breach |
| 1499 | CVE-2017-0199 | critical | 10.0 | 1 | cyber espionage |
| 1500 | Limited staffing | critical | 10.0 | 1 | Cyberattack |
| 1501 | Lack of physical security for sensitive data display | critical | 10.0 | 1 | Data Breach |
| 1502 | CVE-2025-55125 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1503 | lack of threat detection tuning | critical | 10.0 | 1 | ransomware |
| 1504 | Public-facing file-sharing folder | critical | 10.0 | 1 | Ransomware |
| 1505 | Email Spoofing, Unsecured Computer System | critical | 10.0 | 1 | Hacking |
| 1506 | SharePoint Permissions Issue | critical | 10.0 | 1 | Data Breach |
| 1507 | Web server vulnerability | critical | 10.0 | 1 | Data Breach |
| 1508 | Security gaps in industrial networks | critical | 10.0 | 1 | Cyber Espionage |
| 1509 | Geopolitical Tensions (NATO Expansion, Ukraine War) | critical | 10.0 | 1 | Physical Sabotage |
| 1510 | Unspecified Salesforce vulnerability (likely API or authentication flaw) | critical | 10.0 | 1 | Data Breach |
| 1511 | Architectural weakness in LLM input processing and trust boundaries | critical | 10.0 | 1 | Zero-Click Remote Code Execution (RCE) |
| 1512 | CVE-2024-57968 | critical | 10.0 | 1 | Security Breach |
| 1513 | Unmanaged BYOD Devices | critical | 10.0 | 1 | Social Engineering |
| 1514 | Lack of Multi-Factor Authentication (MFA) for high-value targets | critical | 10.0 | 1 | Cyber Theft |
| 1515 | Accellion sharing software | critical | 10.0 | 1 | Ransomware |
| 1516 | CVE-2024-40766 (SonicWall) | critical | 10.0 | 1 | ransomware |
| 1517 | Misconfigured OIDC trust relationships | critical | 10.0 | 1 | Supply-Chain Attack |
| 1518 | unmonitored vendor access to sensitive data | critical | 10.0 | 1 | supply chain attack |
| 1519 | User Data Misuse | critical | 10.0 | 1 | Data Breach |
| 1520 | zero-day vulnerability in Oracle EBusiness Suite | critical | 10.0 | 1 | data breach |
| 1521 | Interconnexion non sécurisée entre IT et OT | critical | 10.0 | 1 | Cyberattaque ciblée |
| 1522 | CVE-2026-21962 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1523 | identity governance gaps | critical | 10.0 | 1 | ransomware |
| 1524 | Government mismanagement, lack of security protocols | critical | 10.0 | 1 | Data Breach |
| 1525 | delayed maintenance response | critical | 10.0 | 1 | physical security breach |
| 1526 | CVE-2025-61882 (Oracle E-Business Suite BI Publisher Integration Component) | critical | 10.0 | 1 | Data Theft |
| 1527 | Inadequate privileged access management | critical | 10.0 | 1 | Ransomware |
| 1528 | Legitimate Windows driver *truesight.sys* (Adlice Software’s RogueKiller) with IOCTL command abuse | critical | 10.0 | 1 | ransomware |
| 1529 | underwater sensor network vulnerabilities | critical | 10.0 | 1 | espionage |
| 1530 | Legacy System Risks | critical | 10.0 | 1 | Data Breach |
| 1531 | Windows OS vulnerability (unspecified programming bug) | critical | 10.0 | 1 | malware |
| 1532 | Weak Password Security (hypothetical, based on context) | critical | 10.0 | 1 | Ransomware Attack |
| 1533 | OAuth Token Misconfiguration | critical | 10.0 | 1 | Data Breach |
| 1534 | CVE-2025-40551 (CWE-502: Unsafe Deserialization) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 1535 | CVE-2024-0132, Docker DoS flaw on Linux | critical | 10.0 | 1 | Vulnerability Exploitation, DoS Attack |
| 1536 | Infected Barcode Scanners | critical | 10.0 | 1 | Data Breach |
| 1537 | Insufficient Vetting of Remote IT Workers | critical | 10.0 | 1 | Cyber Theft |
| 1538 | Human Vulnerability (Bribery/Extortion) | critical | 10.0 | 1 | Insider Threat |
| 1539 | disabled antivirus processes | critical | 10.0 | 1 | ransomware |
| 1540 | Vulnerability in the virtual private network | critical | 10.0 | 1 | Ransomware |
| 1541 | aging IT systems | critical | 10.0 | 1 | data breach |
| 1542 | Improper GitHub Access Controls | critical | 10.0 | 1 | Supply Chain Attack |
| 1543 | Inadequate validation of `gatewayUrl` parameter in ClawDBot Control UI (GHSA-g8p2-7wf7-98mq) | critical | 10.0 | 1 | Authentication Bypass, Remote Code Execution (RCE) |
| 1544 | Insufficient regex anchoring in AWS CodeBuild webhook filters | critical | 10.0 | 1 | Supply Chain Attack |
| 1545 | Unauthenticated SQL injection in Lilli’s API, publicly exposed endpoints | critical | 10.0 | 1 | AI-driven cyberattack |
| 1546 | Limited incident response capabilities in SMEs | critical | 10.0 | 1 | Extortion |
| 1547 | Unmonitored AI Data Flows | critical | 10.0 | 1 | Data Breach |
| 1548 | CVE-2024-3721 | critical | 10.0 | 1 | Malware |
| 1549 | CrushFTP servers | critical | 10.0 | 1 | Supply Chain Attack |
| 1550 | Citrix NetScaler Gateway Appliance (unspecified CVE) | critical | 10.0 | 1 | Cyber Espionage |
| 1551 | CVE-2025-59469 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1552 | Exposed Credentials in Repositories | critical | 10.0 | 1 | Data Breach |
| 1553 | Zero-day vulnerability in Oracle E-Business Suite | critical | 10.0 | 1 | Ransomware |
| 1554 | weaknesses in AIS protocol | critical | 10.0 | 1 | spoofing |
| 1555 | CVE-2025-3835 | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 1556 | CVE-2026-3497 (OpenSSH GSSAPI Key Exchange) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1557 | Lack of Third-Party Supplier Accountability | critical | 10.0 | 1 | Cybersecurity Vulnerability Assessment |
| 1558 | Lack of cybersecurity investment | critical | 10.0 | 1 | Cyberattack |
| 1559 | NPM package integrity weakness | critical | 10.0 | 1 | supply chain attack |
| 1560 | CVE-2026-1490 (Authorization Bypass via Reverse DNS Spoofing) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1561 | React2Shell (CVE not specified) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1562 | CitrixBleed2 (CVE unknown, related to Citrix Netscaler) | critical | 10.0 | 1 | ransomware |
| 1563 | Service Accounts with Non-Expiring Passwords & Excessive Permissions | critical | 10.0 | 1 | Data Breach |
| 1564 | CVE-2025-10725 (CVSS 9.9) | critical | 10.0 | 1 | Privilege Escalation / Vulnerability Exploitation |
| 1565 | Vulnerable signed drivers (exploited via BYOVD) | critical | 10.0 | 1 | Ransomware |
| 1566 | Funding Pressures in State Schools | critical | 10.0 | 1 | Data Breach |
| 1567 | RenderShock 0-Click Vulnerability | critical | 10.0 | 1 | Zero-Click Attack |
| 1568 | Novel method | critical | 10.0 | 1 | Ransomware |
| 1569 | CVE-2025-20363 (Cisco ASA VPN) | critical | 10.0 | 1 | Ransomware |
| 1570 | Inadequate Cybersecurity Defenses | critical | 10.0 | 1 | Data Breach |
| 1571 | Improper input validation in USER environment variable handling | critical | 10.0 | 1 | Authentication Bypass |
| 1572 | Broken Authentication (CWE-287) | critical | 10.0 | 1 | Unauthorized Access |
| 1573 | Weak administrator access controls | critical | 10.0 | 1 | Data Breach |
| 1574 | Weak perimeter defenses, inadequate network segmentation | critical | 10.0 | 1 | Ransomware |
| 1575 | Previously undetected vulnerability | critical | 10.0 | 1 | Ransomware Attack |
| 1576 | Unsecured internet-facing devices (used by China-affiliated actors) | critical | 10.0 | 1 | Extortion |
| 1577 | Lax network security | critical | 10.0 | 1 | Data Breach |
| 1578 | identity and access weaknesses | critical | 10.0 | 1 | ransomware |
| 1579 | Infection via official website | critical | 10.0 | 1 | Ransomware |
| 1580 | Unsalted MD5 | critical | 10.0 | 1 | Data Breach |
| 1581 | CVE-2025-27520 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1582 | Potential Weak MFA Implementation (2FA Prompt Bombing) | critical | 10.0 | 1 | Insider Threat (Attempted) |
| 1583 | File transfer tool vulnerability | critical | 10.0 | 1 | Ransomware |
| 1584 | Unpatched or zero-day flaws in technology platforms | critical | 10.0 | 1 | Ransomware |
| 1585 | Authenticated Reflected XSS | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1586 | Unsecured Self-Service Password Reset | critical | 10.0 | 1 | Cyber Espionage |
| 1587 | Network infiltration | critical | 10.0 | 1 | Security Concerns |
| 1588 | Previously unknown software vulnerability in network infrastructure | critical | 10.0 | 1 | Data Breach |
| 1589 | Inadequate Data Redaction Procedures | critical | 10.0 | 1 | Data Breach |
| 1590 | Weakness in `url_safe` feature (Bing.com tracking link evasion) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1591 | CVE-2024-20399 | critical | 10.0 | 1 | Advanced Persistent Threat (APT) |
| 1592 | Privacy Regulation Non-Compliance | critical | 10.0 | 1 | Ransomware |
| 1593 | Progress MOVEit transfer systems | critical | 10.0 | 1 | Data Breach |
| 1594 | Overcollection of Personal Data | critical | 10.0 | 1 | Data Privacy Violation |
| 1595 | Security flaw in SonicWall’s systems | critical | 10.0 | 1 | Ransomware |
| 1596 | Vulnerability in the online payment system | critical | 10.0 | 1 | Data Breach |
| 1597 | Insufficient data access controls | critical | 10.0 | 1 | Data Exfiltration |
| 1598 | insufficient AI governance | critical | 10.0 | 1 | ransomware |
| 1599 | Compromised Apple ID logins and LinkedIn data | critical | 10.0 | 1 | Data Breach |
| 1600 | CVE-2025-49156 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1601 | CVE-2025-22225 | critical | 10.0 | 1 | Ransomware |
| 1602 | Stolen Private Key | critical | 10.0 | 1 | Cryptocurrency Theft |
| 1603 | excessive email/mailbox permissions (shared read access) | critical | 10.0 | 1 | cyberespionage |
| 1604 | Process Drift in Third-Party Service Desk | critical | 10.0 | 1 | Social Engineering |
| 1605 | Zero-day vulnerabilities in cloud infrastructure/SaaS platforms | critical | 10.0 | 1 | Cybercriminal Alliance Formation |
| 1606 | Improper authorization/callback handling in V2 vaults | critical | 10.0 | 1 | Exploit |
| 1607 | Valid Login Information | critical | 10.0 | 1 | Data Breach |
| 1608 | Disabled Logging | critical | 10.0 | 1 | Data Exposure |
| 1609 | Legitimate Tools Abuse (Bitsadmin, PowerShell, curl) | critical | 10.0 | 1 | Targeted Cyberattack |
| 1610 | CVE-2024-XXXX | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1611 | Unknown vulnerability in file transfer software | critical | 10.0 | 1 | Ransomware |
| 1612 | Lack of Endpoint Detection and Response (EDR) in Some Systems | critical | 10.0 | 1 | Malware Infection |
| 1613 | Lack of In-House Cybersecurity Expertise (17% of shipyards) | critical | 10.0 | 1 | Ransomware |
| 1614 | Lack of Zero-Trust Architecture | critical | 10.0 | 1 | Cyber Espionage |
| 1615 | Disguised Malicious Commands as Benign Requests | critical | 10.0 | 1 | Espionage |
| 1616 | Gaps in anomaly detection for behavioral baselines | critical | 10.0 | 1 | Ransomware |
| 1617 | Improper input sanitization in GNU InetUtils telnetd (USER environment variable handling) | critical | 10.0 | 1 | Authentication Bypass |
| 1618 | CVE-2023-34048 | critical | 10.0 | 1 | Advanced Persistent Threat (APT) |
| 1619 | AI Browser Design Flaw (Fragment Inclusion in Context) | critical | 10.0 | 1 | Prompt Injection |
| 1620 | Shor's Algorithm (theoretical) | critical | 10.0 | 1 | Emerging Threat |
| 1621 | undersea cable physical exposure | critical | 10.0 | 1 | sabotage |
| 1622 | Citrix device vulnerabilities (specific CVE not disclosed) | critical | 10.0 | 1 | Cyberattack |
| 1623 | OS auto-enumeration of mice on Windows 11 and macOS Sonoma, lack of HID trust models | critical | 10.0 | 1 | Hardware-based Attack |
| 1624 | CV_2025_03_1 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1625 | CVE-2025-7027 | critical | 10.0 | 1 | Firmware Vulnerability |
| 1626 | Fortinet software | critical | 10.0 | 1 | Cyber Attack |
| 1627 | Log4Shell vulnerability | critical | 10.0 | 1 | Cyber Attack |
| 1628 | Third-Party Customer Service Provider (Discord) | critical | 10.0 | 1 | Data Breach |
| 1629 | Lack of Content Security Policy (CSP) enforcement | critical | 10.0 | 1 | Data Breach |
| 1630 | AI integrations with applications (e.g., Google Calendar, Zoom) | critical | 10.0 | 1 | AI Exploitation |
| 1631 | blind spots in network visibility | critical | 10.0 | 1 | ransomware |
| 1632 | Accidental transmission of private key information | critical | 10.0 | 1 | Data Breach |
| 1633 | Lack of Email Filtering | critical | 10.0 | 1 | Targeted Cyberattack |
| 1634 | Partial Logging of Data Access | critical | 10.0 | 1 | Insider Threat |
| 1635 | CVE-2026-22844 (Command Injection) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1636 | Data Scraping Vulnerability | critical | 10.0 | 1 | Data Breach |
| 1637 | poor network segmentation (IT/OT convergence) | critical | 10.0 | 1 | ransomware |
| 1638 | insufficient incident response plans | critical | 10.0 | 1 | phishing |
| 1639 | Palo Alto PAN-OS | critical | 10.0 | 1 | Ransomware |
| 1640 | CVE-2023-MoveIt (Critical File Transfer Vulnerability) | critical | 10.0 | 1 | Ransomware |
| 1641 | Unauthorized access to security credentials | critical | 10.0 | 1 | Financial Fraud, Insider Threat |
| 1642 | maritime domain awareness gaps | critical | 10.0 | 1 | espionage |
| 1643 | Authenticated Local File Inclusion | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1644 | Backdoor in M.E.Doc software updates (Intellect Service) | critical | 10.0 | 1 | Cyber Attack |
| 1645 | Compliance Blind Spots in Cross-Border AI Data Flows | critical | 10.0 | 1 | Data Breach (AI Models/Applications) |
| 1646 | WordPress vulnerabilities | critical | 10.0 | 1 | Botnet |
| 1647 | CVE-2024-1709 (ScreenConnect) | critical | 10.0 | 1 | Ransomware |
| 1648 | Mobile carrier verification processes, SMS-based authentication | critical | 10.0 | 1 | SIM Swap Attack |
| 1649 | Remote Disabling Capability | critical | 10.0 | 1 | Repurposing of Commercial Technology for Military Use |
| 1650 | Security Incident During Server Setup | critical | 10.0 | 1 | Ransomware |
| 1651 | Remote code execution vulnerability in SharePoint’s authentication mechanism | critical | 10.0 | 1 | Cyberattack |
| 1652 | CVE-2025-59689 (Command injection in Libraesva ESG) | critical | 10.0 | 1 | Zero-day exploitation |
| 1653 | outdated property assessment funding | critical | 10.0 | 1 | physical security breach |
| 1654 | lack of asset visibility | critical | 10.0 | 1 | unauthorized access |
| 1655 | AI Chatbot Feature | critical | 10.0 | 1 | Copyright Infringement |
| 1656 | Excessive Privileges (God-level access) | critical | 10.0 | 1 | Data Breach |
| 1657 | interconnected manufacturing systems | critical | 10.0 | 1 | cyberattack |
| 1658 | CVE-2024-12856 | critical | 10.0 | 1 | DDoS |
| 1659 | Security protocol bypass, weak access controls, anti-virus circumvention, secret key exposure in source code | critical | 10.0 | 1 | Insider Threat / AI Exploitation |
| 1660 | NPM package dependency trust model | critical | 10.0 | 1 | supply chain attack |
| 1661 | CVE-2025-47171 (Windows Netlogon Use of Uninitialized Resources) | critical | 10.0 | 1 | Patch Release |
| 1662 | Jira | critical | 10.0 | 1 | Data Leak |
| 1663 | MFA bypass techniques | critical | 10.0 | 1 | phishing |
| 1664 | Vulnerabilities in decentralized energy infrastructure and OT/ICS systems | critical | 10.0 | 1 | Cyberattack on Critical Infrastructure |
| 1665 | Unburied or Lightly Buried Cables in Steep Terrain | critical | 10.0 | 1 | Physical Sabotage |
| 1666 | Generative AI applications | critical | 10.0 | 1 | ransomware |
| 1667 | QR Code Vulnerability | critical | 10.0 | 1 | Espionage |
| 1668 | weak SCADA system security | critical | 10.0 | 1 | cyber-physical attack |
| 1669 | Oracle zero-day (Clop gang) | critical | 10.0 | 1 | ransomware |
| 1670 | Mismanagement of data storage | critical | 10.0 | 1 | Data Breach |
| 1671 | dependency trust model | critical | 10.0 | 1 | supply chain attack |
| 1672 | Malicious PowerPoint Add-Ins | critical | 10.0 | 1 | Cyber Espionage |
| 1673 | Weak Authentication (compromised social media accounts) | critical | 10.0 | 1 | Cyber Theft |
| 1674 | default LDAP group configurations | critical | 10.0 | 1 | ransomware |
| 1675 | reliance on IT generalists without specialized security training | critical | 10.0 | 1 | ransomware |
| 1676 | Hidden malicious proxy in AI agents | critical | 10.0 | 1 | Vulnerability Exploit |
| 1677 | CVE-2025-64155 (CWE-78: Improper Neutralization of Special Elements used in an OS Command) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1678 | Ghost Logins (Unmonitored Active Sessions) | critical | 10.0 | 1 | Phishing (Non-Email) |
| 1679 | Unknown network vulnerability | critical | 10.0 | 1 | Ransomware Attack |
| 1680 | Password reminder bug | critical | 10.0 | 1 | Account Takeover |
| 1681 | CVE-2025-27915 (Stored XSS in Zimbra Classic Web Client via ICS files) | critical | 10.0 | 1 | Cyber Espionage |
| 1682 | Malfunction at AWS data center (likely a configuration error) | critical | 10.0 | 1 | Service Disruption |
| 1683 | Absence of Visibility/Monitoring for Non-Email Channels | critical | 10.0 | 1 | Phishing (Non-Email) |
| 1684 | Shared Responsibility Model Gaps in Cloud Security | critical | 10.0 | 1 | Predictive Analysis |
| 1685 | Open Amazon S3 bucket | critical | 10.0 | 1 | Data Breach |
| 1686 | Lack of Access Controls for Sensitive Data Aggregation | critical | 10.0 | 1 | Data Breach |
| 1687 | Precision rounding error in swap calculations | critical | 10.0 | 1 | Exploit |
| 1688 | Vulnerabilities in the email system | critical | 10.0 | 1 | Data Breach |
| 1689 | Legacy Infrastructure | critical | 10.0 | 1 | AI-Powered Cyberattack |
| 1690 | CVE-2024-54085 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1691 | Outdated Cryptographic Protocols | critical | 10.0 | 1 | Data Breach |
| 1692 | Unpatched Software in Data Centers | critical | 10.0 | 1 | Cyber Espionage |
| 1693 | CVE-2024-12297 (Frontend Authorization Logic Disclosure) | critical | 10.0 | 1 | Authentication Bypass |
| 1694 | Supply Chain Weaknesses | critical | 10.0 | 1 | Domain Hijacking |
| 1695 | Zero-day vulnerability in GoAnywhere MFT (Managed File Transfer) software | critical | 10.0 | 1 | Data Breach |
| 1696 | CVE-2025-64446 | critical | 10.0 | 1 | Ransomware |
| 1697 | Unspecified Adobe ColdFusion Vulnerabilities | critical | 10.0 | 1 | Cyber Espionage |
| 1698 | Trust in technical support specialists | critical | 10.0 | 1 | Data Breach |
| 1699 | CVE-2025-49158 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1700 | Email reply-chain exploitation | critical | 10.0 | 1 | Phishing |
| 1701 | Bun runtime environment detection | critical | 10.0 | 1 | supply chain attack |
| 1702 | Misconfigured AWS Bucket | critical | 10.0 | 1 | Data Exposure |
| 1703 | Lack of Code Integrity Checks | critical | 10.0 | 1 | Supply Chain Attack |
| 1704 | Political Distractions | critical | 10.0 | 1 | Operational Risk |
| 1705 | Excessive Privileges in Connected Applications | critical | 10.0 | 1 | Data Breach |
| 1706 | urgency/authority manipulation | critical | 10.0 | 1 | social engineering |
| 1707 | Cleo file sharing tool | critical | 10.0 | 1 | Data Breach |
| 1708 | Embedded credentials/API keys in source code | critical | 10.0 | 1 | Supply Chain Compromise |
| 1709 | CVE-2025-20333 (Authentication bypass in Cisco ASA Software) | critical | 10.0 | 1 | Zero-day exploitation |
| 1710 | Unsecured RDP access, absence of MFA | critical | 10.0 | 1 | Ransomware |
| 1711 | potential prior SharePoint vulnerabilities (historical context for Storm-2603) | critical | 10.0 | 1 | ransomware |
| 1712 | Understaffed Security Operations Center (SOC) | critical | 10.0 | 1 | Data Breach |
| 1713 | CVE-2026-24747 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1714 | Opportunistic targeting | critical | 10.0 | 1 | Data Breach |
| 1715 | weak backup protection (backups were deleted by attacker) | critical | 10.0 | 1 | ransomware |
| 1716 | Publicly accessible links to call recordings/transcripts | critical | 10.0 | 1 | Data Breach |
| 1717 | compromised backup configurations (SonicWall cloud breach) | critical | 10.0 | 1 | ransomware |
| 1718 | weaknesses in distributed enforcement synchronization | critical | 10.0 | 1 | data breach |
| 1719 | CVE-2025-4428 | critical | 10.0 | 1 | Cyber Espionage |
| 1720 | Satellite Communication Systems | critical | 10.0 | 1 | Cyber Attack |
| 1721 | CVE-2025-52163 | critical | 10.0 | 1 | Vulnerability Disclosure |
| 1722 | Irregular software patching | critical | 10.0 | 1 | Ransomware |
| 1723 | default weak password policies (privileged accounts <14 characters) | critical | 10.0 | 1 | ransomware |
| 1724 | Lack of access controls (broad permissions) | critical | 10.0 | 1 | Ransomware |
| 1725 | Improper escaping of LangChain’s internal marker key during serialization | critical | 10.0 | 1 | Serialization/Deserialization Injection |
| 1726 | Known vulnerabilities in backbone routers | critical | 10.0 | 1 | Cyber Espionage |
| 1727 | Stolen Employee Tokens | critical | 10.0 | 1 | Data Breach |
| 1728 | Trust in open-source packages | critical | 10.0 | 1 | Supply Chain Attack |
| 1729 | Typosquatting | critical | 10.0 | 1 | Cyber Theft |
| 1730 | CVE-2023-41345 | critical | 10.0 | 1 | botnet |
| 1731 | Interconnexion entre datacenter et réseau internet | critical | 10.0 | 1 | DDoS |
| 1732 | CVE-2025-14847 | critical | 10.0 | 1 | Vulnerability Disclosure |
| 1733 | Remote Code Execution (RCE) zero-day in Oracle E-Business Suite (versions 12.2.3-12.2.14) | critical | 10.0 | 1 | ransomware |
| 1734 | emotional manipulation | critical | 10.0 | 1 | phishing |
| 1735 | Inadequate HR and Compliance Monitoring | critical | 10.0 | 1 | Data Breach |
| 1736 | Unpatched VPN services | critical | 10.0 | 1 | Ransomware |
| 1737 | Lack of Multi-Factor Authentication (2FA) Enforcement | critical | 10.0 | 1 | Data Breach |
| 1738 | Unsecured Health Declaration Portal | critical | 10.0 | 1 | Data Breach |
| 1739 | Human factor (credentials theft) | critical | 10.0 | 1 | Phishing |
| 1740 | Login bypass vulnerability, improper access controls | critical | 10.0 | 1 | Data Leak, Unauthorized Access, Remote Exploitation |
| 1741 | Four-Faith industrial routers | critical | 10.0 | 1 | DDoS Attack |
| 1742 | CVE-2026-1358 (Unrestricted File Upload) | critical | 10.0 | 1 | Vulnerability Disclosure |
| 1743 | Insecure Build Process | critical | 10.0 | 1 | Supply Chain Attack |
| 1744 | Weak Authentication for Publish Access (npm, PyPI) | critical | 10.0 | 1 | Supply Chain Attack |
| 1745 | CVE-2025-4427 | critical | 10.0 | 1 | Cyber Espionage |
| 1746 | Reduced Workforce Capacity | critical | 10.0 | 1 | Operational Risk |
| 1747 | Ivanti Endpoint Manager Mobile | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1748 | End-to-End Encryption | critical | 10.0 | 1 | Government Order |
| 1749 | Legitimate utilities repurposed for malicious use (e.g., gpscript.exe) | critical | 10.0 | 1 | Ransomware |
| 1750 | Ageing infrastructure, shared IT systems, lack of network segmentation | critical | 10.0 | 1 | Data Breach |
| 1751 | CVE-2025-20337 | critical | 10.0 | 1 | Remote Code Execution |
| 1752 | lack of 2FA for publisher accounts | critical | 10.0 | 1 | supply chain attack |
| 1753 | Gaps in GDPR Data Protection for Vehicle-Generated Data | critical | 10.0 | 1 | Cybersecurity Vulnerability Assessment |
| 1754 | CVE-2023-20867 | critical | 10.0 | 1 | Advanced Persistent Threat (APT) |
| 1755 | CVE-2025-32434 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1756 | Security Vulnerabilities in Verizon’s Web site | critical | 10.0 | 1 | Data Breach |
| 1757 | Unsanitized Metadata | critical | 10.0 | 1 | Data Leak |
| 1758 | Misconfigured Cloud Storage (S3, MongoDB) | critical | 10.0 | 1 | Data Breach |
| 1759 | lack_of_verified_security_controls | critical | 10.0 | 1 | data_at_risk |
| 1760 | inadequate administrative/physical/technical safeguards (HIPAA) | critical | 10.0 | 1 | data breach |
| 1761 | Insufficient Integration Lifecycle Management | critical | 10.0 | 1 | Supply Chain Attack |
| 1762 | Critical vulnerabilities within the ESXi platform | critical | 10.0 | 1 | Ransomware |
| 1763 | CVE-2025-20362 (Memory corruption in Cisco ASA Software) | critical | 10.0 | 1 | Zero-day exploitation |
| 1764 | Access to sensitive infrastructure data | critical | 10.0 | 1 | Insider Threat |
| 1765 | Unpatched vulnerability in the network defenses | critical | 10.0 | 1 | Ransomware |
| 1766 | Pool initialization bypass | critical | 10.0 | 1 | Exploit |
| 1767 | Zero-day vulnerability in Oracle E-Business Suite (advisory issued 2025-10-04) | critical | 10.0 | 1 | Data Breach |
| 1768 | Fragmented accountability among OEMs, MNOs, and satellite operators | critical | 10.0 | 1 | Cyber-Physical Threat |
| 1769 | CVE-2025-21590 | critical | 10.0 | 1 | Advanced Persistent Threat (APT) |
| 1770 | Lack of anti-jamming measures in ferry's GPS system | critical | 10.0 | 1 | GPS jamming |
| 1771 | CVE-2025-55182 (CVSS 10.0) | critical | 10.0 | 1 | worm-driven campaign |
| 1772 | MongoBleed | critical | 10.0 | 1 | Data Breach |
| 1773 | Unencrypted Linux Partition in Dual-Boot Configuration | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1774 | CVE-2025-10035 (Critical deserialization flaw in GoAnywhere MFT) | critical | 10.0 | 1 | Zero-day exploitation |
| 1775 | Content-Type confusion flaw in n8n's webhook and file handling mechanism (CVE-2026-21858) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 1776 | lack of centralized patching for consulting deliverables | critical | 10.0 | 1 | supply chain attack |
| 1777 | Potential Salesforce Misconfigurations | critical | 10.0 | 1 | Data Breach |
| 1778 | Lack of Fragment Inspection in Security Tools | critical | 10.0 | 1 | Prompt Injection |
| 1779 | outsourcing risks | critical | 10.0 | 1 | data breach |
| 1780 | Previously unknown vulnerability in data transfer software | critical | 10.0 | 1 | Data Breach |
| 1781 | GDPR compliance leverage (ransom coercion) | critical | 10.0 | 1 | ransomware |
| 1782 | Unrestricted Remote Access ('Always-On' Feature) | critical | 10.0 | 1 | Data Breach |
| 1783 | Deteriorating cyber defenses | critical | 10.0 | 1 | Cyberattack |
| 1784 | Lack of Behavioral Analytics for Insider Threat Detection | critical | 10.0 | 1 | Insider Threat (Attempted) |
| 1785 | Undisclosed Vulnerabilities in BIG-IP (details not public) | critical | 10.0 | 1 | Data Breach |
| 1786 | Exploit Kit | critical | 10.0 | 1 | Malvertising |
| 1787 | CitrixBleed (CVE-2023-4966) - CVSS 9.3 in Netscaler ADC and Gateway (Session Token Theft, MFA Bypass) | critical | 10.0 | 1 | Data Breach |
| 1788 | Over-Permissive Tool Access (e.g., Password Crackers, Network Scanners) | critical | 10.0 | 1 | Espionage |
| 1789 | CVE-2025-34300 | critical | 10.0 | 1 | Remote Code Execution |
| 1790 | Shared-Service Model Vulnerabilities | critical | 10.0 | 1 | Cyberattack |
| 1791 | CVE-2024-12912 | critical | 10.0 | 1 | botnet |
| 1792 | high market value of copper | critical | 10.0 | 1 | infrastructure vulnerability |
| 1793 | High-risk extension permissions | critical | 10.0 | 1 | Session Hijacking |
| 1794 | lack of email security by design | critical | 10.0 | 1 | phishing |
| 1795 | Claude Code tool's contextual safeguard limitations | critical | 10.0 | 1 | cyberespionage |
| 1796 | exposed SMB services | critical | 10.0 | 1 | ransomware |
| 1797 | CVE-2025-36535 (Missing Authentication in MB-Gateway Devices) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1798 | insecure communication protocols | critical | 10.0 | 1 | unauthorized access |
| 1799 | LogoFAIL flaws (CVE-2023-40238) | critical | 10.0 | 1 | UEFI Bootkit |
| 1800 | Lack of Multi-Factor Authentication (Assumed) | critical | 10.0 | 1 | Ransomware |
| 1801 | GenAI data exfiltration | critical | 10.0 | 1 | Session Hijacking |
| 1802 | poor_network_segmentation | critical | 10.0 | 1 | ransomware |
| 1803 | Human Trust Vulnerability | critical | 10.0 | 1 | Data Breach |
| 1804 | Lapse of CISA 2015 liability protections | critical | 10.0 | 1 | Policy/Regulatory Failure |
| 1805 | Lack of Multi-Factor Authentication (MFA) for remote hires | critical | 10.0 | 1 | Espionage |
| 1806 | CVE-2024-12297 | critical | 10.0 | 1 | Vulnerability Exploit |
| 1807 | Weak Cybersecurity Safeguards in Government Systems | critical | 10.0 | 1 | Data Privacy Violation |
| 1808 | SAP Solution Manager | critical | 10.0 | 1 | Cyber Espionage |
| 1809 | Remote-file-transfer vulnerabilities | critical | 10.0 | 1 | Ransomware |
| 1810 | cloud security weaknesses | critical | 10.0 | 1 | ransomware |
| 1811 | Unclear Accountability Frameworks | critical | 10.0 | 1 | Data Privacy Violation |
| 1812 | operational lapses in rule propagation | critical | 10.0 | 1 | data breach |
| 1813 | Classified information mishandling | critical | 10.0 | 1 | Cyber Attack, Data Leak |
| 1814 | Security flaw in MOVEit software | critical | 10.0 | 1 | Data Breach |
| 1815 | CVE-2025-29927 (React2Shell) | critical | 10.0 | 1 | Cloud Misconfiguration Exploitation |
| 1816 | CVE-2025-7029 | critical | 10.0 | 1 | Firmware Vulnerability |
| 1817 | Policy Non-Compliance | critical | 10.0 | 1 | Data Breach (Alleged) |
| 1818 | Previously Patched Vulnerabilities (Exploited Post-Patch) | critical | 10.0 | 1 | Data Breach |
| 1819 | Weak Security Controls at Third-Party Contractor | critical | 10.0 | 1 | Data Breach |
| 1820 | CVE-2025-8110 (Path traversal in PutContents API via symbolic links) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 1821 | Weakened power grid infrastructure | critical | 10.0 | 1 | Cyberattack |
| 1822 | Insufficient cybersecurity training | critical | 10.0 | 1 | Data Breach |
| 1823 | OAuth Token Theft | critical | 10.0 | 1 | Data Breach |
| 1824 | user trust in search engine ads | critical | 10.0 | 1 | ransomware |
| 1825 | CVE-2025-59287 (Windows Server Update Services - WSUS) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 1826 | Publicly Accessible Industrial Control Systems | critical | 10.0 | 1 | Ransomware |
| 1827 | Weaknesses in satellite-ground station security | critical | 10.0 | 1 | Cyber-Physical Threat |
| 1828 | BACnet/Modbus Protocol Flaws (No Encryption/Authentication) | critical | 10.0 | 1 | Cybersecurity Vulnerability Exposure |
| 1829 | CVE-2024-7587 | critical | 10.0 | 1 | Vulnerabilities in SCADA Systems |
| 1830 | Weak login credentials | critical | 10.0 | 1 | Data Breach |
| 1831 | Zero-day flaw in Oracle E-Business Suite | critical | 10.0 | 1 | Data Breach |
| 1832 | Known vulnerability in the network | critical | 10.0 | 1 | Ransomware Attack |
| 1833 | Remote Code Execution (RCE) in AhsayCBS backup system | critical | 10.0 | 1 | Remote Code Execution |
| 1834 | Absence of Standardized Risk Assessments | critical | 10.0 | 1 | Ransomware |
| 1835 | Lack of multi-factor authentication (MFA) on an outsourced partner’s administrator account | critical | 10.0 | 1 | Ransomware |
| 1836 | ProxyShell (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) | critical | 10.0 | 1 | ransomware |
| 1837 | 161 distinct CVEs in H1 2025 (up from 136 in H1 2024) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1838 | CVE-2025-53771 (Path Traversal) | critical | 10.0 | 1 | Cyber Espionage |
| 1839 | CVE-2024-11859 | critical | 10.0 | 1 | Malware Delivery |
| 1840 | CVE-2016-10033 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1841 | Excessive user permissions | critical | 10.0 | 1 | Ransomware |
| 1842 | React2Shell vulnerability in React frontend application | critical | 10.0 | 1 | Data Breach |
| 1843 | Trust in Employee | critical | 10.0 | 1 | Insider Threat |
| 1844 | CVE-2025-2172 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1845 | Unmonitored API Queries (Graph, Teams) | critical | 10.0 | 1 | Social Engineering |
| 1846 | Weak/Reused Passwords | critical | 10.0 | 1 | Account Compromise |
| 1847 | Exposed Database Credentials | critical | 10.0 | 1 | Data Exposure |
| 1848 | Limited control over shipping and air cargo spaces | critical | 10.0 | 1 | Economic Vulnerability |
| 1849 | Customer Edge (CE) routers | critical | 10.0 | 1 | Cyber Espionage |
| 1850 | Human operational error | critical | 10.0 | 1 | GPS spoofing (disputed) |
| 1851 | Inadequate Backup Protection | critical | 10.0 | 1 | Ransomware Attack |
| 1852 | CVE-2017-12637 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1853 | Ivanti Cloud Service Appliances | critical | 10.0 | 1 | Supply Chain Attack |
| 1854 | outdated configurations | critical | 10.0 | 1 | ransomware |
| 1855 | Lack of IT/OT Security Maturity (65% misalignment with NIST CSF 2.0) | critical | 10.0 | 1 | Cyber-Physical Attack |
| 1856 | CVE-2025-47164 (Microsoft Office Use-After-Free) | critical | 10.0 | 1 | Patch Release |
| 1857 | Lack of continuous vendor monitoring | critical | 10.0 | 1 | Ransomware |
| 1858 | Publicly exposed cloud buckets with critical vulnerabilities and highly privileged data | critical | 10.0 | 1 | Data Exposure |
| 1859 | Unsupported Firmware/OS (EOL Systems) | critical | 10.0 | 1 | Cybersecurity Vulnerability Exposure |
| 1860 | Outdated Juniper Networks Junos OS MX routers | critical | 10.0 | 1 | Cyber Espionage |
| 1861 | CVE-2021-Log4j (Remote Code Execution) | critical | 10.0 | 1 | Ransomware |
| 1862 | insecure use of pull_request_target in GitHub Actions | critical | 10.0 | 1 | supply chain attack |
| 1863 | CVE-2025-24893 (Critical RCE in XWiki) | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1864 | Unauthorized Admin Role Assignments | critical | 10.0 | 1 | Ransomware Prevention Guide |
| 1865 | Weak Authentication for Third-Party Access | critical | 10.0 | 1 | Cyberattack |
| 1866 | Banking security systems | critical | 10.0 | 1 | Malware |
| 1867 | CVE-2025-27363 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1868 | Compromised Deloitte employee credentials | critical | 10.0 | 1 | data breach |
| 1869 | Steganography | critical | 10.0 | 1 | Malware Infection |
| 1870 | CVE-2024-40766 (SonicWall improper access control, CVSS 9.8) | critical | 10.0 | 1 | ransomware |
| 1871 | CVE-2023-41346 | critical | 10.0 | 1 | botnet |
| 1872 | mismanaged certificates | critical | 10.0 | 1 | third-party breach |
| 1873 | network security issues | critical | 10.0 | 1 | third-party breach |
| 1874 | CVE-2025-2783 | critical | 10.0 | 1 | Zero-Day Vulnerability |
| 1875 | SonicWall SSLVPN misconfigurations | critical | 10.0 | 1 | ransomware |
| 1876 | Incorrect host/guest network separation (allowed privilege escalation from guest to host) | critical | 10.0 | 1 | Ransomware |
| 1877 | Payment processing system vulnerability | critical | 10.0 | 1 | Data Breach |
| 1878 | poor staff training | critical | 10.0 | 1 | data breach |
| 1879 | Legacy Authentication Protocols | critical | 10.0 | 1 | Social Engineering |
| 1880 | Auto-update mechanisms | critical | 10.0 | 1 | Session Hijacking |
| 1881 | CVE-2017-7921 (Hikvision - authentication bypass) | critical | 10.0 | 1 | Cyber Espionage, Reconnaissance |
| 1882 | Poor Training on Data Protection Protocols | critical | 10.0 | 1 | Data Breach |
| 1883 | unknown (zero-day) | critical | 10.0 | 1 | cyberattack |
| 1884 | Insufficient Disaster Recovery Plans | critical | 10.0 | 1 | Supply Chain Attack |
| 1885 | CVE-2025-2492 | critical | 10.0 | 1 | botnet |
| 1886 | weak token security | critical | 10.0 | 1 | third-party breach |
| 1887 | Exposed Web-Accessible Operational Technology (OT) System | critical | 10.0 | 1 | Cyberattack |
| 1888 | Insufficient client-side runtime monitoring | critical | 10.0 | 1 | Data Breach |
| 1889 | Salesloft’s Drift AI Chat Integration (OAuth Token Theft) | critical | 10.0 | 1 | Data Breach |
| 1890 | Juniper Networks routers | critical | 10.0 | 1 | Cyberespionage |
| 1891 | Newly discovered vulnerability | critical | 10.0 | 1 | Ransomware |
| 1892 | CVE-2026-20127 | critical | 10.0 | 1 | Authentication Bypass |
| 1893 | Exposure of GitHub token | critical | 10.0 | 1 | Vulnerability |
| 1894 | Known software vulnerabilities | critical | 10.0 | 1 | Cyber Espionage, Sabotage |
| 1895 | human error (e.g., clicking malicious links) | critical | 10.0 | 1 | phishing |
| 1896 | Unencrypted AI Training Datasets/Model Checkpoints | critical | 10.0 | 1 | Data Breach (AI Models/Applications) |
| 1897 | Unmonitored Privileged Accounts | critical | 10.0 | 1 | Data Breach |
| 1898 | Insufficient Privileged Access Controls (e.g., standing admin roles) | critical | 10.0 | 1 | Social Engineering |
| 1899 | Lack of Granular Network Segmentation | critical | 10.0 | 1 | EDR/XDR Evasion |
| 1900 | Improper Whitelisting of Microsoft CDB | critical | 10.0 | 1 | APT (Advanced Persistent Threat) |
| 1901 | human error (employee downloading malware-laced tool) | critical | 10.0 | 1 | ransomware |
| 1902 | CVE-2020-3259 (Cisco) | critical | 10.0 | 1 | ransomware |
| 1903 | Unauthorized access to cloud servers | critical | 10.0 | 1 | Data Breach |
| 1904 | vendor distribution pipelines | critical | 10.0 | 1 | ransomware |
| 1905 | Weak or Outdated Cryptographic Standards | critical | 10.0 | 1 | Emerging Threat |
| 1906 | Vulnerabilities in AI development platforms | critical | 10.0 | 1 | AI-driven cyber threats |
| 1907 | Unspecified (32% of attacks involved exploited vulnerabilities) | critical | 10.0 | 1 | ransomware |
| 1908 | Absence of two-factor authentication | critical | 10.0 | 1 | Ransomware |
| 1909 | Firewall rule exposing RDP on a management server | critical | 10.0 | 1 | Ransomware |
| 1910 | legitimate platform abuse (e.g., Google Calendar, Azure domains) | critical | 10.0 | 1 | ransomware |
| 1911 | Cryptographic Implementation Flaws | critical | 10.0 | 1 | Security Vulnerability |
| 1912 | Internal Login | critical | 10.0 | 1 | Data Breach |
| 1913 | help-desk protocol vulnerabilities | critical | 10.0 | 1 | ransomware |
| 1914 | Unique validation node | critical | 10.0 | 1 | Cryptocurrency Theft |
| 1915 | Security issue with Haltdos | critical | 10.0 | 1 | Data Breach |
| 1916 | CVE-2026-20045 (Improper input validation in HTTP requests) | critical | 10.0 | 1 | Zero-Day Exploitation |
| 1917 | Overwhelmed network infrastructure, misconfigurations, unused ports | critical | 10.0 | 1 | DDoS |
| 1918 | Poor Patch Management | critical | 10.0 | 1 | Compliance Failure |
| 1919 | Stale Accounts (Former Employees with Retained Access) | critical | 10.0 | 1 | Data Breach |
| 1920 | Unmonitored API Traffic | critical | 10.0 | 1 | Data Breach |
| 1921 | Default passwords | critical | 10.0 | 1 | Exposure of Critical Infrastructure |
| 1922 | Third-party systems (Famly platform and one other unnamed system) | critical | 10.0 | 1 | data breach |
| 1923 | Modified Files on Server | critical | 10.0 | 1 | Data Breach |
| 1924 | delayed AV detection due to obfuscation | critical | 10.0 | 1 | ransomware |
| 1925 | Incorrect mailing of care management letters | critical | 10.0 | 1 | Data Breach |
| 1926 | Lack of Vendor Oversight | critical | 10.0 | 1 | Data Breach |
| 1927 | CVE-2025-31324 (unspecified CRM/DBMS/SaaS target) | critical | 10.0 | 1 | Cybercriminal Alliance Formation |
| 1928 | Lack of MFA Enforcement | critical | 10.0 | 1 | Social Engineering |
| 1929 | Plaintext Credential Storage | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1930 | Design Flaws | critical | 10.0 | 1 | Data Breach |
| 1931 | Exposed NAS devices | critical | 10.0 | 1 | Ransomware |
| 1932 | Legitimate features of Signal | critical | 10.0 | 1 | Phishing |
| 1933 | Lack of Real-Time Threat Detection | critical | 10.0 | 1 | Third-Party Breach |
| 1934 | Insider Threat, Social Engineering | critical | 10.0 | 1 | Espionage, Data Breach |
| 1935 | OpenClaw WebSocket-based AI agent framework vulnerability | critical | 10.0 | 1 | Zero-Click Exploit |
| 1936 | Human Error (Compliance with Fraudulent Requests) | critical | 10.0 | 1 | Data Breach |
| 1937 | Excessive Access Privileges | critical | 10.0 | 1 | Insider Threat |
| 1938 | CVE-2017-11882 (Microsoft Office) | critical | 10.0 | 1 | APT (Advanced Persistent Threat) |
| 1939 | CVE-2025-30401 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1940 | Compromised contractor credentials (specific vulnerability undisclosed) | critical | 10.0 | 1 | Data Breach |
| 1941 | upstream services | critical | 10.0 | 1 | ransomware |
| 1942 | unsecured copper infrastructure | critical | 10.0 | 1 | infrastructure vulnerability |
| 1943 | CVE-2025-27816 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1944 | Self-propagating payload in NPM packages | critical | 10.0 | 1 | Supply Chain Attack |
| 1945 | Lack of MFA on Personal/Social Media Accounts | critical | 10.0 | 1 | Phishing (Non-Email) |
| 1946 | Vulnerability in Huawei routers' VRP network operating system | critical | 10.0 | 1 | Cyberattack |
| 1947 | Alleged zero-day vulnerability in MyBB or misconfiguration | critical | 10.0 | 1 | Data Breach |
| 1948 | Lack of AIS/GPS signal authentication | critical | 10.0 | 1 | GPS spoofing |
| 1949 | System Migration Bug | critical | 10.0 | 1 | Data Breach |
| 1950 | Legacy System Exploits | critical | 10.0 | 1 | Ransomware |
| 1951 | Security Oversight | critical | 10.0 | 1 | Data Breach |
| 1952 | Optional MFA (to be phased out) | critical | 10.0 | 1 | Predictive Analysis |
| 1953 | Delayed Threat Response | critical | 10.0 | 1 | Operational Risk |
| 1954 | CVE-2025-47962 (Windows SDK EoP) | critical | 10.0 | 1 | Patch Release |
| 1955 | Obfuscation Techniques | critical | 10.0 | 1 | Malware Infection |
| 1956 | Poor Access Management | critical | 10.0 | 1 | Data Breach |
| 1957 | Lack of Segmentation | critical | 10.0 | 1 | Data Exposure |
| 1958 | Outdated EnCase driver (EnPortv.sys) with revoked certificate, Windows signature validation loophole for pre-2015 certificates | critical | 10.0 | 1 | BYOVD (Bring Your Own Vulnerable Driver) |
| 1959 | Lack of proactive threat detection and centralized incident response | critical | 10.0 | 1 | Cyber Espionage |
| 1960 | Lack of IP restrictions | critical | 10.0 | 1 | Data Breach |
| 1961 | Compromised Subcontractor Credentials | critical | 10.0 | 1 | Data Breach |
| 1962 | Internet-facing edge devices (40% targeted by China-nexus actors) | critical | 10.0 | 1 | AI-driven cyber threats |
| 1963 | Fragmented Cybersecurity Governance (no common procedures) | critical | 10.0 | 1 | Ransomware |
| 1964 | User Information Exposure | critical | 10.0 | 1 | Data Breach |
| 1965 | Unpatched Web Browser/Plugin Vulnerabilities | critical | 10.0 | 1 | Cyber Espionage |
| 1966 | Over-reliance on remote desktop tools without geofencing | critical | 10.0 | 1 | Espionage |
| 1967 | CVE-2022-41040 | critical | 10.0 | 1 | Ransomware |
| 1968 | Abuse of Device Admin and Accessibility Services permissions | critical | 10.0 | 1 | Ransomware |
| 1969 | SonicWall SSL VPN endpoints | critical | 10.0 | 1 | Ransomware |
| 1970 | Outdated versions of Windows | critical | 10.0 | 1 | Data Breach, Ransomware |
| 1971 | Security software vulnerability | critical | 10.0 | 1 | Ransomware |
| 1972 | CVE-2025-59468 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1973 | Weak password (no MFA) on internet-facing system | critical | 10.0 | 1 | Ransomware Attack |
| 1974 | Lack of multi-factor authentication (MFA) on a critical server | critical | 10.0 | 1 | ransomware |
| 1975 | lack of up-to-date incident response plans | critical | 10.0 | 1 | cyber attack |
| 1976 | arbitrary code execution in CI/CD pipeline | critical | 10.0 | 1 | supply chain attack |
| 1977 | Insufficient MFA Enforcement (Ghost Logins, SSO Gaps) | critical | 10.0 | 1 | Browser-Based Attack |
| 1978 | CVE-2026-25049 (insufficient input sanitization in expression evaluation mechanism) | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 1979 | CVE-2026-29000 | critical | 10.0 | 1 | Authentication Bypass |
| 1980 | Zero-day | critical | 10.0 | 1 | Ransomware |
| 1981 | JIT compiler hijacking, .NET Reactor obfuscation, static constructor execution | critical | 10.0 | 1 | Supply Chain Attack |
| 1982 | Weak Entra ID Configurations (e.g., external access policies) | critical | 10.0 | 1 | Social Engineering |
| 1983 | unchanged default passwords in VSAT terminals | critical | 10.0 | 1 | cyberattack |
| 1984 | Poor Oversight of Third-Party Vendor (PowerSchool) | critical | 10.0 | 1 | Data Breach |
| 1985 | Wide Attack Surfaces (Retail: staff, suppliers, IT systems) | critical | 10.0 | 1 | Ransomware |
| 1986 | CVE-2026-24789 | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1987 | Default Authentication Bypasses | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1988 | Unauthenticated File Read | critical | 10.0 | 1 | Vulnerability Exploitation |
| 1989 | exposed remote services | critical | 10.0 | 1 | Ransomware |
| 1990 | CVE-2024-24919 | critical | 10.0 | 1 | Ransomware |
| 1991 | Dual-use technology misuse | critical | 10.0 | 1 | Policy Violation and Dual-Use Technology Misuse |
| 1992 | Overlooked Access Rights | critical | 10.0 | 1 | Data Breach |
| 1993 | Well-known attack vector (unspecified) | critical | 10.0 | 1 | Data Breach |
| 1994 | over_permissive_cloud_settings | critical | 10.0 | 1 | ransomware |
| 1995 | Insufficient multi-factor authentication (MFA) protections | critical | 10.0 | 1 | Ransomware |
| 1996 | CVE-2024-21893 | critical | 10.0 | 1 | Ransomware |
| 1997 | Trust in AI Model Updates | critical | 10.0 | 1 | Malware |
| 1998 | LLM scope violation (CVE-2025-32711) | critical | 10.0 | 1 | Data Breach Vulnerability |
| 1999 | Lack of Timely Detection (6-month delay) | critical | 10.0 | 1 | Supply Chain Attack |
| 2000 | CVEs in Cisco's routers | critical | 10.0 | 1 | Data Breach |
| 2001 | CVE-2025-53770 (ToolShell, patch bypass for CVE-2025-49704/CVE-2025-49706) | critical | 10.0 | 1 | Cyber Espionage |
| 2002 | Over-the-Air Broadcast Without Protection | critical | 10.0 | 1 | Data Interception |
| 2003 | exploitation of maritime regulatory gaps | critical | 10.0 | 1 | AIS spoofing |
| 2004 | limited transparency in global supply chains | critical | 10.0 | 1 | supply chain attack |
| 2005 | CVE-2024-11120 | critical | 10.0 | 1 | Cyberattack |
| 2006 | Lack of Multi-Factor Authentication (MFA) for Vendor Logins | critical | 10.0 | 1 | Cyberattack |
| 2007 | Compromised Vendor Credentials | critical | 10.0 | 1 | Phishing, Malware Distribution |
| 2008 | Unsalted Password Hashes (pre-remediation) | critical | 10.0 | 1 | Data Breach |
| 2009 | Unpatched Microsoft SharePoint Vulnerabilities | critical | 10.0 | 1 | Cyber Espionage |
| 2010 | Potential zero-day in F5 products | critical | 10.0 | 1 | Data Breach |
| 2011 | Known vulnerability in the email system | critical | 10.0 | 1 | Data Breach |
| 2012 | Overly permissive IAM policies | critical | 10.0 | 1 | Supply-Chain Attack |
| 2013 | Virtual Office portal public access | critical | 10.0 | 1 | ransomware |
| 2014 | Lack of Monitoring for Insider Threats | critical | 10.0 | 1 | SCADA Tampering / Insider Threat |
| 2015 | Content management system vulnerability | critical | 10.0 | 1 | Data Breach |
| 2016 | lack of cyber-physical resilience in maritime navigation systems | critical | 10.0 | 1 | cyber deception |
| 2017 | Inadequate Data Encryption | critical | 10.0 | 1 | Ransomware |
| 2018 | Privilege Escalation | critical | 10.0 | 1 | Vulnerability Exploitation |
| 2019 | Disconnected IAM Systems | critical | 10.0 | 1 | Predictive Analysis |
| 2020 | Unspecified vulnerability in MOVEit file transfer platform (known to CL0P) | critical | 10.0 | 1 | Data Breach |
| 2021 | Lack of Employee Cybersecurity Training | critical | 10.0 | 1 | Ransomware |
| 2022 | Microsoft Exchange (unspecified CVEs) | critical | 10.0 | 1 | ransomware |
| 2023 | IMSI-capturing | critical | 10.0 | 1 | Surveillance |
| 2024 | CVE-2024-9852 | critical | 10.0 | 1 | Vulnerabilities in SCADA Systems |
| 2025 | Weak Third-Party Security Controls | critical | 10.0 | 1 | Data Breach |
| 2026 | SCADA system vulnerabilities | critical | 10.0 | 1 | DDoS |
| 2027 | CVE-2025-5777 (Citrix Bleed 2) | critical | 10.0 | 1 | Ransomware |
| 2028 | Lack of Automated PII Detection | critical | 10.0 | 1 | Data Leak |
| 2029 | CVE-2025-49844 (RediShell - Use-after-free in Lua sandbox) | critical | 10.0 | 1 | Vulnerability |
| 2030 | Trustwave’s miscategorization of breach alert as 'moderate' (delayed response) | critical | 10.0 | 1 | Ransomware |
| 2031 | Lack of a business associate agreement | critical | 10.0 | 1 | Ransomware Attack |
| 2032 | CVE-2026-22755 | critical | 10.0 | 1 | Remote Code Execution (RCE) |
| 2033 | Technical Security Configuration Issue | critical | 10.0 | 1 | Data Breach |
| 2034 | Absence of AI Governance Frameworks | critical | 10.0 | 1 | Unauthorized AI Deployment |
| 2035 | AI's inability to recognize malicious intent in fragmented tasks | critical | 10.0 | 1 | cyberespionage |
| 2036 | Employee Theft | critical | 10.0 | 1 | Data Breach |
| 2037 | CVE-2022-26134 (Atlassian OGNL Injection) | critical | 10.0 | 1 | cyberespionage |
| 2038 | Undisclosed vulnerabilities in F5 BIG-IP (actively patched but stolen pre-disclosure) | critical | 10.0 | 1 | Supply Chain Compromise |
| 2039 | Improper oversight and mismanagement of data protection protocols | critical | 10.0 | 1 | Data Breach |
| 2040 | API code change flaw, predictable device serial numbers, unencrypted MFA scratch codes | critical | 10.0 | 1 | Ransomware |
| 2041 | weak credential management (golden ticket risk) | critical | 10.0 | 1 | ransomware |
| 2042 | Lack of Security Layers | critical | 10.0 | 1 | Ransomware |
| 2043 | human error (clicking suspicious links) | critical | 10.0 | 1 | general cybersecurity awareness |
| 2044 | Lack of Data Processing Agreements (DPAs/DSAs) | critical | 10.0 | 1 | Data Privacy Violation |
| 2045 | GPS signal weakness | critical | 10.0 | 1 | spoofing |
| 2046 | third-party ecosystem vulnerabilities | critical | 10.0 | 1 | ransomware |
| 2047 | Stale IAM Accounts in AI Environments | critical | 10.0 | 1 | Data Breach (AI Models/Applications) |
| 2048 | Unsecured Public Wi-Fi | critical | 10.0 | 1 | Awareness Campaign |
| 2049 | Poor Vendor Security Practices | critical | 10.0 | 1 | Third-Party Breach |
| 2050 | CVE-2024-12356 | critical | 10.0 | 1 | Breach |
| 2051 | Lack of Anomaly Detection | critical | 10.0 | 1 | Data Breach Risk |
| 2052 | CVE-2025-20352 (Cisco IOS SNMP Flaw) | critical | 10.0 | 1 | Ransomware |
| 2053 | Weak Token Management in Drift Integration | critical | 10.0 | 1 | Supply Chain Attack |
| 2054 | Inadequate Training | critical | 10.0 | 1 | Data Breach |
| 2055 | kernel-level access via vulnerable driver | critical | 10.0 | 1 | ransomware |
| 2056 | Malware in plug-ins | critical | 10.0 | 1 | Data Privacy and Cybersecurity Advisory |
| 2057 | Implicit TLS | critical | 10.0 | 1 | Cross-protocol Application Layer Desynchronization |
| 2058 | CVE-2022-42475 | critical | 10.0 | 1 | Advanced Persistent Threat (APT) |
| 2059 | Exposed Firewall Configuration Backups (Encrypted but Sensitive) | critical | 10.0 | 1 | Unauthorized Access |
| 2060 | uneven cybersecurity maturity | critical | 10.0 | 1 | data breach |
| 2061 | Software Development and Distribution Processes | critical | 10.0 | 1 | Supply Chain Attack |
| 2062 | npm package hijacking | critical | 10.0 | 1 | supply chain attack |
| 2063 | Previously unknown vulnerability in firewall software | critical | 10.0 | 1 | Ransomware Attack |
| 2064 | Unsecured Email Channels | critical | 10.0 | 1 | Data Breach (General Discussion) |
| 2065 | Legacy system integration vulnerabilities during platform consolidation | critical | 10.0 | 1 | Ransomware Attack |
| 2066 | Unauthorized Access by Employee | critical | 10.0 | 1 | Data Breach |
| 2067 | Lack of Behavioral Anomaly Detection | critical | 10.0 | 1 | Insider Threat |
| 2068 | SonicWall SSL VPN Misconfiguration | critical | 10.0 | 1 | Unauthorized Access |
| 2069 | CVE-2024-55591 (FortiOS/FortiProxy Race Condition Authentication Bypass) | critical | 10.0 | 1 | Unauthorized Access |
| 2070 | Accellion FTA server vulnerability | critical | 9.0 | 1 | Data Breach |
| 2071 | Lack of authentication controls | critical | 9.0 | 1 | Data Exposure |
| 2072 | Past Data Breach | critical | 9.0 | 1 | Phishing Campaign |
| 2073 | Customer Accounts | critical | 9.0 | 1 | Credential Stuffing |
| 2074 | Charting software | critical | 9.0 | 1 | Ransomware |
| 2075 | File Transfer Service Provider | critical | 9.0 | 1 | Data Breach |
| 2076 | Unauthorized Access by Terminated Employee | critical | 9.0 | 1 | Data Breach |
| 2077 | Misplaced Portable Flash Drive | critical | 9.0 | 1 | Data Breach |
| 2078 | Weak or Stolen Login Credentials | critical | 9.0 | 1 | Data Breach |
| 2079 | Multiple vulnerabilities in Cisco Small Business RV Series routers | critical | 9.0 | 1 | Vulnerability Exploitation |
| 2080 | Sophos Firewall versions 18.5 MR3 (18.5.3) | critical | 9.0 | 1 | Vulnerability Exploitation |
| 2081 | Critical CVEs | critical | 8.5 | 1 | Identity Compromise |
| 2082 | Human Trust (Job Seekers) | critical | 8.5 | 1 | APT (Advanced Persistent Threat) |
| 2083 | CVE-2026-26144 | critical | 8.5 | 1 | Vulnerability |
| 2084 | Missile defense system vulnerability | critical | 8.5 | 1 | Data Breach |
| 2085 | CVE-2026-23595 | critical | 8.5 | 1 | Privilege Escalation |
| 2086 | insufficient workforce training | critical | 8.5 | 1 | ransomware |
| 2087 | Misconfiguration in Salesforce environment, lack of least privilege principle, absence of Zero Trust architecture, inadequate behavioral monitoring | critical | 8.5 | 1 | Data Breach |
| 2088 | CVE-2026-3062 (Out-of-bounds read/write in Tint shader engine) | critical | 8.5 | 1 | Vulnerability Patch |
| 2089 | Mali GPU Data Compression | critical | 8.5 | 1 | Data Theft |
| 2090 | Insider Knowledge (Ethan Lipnik's Willingness to Share) | critical | 8.5 | 1 | Trade Secret Theft |
| 2091 | Lack of reasonable cyber security measures | critical | 8.5 | 1 | Data Breach |
| 2092 | User trust and lack of awareness | critical | 8.5 | 1 | Phishing |
| 2093 | Improper IAM Policies | critical | 8.5 | 1 | Cloud Security Breach |
| 2094 | Oracle PeopleSoft vulnerability | critical | 8.5 | 1 | Ransomware |
| 2095 | Third-party secure file transfer tool vulnerability | critical | 8.5 | 1 | Data Breach |
| 2096 | Parking Permit System Flaw (since 2017) | critical | 8.5 | 1 | Data Breach |
| 2097 | CVE-2025-54136 (MCPoison) - Trust Model Flaw in MCP Configuration Handling | critical | 8.5 | 1 | Vulnerability |
| 2098 | weak validator key security | critical | 8.5 | 1 | blockchain exploit |
| 2099 | Weaknesses in third-party integrations with Salesforce-connected applications (not Salesforce itself) | critical | 8.5 | 1 | Data Breach |
| 2100 | Token Sprawl | critical | 8.5 | 1 | Data Breach |
| 2101 | Publicly Exposed API Token | critical | 8.5 | 1 | Data Breach (OAuth Token Compromise) |
| 2102 | No Technical Vulnerability (Human Factor) | critical | 8.5 | 1 | Trade Secret Theft |
| 2103 | Unsecured Public LLM Interactions | critical | 8.5 | 1 | Data Leakage |
| 2104 | ConnectWise software vulnerability | critical | 8.5 | 1 | Data Breach |
| 2105 | lack of secret scanning | critical | 8.5 | 1 | data exposure |
| 2106 | ZombieAgent (prompt injection in ChatGPT Connectors/Apps feature) | critical | 8.5 | 1 | Prompt Injection |
| 2107 | Shopping cart portions of the company's websites | critical | 8.5 | 1 | Data Breach |
| 2108 | DockerDash | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2109 | Progress Software's MOVEit Transfer application | critical | 8.5 | 1 | Data Breach |
| 2110 | Weak security practices | critical | 8.5 | 1 | Fraud/Scam |
| 2111 | Unspecified zero-day in FreePBX (versions 16 and 17 with endpoint module installed) | critical | 8.5 | 1 | Zero-day exploitation |
| 2112 | Account Credentials | critical | 8.5 | 1 | Data Breach |
| 2113 | Vulnerability in Progress Software Corporation's MOVEit Transfer product | critical | 8.5 | 1 | Data Breach |
| 2114 | Lack of Authentication on Cloud Storage | critical | 8.5 | 1 | Data Exposure |
| 2115 | Publicly Accessible Files | critical | 8.5 | 1 | Data Leak |
| 2116 | CVE-2026-1281 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2117 | CVE-2025-13915 (CWE-305: Authentication Bypass by Primary Weakness) | critical | 8.5 | 1 | Authentication Bypass |
| 2118 | Progress Software's MOVEit File Transfer solution | critical | 8.5 | 1 | Data Breach |
| 2119 | CVE-2026-3337 | critical | 8.5 | 1 | Cryptographic Vulnerability |
| 2120 | malicious CI/CD pipeline injection | critical | 8.5 | 1 | supply-chain attack |
| 2121 | Lack of AI-Specific Security Controls | critical | 8.5 | 1 | Supply Chain Attack |
| 2122 | Vendor's security shortcomings (unspecified) | critical | 8.5 | 1 | Data Breach (Third-Party Vendor) |
| 2123 | CVE-2026-3061 (Out-of-bounds read in Media component) | critical | 8.5 | 1 | Vulnerability Patch |
| 2124 | Weak point in the network | critical | 8.5 | 1 | Data Breach |
| 2125 | Support Credentials | critical | 8.5 | 1 | Data Breach |
| 2126 | Lack of Multi-Layered Authentication for Integrations | critical | 8.5 | 1 | Data Breach |
| 2127 | Zero-Click Prompt Injection in ChatGPT's Deep Research Tool | critical | 8.5 | 1 | Data Breach |
| 2128 | Discord's API | critical | 8.5 | 1 | Phishing |
| 2129 | Inconsistent DLP Policy Application | critical | 8.5 | 1 | Data Breach |
| 2130 | MOVEit Transfer application vulnerabilities | critical | 8.5 | 1 | Data Breach |
| 2131 | Visual Studio Code tasks.json | critical | 8.5 | 1 | Supply Chain Attack |
| 2132 | Lack of AI Governance Policies | critical | 8.5 | 1 | Data Leakage |
| 2133 | CVE-2026-20435 (MediaTek chipset boot chain weakness) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2134 | Weak BYOD Policies | critical | 8.5 | 1 | Insider Threat |
| 2135 | Identity and Access Management (IAM) Failures | critical | 8.5 | 1 | Data Breach |
| 2136 | Authentication bypass in Passwordstate Emergency Access (CVE pending) | critical | 8.5 | 1 | Authentication Bypass Vulnerability |
| 2137 | User account compromise | critical | 8.5 | 1 | Data Breach |
| 2138 | Lack of Input Sanitization for Hidden Commands | critical | 8.5 | 1 | Data Breach |
| 2139 | Human Error (Credential Theft via Smishing) | critical | 8.5 | 1 | Data Breach / Unauthorized Access |
| 2140 | MOVEit file transfer service vulnerability | critical | 8.5 | 1 | Data Breach |
| 2141 | MOVEit Transfer Critical Vulnerability (CVE-2023-34362) | critical | 8.5 | 1 | Data Breach |
| 2142 | Unmonitored Data Exfiltration via AI Prompts | critical | 8.5 | 1 | Data Leakage |
| 2143 | Unpatched vulnerabilities in third-party applications | critical | 8.5 | 1 | Third-party data exploitation |
| 2144 | Publicly accessible database without proper security measures | critical | 8.5 | 1 | Data Exposure |
| 2145 | CVE-2026-0958 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2146 | Abandoned software in trusted repository | critical | 8.5 | 1 | Phishing |
| 2147 | Insufficient Conditional Access Controls | critical | 8.5 | 1 | Cloud Security Breach |
| 2148 | Human error (phishing attack on staff) | critical | 8.5 | 1 | Data Breach |
| 2149 | Phishing or Credential Compromise | critical | 8.5 | 1 | Data Breach |
| 2150 | Inadequate data security controls / unauthorized access by insider | critical | 8.5 | 1 | Data Breach |
| 2151 | lack of encryption for stored data | critical | 8.5 | 1 | data breach |
| 2152 | human error (employee tricked into clicking malicious link) | critical | 8.5 | 1 | phishing |
| 2153 | inadequate contractor oversight | critical | 8.5 | 1 | data breach |
| 2154 | Improper deployment of third-party tracking technologies on public website leading to unauthorized data transfer | critical | 8.5 | 1 | Data Privacy Violation |
| 2155 | Generic Out-of-Bounds Read/Write in C/C++ (e.g., unchecked array indexing, `strcpy` overflows) | critical | 8.5 | 1 | Memory Corruption |
| 2156 | E-commerce Website | critical | 8.5 | 1 | Data Breach |
| 2157 | CVE-2025-54820 (Stack-based buffer overflow in *fgtupdates* service) | critical | 8.5 | 1 | Vulnerability |
| 2158 | mDNS Misconfiguration | critical | 8.5 | 1 | Misconfiguration |
| 2159 | CVE-2025-23121 | critical | 8.5 | 1 | Vulnerability |
| 2160 | AcroForms, FlateDecode (PDF features), abuse of legitimate cloud services (Vercel Blob storage) | critical | 8.5 | 1 | Phishing |
| 2161 | CVE-2025-14847 (MongoBleed) - unverified | critical | 8.5 | 1 | In-game abuse |
| 2162 | unpatched cloud tools (speculated) | critical | 8.5 | 1 | data breach |
| 2163 | Improper access control in cloud storage | critical | 8.5 | 1 | Data Breach |
| 2164 | Unspecified vulnerability in Oracle EBS | critical | 8.5 | 1 | Data Breach |
| 2165 | Cloud Database Platform | critical | 8.5 | 1 | Data Breach |
| 2166 | Phone signal interception | critical | 8.5 | 1 | Surveillance |
| 2167 | Lack of AI Governance Frameworks | critical | 8.5 | 1 | Data Leakage |
| 2168 | human trust in search engine ads | critical | 8.5 | 1 | phishing |
| 2169 | Lack of Robust Encryption/Monitoring in Data Flows | critical | 8.5 | 1 | Data Breach |
| 2170 | previously_compromised_data | critical | 8.5 | 1 | data_breach |
| 2171 | Weakness in OAuth token security for Salesloft Drift integrations | critical | 8.5 | 1 | Data Breach |
| 2172 | Full takeover of Tesla’s infotainment system | critical | 8.5 | 1 | Zero-Day Vulnerabilities |
| 2173 | Lack of Data Minimization | critical | 8.5 | 1 | Data Breach |
| 2174 | Irreversible Identity Linking in NFT Ownership | critical | 8.5 | 1 | Privacy Violation |
| 2175 | Compromised OAuth tokens in Gainsight-published applications (no vulnerability in Salesforce platform itself) | critical | 8.5 | 1 | Data Breach |
| 2176 | Inadequate Third-Party Vetting | critical | 8.5 | 1 | Data Breach |
| 2177 | no encryption | critical | 8.5 | 1 | data breach |
| 2178 | CVE-2025-13328 | critical | 8.5 | 1 | Information Leak |
| 2179 | Outdated Security Protocols (vendor) | critical | 8.5 | 1 | Data Breach |
| 2180 | Unsecured LLM infrastructure | critical | 8.5 | 1 | Security Vulnerability |
| 2181 | Lack of Encryption on Laptop | critical | 8.5 | 1 | Data Breach (Physical Theft) |
| 2182 | Morris Worm (1988 - Buffer Overflow in `fingerd`/`sendmail`) | critical | 8.5 | 1 | Memory Corruption |
| 2183 | Exposed Elasticsearch Database without Password | critical | 8.5 | 1 | Data Breach |
| 2184 | Silverlight | critical | 8.5 | 1 | Cyber Attack |
| 2185 | Microsoft Entra SSO Code | critical | 8.5 | 1 | Data Breach |
| 2186 | Vulnerabilities in online quote tools | critical | 8.5 | 1 | data breach |
| 2187 | unauthorized data upload to external platform | critical | 8.5 | 1 | data breach |
| 2188 | Malicious code in online store | critical | 8.5 | 1 | Data Breach |
| 2189 | Software Misconfiguration in Online Grant System | critical | 8.5 | 1 | Data Breach |
| 2190 | CVE-2026-26133 | critical | 8.5 | 1 | Cross-Prompt Injection Attack (XPIA) |
| 2191 | Weak Access Controls (Absent MFA, Insufficient Lockout Policies) in SonicWall SSLVPN | critical | 8.5 | 1 | Ransomware |
| 2192 | Unpatched Security Gaps | critical | 8.5 | 1 | Security Oversight |
| 2193 | Personal devices infected with malware | critical | 8.5 | 1 | Credential Leak |
| 2194 | Inadequate cybersecurity measures | critical | 8.5 | 1 | Data Breach |
| 2195 | Coruna (23 distinct security flaws) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2196 | Lack of Content Verification Mechanisms | critical | 8.5 | 1 | Content Theft and Fraud |
| 2197 | CWE-352: Cross-Site Request Forgery (CSRF) (via API manipulation) | critical | 8.5 | 1 | Data Breach |
| 2198 | Instagram API (alleged) | critical | 8.5 | 1 | Data Scrape / Alleged Breach |
| 2199 | improper access controls (configuration gap in S3 bucket permissions) | critical | 8.5 | 1 | data breach |
| 2200 | Default Data Retention Policies in LLMs (e.g., OpenAI’s 30-day deletion lag) | critical | 8.5 | 1 | Data Leakage |
| 2201 | CVE-2026-23598 | critical | 8.5 | 1 | Privilege Escalation |
| 2202 | Progress MOVEit Transfer tool | critical | 8.5 | 1 | Data Breach |
| 2203 | Stolen Usernames and Passwords | critical | 8.5 | 1 | Data Breach |
| 2204 | Unauthorized access to business email account | critical | 8.5 | 1 | Data Breach |
| 2205 | Outdated TEE image reuse | critical | 8.5 | 1 | Zero-day vulnerability |
| 2206 | Adobe Reader | critical | 8.5 | 1 | Cyber Attack |
| 2207 | CVE-2025-43300 (Apple OS-level vulnerability) | critical | 8.5 | 1 | Zero-day vulnerability |
| 2208 | Cloud Infrastructure Security | critical | 8.5 | 1 | Cyberattack |
| 2209 | CVE-2024-5806 | critical | 8.5 | 1 | Supply Chain Attack, Data Breach, Ransomware |
| 2210 | Click2Gov Payment System | critical | 8.5 | 1 | Data Breach |
| 2211 | CVE-2025-59452 (Cleartext Transmission) | critical | 8.5 | 1 | Denial-of-Service |
| 2212 | Publicly accessible profile information | critical | 8.5 | 1 | Data Scraping |
| 2213 | One-click IP leak via MTProxy | critical | 8.5 | 1 | Data Leak |
| 2214 | Unpatched vulnerabilities, Unintentional installation of malware by IT personnel with admin privileges | critical | 8.5 | 1 | Supply Chain Attack, Data Breach |
| 2215 | Improper handling of ACME HTTP-01 challenge paths in Cloudflare WAF | critical | 8.5 | 1 | Zero-Day Vulnerability |
| 2216 | Okta SSO Credentials | critical | 8.5 | 1 | Data Breach |
| 2217 | CWE-287: Improper Authentication (Authentication Bypass) | critical | 8.5 | 1 | Data Breach |
| 2218 | Potential Configuration Flaws in Shared Platforms (e.g., Salesforce-like systems) | critical | 8.5 | 1 | Data Breach |
| 2219 | Lack of organization-wide two-factor authentication | critical | 8.5 | 1 | Data Breach |
| 2220 | Unverified JWT payload | critical | 8.5 | 1 | Vulnerability Exploit |
| 2221 | ClawJacked (CVE not specified) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2222 | Improper Access Control in SharePoint | critical | 8.5 | 1 | Data Exposure |
| 2223 | Multi-factor Authentication (MFA) Bypass, Credential Theft | critical | 8.5 | 1 | Vishing (Voice Phishing) |
| 2224 | Unsecured Kafka Broker instance | critical | 8.5 | 1 | Data Exposure |
| 2225 | Publicly accessible production chatbots | critical | 8.5 | 1 | LLMjacking |
| 2226 | Improperly configured AWS S3 storage | critical | 8.5 | 1 | Data Breach |
| 2227 | CVE-2025-12807 (SQL Injection) | critical | 8.5 | 1 | Denial-of-Service |
| 2228 | CVE-2026-21513 | critical | 8.5 | 1 | Zero-Day Vulnerability |
| 2229 | Semantic Drift in Multimodal AI | critical | 8.5 | 1 | Prompt Extraction |
| 2230 | CVE-2026-1591 | critical | 8.5 | 1 | Supply Chain Attack |
| 2231 | Weaknesses in lock systems | critical | 8.5 | 1 | Hardware vulnerability |
| 2232 | Insufficient MFA | critical | 8.5 | 1 | Phishing |
| 2233 | CVE-2026-24281 | critical | 8.5 | 1 | Data Exposure |
| 2234 | Security access codes obtained through deception | critical | 8.5 | 1 | Hacking, Identity Theft, Data Breach, Cyberstalking |
| 2235 | Lack of Physical Security for Development Device | critical | 8.5 | 1 | Trade Secret Theft |
| 2236 | Progress Software | critical | 8.5 | 1 | Data Breach |
| 2237 | Network Segmentation Protocols | critical | 8.5 | 1 | Data Breach |
| 2238 | Data Exposure | critical | 8.5 | 1 | Data Leak |
| 2239 | Private Code Repositories (GitLab, Visual Studio Code) | critical | 8.5 | 1 | Malware Deployment |
| 2240 | CVE-2025-31334 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2241 | Default Password on Code Repository | critical | 8.5 | 1 | Data Exposure |
| 2242 | Misconfigured AWS Storage Bucket | critical | 8.5 | 1 | Data Exposure |
| 2243 | Major Security Flaw in Website | critical | 8.5 | 1 | Data Exposure |
| 2244 | Access Control Weakness | critical | 8.5 | 1 | Data Exposure |
| 2245 | Cross-border data storage without GDPR-equivalent protections | critical | 8.5 | 1 | Data Breach Risk |
| 2246 | Lack of transparency in AI decision-making | critical | 8.5 | 1 | Cybersecurity Risk Assessment |
| 2247 | CVE-2025-40778 (Logic Flaw in BIND 9’s Resolver - Bailiwick Principle Violation) | critical | 8.5 | 1 | Vulnerability |
| 2248 | Auto-execution of URL parameters in Microsoft Copilot Personal sessions | critical | 8.5 | 1 | Prompt Injection Attack |
| 2249 | unpatched vulnerabilities in enterprise software | critical | 8.5 | 1 | ransomware |
| 2250 | Website Bug | critical | 8.5 | 1 | Data Exposure |
| 2251 | Governance gap in data access controls | critical | 8.5 | 1 | Third-party data exploitation |
| 2252 | Inadequate data retention/deletion policies | critical | 8.5 | 1 | Data Breach Risk |
| 2253 | Weak Password Reset Mechanisms | critical | 8.5 | 1 | Cyberattack |
| 2254 | Fractured auditability across communication channels | critical | 8.5 | 1 | Data Governance Blind Spot |
| 2255 | Opportunistic scanning for sensitive file extensions (e.g., `.openclaw`) | critical | 8.5 | 1 | Infostealer Attack |
| 2256 | Zero-day flaw in Oracle E-Business Suite (EBS) | critical | 8.5 | 1 | Data Breach |
| 2257 | Web application vulnerability (Click2Gov online payment system) | critical | 8.5 | 1 | Data Breach |
| 2258 | Unpatched VPN endpoint | critical | 8.5 | 1 | Ransomware Attack |
| 2259 | Human Manipulation (Social Engineering) | critical | 8.5 | 1 | Phishing (Vishing) |
| 2260 | Account verification procedure | critical | 8.5 | 1 | Data Breach |
| 2261 | Remote code execution vulnerability in Secure Mobile Access (SMA) appliances | critical | 8.5 | 1 | Remote Code Execution |
| 2262 | CVE-2026-21519 | critical | 8.5 | 1 | Privilege Escalation |
| 2263 | CVE-2025-61884 (CVSS 7.5 - Information Disclosure in Runtime UI) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2264 | Insecure Amazon S3 databases | critical | 8.5 | 1 | Data Exposure |
| 2265 | Long-Term Data Retention | critical | 8.5 | 1 | Data Breach |
| 2266 | Legacy email protections | critical | 8.5 | 1 | Phishing |
| 2267 | AI-generated_deepfakes | critical | 8.5 | 1 | data_breach |
| 2268 | Transaction Front-running | critical | 8.5 | 1 | Security Breach |
| 2269 | Previously unknown vulnerability in Oracle E-Business Suite | critical | 8.5 | 1 | Data Breach |
| 2270 | Soliton Systems K.K FileZen | critical | 8.5 | 1 | APT Activity |
| 2271 | Fragmented Data Access Controls | critical | 8.5 | 1 | Data Privacy Fragmentation |
| 2272 | CVE-2025-22231 | critical | 8.5 | 1 | Vulnerability |
| 2273 | CVE-2024-38200 (MSHTML/Trident engine RCE) | critical | 8.5 | 1 | Zero-Day Exploit |
| 2274 | Lack of default sandboxing, Ineffective filtering of untrusted content, Plaintext storage of API keys and session tokens, Reliance on language models for critical security decisions, Execution of tool calls without explicit user approval | critical | 8.5 | 1 | Malware Distribution, Data Exfiltration, Prompt Injection, Backdoor Installation |
| 2275 | CVE-2026-3063 (Improper implementation in DevTools) | critical | 8.5 | 1 | Vulnerability Patch |
| 2276 | potential Oracle E-Business Suite vulnerability | critical | 8.5 | 1 | data breach |
| 2277 | Authorization control bypass in Google Gemini | critical | 8.5 | 1 | Indirect Prompt Injection |
| 2278 | Verbose error messages exposing OAuth 2.0 bearer tokens | critical | 8.5 | 1 | Phishing, Data Theft, Persistent Access |
| 2279 | MOVEit file transfer tool | critical | 8.5 | 1 | Data Breach |
| 2280 | unsecured Azure Blob Storage | critical | 8.5 | 1 | data breach |
| 2281 | CVE-2026-2836 | critical | 8.5 | 1 | HTTP Request Smuggling |
| 2282 | Weak authentication (Dior Instagram) | critical | 8.5 | 1 | Data Breach |
| 2283 | Tracking code sharing data with third-party advertisers | critical | 8.5 | 1 | Data Breach |
| 2284 | Quantum Model Memorization of Training Data | critical | 8.5 | 1 | Privacy Breach |
| 2285 | Insufficient Monitoring of EHR Access | critical | 8.5 | 1 | Data Breach |
| 2286 | CVE-2025-51683 (Blind SQL Injection) | critical | 8.5 | 1 | SQL Injection |
| 2287 | CVE-2026-0709 | critical | 8.5 | 1 | Supply Chain Attack |
| 2288 | Notepad++ WinGUp Update Verification Flaw | critical | 8.5 | 1 | Supply Chain Attack |
| 2289 | Hardcoded Google API keys with expanded authentication capabilities | critical | 8.5 | 1 | Data Exposure |
| 2290 | CVE-2026-27970 | critical | 8.5 | 1 | Cross-Site Scripting (XSS) |
| 2291 | Cardinality-Based Rate Limiting Bypass | critical | 8.5 | 1 | Privacy Violation |
| 2292 | Vendor Error | critical | 8.5 | 1 | Data Breach |
| 2293 | Over-Permissive Third-Party App Access (Gmail, Google Drive, Dropbox) | critical | 8.5 | 1 | Data Breach |
| 2294 | Unsanitized parameters in database queries leading to SQL injection | critical | 8.5 | 1 | SQL Injection |
| 2295 | Authentication vulnerabilities in Coupang's servers | critical | 8.5 | 1 | Data Breach |
| 2296 | CVE-not-yet-assigned (as of description) – RCE via `new Function()` in `expr-eval` < 2.0.2 | critical | 8.5 | 1 | Vulnerability |
| 2297 | Timing Attack via Rendering Pipeline | critical | 8.5 | 1 | Data Theft |
| 2298 | CVE-2026-21519 (Type Confusion - CWE-843) | critical | 8.5 | 1 | Elevation of Privilege |
| 2299 | CVE-2024-9680 | critical | 8.5 | 1 | Zero-Day Exploit |
| 2300 | Legacy email protocols (IMAP/POP3) | critical | 8.5 | 1 | Data Breach |
| 2301 | Unauthorized Access to Customer Account Information | critical | 8.5 | 1 | Data Exposure |
| 2302 | IDOR | critical | 8.5 | 1 | Data Breach |
| 2303 | Hardcoded Supabase API key in client-side JavaScript with no Row Level Security (RLS) policies | critical | 8.5 | 1 | Data Breach |
| 2304 | Auto-execution of `runOptions.runOn: 'folderOpen'` in tasks | critical | 8.5 | 1 | Arbitrary Code Execution |
| 2305 | CVE-2026-20163 (Improper Neutralization of Special Elements used in a Command - CWE-77) | critical | 8.5 | 1 | Remote Command Execution (RCE) |
| 2306 | Oracle E-Business Suite (versions 12.2.3 to 12.2.14) | critical | 8.5 | 1 | Data Breach |
| 2307 | No Rate Limiting | critical | 8.5 | 1 | Data Breach |
| 2308 | Unsecured AWS bucket | critical | 8.5 | 1 | Data Breach |
| 2309 | Endpoint Detection and Response (EDR) Services | critical | 8.5 | 1 | Ransomware Attack |
| 2310 | npm run dev execution | critical | 8.5 | 1 | Supply Chain Attack |
| 2311 | Back-end system vulnerability | critical | 8.5 | 1 | Data Breach |
| 2312 | Unauthorized access due to exposed credentials | critical | 8.5 | 1 | Data Breach |
| 2313 | Lack of Authentication or Access Restrictions | critical | 8.5 | 1 | Data Leak |
| 2314 | Employee Bypass of Sanctioned Tools | critical | 8.5 | 1 | Data Leakage |
| 2315 | Gateway between the airline and a payment processor | critical | 8.5 | 1 | Data Breach |
| 2316 | CVE-2026-26123 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2317 | CVE-2026-22219 (CVSS 8.3) | critical | 8.5 | 1 | Data Breach |
| 2318 | Critical security flaw in License Express system | critical | 8.5 | 1 | Data Breach |
| 2319 | API vulnerabilities | critical | 8.5 | 1 | Quantum Computing Threat |
| 2320 | Employee deception, potential weak passwords or third-party vulnerabilities (Okta identity management service) | critical | 8.5 | 1 | Data Breach |
| 2321 | CVE-2025-41115 (Improper Mapping of SCIM 'externalId' to Internal 'user.uid') | critical | 8.5 | 1 | Vulnerability |
| 2322 | Weak Authentication in AI Platforms | critical | 8.5 | 1 | Data Leakage |
| 2323 | Biometric authentication exploitation | critical | 8.5 | 1 | Data Breach |
| 2324 | Plain text storage of login details | critical | 8.5 | 1 | Data Breach |
| 2325 | CVE-2025-54309 (CrushFTP) | critical | 8.5 | 1 | Ransomware |
| 2326 | Stolen Personal Data from External Sources | critical | 8.5 | 1 | Data Breach |
| 2327 | Node.js workflows | critical | 8.5 | 1 | Supply Chain Attack |
| 2328 | Compromised Administrator Account | critical | 8.5 | 1 | Ransomware |
| 2329 | Lack of visibility into employee AI tool usage | critical | 8.5 | 1 | Data Leakage |
| 2330 | Hardcoded login credentials in the source code | critical | 8.5 | 1 | Data Breach |
| 2331 | Misunderstandings over Data Ownership | critical | 8.5 | 1 | Insider Threat |
| 2332 | inadequate staff training | critical | 8.5 | 1 | data breach |
| 2333 | legitimate credentials misuse | critical | 8.5 | 1 | phishing |
| 2334 | Vulnerability with technology vendor | critical | 8.5 | 1 | Data Breach |
| 2335 | GoAnywhere MFT (specific CVE not mentioned) | critical | 8.5 | 1 | Data Breach |
| 2336 | Weak encryption (unsalted MD5 password hashes) | critical | 8.5 | 1 | Data Breach |
| 2337 | Improper FOIA Redaction Procedures | critical | 8.5 | 1 | Data Breach |
| 2338 | Weak DMARC/SPF policies, Missing MTA-STS, Unvalidated/Expired Server Certificates, Misconfigured Microsoft 365 Security Tools | critical | 8.5 | 1 | Data Breach |
| 2339 | Architectural weakness in Google Gemini Enterprise and Vertex AI Search (RAG-based trust boundary exploitation) | critical | 8.5 | 1 | Zero-Click Vulnerability, Indirect Prompt Injection |
| 2340 | Hardcoded API Keys in Public Repositories and Websites | critical | 8.5 | 1 | Data Exposure |
| 2341 | Integer Overflow | critical | 8.5 | 1 | Privilege Escalation |
| 2342 | Lack of Access Controls / Unencrypted Data Storage | critical | 8.5 | 1 | Data Exposure |
| 2343 | CVE-2026-3102 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2344 | CVE-2025-61882 (Zero-day in Oracle E-Business Suite) | critical | 8.5 | 1 | Data Breach |
| 2345 | CVE-2025-52436 (Improper Neutralization of Input During Web Page Generation - CWE-79) | critical | 8.5 | 1 | Cross-Site Scripting (XSS) |
| 2346 | Absence of Visibility/Monitoring Tools | critical | 8.5 | 1 | Data Leakage |
| 2347 | NPM Dependencies | critical | 8.5 | 1 | Malware Deployment |
| 2348 | Bias in AI algorithms (e.g., loan approvals, credit scoring) | critical | 8.5 | 1 | Cybersecurity Risk Assessment |
| 2349 | Oracle’s eBusiness Suite software vulnerability | critical | 8.5 | 1 | Data Breach |
| 2350 | MOVEit® Secure File Transfer software | critical | 8.5 | 1 | Data Breach |
| 2351 | Inadequate security measures (unspecified) | critical | 8.5 | 1 | Data Breach |
| 2352 | Client-Side Reward Points Validation (Mobile App) | critical | 8.5 | 1 | Data Exposure |
| 2353 | lack of phishing-resistant authentication | critical | 8.5 | 1 | phishing |
| 2354 | Unlimited Coupon Redemptions (CosMc’s App) | critical | 8.5 | 1 | Data Exposure |
| 2355 | Multi-Factor Authentication (MFA) bypass, Session token hijacking, Credential theft via phishing kits | critical | 8.5 | 1 | Phishing/Vishing, Credential Theft, Data Breach, Session Hijacking |
| 2356 | CVE-2026-23597 | critical | 8.5 | 1 | Privilege Escalation |
| 2357 | Customer inadvertent disclosure of credentials | critical | 8.5 | 1 | Data Breach |
| 2358 | improper access controls / misconfigured portal | critical | 8.5 | 1 | data breach |
| 2359 | Fragmented policies for data in motion | critical | 8.5 | 1 | Data Governance Blind Spot |
| 2360 | Lack of input validation controls | critical | 8.5 | 1 | Data Security Audit |
| 2361 | Incorrect privacy settings on public maps | critical | 8.5 | 1 | Data Exposure |
| 2362 | Unsecured email API endpoints with improper input validation | critical | 8.5 | 1 | Phishing, Data Theft, Persistent Access |
| 2363 | Insufficient data filtering in AI screenshot feature | critical | 8.5 | 1 | Data Breach |
| 2364 | Improper data handling via third-party tracking tools (e.g., Google Analytics, Meta Pixel) | critical | 8.5 | 1 | Data Privacy Breach |
| 2365 | Human Error (Improper Document Upload) | critical | 8.5 | 1 | Data Breach (Inadvertent Disclosure) |
| 2366 | CVE-2024-13496 | critical | 8.5 | 1 | SQL Injection |
| 2367 | CVE-2025-5806 | critical | 8.5 | 1 | Cross-Site Scripting (XSS) |
| 2368 | Weak or default SSH credentials | critical | 8.5 | 1 | Botnet |
| 2369 | CVE-2026-XXXXX (Local WebSocket Gateway Authentication Bypass) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2370 | Unpatched flaw (addressed in July 2023 update, additional vulnerabilities patched in October 2023) | critical | 8.5 | 1 | Data Breach |
| 2371 | Lack of Data Encryption in University Advancement Database | critical | 8.5 | 1 | Data Breach |
| 2372 | Arbitrary Order Data Injection (CosMc’s App) | critical | 8.5 | 1 | Data Exposure |
| 2373 | Misconfigured Remote Access Systems | critical | 8.5 | 1 | Data Breach |
| 2374 | Improper Access by Employee | critical | 8.5 | 1 | Data Breach |
| 2375 | CVE-2026-22218 (Arbitrary File Read) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2376 | Improper Access Control (Publicly Exposed Sensitive Data) | critical | 8.5 | 1 | Data Breach |
| 2377 | Compromised Salesforce integrations, Zendesk customer support system | critical | 8.5 | 1 | Data Breach |
| 2378 | CVE-2026-24308 | critical | 8.5 | 1 | Data Exposure |
| 2379 | Download of malicious apps | critical | 8.5 | 1 | Malware |
| 2380 | CVE-2025-7399 (Unauthenticated RCE in Samsung MagicINFO 9 Server) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2381 | CVE-2026-20046 | critical | 8.5 | 1 | Privilege Escalation |
| 2382 | Human error (employee susceptibility to scams), lack of robust multi-factor authentication (MFA) enforcement | critical | 8.5 | 1 | Data Breach |
| 2383 | Improper Token Management | critical | 8.5 | 1 | Data Breach |
| 2384 | CVE pending (related to 'node-forge' cryptographic signature verification flaw) | critical | 8.5 | 1 | Vulnerability |
| 2385 | Human Factor (Social Engineering) | critical | 8.5 | 1 | Data Breach |
| 2386 | Delayed Incident Reporting | critical | 8.5 | 1 | Data Breach |
| 2387 | MOVEit secure file transfer tool vulnerability | critical | 8.5 | 1 | Data Breach |
| 2388 | Improperly secured file on public-facing website | critical | 8.5 | 1 | Data Breach |
| 2389 | Inadequate IT security measures | critical | 8.5 | 1 | Data Breach |
| 2390 | Automated link preview generation in AI agents | critical | 8.5 | 1 | Data Exfiltration |
| 2391 | Improper disposal of hardware containing sensitive data | critical | 8.5 | 1 | Data Breach (Physical/Improper Disposal) |
| 2392 | Inadequate encryption, insufficient vendor security vetting | critical | 8.5 | 1 | Data Breach |
| 2393 | CVE-2026-1602 | critical | 8.5 | 1 | Authentication Bypass |
| 2394 | CVE-2025-55227 (SQL Server Privilege Escalation) | critical | 8.5 | 1 | Malware (Infostealer) |
| 2395 | Reuse of leaked personal data, Lack of user awareness | critical | 8.5 | 1 | Phishing / Social Engineering |
| 2396 | Social engineering, in-memory execution, process hollowing, AMSI/ETW bypass | critical | 8.5 | 1 | Spear-Phishing, Malware (Keylogger), Credential Theft |
| 2397 | CVE-2026-25108 (OS Command Injection - CWE-78) | critical | 8.5 | 1 | Command Injection |
| 2398 | CW1226324 (Copilot DLP bypass) | critical | 8.5 | 1 | AI Integration Bug |
| 2399 | Logic error in NextAuth JWT callback (GHSA-7hg4-x4pr-3hrg) | critical | 8.5 | 1 | Authentication Bypass |
| 2400 | CVE-2025-54236 (SessionReaper - Session Data Storage on File System) | critical | 8.5 | 1 | Vulnerability Disclosure |
| 2401 | Absence of web application firewall (WAF) | critical | 8.5 | 1 | Data Security Audit |
| 2402 | Hardcoded Flask secret key, weak authentication controls, disabled security tools (Windows Defender), DLP bypass | critical | 8.5 | 1 | AI-driven security bypass, vulnerability exploitation, data exfiltration |
| 2403 | Misconfigured Google Firebase database | critical | 8.5 | 1 | Data Breach |
| 2404 | Default Network Access Settings (Pro/Max accounts) | critical | 8.5 | 1 | Data Exfiltration |
| 2405 | Lack of Encryption on Portable Device | critical | 8.5 | 1 | Data Breach (Physical Theft) |
| 2406 | Privilege Escalation Flaw in FIA Driver Categorisation Website | critical | 8.5 | 1 | Data Breach |
| 2407 | Human error (social engineering of third-party employee) | critical | 8.5 | 1 | Data Breach |
| 2408 | Weak Password ('123456') | critical | 8.5 | 1 | Data Breach |
| 2409 | Net-NTLMv1 Authentication Protocol | critical | 8.5 | 1 | Vulnerability Disclosure |
| 2410 | Click2Gov online payment system | critical | 8.5 | 1 | Data Breach |
| 2411 | Improper Disposal of Sensitive Data | critical | 8.5 | 1 | Data Breach |
| 2412 | lack of access controls and encryption for cloud-hosted databases | critical | 8.5 | 1 | data breach |
| 2413 | Accellion FTA (specific CVE not mentioned) | critical | 8.5 | 1 | Data Breach |
| 2414 | Valid Log-in Credentials | critical | 8.5 | 1 | Data Breach |
| 2415 | Excessive account permissions | critical | 8.5 | 1 | Data Breach |
| 2416 | Human Error (Compromised Employee Email Account) | critical | 8.5 | 1 | Data Breach |
| 2417 | VMware Vulnerabilities | critical | 8.5 | 1 | Ransomware |
| 2418 | unsecured backup databases co-located with active databases | critical | 8.5 | 1 | data breach |
| 2419 | Hard-coded passwords in HTML/APIs | critical | 8.5 | 1 | Unauthorized Access |
| 2420 | Poor security practices for remote logins | critical | 8.5 | 1 | Data Breach |
| 2421 | Login Page Bug | critical | 8.5 | 1 | Data Breach |
| 2422 | Absence of defensible deletion policies | critical | 8.5 | 1 | Data Breach |
| 2423 | Reused credentials from older data breaches | critical | 8.5 | 1 | Data Breach |
| 2424 | High-severity vulnerability in ADSelfService Plus software | critical | 8.5 | 1 | Vulnerability Exploit |
| 2425 | Insufficient validation process for third-party API access | critical | 8.5 | 1 | Data Breach |
| 2426 | Unsecured Elasticsearch cluster | critical | 8.5 | 1 | Data Breach |
| 2427 | CVE-2025-14560 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2428 | improper data retention practices (government IDs) | critical | 8.5 | 1 | data breach |
| 2429 | Compromised company account on GitHub | critical | 8.5 | 1 | Data Breach |
| 2430 | WebKit memory-related errors | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2431 | Insufficient Behavioral Monitoring for Authorized Users | critical | 8.5 | 1 | Data Breach |
| 2432 | OpenClaw WebSocket API Authentication Bypass | critical | 8.5 | 1 | Supply Chain Attack |
| 2433 | CVE-2025-1724 | critical | 8.5 | 1 | Authentication Vulnerability |
| 2434 | Unsecured digital identities for AI agents | critical | 8.5 | 1 | Data Leakage |
| 2435 | Human vulnerability (bribery of overseas support agents) | critical | 8.5 | 1 | Data Breach |
| 2436 | Internal Collaboration Tool | critical | 8.5 | 1 | Data Breach |
| 2437 | Internal system flaw exposing plain text passwords | critical | 8.5 | 1 | Data Breach |
| 2438 | Failure to Follow Standard Operating Procedures | critical | 8.5 | 1 | Data Breach |
| 2439 | faiblesse des mots de passe utilisateurs | critical | 8.5 | 1 | cyberattaque |
| 2440 | outdated software (13 months without updates) | critical | 8.5 | 1 | data breach |
| 2441 | Unknown vulnerability in Oracle E-Business Suite (CVE not specified) | critical | 8.5 | 1 | Data Breach / Ransomware Attack |
| 2442 | Lack of multi-factor authentication (MFA), Basic security lapses (MMH) | critical | 8.5 | 1 | Data Breach |
| 2443 | CVE-2025-5777 (CitrixBleed 2) | critical | 8.5 | 1 | Reconnaissance |
| 2444 | Mishandled private keys in AI-generated JavaScript | critical | 8.5 | 1 | Data Breach |
| 2445 | improper access controls / misconfigured storage | critical | 8.5 | 1 | data exposure |
| 2446 | active former employee credentials | critical | 8.5 | 1 | data breach |
| 2447 | abuse of LaunchAgents for persistence | critical | 8.5 | 1 | malware |
| 2448 | Inconsistent security measures | critical | 8.5 | 1 | Phishing |
| 2449 | Human error (tricked employees into handing over login credentials for internal Salesforce software) | critical | 8.5 | 1 | Data Breach |
| 2450 | Unauthorized access to third-party system storing customer data | critical | 8.5 | 1 | Data Breach |
| 2451 | improper access controls in the Texas Integrated Grant Reporting system | critical | 8.5 | 1 | data breach |
| 2452 | Human Error (Telecommunications Employee Deception) | critical | 8.5 | 1 | Data Breach |
| 2453 | Progress MOVEit Transfer | critical | 8.5 | 1 | Data Breach |
| 2454 | Exploitation of accessibility permissions, fake overlays | critical | 8.5 | 1 | Trojan |
| 2455 | Insecure data transmission by browser extensions | critical | 8.5 | 1 | Data Leakage |
| 2456 | Publicly Accessible Firebase Storage Bucket | critical | 8.5 | 1 | Data Breach |
| 2457 | MOVEit file transfer platform vulnerability | critical | 8.5 | 1 | Data Breach |
| 2458 | vBulletin security hole | critical | 8.5 | 1 | Data Breach |
| 2459 | Incorrect System Settings | critical | 8.5 | 1 | Data Leak |
| 2460 | GoAnywhere MFT SaaS | critical | 8.5 | 1 | Data Breach |
| 2461 | Confidential Virtual Machine (CVM) exploitation | critical | 8.5 | 1 | Zero-day vulnerability |
| 2462 | Abandoned domain takeover, lack of runtime URL validation in Microsoft add-ins | critical | 8.5 | 1 | Phishing |
| 2463 | Insecure 'super admin' APIs allowing unauthenticated high-privilege account creation | critical | 8.5 | 1 | Data Exposure |
| 2464 | Unpatched Cloud Services | critical | 8.5 | 1 | Cloud Security Breach |
| 2465 | Computer Virus | critical | 8.5 | 1 | Data Breach |
| 2466 | missing server-side encryption | critical | 8.5 | 1 | data breach |
| 2467 | Delayed breach detection | critical | 8.5 | 1 | Data Breach |
| 2468 | Unmonitored mass data downloads/email exfiltration | critical | 8.5 | 1 | Data Breach |
| 2469 | Lack of access controls and encryption | critical | 8.5 | 1 | Data Breach |
| 2470 | Legacy accounts | critical | 8.5 | 1 | Phishing |
| 2471 | Unpatched React frontend application | critical | 8.5 | 1 | Data Breach |
| 2472 | Inadequate cybersecurity measures (alleged) | critical | 8.5 | 1 | Data Breach |
| 2473 | Coding Transmission Error | critical | 8.5 | 1 | Data Breach |
| 2474 | CWE-269: Improper Privilege Management | critical | 8.5 | 1 | Data Exposure |
| 2475 | Insufficient DLP and behavioral analytics | critical | 8.5 | 1 | Data Breach |
| 2476 | CVE-2025-3648 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2477 | Third-party vendor vulnerabilities (historical reference: Target 2013 breach) | critical | 8.5 | 1 | Data Breach |
| 2478 | CVE-2025-54136 (MCPoison - MCP Trust Bypass) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2479 | unpatched vulnerabilities in network devices | critical | 8.5 | 1 | ransomware |
| 2480 | Supply chain weakness in analytics data handling | critical | 8.5 | 1 | Data Breach |
| 2481 | Broken Access Control (OWASP Top 10) | critical | 8.5 | 1 | Data Exposure |
| 2482 | Unauthenticated vulnerabilities (56% of tracked vulnerabilities in 2025) | critical | 8.5 | 1 | Supply Chain Attack |
| 2483 | CVE-2025-4123 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2484 | MOVEit application by IBM | critical | 8.5 | 1 | Data Breach |
| 2485 | Social Engineering, Trust Exploitation | critical | 8.5 | 1 | Phishing |
| 2486 | Lack of user verification for extension authenticity and over-permissioned access | critical | 8.5 | 1 | Malware (Malicious Browser Extension) |
| 2487 | MOVEit Transfer Zero-Day (CVE-2023-34362) | critical | 8.5 | 1 | Data Breach |
| 2488 | weak password practices | critical | 8.5 | 1 | data breach |
| 2489 | CVE-2026-21514 (CWE-807) | critical | 8.5 | 1 | Security Feature Bypass |
| 2490 | Unsecured personal information handling | critical | 8.5 | 1 | Data Breach |
| 2491 | CWE-200: Exposure of Sensitive Information | critical | 8.5 | 1 | Data Exposure |
| 2492 | Vertex AI Agent Engine Service Agent Hijacking | critical | 8.5 | 1 | Privilege Escalation |
| 2493 | CVE-2026-23596 | critical | 8.5 | 1 | Privilege Escalation |
| 2494 | CVE-2025-9368 (Resource Allocation Without Limits) | critical | 8.5 | 1 | Denial-of-Service |
| 2495 | Inadequate acceptable use policies for AI | critical | 8.5 | 1 | Data Leakage |
| 2496 | Lack of Command-Line Execution Awareness | critical | 8.5 | 1 | APT (Advanced Persistent Threat) |
| 2497 | Unspecified security flaw | critical | 8.5 | 1 | Data Leak |
| 2498 | CVE-2025-32896 | critical | 8.5 | 1 | Remote Code Execution (RCE) |
| 2499 | weak threat-detection system | critical | 8.5 | 1 | data breach |
| 2500 | Oracle E-Business Suite (EBS) vulnerability | critical | 8.5 | 1 | Data Breach |
| 2501 | Clerical Error | critical | 8.5 | 1 | Data Breach |
| 2502 | Contact Discovery Mechanism Flaw | critical | 8.5 | 1 | Privacy Violation |
| 2503 | CVE-2025-49870 (Unauthenticated SQL Injection in PayPal IPN handling) | critical | 8.5 | 1 | Vulnerability |
| 2504 | Third-Party Application Misconfiguration | critical | 8.5 | 1 | Data Breach |
| 2505 | Poor Security Practices | critical | 8.5 | 1 | Data Breach |
| 2506 | Inadequate governance for AI systems | critical | 8.5 | 1 | Cybersecurity Risk Assessment |
| 2507 | CVE-2025-7775 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2508 | Human Error / Social Engineering | critical | 8.5 | 1 | Phishing Attack |
| 2509 | Lack of Multi-Factor Authentication (MFA) (inferred) | critical | 8.5 | 1 | Data Breach |
| 2510 | Lack of separation between instructions and data in large language models | critical | 8.5 | 1 | AI Vulnerability Misunderstanding |
| 2511 | Inadequate employee training on cybersecurity risks | critical | 8.5 | 1 | Data Breach |
| 2512 | lack of sandboxing for physical GPU-equipped machines | critical | 8.5 | 1 | malware |
| 2513 | Human Error (Failure to Redact Sensitive Data) | critical | 8.5 | 1 | Data Breach (Unintentional Disclosure) |
| 2514 | CVE-2025-54910 (Office RCE) | critical | 8.5 | 1 | Malware (Infostealer) |
| 2515 | CWE-798: Use of Hard-coded Credentials | critical | 8.5 | 1 | Data Breach |
| 2516 | Vulnerability in GoAnywhere file transfer platform | critical | 8.5 | 1 | Data Breach |
| 2517 | Software Flaw | critical | 8.5 | 1 | Ransomware |
| 2518 | Lack of Policy Enforcement for AI Tool Usage | critical | 8.5 | 1 | Data Breach |
| 2519 | CVE-2025-54253 (Misconfiguration in AEM Forms - Apache Struts 'devMode' enabled + Authentication Bypass) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2520 | Lack of Security Reviews | critical | 8.5 | 1 | Security Oversight |
| 2521 | Outdated SCADA systems, integrated IT/OT environment | critical | 8.5 | 1 | Ransomware |
| 2522 | Data Migration Error | critical | 8.5 | 1 | Data Breach |
| 2523 | CVE-2025-8088 | critical | 8.5 | 1 | Zero-day exploitation, Phishing, Malware installation |
| 2524 | Unapplied security patches to its software | critical | 8.5 | 1 | Data Breach |
| 2525 | Unauthorized access to Microsoft Office 365 email account | critical | 8.5 | 1 | Data Breach |
| 2526 | CVE-2026-1603 | critical | 8.5 | 1 | Authentication Bypass |
| 2527 | internal API vulnerability (details undisclosed) | critical | 8.5 | 1 | data breach |
| 2528 | Obscured opt-out tools, 'no index' instructions, and dark patterns | critical | 8.5 | 1 | Data Breach |
| 2529 | Compromised GitHub Tokens | critical | 8.5 | 1 | Identity Compromise |
| 2530 | Authentication Bypass | critical | 8.5 | 1 | Authentication Bypass |
| 2531 | Human error (deception of individuals into disclosing confidential information) | critical | 8.5 | 1 | Data Breach |
| 2532 | Incorrectly configured database | critical | 8.5 | 1 | Data Leak |
| 2533 | Unauthorized access to cloud system | critical | 8.5 | 1 | Data Exposure |
| 2534 | CVE-2025-68428 | critical | 8.5 | 1 | Local File Inclusion / Path Traversal |
| 2535 | Human Error (Employee fell for phishing scam) | critical | 8.5 | 1 | Data Breach |
| 2536 | CVE-2025-54236 (Improper Input Validation in Adobe Commerce/Magento) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2537 | Decentralized data movement systems | critical | 8.5 | 1 | Data Governance Blind Spot |
| 2538 | SQL Injection vulnerability in MOVEit Transfer | critical | 8.5 | 1 | Ransomware |
| 2539 | human trust in legacy inheritance process | critical | 8.5 | 1 | phishing |
| 2540 | Improper data storage practices | critical | 8.5 | 1 | Data Breach |
| 2541 | Unauthorized Access to API Key | critical | 8.5 | 1 | Data Breach |
| 2542 | Single Sign-On (SSO) accounts (Okta and other identity platforms), MFA manipulation | critical | 8.5 | 1 | Phishing (Vishing), Data Breach, Credential Theft |
| 2543 | CVE-2026-0709 (Insufficient Input Validation) | critical | 8.5 | 1 | Command Execution Vulnerability |
| 2544 | persistent background execution via detached screen sessions | critical | 8.5 | 1 | malware |
| 2545 | Lack of account management (inactive accounts not decommissioned) | critical | 8.5 | 1 | Data Breach |
| 2546 | Weak encryption in data-sharing mandates | critical | 8.5 | 1 | Cybersecurity Risk Assessment |
| 2547 | Weak verification processes for new user accounts on online gambling platforms | critical | 8.5 | 1 | Fraud Scheme |
| 2548 | CVE-2025-7659 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2549 | Inadequately secured network (Salesloft) | critical | 8.5 | 1 | Data Breach (Third-Party Vendor Compromise) |
| 2550 | Programming Errors | critical | 8.5 | 1 | Data Breach |
| 2551 | Illicit tactics to bypass digital rights management (DRM) | critical | 8.5 | 1 | Data Breach |
| 2552 | Inadequate logging | critical | 8.5 | 1 | Data Breach |
| 2553 | Improperly secured database | critical | 8.5 | 1 | Data Exposure |
| 2554 | Third-party Salesforce tenant misconfiguration/access controls | critical | 8.5 | 1 | Data Breach |
| 2555 | Zero-day vulnerability in third-party software platform | critical | 8.5 | 1 | Data Breach |
| 2556 | Unauthorized access by authorized user | critical | 8.5 | 1 | Data Breach |
| 2557 | CVE-2026-25921 (CWE-345: Insufficient Verification of Data Authenticity) | critical | 8.5 | 1 | Supply-Chain Attack |
| 2558 | CVE-2025-33228 | critical | 8.5 | 1 | Vulnerability |
| 2559 | Misconfigured Stravito Access (Internal Documents) | critical | 8.5 | 1 | Data Exposure |
| 2560 | Disabled Workspace Trust in Cursor (VS Code fork) | critical | 8.5 | 1 | Arbitrary Code Execution |
| 2561 | CVE-2024-49039 | critical | 8.5 | 1 | Zero-Day Exploit |
| 2562 | User Trust in Signature Requests | critical | 8.5 | 1 | DNS Hijacking |
| 2563 | CVE-2026-0628 (declarativeNetRequest API misconfiguration in Gemini AI panel) | critical | 8.5 | 1 | Privilege Escalation |
| 2564 | CVE-2026-22153 (FG-IR-25-1052), CWE-305 (Authentication Bypass by Primary Weakness) | critical | 8.5 | 1 | Authentication Bypass |
| 2565 | Third-Party Platform Security (Salesforce) | critical | 8.5 | 1 | Data Breach |
| 2566 | Poor Cybersecurity Practices | critical | 8.5 | 1 | Data Breach |
| 2567 | Trivial vulnerability | critical | 8.5 | 1 | Data Breach |
| 2568 | user susceptibility to phishing | critical | 8.5 | 1 | phishing |
| 2569 | user trust in legitimate-looking emails/websites | critical | 8.5 | 1 | spear-phishing |
| 2570 | compromised Booking.com accounts | critical | 8.5 | 1 | phishing |
| 2571 | Progress Software MOVEit file transfer application vulnerability | critical | 8.5 | 1 | Data Breach |
| 2572 | lack of enterprise-grade security for AI tools | critical | 8.5 | 1 | ransomware |
| 2573 | Internal Glitch | critical | 8.5 | 1 | Data Exposure |
| 2574 | Info-stealing malware infections, lack of multi-factor authentication | critical | 8.5 | 1 | Credential Stuffing |
| 2575 | Weaknesses in IVR System Authentication | critical | 8.5 | 1 | Cyberattack |
| 2576 | Unauthorized access to internal systems | critical | 8.5 | 1 | Data Breach, Extortion |
| 2577 | CVE-2025-55177 (WhatsApp Zero-Click) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2578 | account takeover (ATO) | critical | 8.5 | 1 | supply-chain attack |
| 2579 | CWE-284: Improper Access Control | critical | 8.5 | 1 | Data Exposure |
| 2580 | Unsecured Data Transfer Methods | critical | 8.5 | 1 | Insider Threat |
| 2581 | Improper Database Security | critical | 8.5 | 1 | Data Leak |
| 2582 | Inadequate physical access controls | critical | 8.5 | 1 | Data Breach |
| 2583 | Inadequate AI governance and security oversight | critical | 8.5 | 1 | Data Breach |
| 2584 | Weaknesses in vendor credential management | critical | 8.5 | 1 | Data Breach |
| 2585 | Docker MCP Gateway RCE | critical | 8.5 | 1 | Supply Chain Attack |
| 2586 | manque de protection des terminaux personnels | critical | 8.5 | 1 | cyberattaque |
| 2587 | Signal’s 'linked devices' feature | critical | 8.5 | 1 | Cyber Espionage |
| 2588 | Zero-day vulnerability in third-party software (patched post-incident) | critical | 8.5 | 1 | Data Breach |
| 2589 | Absence of phishing-resistant MFA | critical | 8.5 | 1 | Data Breach |
| 2590 | Java | critical | 8.5 | 1 | Cyber Attack |
| 2591 | CVE-2024-3210 | critical | 8.5 | 1 | Data Breach |
| 2592 | BeyondTrust (CVE-2026-1731) | critical | 8.5 | 1 | APT Activity |
| 2593 | Stolen Login Information | critical | 8.5 | 1 | Data Breach |
| 2594 | Technical failure in recognizing court updates | critical | 8.5 | 1 | Data Leak |
| 2595 | Compromised remote access credentials from third-party service providers | critical | 8.5 | 1 | Data Breach |
| 2596 | Social engineering, lack of multi-factor authentication | critical | 8.5 | 1 | Phishing Campaign |
| 2597 | CVE-2026-20040 | critical | 8.5 | 1 | Privilege Escalation |
| 2598 | Unknown system flaws in retail/luxury brand infrastructure | critical | 8.5 | 1 | Data Breach |
| 2599 | Poor Internal Access Controls | critical | 8.5 | 1 | Data Breach |
| 2600 | Context Poisoning in AI Conversation History | critical | 8.5 | 1 | Data Breach |
| 2601 | Improper data retention (post-contract) | critical | 8.5 | 1 | Data Breach |
| 2602 | CVE-2026-21533 | critical | 8.5 | 1 | Elevation of Privilege |
| 2603 | Intermediate Data Leakage (Predictions, Losses) | critical | 8.5 | 1 | Privacy Breach |
| 2604 | Insufficient data encryption | critical | 8.5 | 1 | Data Breach |
| 2605 | CVE-2025-9242 (Out-of-bounds write in Fireware OS ‘iked’ process) | critical | 8.5 | 1 | Vulnerability Exposure |
| 2606 | Fragmented Token Extraction via Optical/Transcription Methods | critical | 8.5 | 1 | Prompt Extraction |
| 2607 | CVE-2025-59367 (Authentication Bypass in DSL-series routers) | critical | 8.5 | 1 | Vulnerability |
| 2608 | Insider access to patient records | critical | 8.5 | 1 | Data Breach |
| 2609 | CVE-2024-40766 (SonicWall Improper Access Control) | critical | 8.5 | 1 | Malware (Infostealer) |
| 2610 | UAC bypass via COM auto-elevation (ICMLuaUtil through cmlua.dll) | critical | 8.5 | 1 | Trojan |
| 2611 | Unauthorized use of Stripe API key | critical | 8.5 | 1 | Data Breach |
| 2612 | unsecured teacher credentials | critical | 8.5 | 1 | unauthorized access |
| 2613 | Insufficient de-identification | critical | 8.5 | 1 | Data Breach |
| 2614 | Third-party platforms used for marketing and operations | critical | 8.5 | 1 | Data Breach |
| 2615 | Misconfigured database lacking proper authentication controls | critical | 8.5 | 1 | Data Breach |
| 2616 | Insufficient Bot Detection/Prevention | critical | 8.5 | 1 | Cyberattack |
| 2617 | Account recovery workflows (password resets, MFA re-enrollment, help-desk recovery requests) | critical | 8.5 | 1 | Identity Breach |
| 2618 | Cisco SD-WAN flaws | critical | 8.5 | 1 | APT Activity |
| 2619 | Deceptive chats impersonating Signal Support chatbot | critical | 8.5 | 1 | Cyber Espionage |
| 2620 | CVE-2026-21514 (CWE-807 - Improper security decision-making based on untrusted inputs) | critical | 8.5 | 1 | Zero-Day Vulnerability Exploitation |
| 2621 | Prolonged Email Retention (6+ years) | critical | 8.5 | 1 | Data Breach |
| 2622 | Human Error (Misaddressed Email) | critical | 8.5 | 1 | Data Breach (Phishing / Unauthorized Disclosure) |
| 2623 | Unencrypted data storage in an internet-accessible environment | critical | 8.5 | 1 | Data Breach |
| 2624 | Excessive Discord SDK logging writing private data to local log files in plaintext | critical | 8.5 | 1 | Data Exposure |
| 2625 | human trust in AI-generated content | critical | 8.5 | 1 | fraud |
| 2626 | MOVEit Transfer Server Vulnerability | critical | 8.5 | 1 | Data Breach |
| 2627 | lack of code signing verification for replaced applications | critical | 8.5 | 1 | malware |
| 2628 | MOVEit file transfer platform | critical | 8.5 | 1 | Data Breach |
| 2629 | Progress Software's MOVEit secure file transfer tool | critical | 8.5 | 1 | Data Breach |
| 2630 | Unusual access to GitHub repositories | critical | 8.5 | 1 | Hacking/Unauthorized Access |
| 2631 | Employee Access | critical | 8.5 | 1 | Data Breach |
| 2632 | Improper use of tracking technologies on authenticated pages (patient portals) without HIPAA-compliant authorizations or business associate agreements | critical | 8.5 | 1 | Data Breach |
| 2633 | Autofill Functionality Abuse | critical | 8.5 | 1 | Vulnerability Disclosure |
| 2634 | Misconfiguration in Electron framework | critical | 8.5 | 1 | Security Vulnerability |
| 2635 | Remote Access to Car Functions | critical | 8.5 | 1 | Vulnerability Exploit |
| 2636 | Lack of disclosure and user consent for data collection | critical | 8.5 | 1 | Data Exfiltration |
| 2637 | SOHO devices | critical | 8.5 | 1 | Credential Theft |
| 2638 | eCompli application vulnerability | critical | 8.5 | 1 | Data Breach |
| 2639 | gaps in business associate oversight | critical | 8.5 | 1 | ransomware |
| 2640 | CVE-2025-33229 | critical | 8.5 | 1 | Vulnerability |
| 2641 | misconfigured data visualization tool | critical | 8.5 | 1 | data exposure |
| 2642 | Time-of-Check to Time-of-Use vulnerability in Alpitronic HYC50 EV charger | critical | 8.5 | 1 | Zero-Day Vulnerabilities |
| 2643 | Lack of input validation in web configuration interfaces | critical | 8.5 | 1 | DNS Hijacking |
| 2644 | Secure file transfer software | critical | 8.5 | 1 | Data Breach |
| 2645 | CVE-2026-1220 (Race Condition in V8 JavaScript Engine) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2646 | Website Setup Error | critical | 8.5 | 1 | Credential Leak |
| 2647 | CVE-2026-20817 (CWE-280: Improper Handling of Insufficient Permissions) | critical | 8.5 | 1 | Privilege Escalation |
| 2648 | Password recovery and sharing features | critical | 8.5 | 1 | Data Breach/Vulnerability Exposure |
| 2649 | Debug Log File | critical | 8.5 | 1 | Data Breach |
| 2650 | Lack of Monitoring for Unauthorized Data Exfiltration | critical | 8.5 | 1 | Data Breach |
| 2651 | CVE-2025-67601 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2652 | CVE-2025-59451 (Predictable Identifiers) | critical | 8.5 | 1 | Denial-of-Service |
| 2653 | Known system vulnerability | critical | 8.5 | 1 | Data Breach |
| 2654 | improper access controls / lack of authentication for cloud storage | critical | 8.5 | 1 | data breach |
| 2655 | Accellion File Transfer Appliance vulnerability | critical | 8.5 | 1 | Data Breach |
| 2656 | Log4Shell | critical | 8.5 | 1 | Ransomware |
| 2657 | Leaked Passwords | critical | 8.5 | 1 | Data Breach |
| 2658 | Publicly Accessible .env Files | critical | 8.5 | 1 | Data Exposure |
| 2659 | Unauthenticated Admin Functions (GRS Panel, HTML Injection) | critical | 8.5 | 1 | Data Exposure |
| 2660 | Lack of multi-factor authentication (MFA) on file-transfer services (ShareFile, OwnCloud, Nextcloud) | critical | 8.5 | 1 | Data Breach |
| 2661 | User Privacy | critical | 8.5 | 1 | Privacy Breach |
| 2662 | Insufficient monitoring and control over non-human credentials | critical | 8.5 | 1 | Data Breach / Lateral Movement |
| 2663 | Key Reuse Vulnerability (Android) | critical | 8.5 | 1 | Privacy Violation |
| 2664 | Insufficient Agent Permission Controls | critical | 8.5 | 1 | AI Security Vulnerabilities |
| 2665 | Insufficient URL Security | critical | 8.5 | 1 | Data Breach |
| 2666 | Over-permissioned OAuth scopes | critical | 8.5 | 1 | Data Breach |
| 2667 | lack of monitoring | critical | 8.5 | 1 | data breach |
| 2668 | DOM-Based UI Manipulation | critical | 8.5 | 1 | Vulnerability Disclosure |
| 2669 | Prompt Injection Vulnerabilities | critical | 8.5 | 1 | AI Security Vulnerabilities |
| 2670 | CVE-2023-28771 | critical | 8.5 | 1 | Remote Code Execution |
| 2671 | CVE-2025-30248 (CWE-427: Uncontrolled Search Path Element) | critical | 8.5 | 1 | DLL Hijacking |
| 2672 | third-party vendor (Salesforce) security flaw | critical | 8.5 | 1 | data breach |
| 2673 | Unrotated Service Account Token | critical | 8.5 | 1 | Data Breach (OAuth Token Compromise) |
| 2674 | Unknown (zero-day) vulnerability in Oracle E-Business Suite (EBS) | critical | 8.5 | 1 | Data Breach |
| 2675 | Trusted domain chaining, search engine trust exploitation | critical | 8.5 | 1 | Phishing |
| 2676 | Insufficient sanitization of user input in XML processing | critical | 8.5 | 1 | XML External Entity (XXE) Injection |
| 2677 | Lack of software updates for gear shifters | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2678 | Weaknesses in Almaviva’s infrastructure | critical | 8.5 | 1 | Data Breach |
| 2679 | Insecure Direct Object Reference (Sapphos API) | critical | 8.5 | 1 | Malware (Infostealer) |
| 2680 | Recently patched vulnerability in Oracle E-Business Suite (for Cl0p ransomware incident) | critical | 8.5 | 1 | Data Breach |
| 2681 | Misconfigured Ollama endpoints (port 11434) | critical | 8.5 | 1 | LLMjacking |
| 2682 | Storage and transmission of device-specific data (e.g., precise geolocation, browsing history, search queries) | critical | 8.5 | 1 | Data Exposure |
| 2683 | Unspecified vulnerability in Salesloft Drift's OAuth token management | critical | 8.5 | 1 | Supply Chain Attack |
| 2684 | CWE-319: Cleartext Transmission of Sensitive Information (weak AES encryption) | critical | 8.5 | 1 | Data Breach |
| 2685 | Poor Staff Awareness of Insider Threats | critical | 8.5 | 1 | Unauthorized Access |
| 2686 | improper data retention by third-party vendor | critical | 8.5 | 1 | data breach |
| 2687 | Publicly Accessible Cloud Database | critical | 8.5 | 1 | Data Exposure |
| 2688 | Social Engineering, macOS TCC Bypass (SQL Injection into Privacy Database) | critical | 8.5 | 1 | Phishing, Malware |
| 2689 | CVE-2026-20700 (Memory-corruption in dyld component) | critical | 8.5 | 1 | Zero-Day Exploit |
| 2690 | Insufficient Monitoring | critical | 8.5 | 1 | Data Breach |
| 2691 | OpenAI-compatible APIs (port 8000) | critical | 8.5 | 1 | LLMjacking |
| 2692 | Sleeping Beauty | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2693 | MongoDB database vulnerability | critical | 8.5 | 1 | Data Breach |
| 2694 | Mistake that exposed personal and financial information | critical | 8.5 | 1 | Data Breach |
| 2695 | Insufficient Authentication/Authorization Controls for Reimbursement Account Access | critical | 8.5 | 1 | Data Breach / Unauthorized Access |
| 2696 | Inadequate Audit Logs | critical | 8.5 | 1 | Data Breach |
| 2697 | Missing Reporting Mechanisms for Objectionable Content | critical | 8.5 | 1 | Data Breach |
| 2698 | SureTriggers Vulnerability | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2699 | Human Error (Improper Handling of Public Records Request) | critical | 8.5 | 1 | Data Breach (Unintentional Disclosure) |
| 2700 | publicly accessible repositories | critical | 8.5 | 1 | data exposure |
| 2701 | Lack of Input Validation | critical | 8.5 | 1 | Data Breach |
| 2702 | Backup Database Access | critical | 8.5 | 1 | Data Breach |
| 2703 | Unsecured database, malware infection via phishing emails/malicious websites/cracked software | critical | 8.5 | 1 | Data Exposure |
| 2704 | Unpatched 'n-day' vulnerability in end-of-life software | critical | 8.5 | 1 | Data Breach |
| 2705 | Unspecified coding error in SchoolMessenger application | critical | 8.5 | 1 | Data Breach |
| 2706 | Unauthorized data transmission via third-party integrations | critical | 8.5 | 1 | Data Breach |
| 2707 | Excessive OAuth permissions (Mail.Read, offline_access, profile/openid) | critical | 8.5 | 1 | OAuth Abuse |
| 2708 | CVE-2023-6895 | critical | 8.5 | 1 | Espionage |
| 2709 | social engineering targeting IT helpdesks | critical | 8.5 | 1 | data breach |
| 2710 | Insufficient internal access controls | critical | 8.5 | 1 | Data Breach |
| 2711 | Trust in community integrations, lack of sandboxing in n8n community nodes | critical | 8.5 | 1 | Supply Chain Attack |
| 2712 | Critical vulnerability | critical | 8.5 | 1 | Data Breach, Account Hijacking |
| 2713 | A setting within one of Petco's software applications that inadvertently allowed certain files to be accessible online | critical | 8.5 | 1 | Data Breach |
| 2714 | Human error (tricked customer support employees into granting access) | critical | 8.5 | 1 | Data Breach |
| 2715 | Lack of Multi-Factor Authentication (MFA) for Call-In Access | critical | 8.5 | 1 | Cyberattack |
| 2716 | CVE-2025-48561 | critical | 8.5 | 1 | Data Theft |
| 2717 | Frontend Access Control | critical | 8.5 | 1 | DNS Hijacking |
| 2718 | CVE-2025-43300 (Apple Zero-Day) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2719 | Improper use of private email account | critical | 8.5 | 1 | Data Breach |
| 2720 | Absence of vendor security assessments for AI tools | critical | 8.5 | 1 | Data Leakage |
| 2721 | CVE-2025-1080 | critical | 8.5 | 1 | Remote Code Execution |
| 2722 | ShadowLeak (CVE pending) | critical | 8.5 | 1 | Data Exfiltration |
| 2723 | Insufficient sanitization in the `serialize` function (CVE-2026-0969) | critical | 8.5 | 1 | Remote Code Execution (RCE) |
| 2724 | Weak Authentication (SSO) | critical | 8.5 | 1 | Data Breach |
| 2725 | CVE-2025-13834 | critical | 8.5 | 1 | Information Leak |
| 2726 | Failure to remediate known vulnerabilities | critical | 8.5 | 1 | Data Breach |
| 2727 | CVE-2026-1235 | critical | 8.5 | 1 | Cross-Site Scripting (XSS) |
| 2728 | Weak MFA | critical | 8.5 | 1 | Data Breach |
| 2729 | Unverified Update Mechanism (Lack of Code Signing) | critical | 8.5 | 1 | Vulnerability |
| 2730 | Access Control Mechanisms | critical | 8.5 | 1 | Data Breach |
| 2731 | third-party security gaps | critical | 8.5 | 1 | data breach |
| 2732 | Weak Authentication Mechanisms (e.g., no 2FA) | critical | 8.5 | 1 | Privacy Violation |
| 2733 | CVE-2025-33230 | critical | 8.5 | 1 | Vulnerability |
| 2734 | CVE-2025-33231 | critical | 8.5 | 1 | Vulnerability |
| 2735 | Unpatched RCE vulnerabilities | critical | 8.5 | 1 | Botnet |
| 2736 | Architectural flaw in GitHub MCP server allowing AI agents to access and exfiltrate data from private repositories | critical | 8.5 | 1 | Prompt Injection |
| 2737 | Lack of Visibility into AI Data Flows | critical | 8.5 | 1 | AI Security Vulnerabilities |
| 2738 | Coding error in PayPal Working Capital (PPWC) loan application | critical | 8.5 | 1 | Data Breach |
| 2739 | CVE-2025-55232 (Microsoft HPC Pack RCE) | critical | 8.5 | 1 | Malware (Infostealer) |
| 2740 | Unrestricted internet access to real-time surveillance data without authentication | critical | 8.5 | 1 | Data Breach |
| 2741 | Failure to implement and maintain reasonable security measures | critical | 8.5 | 1 | Data Breach |
| 2742 | Human Error (Inadvertent Publication of Sensitive Data) | critical | 8.5 | 1 | Data Breach (Inadvertent Disclosure) |
| 2743 | Improper Access Controls (Publicly Accessible Folder) | critical | 8.5 | 1 | Data Breach |
| 2744 | Sequentially numbered and guessable URLs | critical | 8.5 | 1 | Data Exposure |
| 2745 | AirSnitch (exploits gaps in MAC address, encryption key, and IP address linking across network layers) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2746 | CVE-2025-20333 & CVE-2025-20363 (Cisco ASA VPN) | critical | 8.5 | 1 | Ransomware |
| 2747 | Unauthorized Access to Personal Information | critical | 8.5 | 1 | Data Theft |
| 2748 | Lack of encryption for sensitive data | critical | 8.5 | 1 | Data Breach |
| 2749 | VMware Aria Operations | critical | 8.5 | 1 | APT Activity |
| 2750 | MOVEit Transfer programme zero-day vulnerability | critical | 8.5 | 1 | Data Breach |
| 2751 | Weak or Stolen OAuth Token Management (External App Connection to Salesforce) | critical | 8.5 | 1 | Data Breach |
| 2752 | Security flaw in third-party software | critical | 8.5 | 1 | Data Breach |
| 2753 | AI Supply Chain Weaknesses | critical | 8.5 | 1 | Supply Chain Attack |
| 2754 | CVE-2025-20352 (SNMP RCE in Cisco IOS/IOS XE) | critical | 8.5 | 1 | unauthorized access |
| 2755 | Plug-in on e-commerce platform | critical | 8.5 | 1 | Data Breach |
| 2756 | Incremental features and customizations accumulating risk, lack of proper access controls | critical | 8.5 | 1 | Misconfiguration |
| 2757 | Excessive permissions, hidden app functionality, cloud service abuse (Firebase, Google Apps Script, Telegram, Google Drive) | critical | 8.5 | 1 | Malware (Remote Access Trojan - RAT) |
| 2758 | CVE-2025-4632 (Improper Pathname Limitation Leading to Arbitrary File Write) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2759 | Outdated cryptographic practices | critical | 8.5 | 1 | Data Breach/Vulnerability Exposure |
| 2760 | CVE-2025-41244 (VMware Aria Operations and VMware Tools Privilege Escalation) | critical | 8.5 | 1 | Privilege Escalation |
| 2761 | CVE-2025-4366 | critical | 8.5 | 1 | HTTP Request Smuggling |
| 2762 | Improper data handling and lack of safeguards | critical | 8.5 | 1 | Data Breach |
| 2763 | CVE-2025-54135 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2764 | Legacy encryption | critical | 8.5 | 1 | Data Breach/Vulnerability Exposure |
| 2765 | Employee Access Abuse | critical | 8.5 | 1 | Data Leak |
| 2766 | Unconstrained CI/CD Service Accounts | critical | 8.5 | 1 | Identity Compromise |
| 2767 | Operational security lapse (SSH authentication key reuse across servers) | critical | 8.5 | 1 | phishing |
| 2768 | FG-IR-26-060 (CWE-288: Authentication Bypass Using an Alternate Path or Channel) | critical | 8.5 | 1 | Authentication Bypass |
| 2769 | SIM-swapping | critical | 8.5 | 1 | SIM-swapping |
| 2770 | Inadequate cybersecurity protocols, weak security controls | critical | 8.5 | 1 | Data Breach |
| 2771 | RoguePilot (GitHub Codespaces/Copilot) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2772 | Lack of end-to-end encryption for ID uploads | critical | 8.5 | 1 | Data Breach Risk |
| 2773 | Employee Impersonation | critical | 8.5 | 1 | Data Breach |
| 2774 | System misconfiguration reactivating disabled feature | critical | 8.5 | 1 | Data Breach |
| 2775 | unencrypted patient records | critical | 8.5 | 1 | ransomware |
| 2776 | Lack of robust identity verification during hiring process | critical | 8.5 | 1 | Data Breach (Insider Threat / Identity Misuse) |
| 2777 | Human Error (Social Engineering via Phone Calls) | critical | 8.5 | 1 | Data Breach |
| 2778 | Reused passwords across multiple accounts | critical | 8.5 | 1 | Credential Stuffing |
| 2779 | Unsecured storage of sensitive data | critical | 8.5 | 1 | Data Breach |
| 2780 | Ineffective Security Configurations | critical | 8.5 | 1 | Data Breach |
| 2781 | Unencrypted student data | critical | 8.5 | 1 | Data Breach |
| 2782 | Insufficient Third-Party Vendor Security | critical | 8.5 | 1 | Data Breach |
| 2783 | WebOTP API, Clipboard Access, Notification Control, PWA Installation Permissions, Android Permissions Abuse | critical | 8.5 | 1 | Phishing |
| 2784 | Overprivileged OAuth Tokens | critical | 8.5 | 1 | Data Breach (OAuth Token Compromise) |
| 2785 | CVE-2025-3155 | critical | 8.5 | 1 | Vulnerability Exploit |
| 2786 | CVE-2025-XXXX (WebKit Zero-Day 2) | critical | 8.5 | 1 | Zero-Day Exploit |
| 2787 | Excessive data access privileges | critical | 8.5 | 1 | Data Breach |
| 2788 | Critical vulnerability in VIGI camera series | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2789 | CVE-2026-1357 | critical | 8.5 | 1 | Remote Code Execution (RCE) |
| 2790 | Design bug in the FOIA request search feature | critical | 8.5 | 1 | Data Exposure |
| 2791 | Skimming | critical | 8.5 | 1 | Data Breach |
| 2792 | CVE-2025-32711 (CVSS 9.3) | critical | 8.5 | 1 | AI Command Injection |
| 2793 | CVE-2026-2447 (Heap buffer overflow in libvpx video codec) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2794 | Unencrypted data on decommissioned equipment | critical | 8.5 | 1 | Data Breach |
| 2795 | CVE-2025-48927 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2796 | CVE-2026-23550 (CVSS 10.0) | critical | 8.5 | 1 | Privilege Escalation |
| 2797 | AI-Specific Attack Vectors (Prompt Injection, Model Poisoning) | critical | 8.5 | 1 | Supply Chain Attack |
| 2798 | Zero-click indirect prompt injection (*PleaseFix*) | critical | 8.5 | 1 | AI Prompt Injection |
| 2799 | Improper Authentication (MongoDB instance left unsecured) | critical | 8.5 | 1 | Data Leak |
| 2800 | Unsecured MongoDB Database | critical | 8.5 | 1 | Data Breach |
| 2801 | CVE-2025-9142 (JWT manipulation and directory traversal in Perimeter81 service component) | critical | 8.5 | 1 | Privilege Escalation |
| 2802 | Unspecified vulnerability in OT security solutions | critical | 8.5 | 1 | Data Breach |
| 2803 | Shared Inbox Access | critical | 8.5 | 1 | Data Breach |
| 2804 | Lack of Data Loss Prevention (DLP) Controls | critical | 8.5 | 1 | Data Breach |
| 2805 | Server Security Issue | critical | 8.5 | 1 | Data Breach |
| 2806 | Reused passwords from data leaks | critical | 8.5 | 1 | Fraud/Scam |
| 2807 | Inconsistent DLP controls | critical | 8.5 | 1 | Data Breach |
| 2808 | Lack of multi-factor authentication (MFA), Third-party vendor compromise | critical | 8.5 | 1 | Data Breach |
| 2809 | Insufficient VPN authentication, ineffective abnormal behavior detection | critical | 8.5 | 1 | Data Breach |
| 2810 | Unauthorized Plugin | critical | 8.5 | 1 | Data Breach |
| 2811 | Lack of access controls / improper employee oversight | critical | 8.5 | 1 | Unauthorized Access / Insider Threat |
| 2812 | CVE (3 high-severity with publicly available exploit code) | critical | 8.5 | 1 | Misconfiguration |
| 2813 | CVE-2026-22218 (CVSS 7.1) | critical | 8.5 | 1 | Data Breach |
| 2814 | Over-collection of sensitive PII (e.g., full ID scans vs. minimal verification) | critical | 8.5 | 1 | Data Breach Risk |
| 2815 | Lack of Robust Security Controls on Third-Party Platforms | critical | 8.5 | 1 | Data Breach |
| 2816 | Improper access controls on PDF-generating page | critical | 8.5 | 1 | Data Exposure |
| 2817 | CVE-2025-0033 (Race Condition in AMD SEV-SNP RMP Initialization) | critical | 8.5 | 1 | Vulnerability |
| 2818 | Lack of least-privilege access controls | critical | 8.5 | 1 | Data Breach |
| 2819 | trust in open-source dependencies | critical | 8.5 | 1 | supply-chain attack |
| 2820 | CVE-2026-3336 | critical | 8.5 | 1 | Cryptographic Vulnerability |
| 2821 | Lack of Robust Guardrails for Non-Text Modalities | critical | 8.5 | 1 | Prompt Extraction |
| 2822 | Android Activity Layering | critical | 8.5 | 1 | Data Theft |
| 2823 | Lack of API Key Ownership Validation | critical | 8.5 | 1 | Data Exfiltration |
| 2824 | CVE-2026-27728 | critical | 8.5 | 1 | Command Injection |
| 2825 | Third-party shopping cart software | critical | 8.5 | 1 | Data Breach |
| 2826 | Path traversal in Microsoft NLWeb (reading `/etc/passwd`, `.env`) | critical | 8.5 | 1 | Arbitrary Code Execution |
| 2827 | Windows’ Restart Manager (RstrtMgr.dll) exploitation for disabling security processes | critical | 8.5 | 1 | Potentially Unwanted Application (PUA) |
| 2828 | Out-of-bounds write flaw in Alpitronic HYC50 EV charger | critical | 8.5 | 1 | Zero-Day Vulnerabilities |
| 2829 | CVE-2025-54820 (Stack-based buffer overflow, CWE-121) | critical | 8.5 | 1 | Remote Code Execution (RCE) |
| 2830 | identity weaknesses | critical | 8.5 | 1 | credential compromise |
| 2831 | Remote-viewing software | critical | 8.5 | 1 | Data Breach |
| 2832 | Expired domain takeover, lack of ongoing security validation for Office add-ins | critical | 8.5 | 1 | Phishing, Credential Theft, Data Exfiltration |
| 2833 | CVE-2026-25903 | critical | 8.5 | 1 | Authorization Bypass |
| 2834 | Inability to Distinguish Content from Directives in Prompts | critical | 8.5 | 1 | Data Exfiltration |
| 2835 | Data Corruption | critical | 8.5 | 1 | Data Leak |
| 2836 | Unauthenticated AI services | critical | 8.5 | 1 | LLMjacking |
| 2837 | Lack of Access Controls / Insider Threat | critical | 8.5 | 1 | Data Breach |
| 2838 | Weak authentication measures in Fast Pair protocol | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2839 | Starlink network access control | critical | 8.5 | 1 | Data Breach |
| 2840 | OAuth 2.0 protocol behavior (RFC 6749/9700) | critical | 8.5 | 1 | Phishing |
| 2841 | Weak authentication in verification APIs | critical | 8.5 | 1 | Data Breach Risk |
| 2842 | third-party integrations (speculated) | critical | 8.5 | 1 | data breach |
| 2843 | Oracle EBS vulnerability | critical | 8.5 | 1 | Data Breach |
| 2844 | CVE-2025-8099 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2845 | E-commerce web platform | critical | 8.5 | 1 | Data Breach |
| 2846 | CVE-2026-0629 | critical | 8.5 | 1 | Authentication Bypass |
| 2847 | Insider Threat / Unauthorized Access | critical | 8.5 | 1 | Data Breach |
| 2848 | Clickjacking (CWE-1021) | critical | 8.5 | 1 | Vulnerability Disclosure |
| 2849 | Citrix Software Vulnerability (unspecified) | critical | 8.5 | 1 | Data Breach |
| 2850 | CVE-2024-28989 | critical | 8.5 | 1 | Vulnerability Exploit |
| 2851 | Weak User Authentication | critical | 8.5 | 1 | Data Breach |
| 2852 | E-commerce Site Vulnerability | critical | 8.5 | 1 | Data Breach |
| 2853 | CVE-2026-1340 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2854 | URL fetcher failing to block internal domains | critical | 8.5 | 1 | Autonomous AI-driven cyber attack |
| 2855 | CVE-2025-53770 (Microsoft SharePoint 'ToolShell') | critical | 8.5 | 1 | Ransomware |
| 2856 | Vendor Software | critical | 8.5 | 1 | Data Breach |
| 2857 | MOVEit secure file transfer solution vulnerability | critical | 8.5 | 1 | Data Breach |
| 2858 | compromised signed access token | critical | 8.5 | 1 | data breach |
| 2859 | CVE-2025-0994 | critical | 8.5 | 1 | Cyber Attack |
| 2860 | Lack of authentication and access controls in Firebase instances | critical | 8.5 | 1 | Data Breach |
| 2861 | Centralized Points of Failure in Hybrid Platforms | critical | 8.5 | 1 | Privacy Violation |
| 2862 | Postinstall hook abuse, self-dependency trick | critical | 8.5 | 1 | Supply Chain Attack |
| 2863 | Salesforce Environments | critical | 8.5 | 1 | Data Breach |
| 2864 | User trust in AI-themed extensions, lack of stringent Chrome Web Store security checks | critical | 8.5 | 1 | Malicious Browser Extensions |
| 2865 | CVE-2025-61882 (CVSS 9.8 - Remote Code Execution in BI Publisher Integration/Concurrent Processing) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2866 | Insufficient access controls and monitoring | critical | 8.5 | 1 | Insider Threat |
| 2867 | CVE-2026-21385 | critical | 8.5 | 1 | Zero-Day Vulnerability |
| 2868 | Sending sensitive data in unencrypted emails | critical | 8.5 | 1 | Data Breach |
| 2869 | Unauthorized administrative access | critical | 8.5 | 1 | Data Leak |
| 2870 | Weak Authentication in AI Hiring System (Password '123456') | critical | 8.5 | 1 | Data Exposure |
| 2871 | Software vulnerabilities in AI tools (e.g., backdoors, bugs) | critical | 8.5 | 1 | Data Leakage |
| 2872 | inadequate cloud security measures | critical | 8.5 | 1 | data breach |
| 2873 | Lack of segmentation between IT and operational systems | critical | 8.5 | 1 | Data Breach |
| 2874 | Juniper PTX router RCE flaw | critical | 8.5 | 1 | APT Activity |
| 2875 | Gemini Browsing Tool (Web Page Summarization Data Exfiltration) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2876 | lack of data access controls | critical | 8.5 | 1 | data breach |
| 2877 | Branch Predictor Race Conditions (BPRC) in Intel Processors (Speculative Execution Side Channel) | critical | 8.5 | 1 | Hardware Vulnerability |
| 2878 | SMS phishing (smishing) attack | critical | 8.5 | 1 | Data Breach |
| 2879 | SQLi in Postgres MCP (bypassing read-only restrictions) | critical | 8.5 | 1 | Arbitrary Code Execution |
| 2880 | Web vulnerabilities in Subaru's Starlink service | critical | 8.5 | 1 | Web Vulnerabilities |
| 2881 | CWE-798: Hard-coded Credentials | critical | 8.5 | 1 | Data Exposure |
| 2882 | Spree IDOR Flaws (CVE-2026-22588/22589) | critical | 8.5 | 1 | Supply Chain Attack |
| 2883 | Weak or Compromised Employee Credentials | critical | 8.5 | 1 | Data Breach |
| 2884 | Human error, limited cybersecurity resources | critical | 8.5 | 1 | Data Breach |
| 2885 | Software misconfiguration exposing files to the internet | critical | 8.5 | 1 | Data Breach |
| 2886 | unprotected storage bucket | critical | 8.5 | 1 | data breach |
| 2887 | Flash Player | critical | 8.5 | 1 | Cyber Attack |
| 2888 | Impersonation of legitimate Go module (*golang.org/x/crypto*) | critical | 8.5 | 1 | Supply-Chain Attack |
| 2889 | Lack of clear user consent | critical | 8.5 | 1 | Privacy Violation |
| 2890 | Compromise of private keys | critical | 8.5 | 1 | Security Breach |
| 2891 | CVE-2026-21513 (Security Feature Bypass - CWE-693) | critical | 8.5 | 1 | Zero-Day Exploit |
| 2892 | Weak third-party credential management | critical | 8.5 | 1 | Data Breach |
| 2893 | Static default password in remote desktop software | critical | 8.5 | 1 | Data Breach |
| 2894 | Unprotected Cloud Repository | critical | 8.5 | 1 | Data Leak |
| 2895 | open-source_software_vulnerabilities | critical | 8.5 | 1 | data_breach |
| 2896 | Error in server configuration change | critical | 8.5 | 1 | Data Breach |
| 2897 | Credentials exploitation | critical | 8.5 | 1 | Data Breach |
| 2898 | Insufficient network monitoring for suspicious activity | critical | 8.5 | 1 | Data Breach |
| 2899 | Unsecured admin panel, IDOR vulnerability | critical | 8.5 | 1 | Data Exposure |
| 2900 | Several vulnerabilities in the Likud app | critical | 8.5 | 1 | Data Breach |
| 2901 | Human Weakness in Customer Service | critical | 8.5 | 1 | Data Breach |
| 2902 | GraphQL API Misconfiguration | critical | 8.5 | 1 | Data Leak |
| 2903 | Misconfigured Storage Buckets | critical | 8.5 | 1 | Data Leak |
| 2904 | Login and Sign-up Service | critical | 8.5 | 1 | Data Breach |
| 2905 | Human error, lack of centralized IT control, decentralized IT departments | critical | 8.5 | 1 | Data Breach |
| 2906 | AI-Generated Convincing Impersonations | critical | 8.5 | 1 | Data Breach |
| 2907 | Progress Software’s MOVEit Transfer solution | critical | 8.5 | 1 | Data Breach |
| 2908 | Unsecured legacy server | critical | 8.5 | 1 | Data Exposure |
| 2909 | Open Registration Endpoint (Design Hub) | critical | 8.5 | 1 | Data Exposure |
| 2910 | CVE-2024-34102 (CosmicSting) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2911 | Weaknesses in university authentication processes | critical | 8.5 | 1 | Data Breach |
| 2912 | CVE-2023-43000 (WebKit RCE - terrorbird) | critical | 8.5 | 1 | Exploit Kit / Malware Campaign |
| 2913 | Third-Party CRM Security Weaknesses | critical | 8.5 | 1 | Data Breach |
| 2914 | MOVEit Secure File Transfer server | critical | 8.5 | 1 | Data Breach |
| 2915 | Checkout page code issue | critical | 8.5 | 1 | Data Breach |
| 2916 | Weak Authentication Credentials / Use of Non-Corporate Devices | critical | 8.5 | 1 | Data Breach / Unauthorized Access |
| 2917 | CVE-2025-47934 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2918 | Lack of MFA resilience, Human susceptibility to social engineering | critical | 8.5 | 1 | Phishing/Social Engineering |
| 2919 | Failure to Enforce 'Minimum Necessary' HIPAA Requirements | critical | 8.5 | 1 | Data Breach |
| 2920 | Abuse of Shared Access Signature (SAS) tokens and trusted cloud tools | critical | 8.5 | 1 | Ransomware |
| 2921 | Inadequate Technology and Agency Understaffing | critical | 8.5 | 1 | Data Exposure |
| 2922 | Aeries Software | critical | 8.5 | 1 | Data Breach |
| 2923 | Improper Token Management (Unrotated API Tokens) | critical | 8.5 | 1 | Data Breach |
| 2924 | CVE-2025-54106 (Windows RRAS RCE) | critical | 8.5 | 1 | Malware (Infostealer) |
| 2925 | Partner system compromise leading to unauthorized API access | critical | 8.5 | 1 | Data Exposure |
| 2926 | CVE-2025-59489 (Unity Editor Command-Line Argument Injection) | critical | 8.5 | 1 | Vulnerability |
| 2927 | Insufficient identity verification in hiring processes, reliance on social media badges | critical | 8.5 | 1 | Identity Fraud, Insider Threat, Cyber Espionage |
| 2928 | Leak of User Emails | critical | 8.5 | 1 | Data Breach |
| 2929 | Lack of Second-Layer Security Checks in API Configurations | critical | 8.5 | 1 | Data Breach |
| 2930 | URL Vulnerability | critical | 8.5 | 1 | Data Breach |
| 2931 | CVE-2026-1592 | critical | 8.5 | 1 | Supply Chain Attack |
| 2932 | CVE-2025-8088 (WinRAR path traversal flaw in Windows versions < 7.13) | critical | 8.5 | 1 | Zero-day exploit |
| 2933 | CVE-2025-43300 (Image I/O framework - out-of-bounds write) | critical | 8.5 | 1 | Zero-day vulnerability |
| 2934 | Third-party authentication (Okta SSO) | critical | 8.5 | 1 | Data Breach |
| 2935 | Inadequate security measures, potential internal mismanagement | critical | 8.5 | 1 | Data Breach |
| 2936 | Online customer service system vulnerability | critical | 8.5 | 1 | Data Breach |
| 2937 | CVE-2026-1234 | critical | 8.5 | 1 | Cross-Site Scripting (XSS) |
| 2938 | improper decommissioning of legacy cloud storage | critical | 8.5 | 1 | data breach |
| 2939 | Unique Identification Number Guessing | critical | 8.5 | 1 | Data Breach |
| 2940 | Lack of Timely Incident Reporting | critical | 8.5 | 1 | Data Breach |
| 2941 | CVE-2026-23594 | critical | 8.5 | 1 | Privilege Escalation |
| 2942 | Trusted Hiring Pipelines | critical | 8.5 | 1 | Malware Deployment |
| 2943 | CVE-2025-30247 (OS Command Injection in My Cloud UI) | critical | 8.5 | 1 | Vulnerability |
| 2944 | Improper Handling of Sensitive Data | critical | 8.5 | 1 | Data Breach |
| 2945 | Gemini Search Personalization Model (Prompt Injection via Browsing History) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2946 | System Setup Error | critical | 8.5 | 1 | Data Exposure |
| 2947 | CVE-2026-1237 | critical | 8.5 | 1 | Cross-Site Scripting (XSS) |
| 2948 | Ivanti Endpoint Manager Mobile flaw | critical | 8.5 | 1 | Data Breach |
| 2949 | Improper data handling during system restoration | critical | 8.5 | 1 | Data Breach |
| 2950 | Insider Access Abuse | critical | 8.5 | 1 | Data Breach |
| 2951 | CVE-2024-23222 (WebKit RCE - cassowary) | critical | 8.5 | 1 | Exploit Kit / Malware Campaign |
| 2952 | Overbroad OAuth Token Permissions | critical | 8.5 | 1 | Data Breach |
| 2953 | E-commerce System | critical | 8.5 | 1 | Data Breach |
| 2954 | Lack of Multi-Factor Authentication (implied) | critical | 8.5 | 1 | Data Breach |
| 2955 | AWS Trusted Advisor Bypass via S3 Bucket Policy Misconfiguration (Deny Rules for `s3:GetBucketPolicyStatus`, `s3:GetBucketPublicAccessBlock`, `s3:GetBucketAcl`) | critical | 8.5 | 1 | Misconfiguration |
| 2956 | MOVEit file transfer tool (global exploit) | critical | 8.5 | 1 | Data Breach |
| 2957 | CVE-2025-54236 (SessionReaper) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2958 | Unauthenticated Access to TRT Tool (Employee Data) | critical | 8.5 | 1 | Data Exposure |
| 2959 | Resource Constraints in DHS | critical | 8.5 | 1 | Security Oversight |
| 2960 | Human error, Social engineering, Internal leaks | critical | 8.5 | 1 | Data Breach |
| 2961 | Limited IT Infrastructure | critical | 8.5 | 1 | Data Privacy Fragmentation |
| 2962 | Poor credential management | critical | 8.5 | 1 | Unauthorized Access |
| 2963 | Social Engineering, Fake Authentication Screens | critical | 8.5 | 1 | Phishing |
| 2964 | Weak or Stolen Employee Credentials | critical | 8.5 | 1 | Data Breach |
| 2965 | absence of suspicious login alerts | critical | 8.5 | 1 | data breach |
| 2966 | Progress Software’s MOVEit Transfer application | critical | 8.5 | 1 | Data Breach |
| 2967 | inadequate data retention policies | critical | 8.5 | 1 | data breach |
| 2968 | Salesforce integration flaw (Drift-Salesloft) | critical | 8.5 | 1 | data breach |
| 2969 | Misconfigured access control, lack of IP whitelisting | critical | 8.5 | 1 | Data Leak |
| 2970 | Lack of Monitoring for Existing Threats | critical | 8.5 | 1 | Data Breach |
| 2971 | Mishandling of sensitive data by workers | critical | 8.5 | 1 | Data Breach |
| 2972 | Improper permission handling in Windows Error Reporting Service (wersvc.dll) | critical | 8.5 | 1 | Privilege Escalation |
| 2973 | MOVEit® Transfer application | critical | 8.5 | 1 | Data Breach |
| 2974 | Undisclosed zero-day vulnerability in WhatsApp calling feature | critical | 8.5 | 1 | Zero-Day Exploit |
| 2975 | Unauthenticated Access | critical | 8.5 | 1 | Data Breach |
| 2976 | Apple Notarization Bypass (ChillyHell) | critical | 8.5 | 1 | Malware (Infostealer) |
| 2977 | Contact-importing features | critical | 8.5 | 1 | Data Leak |
| 2978 | Excessive guest user permissions, misconfigured guest access to public APIs | critical | 8.5 | 1 | Data Theft |
| 2979 | Remote Dynamic Dependencies (RDD) | critical | 8.5 | 1 | Supply Chain Attack |
| 2980 | Policy/Procedural Failure | critical | 8.5 | 1 | Data Breach |
| 2981 | Misuse of legitimate access credentials post-employment | critical | 8.5 | 1 | Data Breach |
| 2982 | MOVEit Server | critical | 8.5 | 1 | Data Breach |
| 2983 | Lack of Authentication (No Password Protection) | critical | 8.5 | 1 | Data Exposure / Unsecured Database |
| 2984 | Social Engineering (Fake App Update) | critical | 8.5 | 1 | Cyberespionage |
| 2985 | Unauthorized access to shared network drive | critical | 8.5 | 1 | Data Breach |
| 2986 | Automatic Opt-Ins | critical | 8.5 | 1 | Data Privacy Issue |
| 2987 | AutoConsent JS bridge in DuckDuckGo Android browser (UXSS) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 2988 | Memory address mapping manipulation via DDR4 interposer | critical | 8.5 | 1 | Supply Chain Attack |
| 2989 | Insufficient input sanitization and double-parsing bug in 'Dispatch Search' feature | critical | 8.5 | 1 | Data Breach |
| 2990 | CVE-2026-21262 (Improper Access Control - CWE-284) | critical | 8.5 | 1 | Privilege Escalation |
| 2991 | Exposed API Keys | critical | 8.5 | 1 | Cloud Security Breach |
| 2992 | Exposed Elasticsearch Database | critical | 8.5 | 1 | Data Leak |
| 2993 | Poor M365 configurations | critical | 8.5 | 1 | Data Breach |
| 2994 | Lack of monitoring for suspicious activity | critical | 8.5 | 1 | Data Breach |
| 2995 | CVE-2025-31191 | critical | 8.5 | 1 | Sandbox Escape Vulnerability |
| 2996 | Account Compromise | critical | 8.5 | 1 | Data Breach |
| 2997 | Phishing-susceptible MFA methods | critical | 8.5 | 1 | Data Breach |
| 2998 | Improper Privilege Management (CWE-269) | critical | 8.5 | 1 | Privilege Escalation |
| 2999 | failure to deactivate former employee accounts | critical | 8.5 | 1 | data breach |
| 3000 | App cloning, Reverse engineering, Bypassing App Store security (iOS), JavaScript bundle interception, RSA-encrypted payload exfiltration | critical | 8.5 | 1 | Backdoor Attack, Cryptocurrency Wallet Hack |
| 3001 | Improper key management, lack of automated key rotation | critical | 8.5 | 1 | Data Leak |
| 3002 | CVE-2025-27920 (Directory Traversal), CVE-2025-27921 (Reflected XSS - unused) | critical | 8.5 | 1 | Cyber Espionage |
| 3003 | Missing role checks during user onboarding | critical | 8.5 | 1 | Autonomous AI-driven cyber attack |
| 3004 | Over-Permissive Access to CRM/Donor Data | critical | 8.5 | 1 | Data Breach |
| 3005 | Website Vulnerabilities | critical | 8.5 | 1 | Data Leak |
| 3006 | Vulnerability in Gladinet CentreStack | critical | 8.5 | 1 | Data Breach |
| 3007 | CVE-2025-10184 (Improper Permission Handling in OxygenOS Telephony Package) | critical | 8.5 | 1 | Vulnerability |
| 3008 | CVE-2025-54113 (Windows RRAS RCE) | critical | 8.5 | 1 | Malware (Infostealer) |
| 3009 | Unpatched Smart Contract Bugs | critical | 8.5 | 1 | Privacy Violation |
| 3010 | Inadequate safeguards in government online portals | critical | 8.5 | 1 | Credential Stuffing |
| 3011 | Lack of Privacy-Preserving Mechanisms in QML | critical | 8.5 | 1 | Privacy Breach |
| 3012 | Weak/Reused Passwords (from third-party sources) | critical | 8.5 | 1 | Account Takeover |
| 3013 | Insider access, malware backdoor | critical | 8.5 | 1 | Cyber-enabled drug trafficking |
| 3014 | Inadequate security protections | critical | 8.5 | 1 | Data Breach / Cybersecurity Failure |
| 3015 | CVE-2025-7776 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 3016 | Outdated or poorly secured API interfaces | critical | 8.5 | 1 | Data Breach |
| 3017 | Ray on Vertex AI Insecure Default Access | critical | 8.5 | 1 | Privilege Escalation |
| 3018 | Decentralized Security Coordination | critical | 8.5 | 1 | Data Breach |
| 3019 | Perimeter security measures | critical | 8.5 | 1 | Data Breach |
| 3020 | DNS Infrastructure Weakness (Box Domains) | critical | 8.5 | 1 | DNS Hijacking |
| 3021 | Lack of sandboxing in AI-generated test cases (Claude Code) | critical | 8.5 | 1 | Arbitrary Code Execution |
| 3022 | CSRF Protection Mechanism in Ruby on Rails | critical | 8.5 | 1 | Vulnerability |
| 3023 | CVE-2026-27739 | critical | 8.5 | 1 | SSRF (Server-Side Request Forgery) |
| 3024 | Lack of Network Segmentation in Cloud | critical | 8.5 | 1 | Cloud Security Breach |
| 3025 | Unknown vulnerability in the spam quarantine server software | critical | 8.5 | 1 | Data Breach |
| 3026 | CVE-2016-5817 (Critical SQL injection in Navis WebAccess) | critical | 8.5 | 1 | cyberattack |
| 3027 | Human Error (Tricked Call Center Worker) | critical | 8.5 | 1 | Data Breach |
| 3028 | Exposed Magicbell API Keys and Secrets | critical | 8.5 | 1 | Data Exposure |
| 3029 | Insecure Third-Party Integration (Drift-Salesforce/Google Workspace) | critical | 8.5 | 1 | Data Breach |
| 3030 | Human (Employee Susceptibility to Phishing) | critical | 8.5 | 1 | Data Breach |
| 3031 | Incorrect authorization (Lovable, CVE-2025-48757) | critical | 8.5 | 1 | Arbitrary Code Execution |
| 3032 | Missing row-level security (RLS), role-based access controls, and logic flaws in authentication | critical | 8.5 | 1 | Data Breach |
| 3033 | Improper Input/Output Sanitization in AI Chatbot (XSS) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 3034 | Ability to self-apply for admin privileges on the FIA Driver Categorisation portal | critical | 8.5 | 1 | data breach |
| 3035 | Unencrypted and non-password-protected database | critical | 8.5 | 1 | Data Leak |
| 3036 | CVE-2026-25049 | critical | 8.5 | 1 | Supply Chain Attack |
| 3037 | lack of multi-factor authentication (MFA) enforcement on phishing sites | critical | 8.5 | 1 | phishing |
| 3038 | Cryptographic Flaw in Infineon Microcontroller | critical | 8.5 | 1 | Cryptographic Vulnerability |
| 3039 | Email Misdirection | critical | 8.5 | 1 | Data Breach |
| 3040 | Windows automatic DLL loading | critical | 8.5 | 1 | Malware Campaign |
| 3041 | WebSocket auth bypass (CVE-2025-52882, CVSS: 8.8) | critical | 8.5 | 1 | Arbitrary Code Execution |
| 3042 | Stolen web cookies (session IDs, personal data) | critical | 8.5 | 1 | Data Exposure |
| 3043 | Lack of security audits for employee-facing ecommerce platforms | critical | 8.5 | 1 | Keylogger Attack |
| 3044 | Client-side vulnerabilities | critical | 8.5 | 1 | Data Breach/Vulnerability Exposure |
| 3045 | Unverified Assessment Domains | critical | 8.5 | 1 | APT (Advanced Persistent Threat) |
| 3046 | Vulnerability in SonicWall firewall | critical | 8.5 | 1 | Data Breach |
| 3047 | Customer Contract Search Tool | critical | 8.5 | 1 | Data Breach |
| 3048 | Use of Unlicensed Software | critical | 8.5 | 1 | Malware |
| 3049 | NULL Pointer Dereference | critical | 8.5 | 1 | Privilege Escalation |
| 3050 | Potential Weak Email Security Controls | critical | 8.5 | 1 | Phishing |
| 3051 | CVE-2023-32409 (WebKit Sandbox Escape - IronLoader) | critical | 8.5 | 1 | Exploit Kit / Malware Campaign |
| 3052 | inadequate segmentation between Discord and vendor systems | critical | 8.5 | 1 | data breach |
| 3053 | Human Error (Employee Susceptibility to Phishing) | critical | 8.5 | 1 | Data Breach |
| 3054 | Insufficient user identification and authentication (UIA) controls | critical | 8.5 | 1 | Data Security Audit |
| 3055 | Setting turned on by Patient Portal vendor | critical | 8.5 | 1 | Data Breach |
| 3056 | CVE-2026-29191 | critical | 8.5 | 1 | Cross-Site Scripting (XSS) |
| 3057 | User trust in online platforms | critical | 8.5 | 1 | Phishing |
| 3058 | delayed breach notifications | critical | 8.5 | 1 | ransomware |
| 3059 | Lack of password encryption | critical | 8.5 | 1 | Unauthorized Access |
| 3060 | fragmented infrastructure | critical | 8.5 | 1 | ransomware |
| 3061 | Misconfigured Cloud Storage | critical | 8.5 | 1 | Data Breach |
| 3062 | Weak IT Help Desk Authentication Protocols | critical | 8.5 | 1 | Data Breach |
| 3063 | Mobile Application Vulnerability | critical | 8.5 | 1 | Data Breach |
| 3064 | Test mode left enabled allowing OTP login via email keyword | critical | 8.5 | 1 | Autonomous AI-driven cyber attack |
| 3065 | API scraping via automated harvesting of user profiles | critical | 8.5 | 1 | Data Breach |
| 3066 | weak cybersecurity safeguards in third-party vendor (Salesforce) | critical | 8.5 | 1 | data breach |
| 3067 | CVE-2025-54897 (SharePoint RCE) | critical | 8.5 | 1 | Malware (Infostealer) |
| 3068 | misconfigured Azure Blob storage permissions | critical | 8.5 | 1 | data exposure |
| 3069 | CVE-2025-59448 (Session Token Lifetimes) | critical | 8.5 | 1 | Denial-of-Service |
| 3070 | Plaintext Password Transmission (Design Hub) | critical | 8.5 | 1 | Data Exposure |
| 3071 | Legitimate Telegram API authentication mechanisms | critical | 8.5 | 1 | Phishing |
| 3072 | Disabled security tools, outdated cyber hygiene practices | critical | 8.5 | 1 | Cyber Intrusion |
| 3073 | eForms System Vulnerability | critical | 8.5 | 1 | Data Breach |
| 3074 | Weak password storage (base64 hashes or unhashed passwords) | critical | 8.5 | 1 | Data Breach |
| 3075 | Website Migration | critical | 8.5 | 1 | Data Breach |
| 3076 | Social Engineering (ClickFix technique) | critical | 8.5 | 1 | Malware Campaign |
| 3077 | limited_cybersecurity_resources | critical | 8.5 | 1 | data_breach |
| 3078 | Critical security flaw allowing unauthorized 'super admin' account creation | critical | 8.5 | 1 | Data Breach |
| 3079 | Technical Issue with Third-Party Service Provider | critical | 8.5 | 1 | Data Breach |
| 3080 | weaknesses in backend systems | critical | 8.5 | 1 | data breach |
| 3081 | CVE-2026-21509 (Microsoft Office Security Feature Bypass) | critical | 8.5 | 1 | Cyber-Espionage |
| 3082 | Amazon S3 Storage Account | critical | 8.5 | 1 | Data Breach |
| 3083 | Lack of Secure Document Destruction Procedures | critical | 8.5 | 1 | Data Breach (Improper Disposal / Physical Security Failure) |
| 3084 | Third-party Cloud Service | critical | 8.5 | 1 | Data Breach |
| 3085 | Unsecured third-party server | critical | 8.5 | 1 | Data Breach |
| 3086 | Improper sanitization of authorization URLs in n8n | critical | 8.5 | 1 | Stored Cross-Site Scripting (XSS) |
| 3087 | Inconsistent Compliance Practices | critical | 8.5 | 1 | Data Privacy Fragmentation |
| 3088 | Sophisticated hacking attempts | critical | 8.5 | 1 | Data Breach |
| 3089 | Lack of multi-factor authentication, Human error (victims sharing access codes) | critical | 8.5 | 1 | Phishing, Social Engineering, Identity Theft, Data Theft |
| 3090 | Service Account Credential | critical | 8.5 | 1 | Data Breach |
| 3091 | Oracle E-Business Suite (Zero-Day) | critical | 8.5 | 1 | Cyberattack (Data Breach) |
| 3092 | misconfigured AWS S3 bucket (lack of access controls) | critical | 8.5 | 1 | data exposure |
| 3093 | Insecure defaults in Google Cloud Platform (GCP) API key architecture | critical | 8.5 | 1 | Data Exposure |
| 3094 | passkey storage in password managers | critical | 8.5 | 1 | phishing |
| 3095 | Human Error (Employee Susceptibility to Social Engineering) | critical | 8.5 | 1 | Data Breach (Social Engineering) |
| 3096 | Improper Firebase security rules (publicly accessible database) | critical | 8.5 | 1 | Data Breach |
| 3097 | Claude Code flaws | critical | 8.5 | 1 | APT Activity |
| 3098 | Poor credential hygiene (hard-coded/exposed credentials) | critical | 8.5 | 1 | Data Breach |
| 3099 | CWE-20: Improper Input Validation (lack of server-side checks) | critical | 8.5 | 1 | Data Breach |
| 3100 | Insufficient Identity Management | critical | 8.5 | 1 | Data Breach |
| 3101 | Google Tag Manager | critical | 8.5 | 1 | Data Breach |
| 3102 | hardcoded secrets in code | critical | 8.5 | 1 | data exposure |
| 3103 | Technical error in user data retrieval/logic (likely session or caching misconfiguration) | critical | 8.5 | 1 | Data Exposure (Unintentional Disclosure) |
| 3104 | CVE-2021-39935 | critical | 8.5 | 1 | Server-Side Request Forgery (SSRF) |
| 3105 | Zero-day vulnerability in MOVEit Transfer application | critical | 8.5 | 1 | Data Breach |
| 3106 | Theft of banking credentials and sensitive financial data | critical | 8.5 | 1 | Malware |
| 3107 | Legitimate API traffic for command-and-control (C2) communications | critical | 8.5 | 1 | Cyber Espionage |
| 3108 | Insufficient security measures | critical | 8.5 | 1 | Data Breach |
| 3109 | Improper Access Controls, Undisclosed System Features | critical | 8.5 | 1 | Unauthorized Data Access |
| 3110 | Human error, lack of phishing awareness | critical | 8.5 | 1 | Data Breach |
| 3111 | Lack of organizational safeguards for AI chatbot usage | critical | 8.5 | 1 | Data Breach |
| 3112 | Outdated security protocols | critical | 8.5 | 1 | Data Breach |
| 3113 | Shared Access Protocols with Weak Authentication | critical | 8.5 | 1 | Data Breach |
| 3114 | lack of multi-signature validation for critical operations | critical | 8.5 | 1 | blockchain exploit |
| 3115 | Server Vulnerabilities | critical | 8.5 | 1 | Smishing Scam |
| 3116 | MOVEit Transfer Vulnerability (CVE-2023-34362) | critical | 8.5 | 1 | Data Breach |
| 3117 | Lateral Movement within Internal Systems | critical | 8.5 | 1 | Data Breach |
| 3118 | Unprotected Elasticsearch instance | critical | 8.5 | 1 | Data Exposure |
| 3119 | CVE-2025-XXXX (WebKit Zero-Day 1) | critical | 8.5 | 1 | Zero-Day Exploit |
| 3120 | misconfiguration in HR/finance team servers | critical | 8.5 | 1 | ransomware |
| 3121 | Vulnerability in MOBO subscriber management tool | critical | 8.5 | 1 | Data Breach |
| 3122 | CVE-Pending (CamoLeak: Copilot Chat's parsing of invisible markdown + Camo image-proxy exfiltration) | critical | 8.5 | 1 | Data Exfiltration |
| 3123 | Bias and Unverified Data Propagation | critical | 8.5 | 1 | Data Privacy Issue |
| 3124 | Improper handling of technical identifiers | critical | 8.5 | 1 | Data Exposure |
| 3125 | Citrix Software Vulnerability (specific CVE unidentified) | critical | 8.5 | 1 | Data Breach |
| 3126 | CVE-2014-0160 (Heartbleed - Out-of-Bounds Read in OpenSSL) | critical | 8.5 | 1 | Memory Corruption |
| 3127 | Impersonation Feature in Employee Portals | critical | 8.5 | 1 | Data Exposure |
| 3128 | Insufficient Mass Email Controls | critical | 8.5 | 1 | Data Breach |
| 3129 | Oracle EBS zero-day flaw | critical | 8.5 | 1 | Data Breach |
| 3130 | CVE-2025-3102 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 3131 | Lack of Data Minimization in Blockchain Transactions | critical | 8.5 | 1 | Privacy Violation |
| 3132 | Unauthorized data sharing via embedded tracking tools | critical | 8.5 | 1 | Data Breach |
| 3133 | weak MFA implementations | critical | 8.5 | 1 | phishing |
| 3134 | Unauthorized data transmission via third-party trackers | critical | 8.5 | 1 | Data Breach |
| 3135 | Remote Work Vulnerabilities (COVID-19 Exploitation) | critical | 8.5 | 1 | Data Breach |
| 3136 | Unsecured System | critical | 8.5 | 1 | Data Breach |
| 3137 | Human Trust and Error (Bypassed Security Awareness Training) | critical | 8.5 | 1 | Data Breach |
| 3138 | Lack of proper access controls or oversight during training | critical | 8.5 | 1 | Data Breach / Espionage |
| 3139 | hardcoded credentials in source code | critical | 8.5 | 1 | data breach |
| 3140 | Unregulated AI Tool Integration | critical | 8.5 | 1 | Data Privacy Fragmentation |
| 3141 | Use-After-Free | critical | 8.5 | 1 | Privilege Escalation |
| 3142 | Overly permissive guest user settings in Salesforce Experience Cloud | critical | 8.5 | 1 | Data Harvesting |
| 3143 | CVE-2025-14847 (Improper handling of length parameter inconsistency, CWE-130) | critical | 8.5 | 1 | Memory-Read Vulnerability |
| 3144 | Potential unauthorized access to LDLC's customer database (timing suggests link to LDLC's server breach) | critical | 8.5 | 1 | phishing |
| 3145 | CVE-2017-7921 | critical | 8.5 | 1 | Espionage |
| 3146 | Unencrypted Computers | critical | 8.5 | 1 | Data Breach |
| 3147 | Over-Permissive Third-Party Access | critical | 8.5 | 1 | Data Breach |
| 3148 | Gemini Cloud Assist (Log Summarization Flaw) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 3149 | Inherited permissions from privileged users | critical | 8.5 | 1 | Data Breach |
| 3150 | Lack of Cybersecurity Leadership | critical | 8.5 | 1 | Potential Data Breach |
| 3151 | improper data retention | critical | 8.5 | 1 | data breach |
| 3152 | Abuse of Android’s Accessibility Service | critical | 8.5 | 1 | Malware (Remote Access Trojan - RAT) |
| 3153 | Lack of Email Spoofing Protections | critical | 8.5 | 1 | Data Breach |
| 3154 | Improper scoping of OAuth permissions in Salesloft Drift (Salesforce-integrated tool) | critical | 8.5 | 1 | Data Breach |
| 3155 | Unprotected 'unlink()' call enabling unauthenticated file deletion | critical | 8.5 | 1 | SQL Injection |
| 3156 | Google Analytics and Google Ads misconfiguration | critical | 8.5 | 1 | Data Breach |
| 3157 | Lack of domain verification during account creation | critical | 8.5 | 1 | Autonomous AI-driven cyber attack |
| 3158 | CVE-2025-5775 | critical | 8.5 | 1 | Reconnaissance |
| 3159 | Unauthenticated DNS modification | critical | 8.5 | 1 | DNS Hijacking |
| 3160 | CVE-2025-54254 (Improper Restriction of XML External Entity Reference) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 3161 | CVE-2026-1236 | critical | 8.5 | 1 | Cross-Site Scripting (XSS) |
| 3162 | inadequate validation of third-party services (Cloudflare Pages) | critical | 8.5 | 1 | phishing |
| 3163 | lack of encryption and authentication (non-password-protected database) | critical | 8.5 | 1 | data exposure |
| 3164 | MOVEit Transfer zero-day vulnerability (CVE-2023-34362) | critical | 8.5 | 1 | Data Breach |
| 3165 | Weak multi-factor authentication (MFA) enforcement, password reuse, exposed network edge devices (e.g., Fortinet FortiGate-60E with open ports) | critical | 8.5 | 1 | Credential Stuffing |
| 3166 | CVE-2025-53652 | critical | 8.5 | 1 | Command Injection |
| 3167 | Overly permissive guest user configurations in Salesforce Experience Cloud | critical | 8.5 | 1 | Data Theft |
| 3168 | GitHub Account Security Weakness | critical | 8.5 | 1 | Data Breach |
| 3169 | Inadequate safeguards for international data transfers | critical | 8.5 | 1 | Data Breach |
| 3170 | Incomplete cross-origin controls (Ollama Desktop) | critical | 8.5 | 1 | Arbitrary Code Execution |
| 3171 | Lack of Physical Security for Devices Containing Sensitive Data | critical | 8.5 | 1 | Data Breach (Physical Theft) |
| 3172 | lack of credential rotation | critical | 8.5 | 1 | data breach |
| 3173 | Remote Code Execution Vulnerability in DS-2105 Pro DVRs | critical | 8.5 | 1 | Botnet |
| 3174 | Lack of encryption in radio communications used by public health systems | critical | 8.5 | 1 | Data Breach |
| 3175 | Public web server misconfiguration | critical | 8.5 | 1 | Data Breach |
| 3176 | Vulnerabilities in Salesforce-hosted databases | critical | 8.5 | 1 | Data Breach |
| 3177 | Supply-chain risks | critical | 8.5 | 1 | Third-party data exploitation |
| 3178 | Backend API endpoint lacking proper authentication checks | critical | 8.5 | 1 | Data Breach |
| 3179 | Excessive Data Access Permissions | critical | 8.5 | 1 | Data Breach |
| 3180 | Unsecured Internet-Connected Database | critical | 8.5 | 1 | Data Exposure |
| 3181 | Unauthorized Software Installation | critical | 8.5 | 1 | Data Breach |
| 3182 | Prompt Injection (AI agent misinterprets embedded commands in untrusted data as legitimate instructions) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 3183 | CVE-2025-49596 | critical | 8.5 | 1 | Remote Code Execution (RCE) |
| 3184 | CVE-2017-3881 (Cluster Management Protocol RCE in Cisco IOS/IOS XE) | critical | 8.5 | 1 | unauthorized access |
| 3185 | MOVEit Transfer environment vulnerability | critical | 8.5 | 1 | Data Breach |
| 3186 | automated CI/CD pipeline execution | critical | 8.5 | 1 | supply-chain attack |
| 3187 | Incorrect access settings | critical | 8.5 | 1 | Data Breach |
| 3188 | CVE-2025-64496 | critical | 8.5 | 1 | Code Injection |
| 3189 | Unmaintained VPN remote access server, inadequate network monitoring, ambiguous division of responsibilities, accumulation of unmanaged data on network drives | critical | 8.5 | 1 | Data Breach |
| 3190 | CVE-2025-61984 (Inadequate filtering of control characters in usernames for ProxyCommand in OpenSSH) | critical | 8.5 | 1 | Vulnerability |
| 3191 | Misconfigured Amazon Web Services S3 buckets | critical | 8.5 | 1 | Data Leak |
| 3192 | Inactive user accounts not deactivated | critical | 8.5 | 1 | Data Breach |
| 3193 | Improper TLS Certificate Validation (CWE-295) | critical | 8.5 | 1 | Vulnerability |
| 3194 | Improper CSV processing allowing unauthenticated file reads | critical | 8.5 | 1 | SQL Injection |
| 3195 | Blender’s 'Auto Run Python Scripts' feature | critical | 8.5 | 1 | malware |
| 3196 | Publicly Available Code Repository | critical | 8.5 | 1 | Data Breach |
| 3197 | User Email Accounts | critical | 8.5 | 1 | Data Breach |
| 3198 | Security hole in MOVEit Transfer software | critical | 8.5 | 1 | Ransomware |
| 3199 | CVE-2025-14756 | critical | 8.5 | 1 | Command Injection |
| 3200 | inadequate vendor oversight | critical | 8.5 | 1 | data breach |
| 3201 | Temporary unsecured storage of user data and PGP keys | critical | 8.5 | 1 | Data Breach |
| 3202 | compromised personal data | critical | 8.5 | 1 | fraud |
| 3203 | CVE-2025-10547 (Uninitialized Stack Value Leading to Arbitrary Free) | critical | 8.5 | 1 | Vulnerability |
| 3204 | Cloud Vendor Compromise | critical | 8.5 | 1 | Data Breach |
| 3205 | weak access controls at third-party vendor | critical | 8.5 | 1 | data breach |
| 3206 | Previously unknown security vulnerability in Oracle E-Business Suite | critical | 8.5 | 1 | Data Breach |
| 3207 | Salesforce Misconfiguration | critical | 8.5 | 1 | Data Breach |
| 3208 | Human vulnerability (bribery of customer support agents) | critical | 8.5 | 1 | Data Breach |
| 3209 | Lack of access controls and monitoring | critical | 8.5 | 1 | Unauthorized Data Access |
| 3210 | Disabled Workspace Trust (Cursor Editor) | critical | 8.5 | 1 | Malware (Infostealer) |
| 3211 | CVE-2025-37899 (Use-After-Free in ksmbd SMB2 LOGOFF handler) | critical | 8.5 | 1 | Zero-Day Vulnerability |
| 3212 | CVE-2025-59449 (Incorrect Authorization) | critical | 8.5 | 1 | Denial-of-Service |
| 3213 | CVE-2025-33206 (Improper Input Validation - CWE-78) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 3214 | Inadequate User Data Protection | critical | 8.5 | 1 | Data Breach |
| 3215 | Inadequate Data Security Measures | critical | 8.5 | 1 | Data Breach |
| 3216 | CWE-601: URL Redirection to Untrusted Site (Open Redirect) (via token manipulation) | critical | 8.5 | 1 | Data Breach |
| 3217 | CVE-2026-3338 | critical | 8.5 | 1 | Cryptographic Vulnerability |
| 3218 | CVE-2025-8424 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 3219 | configuration gap in Amazon S3 server | critical | 8.5 | 1 | data breach |
| 3220 | Weak cybersecurity defenses, lack of dedicated cybersecurity staff, reliance on ed-tech tools | critical | 8.5 | 1 | Ransomware |
| 3221 | VPN appliances | critical | 8.5 | 1 | Credential Theft |
| 3222 | Security flaw | critical | 8.5 | 1 | Data Breach |
| 3223 | Software Vulnerabilities | critical | 8.5 | 1 | Data Breach |
| 3224 | Internal Authentication API bug | critical | 8.5 | 1 | Authentication Vulnerability |
| 3225 | Application misconfiguration | critical | 8.5 | 1 | Data Breach |
| 3226 | CVE-2025-23120 | critical | 8.5 | 1 | Vulnerability |
| 3227 | Preventable authorization flaw, path manipulation in web address | critical | 8.5 | 1 | Data Breach |
| 3228 | CVE-2026-24512 | critical | 8.5 | 1 | Supply Chain Attack |
| 3229 | Unauthorized code in third-party vendor's application | critical | 8.5 | 1 | Data Breach |
| 3230 | Three separate flaws in Automotive Grade Linux | critical | 8.5 | 1 | Zero-Day Vulnerabilities |
| 3231 | CVE-2026-2835 | critical | 8.5 | 1 | HTTP Request Smuggling |
| 3232 | CVE-2026-20098 | critical | 8.5 | 1 | Vulnerability Exploitation |
| 3233 | Human Error (Misconfigured Email Distribution List) | critical | 8.5 | 1 | Data Breach (Unintentional Disclosure) |
| 3234 | CVE (not specified) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 3235 | Trust in the platform's review system and verification processes | critical | 8.5 | 1 | Disinformation and Scams |
| 3236 | Network Access Feature in Claude (Sandbox Environment) | critical | 8.5 | 1 | Data Exfiltration |
| 3237 | compromised user devices (suspected) | critical | 8.5 | 1 | data breach (unverified) |
| 3238 | Listable Algolia Search Indexes (PII Exposure) | critical | 8.5 | 1 | Data Exposure |
| 3239 | Lack of Physical Security / Unencrypted Device | critical | 8.5 | 1 | Data Breach (Physical Theft) |
| 3240 | Inadequate Data Handling Controls | critical | 8.5 | 1 | Data Breach |
| 3241 | user trust in legitimate cryptocurrency wallet applications | critical | 8.5 | 1 | malware |
| 3242 | Weak security measures in credit card terminals | critical | 8.5 | 1 | Cyber Crime |
| 3243 | Inadequate security on WordPress-hosted infrastructure | critical | 8.5 | 1 | Data Breach |
| 3244 | Incomplete redaction of sensitive documents | critical | 8.5 | 1 | Data Exposure |
| 3245 | Inadequate security awareness training | critical | 8.5 | 1 | Phishing |
| 3246 | Progress MOVEit platform | critical | 8.5 | 1 | Data Breach |
| 3247 | Third-party system vulnerability | critical | 8.5 | 1 | Data Breach |
| 3248 | Use of Pirated Corporate Software | critical | 8.5 | 1 | Info-Stealing |
| 3249 | CVE-2026-22219 (SSRF) | critical | 8.5 | 1 | Vulnerability Exploitation |
| 3250 | Impersonation of law enforcement officials | critical | 8.0 | 1 | Data Leak |
| 3251 | Human Resources Information Access | critical | 8.0 | 1 | Data Breach |
| 3252 | System Bug | critical | 8.0 | 1 | Data Disclosure |
| 3253 | Employee Sharing Sensitive Information | critical | 8.0 | 1 | Data Breach |
| 3254 | Application Vulnerability | critical | 8.0 | 1 | Data Breach |
| 3255 | Accellion file-sharing system | critical | 8.0 | 1 | Data Breach |
| 3256 | Database Access | critical | 8.0 | 1 | Data Breach |
| 3257 | Compromised Administrative Staff Account | critical | 8.0 | 1 | Data Breach |
| 3258 | Physical Loss of Device | critical | 8.0 | 1 | Data Breach |
| 3259 | Authentication process for My Account login details | critical | 8.0 | 1 | Data Breach |
| 3260 | Accellion’s FTA | critical | 8.0 | 1 | Data Breach |
| 3261 | Third-party Vendor Access | critical | 8.0 | 1 | Data Breach |
| 3262 | Improper Data Redaction | critical | 8.0 | 1 | Data Breach |
| 3263 | Lack of security safeguards in the contract | critical | 8.0 | 1 | Data Breach |
| 3264 | Software Update | critical | 8.0 | 1 | Data Breach |
| 3265 | Misconfigured Server | critical | 8.0 | 1 | Data Breach |
| 3266 | Points of Sale | critical | 8.0 | 1 | Data Breach |
| 3267 | Misconfiguration in computer system | critical | 8.0 | 1 | Data Breach |
| 3268 | Keyboard Software Bug | critical | 8.0 | 1 | Software Vulnerability |
| 3269 | RCE vulnerability in Dynamicweb software | critical | 8.0 | 1 | Remote Code Execution (RCE) |
| 3270 | Security flaw in the patient portal | critical | 8.0 | 1 | Data Breach |
| 3271 | Unsecured Data Storage Device | critical | 8.0 | 1 | Data Breach |
| 3272 | Misconfigured GitHub repository | critical | 8.0 | 1 | Data Leak |
| 3273 | Sequential User ID Bug | critical | 8.0 | 1 | Data Breach |
| 3274 | Radio Communications Disruption | critical | 8.0 | 1 | Vulnerability Exploitation |
| 3275 | Unauthorized Access by Insider | critical | 8.0 | 1 | Data Breach |
| 3276 | CWE Exposure of Resource to Wrong Sphere | critical | 8.0 | 1 | Vulnerability |
| 3277 | Various vulnerabilities scanned by the Angler exploit kit | critical | 8.0 | 1 | Malvertising |
| 3278 | Insufficient security protections in cloud-based storage container | critical | 8.0 | 1 | Data Breach |
| 3279 | CVE-2025-61884 (potential, not yet confirmed as exploited) | high | 7.5 | 1 | ransomware |
| 3280 | legacy perimeter firewall | high | 7.5 | 1 | Ransomware |
| 3281 | Compromised Update Server | high | 7.5 | 1 | Malware Distribution |
| 3282 | Firewall Vulnerability | high | 7.5 | 1 | Ransomware Attack |
| 3283 | security systems vulnerability | high | 7.5 | 1 | data breach |
| 3284 | Fragmented security tools, insufficient email security coverage | high | 7.5 | 1 | Ransomware |
| 3285 | CVE-2023-34362 (MOVEit) | high | 7.5 | 1 | ransomware |
| 3286 | IT System Glitch | high | 7.5 | 1 | Data Breach |
| 3287 | Obfuscated Code in Extensions | high | 7.5 | 1 | Malicious Software |
| 3288 | Employee login credentials | high | 7.5 | 1 | Ransomware Attack |
| 3289 | Lack of multi-factor authentication (MFA) on domain accounts | high | 7.5 | 1 | Ransomware Attempt |
| 3290 | Improper handling of sensitive information | high | 7.5 | 1 | Data Breach |
| 3291 | Review Process Bypass | high | 7.5 | 1 | Ransomware |
| 3292 | CVE-2025-61884 | high | 7.5 | 1 | Cyberattack |
| 3293 | Stack space exhaustion in user code with async_hooks enabled | high | 7.5 | 1 | Denial-of-Service (DoS) |
| 3294 | Vulnerabilities in global digital infrastructure | high | 7.5 | 1 | Ransomware |
| 3295 | outdated software, overworked staff, limited holiday response times | high | 7.5 | 1 | phishing |
| 3296 | Oracle E-Business Suite Zero-Day (Unauthenticated, Low Complexity) | high | 7.5 | 1 | Cyberattack |
| 3297 | POS Systems | high | 7.5 | 1 | Data Breach |
| 3298 | Internet-accessible flaws | high | 7.5 | 1 | Ransomware |
| 3299 | Payment system vulnerability | high | 7.5 | 1 | Data Breach |
| 3300 | Zero-day vulnerability in third-party software (Oracle E-Business Suite) | high | 7.5 | 1 | Data Breach |
| 3301 | Weak Password Policy | high | 6.5 | 1 | Hacking Incident |
| 3302 | Database vulnerability | high | 6.0 | 1 | Data Breach |
| 3303 | lack of multi-factor authentication (MFA) on crypto accounts | high | 6.0 | 1 | cyber theft |
| 3304 | Human error, Credential harvesting | high | 6.0 | 1 | Data Breach |
| 3305 | Human Error (Misplaced Trust in Email Communication) | high | 6.0 | 1 | Business Email Compromise (BEC) |
| 3306 | Misconfigured Docker Daemon (Exposed to Internet) | high | 6.0 | 1 | DDoS Attack |
| 3307 | Compromised software via phishing | high | 6.0 | 1 | Phishing Attack |
| 3308 | Third-party application vulnerability | high | 6.0 | 1 | Data Breach |
| 3309 | Lack of Data Governance Policies | high | 6.0 | 1 | Data Leakage |
| 3310 | Compromised Office 365 Account | high | 6.0 | 1 | Data Breach |
| 3311 | weaknesses in social media platform moderation | high | 6.0 | 1 | fraud |
| 3312 | Unauthorized access to an employee email account | high | 6.0 | 1 | Data Breach |
| 3313 | Security flaw in Progress' MOVEit data transfer programme | high | 6.0 | 1 | Data Breach |
| 3314 | Hardcoded Credentials in Internal Portals | high | 6.0 | 1 | Data Breach |
| 3315 | CVE-2025-0128 | high | 6.0 | 1 | Denial of Service (DoS) |
| 3316 | Unsecured Zoom Classroom | high | 6.0 | 1 | Cyber Attack |
| 3317 | Human Trust in Authority Figures | high | 6.0 | 1 | Social Engineering |
| 3318 | unprotected storage | high | 6.0 | 1 | data exposure |
| 3319 | Insufficient Email Security Protocols | high | 6.0 | 1 | Phishing |
| 3320 | System Malfunction | high | 6.0 | 1 | Data Leak |
| 3321 | Human Error / Lack of Authentication Protocols | high | 6.0 | 1 | Data Breach |
| 3322 | Improper Access Controls on AWS EC2 | high | 6.0 | 1 | DDoS Attack |
| 3323 | NEXTEP self-service kiosks | high | 6.0 | 1 | Data Breach |
| 3324 | lack of authentication for mobile device pairing | high | 6.0 | 1 | fraud |
| 3325 | improper use of email fields (To/CC instead of BCC) | high | 6.0 | 1 | data breach |
| 3326 | potential weaknesses in email system security | high | 6.0 | 1 | phishing |
| 3327 | Compromised Employee Mailbox | high | 6.0 | 1 | Data Breach |
| 3328 | Lack of end-to-end encryption in standard email protocols, Absence of proper email authentication mechanisms | high | 6.0 | 1 | Business Email Compromise (BEC) |
| 3329 | Employee Mailboxes | high | 6.0 | 1 | Data Breach |
| 3330 | Psychological manipulation (urgency, authority impersonation) | high | 6.0 | 1 | Phishing (AI-enhanced) |
| 3331 | Insecure use of pull_request_target in GitHub Actions workflows | high | 6.0 | 1 | Supply Chain Attack |
| 3332 | Backdoor in the system | high | 6.0 | 1 | Fraud |
| 3333 | Medium and high severity vulnerabilities in Ivanti EPMM software | high | 6.0 | 1 | Cyber Attack |
| 3334 | Unsecured Active Directory | high | 6.0 | 1 | Data Breach |
| 3335 | Unmanaged Secrets in CI/CD Pipelines | high | 6.0 | 1 | Credential Theft |
| 3336 | Shadow IT | high | 6.0 | 1 | Security Control Bypass |
| 3337 | Unauthorized access to WiFi management system | high | 6.0 | 1 | Cyber Attack |
| 3338 | Insufficient Staff Training | high | 6.0 | 1 | Data Breach |
| 3339 | Reused passwords across multiple services | high | 6.0 | 1 | Credential Stuffing |
| 3340 | Use of Personal Device for Corporate Access | high | 6.0 | 1 | Data Breach |
| 3341 | Unsecured Endpoints | high | 6.0 | 1 | Data Security Incident |
| 3342 | JavaScript File Modification | high | 6.0 | 1 | Malware |
| 3343 | Human vulnerability through social engineering | high | 6.0 | 1 | Social Engineering Attack |
| 3344 | Email login credentials | high | 6.0 | 1 | Data Breach |
| 3345 | inadequate contractor monitoring | high | 6.0 | 1 | insider threat |
| 3346 | Error in resetting network settings | high | 6.0 | 1 | Data Breach |
| 3347 | Over-Permissive Ticket Transfer Features | high | 6.0 | 1 | Account Takeover (ATO) |
| 3348 | Weak Authentication for OAuth Tokens | high | 6.0 | 1 | Data Breach |
| 3349 | Misconfiguration of AWS Application Load Balancer Authentication | high | 6.0 | 1 | Misconfiguration |
| 3350 | Unpatched flaw in a commercial MDM system | high | 6.0 | 1 | Data Breach |
| 3351 | Lax privacy settings | high | 6.0 | 1 | Data Breach |
| 3352 | Compromised official Belgian Grand Prix email account | high | 6.0 | 1 | Multi-vector attack |
| 3353 | Email Account and Tax Preparation Software | high | 6.0 | 1 | Data Breach |
| 3354 | Human Error (Unauthorized Information Disclosure) | high | 6.0 | 1 | Data Breach |
| 3355 | lack of anomaly detection for screenshot activities | high | 6.0 | 1 | insider threat |
| 3356 | Outdated Antivirus/Anti-Malware Tools | high | 6.0 | 1 | Data Breach Risk |
| 3357 | Browsealoud Plugin | high | 6.0 | 1 | Cryptojacking |
| 3358 | Legacy X-Frame-Options Ineffectiveness | high | 6.0 | 1 | Data Breach |
| 3359 | Employee Malpractice | high | 6.0 | 1 | Data Breach |
| 3360 | Credential theft, Stolen payment tokens | high | 6.0 | 1 | Fraud |
| 3361 | CMS vulnerability | high | 6.0 | 1 | Data Breach |
| 3362 | Human Error/Employee Misconduct | high | 6.0 | 1 | Unauthorized Access and Data Breach |
| 3363 | Human Trust in Branded Communications / Lack of Multi-Channel Verification | high | 6.0 | 1 | Phishing / Social Engineering |
| 3364 | Business Email Compromise | high | 6.0 | 1 | Data Breach |
| 3365 | Potential SharePoint vulnerability (unconfirmed) | high | 6.0 | 1 | Cyberattack |
| 3366 | Routers from T-Mobile, Zyxel, D-Link, Linksys | high | 6.0 | 1 | DDoS Attack |
| 3367 | Web-based payroll program | high | 6.0 | 1 | Data Breach |
| 3368 | lack of package registry enforcement | high | 6.0 | 1 | supply chain attack |
| 3369 | Human Trust in Known Contacts | high | 6.0 | 1 | Phishing |
| 3370 | Unsecured MongoDB Server | high | 6.0 | 1 | Data Exposure |
| 3371 | Weak or compromised email account security | high | 6.0 | 1 | Data Breach |
| 3372 | Weak credential security (IT vendor account compromise) | high | 6.0 | 1 | unauthorized access |
| 3373 | Website platform configuration error (password-protected documents made publicly accessible via search) | high | 6.0 | 1 | data breach |
| 3374 | AI-related blind spots | high | 6.0 | 1 | Data Breach |
| 3375 | Public exposure of environment configuration file | high | 6.0 | 1 | Data Breach |
| 3376 | Misconfigured AWS S3 storage | high | 6.0 | 1 | Data Leak |
| 3377 | Data Collection Practices | high | 6.0 | 1 | Data Privacy Issue |
| 3378 | Employee Misconfiguration | high | 6.0 | 1 | Data Breach |
| 3379 | Abuse of trusted .arpa domain for reverse DNS lookups | high | 6.0 | 1 | Phishing |
| 3380 | Unspecified vulnerability | high | 6.0 | 1 | Cyber Attack |
| 3381 | Android system permissions bypass | high | 6.0 | 1 | Vulnerability |
| 3382 | Weak Data Access Controls | high | 6.0 | 1 | Data Exposure |
| 3383 | Improper backup file storage | high | 6.0 | 1 | Data Breach |
| 3384 | Employee Account | high | 6.0 | 1 | Data Breach |
| 3385 | Open Elastic Search Instances | high | 6.0 | 1 | Data Exposure |
| 3386 | Unauthorized access to Microsoft 365 account | high | 6.0 | 1 | Data Breach |
| 3387 | Programming Update Error | high | 6.0 | 1 | Data Breach |
| 3388 | Excessive OAuth Token Scopes | high | 6.0 | 1 | Unauthorized Access |
| 3389 | unsecured QR code access | high | 6.0 | 1 | fraud |
| 3390 | CVE-2025-33206 (CWE-78: Improper Neutralization of Special Elements in OS Commands) | high | 6.0 | 1 | Vulnerability |
| 3391 | Fortra's GoAnywhere MFT platform's zero-day vulnerability | high | 6.0 | 1 | Data Breach |
| 3392 | Human Vulnerability (Blackmail) | high | 6.0 | 1 | Extortion, Insider Threat, Retail Theft |
| 3393 | Unmonitored DOM Changes (Lack of MutationObserver) | high | 6.0 | 1 | Data Breach |
| 3394 | Poor Employee Training | high | 6.0 | 1 | Data Leak |
| 3395 | Cached Credentials | high | 6.0 | 1 | Data Security Incident |
| 3396 | Unguarded Physical Access Points | high | 6.0 | 1 | Physical Theft |
| 3397 | Email Privacy Misconfigurations | high | 6.0 | 1 | Data Breach |
| 3398 | Insufficiently Secure Settings | high | 6.0 | 1 | Data Breach |
| 3399 | Payment Card Network | high | 6.0 | 1 | Data Breach |
| 3400 | Weak password hashing (SHA-256) | high | 6.0 | 1 | Data Breach |
| 3401 | Accidental Exposure | high | 6.0 | 1 | Data Breach |
| 3402 | Default/Lack of Credentials | high | 6.0 | 1 | DDoS Attack |
| 3403 | Microsoft Copilot email summarization flaw | high | 6.0 | 1 | Phishing |
| 3404 | Insufficient Access Controls for High-Risk Secrets | high | 6.0 | 1 | Credential Theft |
| 3405 | Email Account Security | high | 6.0 | 1 | Email Hijacking |
| 3406 | exploitation of job application platforms | high | 6.0 | 1 | social engineering |
| 3407 | Credential Stuffing | high | 6.0 | 1 | Authentication Security Improvement |
| 3408 | Lack of Email Gateway HTML Attachment Blocking | high | 6.0 | 1 | Phishing |
| 3409 | CVE-2025-66168 | high | 6.0 | 1 | Denial-of-Service (DoS) |
| 3410 | Absence of Document Automation/Redaction Tools | high | 6.0 | 1 | Data Leakage |
| 3411 | PCI DSS 4.0.1 Non-Compliance (Unmanaged Scripts on Payment Pages) | high | 6.0 | 1 | Data Breach |
| 3412 | Unattended Property | high | 6.0 | 1 | Data Theft |
| 3413 | IT vendor vulnerability confirmed by the Ministry of Health | high | 6.0 | 1 | Data Breach |
| 3414 | Over-reliance on email/text-based communication without secondary validation | high | 6.0 | 1 | Phishing (AI-enhanced) |
| 3415 | Unsecured Remote Work Environments | high | 6.0 | 1 | Human Error |
| 3416 | MOVEit Transfer platform vulnerability (likely CVE-2023-34362) | high | 6.0 | 1 | Data Breach |
| 3417 | Poor Data Handling Protocols | high | 6.0 | 1 | Data Breach |
| 3418 | Critical Infrastructure Vulnerabilities (e.g., Power Grid Exploitation) | high | 6.0 | 1 | Cybercrime Network Dismantling |
| 3419 | Weak Cloud Security (Nintendo) | high | 6.0 | 1 | DDoS Attack |
| 3420 | publicly available personal data (for voice cloning) | high | 6.0 | 1 | phishing |
| 3421 | Flaw in the online application | high | 6.0 | 1 | Data Breach |
| 3422 | Human Error (Inadvertent Disclosure in Public Documents) | high | 6.0 | 1 | Data Breach |
| 3423 | CVE-2025-12779 | high | 6.0 | 1 | Vulnerability |
| 3424 | trust in automated AI-driven code analysis | high | 6.0 | 1 | supply chain attack |
| 3425 | Security Setting Error | high | 6.0 | 1 | Data Breach |
| 3426 | Human Error (IT Support Tricked) | high | 6.0 | 1 | Data Breach |
| 3427 | Unquoted Search Path Weakness in Plantronics Hub | high | 6.0 | 1 | Privilege Escalation |
| 3428 | Surveillance software | high | 6.0 | 1 | Surveillance |
| 3429 | System Misconfiguration | high | 6.0 | 1 | Data Breach |
| 3430 | Physical ATM Security | high | 6.0 | 1 | Data Breach |
| 3431 | Unsecured Email Account | high | 6.0 | 1 | Data Breach |
| 3432 | Employee Self Service system | high | 6.0 | 1 | Data Breach |
| 3433 | lack of multi-factor verification | high | 6.0 | 1 | phishing |
| 3434 | Improper data management practices | high | 6.0 | 1 | Data Leak |
| 3435 | Human Error (Fatigue/Jetlag) | high | 6.0 | 1 | Phishing |
| 3436 | Unrelated software bugs in vendor’s trading software | high | 6.0 | 1 | Hacking, Software Bug |
| 3437 | Software used by a third-party service provider | high | 6.0 | 1 | Data Breach |
| 3438 | CVE-2025-32432 (Craft CMS) | high | 6.0 | 1 | cyberattack |
| 3439 | Backup Device Misconfiguration | high | 6.0 | 1 | Data Breach |
| 3440 | lack of verification for online investments | high | 6.0 | 1 | fraud |
| 3441 | Compromised user credentials | high | 6.0 | 1 | Data Breach |
| 3442 | Insufficient User Awareness Training | high | 6.0 | 1 | Phishing |
| 3443 | Improper access to email account | high | 6.0 | 1 | Data Breach |
| 3444 | DNS misconfiguration (abandoned domains with improper nameserver delegation) | high | 6.0 | 1 | DNS Misconfiguration Exploitation |
| 3445 | Flaw in Ivanti Endpoint Manager Mobile (EPMM) | high | 6.0 | 1 | Data Breach |
| 3446 | Hardcoded Secrets in Code Repositories | high | 6.0 | 1 | Credential Theft |
| 3447 | Lack of Email Encryption / Employee Negligence | high | 6.0 | 1 | Data Breach |
| 3448 | Fragmented Security Tool Integration | high | 6.0 | 1 | Operational Risk |
| 3449 | Poor Data Protection Practices | high | 6.0 | 1 | Insider Threat |
| 3450 | Human trust in authentic-looking communications | high | 6.0 | 1 | Phishing (AI-enhanced) |
| 3451 | TOCTOU Vulnerability | high | 6.0 | 1 | Vulnerability Exploitation |
| 3452 | Unencrypted device with sensitive data (despite password protection) | high | 6.0 | 1 | Data Breach (Physical Theft) |
| 3453 | AI Agent Memory Access | high | 6.0 | 1 | Prompt Injection |
| 3454 | Fortra GoAnywhere secure file transfer platform | high | 6.0 | 1 | Data Breach |
| 3455 | Password Reset Token Leak | high | 6.0 | 1 | Account Hijacking |
| 3456 | Weak password encryption (unsalted MD5 and SHA-1) | high | 6.0 | 1 | Data Breach |
| 3457 | Weak Third-Party Compliance Standards | high | 6.0 | 1 | Data Leakage |
| 3458 | Human error (email misdelivery) | high | 6.0 | 1 | Data Breach (Human Error / Misdelivery) |
| 3459 | Unauthorized access to Workday payroll accounts | high | 6.0 | 1 | Data Breach |
| 3460 | System Vulnerability | high | 6.0 | 1 | Data Breach |
| 3461 | Compromised Email Credentials | high | 6.0 | 1 | Data Breach |
| 3462 | Improper Data Handling / Public-Facing Website Misconfiguration | high | 6.0 | 1 | Data Breach |
| 3463 | Browser and plugin vulnerabilities | high | 6.0 | 1 | Malvertising |
| 3464 | Developer oversight leading to token exposure in public repositories | high | 6.0 | 1 | credential compromise |
| 3465 | Weak Authentication (SMS-based 2FA) | high | 6.0 | 1 | Social Engineering |
| 3466 | CVE-2025-24071 | high | 6.0 | 1 | Vulnerability Disclosure |
| 3467 | MOVEit zero-day vulnerability | high | 6.0 | 1 | Data Breach |
| 3468 | Third-party file sharing product | high | 6.0 | 1 | Data Breach |
| 3469 | Data processing error | high | 6.0 | 1 | Data Breach |
| 3470 | Generic Design of Legitimate Settlement Sites | high | 6.0 | 1 | Phishing |
| 3471 | Unsecured IoT Devices (DVRs, WiFi Routers) | high | 6.0 | 1 | DDoS Attack |
| 3472 | Weak SMS-based Multi-Factor Authentication (MFA) | high | 6.0 | 1 | Financial Fraud |
| 3473 | Weak PIN reset security questions | high | 6.0 | 1 | Data Breach |
| 3474 | Lack of Physical Security / Unencrypted Laptops | high | 6.0 | 1 | Data Breach (Physical Theft) |
| 3475 | Google Business Profile verification loophole | high | 6.0 | 1 | defacement |
| 3476 | Human Trust in Legitimate Breach Alerts | high | 6.0 | 1 | Phishing / Social Engineering |
| 3477 | Use of Non-Official Communication Channels | high | 6.0 | 1 | Phishing |
| 3478 | Mistaken Disclosure | high | 6.0 | 1 | Data Breach |
| 3479 | Outdated Technology Infrastructure | high | 6.0 | 1 | Data Leakage |
| 3480 | Family Member Trust Exploitation | high | 6.0 | 1 | Fraud |
| 3481 | SSRF | high | 6.0 | 1 | SSRF Vulnerability |
| 3482 | Unpatched Endpoints | high | 6.0 | 1 | Credential Theft |
| 3483 | URL Spoofing | high | 6.0 | 1 | Phishing |
| 3484 | Standard employee account credentials | high | 6.0 | 1 | Cyberattack |
| 3485 | Incorrectly Configured AWS Bucket | high | 6.0 | 1 | Data Exposure |
| 3486 | CVE-2025-37735 (Improper Preservation of Permissions) | high | 6.0 | 1 | Vulnerability / Privilege Escalation |
| 3487 | Human Trust in IT Support Impersonation | high | 6.0 | 1 | Data Breach |
| 3488 | Security weaknesses in NHS websites | high | 6.0 | 1 | Cyberattack |
| 3489 | unauthorized data access/exfiltration by terminated employee | high | 6.0 | 1 | data breach |
| 3490 | Weak Multi-Factor Authentication (MFA) on Twitter Employee Accounts | high | 6.0 | 1 | Account Takeover |
| 3491 | Business Email Accounts | high | 6.0 | 1 | Data Breach |
| 3492 | Suspicious WordPress plugin | high | 6.0 | 1 | Cyberattack |
| 3493 | Stolen authentication cookie | high | 6.0 | 1 | Cyber Espionage |
| 3494 | Weak Cybersecurity Standards in Financial and E-Commerce Sectors | high | 6.0 | 1 | Cybercrime Network Dismantling |
| 3495 | Inadequate Vetting Procedures | high | 6.0 | 1 | Data Exposure |
| 3496 | Weak DDoS mitigation (gaming platforms) | high | 6.0 | 1 | Distributed Denial of Service (DDoS) |
| 3497 | Lack of Regulatory Oversight in Cryptocurrency Operations | high | 6.0 | 1 | Cybercrime Network Dismantling |
| 3498 | misconfigured database | high | 6.0 | 1 | data exposure |
| 3499 | Exposure of Customer Data | high | 6.0 | 1 | Data Exposure |
| 3500 | Zero-Day Vulnerability in ESG Equipment | high | 6.0 | 1 | Data Theft |
| 3501 | alleged exploitation of parking permit system to gain unauthorized access | high | 6.0 | 1 | phishing |
| 3502 | Inadequate Remote Work Policies | high | 6.0 | 1 | Data Leak |
| 3503 | Exposed Private Data | high | 6.0 | 1 | Data Leak |
| 3504 | Internal Access Controls | high | 6.0 | 1 | Data Breach |
| 3505 | Setup Configuration | high | 6.0 | 1 | Data Leak |
| 3506 | Neglected to fix vulnerabilities | high | 6.0 | 1 | Data Breach |
| 3507 | Citrix Remote Desktop Software Vulnerability | high | 6.0 | 1 | Unauthorized Access |
| 3508 | Unsecured Employee Roster | high | 6.0 | 1 | Data Breach |
| 3509 | insufficient monitoring of collaboration platforms | high | 6.0 | 1 | data breach |
| 3510 | Trust in official app marketplaces, deceptive email outreach | high | 6.0 | 1 | Phishing |
| 3511 | Legacy Access Controls, Identity Vulnerabilities | high | 6.0 | 1 | Data Breach |
| 3512 | human error (successful phishing) | high | 6.0 | 1 | data breach |
| 3513 | Email Access | high | 6.0 | 1 | Business Email Compromise |
| 3514 | CVE-2026-26127 (Out-of-bounds read, CWE-125) | high | 6.0 | 1 | Denial-of-Service (DoS) |
| 3515 | Browser-Stored Credentials | high | 6.0 | 1 | Credential Theft |
| 3516 | Unauthorized access due to call center employee negligence | high | 6.0 | 1 | Data Breach |
| 3517 | Misconfigured database backup access | high | 6.0 | 1 | Data Breach |
| 3518 | Same-Origin Policy Gaps (postMessage Wildcards, CORS Misconfigurations) | high | 6.0 | 1 | Data Breach |
| 3519 | Cloud Storage System | high | 6.0 | 1 | Data Breach |
| 3520 | Lack of Automated Secrets Rotation | high | 6.0 | 1 | Credential Theft |
| 3521 | Suspicious code on online payment portal | high | 6.0 | 1 | Data Breach |
| 3522 | Brute Force Attacks | high | 6.0 | 1 | Authentication Security Improvement |
| 3523 | Authentication protocol vulnerabilities | high | 6.0 | 1 | Cyberattack |
| 3524 | Click2Gov | high | 6.0 | 1 | Data Breach |
| 3525 | Improper data storage | high | 6.0 | 1 | Data Breach |
| 3526 | Improper handling of sensitive documents | high | 6.0 | 1 | Data Breach |
| 3527 | Vulnerable version of Trust Wallet browser extension (v2.68) | high | 6.0 | 1 | Supply Chain Attack |
| 3528 | Human Error / Policy Violation (Email Mismanagement) | high | 6.0 | 1 | Data Breach / Unauthorized Disclosure |
| 3529 | Website Payment Page | high | 6.0 | 1 | Data Breach |
| 3530 | Inadequate User Consent Mechanisms | high | 6.0 | 1 | Data Breach |
| 3531 | Misplaced Thumb Drive | high | 6.0 | 1 | Data Breach |
| 3532 | Lack of endpoint security for attendee devices | high | 6.0 | 1 | Malware |
| 3533 | Compromised Emails | high | 6.0 | 1 | Cyber Fraud |
| 3534 | Delay introduction via VPN | high | 6.0 | 1 | Cheating via VPN |
| 3535 | Human vulnerability (phishing) | high | 6.0 | 1 | Phishing |
| 3536 | Abuse of trusted cloud services (Firebase, Google Translate) | high | 6.0 | 1 | Phishing |
| 3537 | Phishable OTP Tokens for Mobile Wallet Provisioning | high | 6.0 | 1 | Financial Fraud |
| 3538 | Human factor (phishing) | high | 6.0 | 1 | Phishing |
| 3539 | Unsupported OS (Windows 2000, XP, Server 2003) | high | 6.0 | 1 | Security Audit Findings |
| 3540 | Payment card processing system | high | 6.0 | 1 | Data Breach |
| 3541 | Public Venmo Account | high | 6.0 | 1 | Data Exposure |
| 3542 | Permission Misconfiguration | high | 6.0 | 1 | Data Exposure |
| 3543 | Three additional undisclosed vulnerabilities (details not specified) | high | 6.0 | 1 | Spoofing |
| 3544 | Improper folder permissions on file servers | high | 6.0 | 1 | Data Breach |
| 3545 | Package look-up capabilities | high | 6.0 | 1 | Data Breach |
| 3546 | Inadequate Training Programs | high | 6.0 | 1 | Data Breach |
| 3547 | Lack of vetting for third-party game demos (Valve/Steam) | high | 6.0 | 1 | Distributed Denial of Service (DDoS) |
| 3548 | misconfigured slot machine software | high | 6.0 | 1 | fraud |
| 3549 | Exposed Google API key | high | 6.0 | 1 | Data Exposure |
| 3550 | Weak authentication mechanism (Phone Number/PIN model) | high | 6.0 | 1 | Unauthorized Access |
| 3551 | Loss of Physical Hard Drives | high | 6.0 | 1 | Data Breach |
| 3552 | Misconfiguration in talent management software | high | 6.0 | 1 | Data Breach |
| 3553 | CVE-2025-27610 | high | 6.0 | 1 | Vulnerability Exploitation |
| 3554 | Unsecured Physical Device (Password-protected laptop) | high | 6.0 | 1 | Data Breach (Physical Theft) |
| 3555 | Unspecified vulnerability in a development server | high | 6.0 | 1 | Data Breach |
| 3556 | Human (Insider Trust) | high | 6.0 | 1 | Unauthorized Disclosure |
| 3557 | Employee System Credentials | high | 6.0 | 1 | Data Breach |
| 3558 | weakness in AIS tampering detection | high | 6.0 | 1 | physical cyber convergence |
| 3559 | Phishing/Malware | high | 6.0 | 1 | Data Breach |
| 3560 | Insertion of malicious script | high | 6.0 | 1 | Data Breach |
| 3561 | Sitting Ducks (DNS misconfiguration) | high | 6.0 | 1 | Scam / Fraudulent Push Notifications |
| 3562 | Unauthorized Disclosure of Surveillance Footage | high | 6.0 | 1 | Physical Security Breach |
| 3563 | Skill Gaps in Workforce | high | 6.0 | 1 | Data Breach |
| 3564 | Legal Access via Emergency Order | high | 6.0 | 1 | Data Breach |
| 3565 | Human error (opening malicious attachment) | high | 6.0 | 1 | Phishing |
| 3566 | Reused/Weak Passwords | high | 6.0 | 1 | Data Breach |
| 3567 | Absence of Technical Safeguards (Encryption/De-identification) | high | 6.0 | 1 | Data Breach |
| 3568 | Reused/Weak Passwords (Phishing) | high | 6.0 | 1 | DDoS Attack |
| 3569 | Lack of U2F/Physical Security Key Enforcement | high | 6.0 | 1 | Financial Fraud |
| 3570 | File Decompression in Kernel | high | 6.0 | 1 | Vulnerability Exploit |
| 3571 | human trust in FIFA branding | high | 6.0 | 1 | phishing |
| 3572 | Mandatory login gate on social media platform | high | 6.0 | 1 | Notification System Failure |
| 3573 | GitHub Credentials | high | 6.0 | 1 | Data Breach |
| 3574 | Inadequate Coordination of Security Escort | high | 6.0 | 1 | Physical Security Breach |
| 3575 | Donation Page | high | 6.0 | 1 | Data Breach |
| 3576 | Human Trust in Email Communication | high | 6.0 | 1 | Phishing |
| 3577 | CVE-2025-53770 (Microsoft SharePoint, CVSS 9.8) | high | 6.0 | 1 | Data Breach |
| 3578 | Lack of Cross-Border Data Transfer Compliance | high | 6.0 | 1 | Data Breach |
| 3579 | Exposed Data on Website | high | 6.0 | 1 | Data Leak |
| 3580 | Insufficient Contextual Risk Awareness | high | 6.0 | 1 | Social Engineering |
| 3581 | User Trust in Discounted/Rare Item Offers | high | 6.0 | 1 | DDoS Attack |
| 3582 | CitrixBleed | high | 6.0 | 1 | Data Breach |
| 3583 | Lack of insider threat detection and prevention measures | high | 6.0 | 1 | Insider Threat |
| 3584 | Lack of Geofencing for Transaction Validation | high | 6.0 | 1 | Financial Fraud |
| 3585 | Faiblesse dans les procédures de vérification d'identité | high | 6.0 | 1 | Cyberattaque |
| 3586 | WhatsApp screen-sharing feature (misuse) | high | 6.0 | 1 | social engineering |
| 3587 | Improper storage of personal information | high | 6.0 | 1 | Data Breach |
| 3588 | Unencrypted CouchDB installation | high | 6.0 | 1 | Data Leak |
| 3589 | Weak/Leaked Credentials | high | 6.0 | 1 | Data Breach |
| 3590 | Installation management process in Mobile VPN with IPSec client for Windows | high | 6.0 | 1 | Privilege Escalation |
| 3591 | Payment .php file vulnerability | high | 6.0 | 1 | Data Breach |
| 3592 | Default Configurations in Security Tools | high | 6.0 | 1 | Operational Risk |
| 3593 | External System Breach (Hacking) | high | 6.0 | 1 | Data Breach |
| 3594 | Security vulnerabilities in IP cameras | high | 6.0 | 1 | DDoS Attack |
| 3595 | Weak Security Questions | high | 6.0 | 1 | Data Breach |
| 3596 | Inadvertent Permissions | high | 6.0 | 1 | Cyber Attack |
| 3597 | Gmail accounts | high | 6.0 | 1 | Data Breach |
| 3598 | Unpatched systems in video surveillance and access control | high | 6.0 | 1 | Security Audit Findings |
| 3599 | Lack of rate-limiting or size restrictions on contact list uploads, enabling mass verification of phone numbers associated with WhatsApp accounts. | high | 6.0 | 1 | Privacy Vulnerability |
| 3600 | Fake pop-up window | high | 6.0 | 1 | Data Breach |
| 3601 | CVE-2024-38197 (CVSS 6.5: Medium) | high | 6.0 | 1 | Spoofing |
| 3602 | Fortinet VPN vulnerability | high | 6.0 | 1 | Data Breach |
| 3603 | Browser hijacking via malicious script | high | 6.0 | 1 | DDoS Attack, Content Tampering, Malicious JavaScript Injection |
| 3604 | privileged access controls | high | 6.0 | 1 | insider threat |
| 3605 | Complexity in visibility and control | high | 6.0 | 1 | Data Breach |
| 3606 | insufficient security protections | high | 6.0 | 1 | cyber intrusion |
| 3607 | Zero-Day Vulnerability in Fortran GoAnywhere MFT | high | 6.0 | 1 | Data Breach |
| 3608 | Human Error (Incorrect Address Usage) | high | 6.0 | 1 | Data Breach |
| 3609 | Public Access to Amazon S3 Bucket | high | 6.0 | 1 | Data Exposure |
| 3610 | Improper Access | high | 6.0 | 1 | Data Breach |
| 3611 | Lack of Strict Marketplace Vetting | high | 6.0 | 1 | Malware Distribution |
| 3612 | psychological manipulation (e.g., fear of missing out on high returns) | high | 6.0 | 1 | fraud |
| 3613 | Backend Update Bug | high | 6.0 | 1 | Bug/Exploit |
| 3614 | Compromised email account credentials | high | 6.0 | 1 | Phishing |
| 3615 | Lack of proactive domain monitoring and registration of brand variations | high | 6.0 | 1 | Cybersquatting, Phishing, Malware Distribution, Fraud |
| 3616 | Weak Login Verification | high | 6.0 | 1 | Data Breach |
| 3617 | CVE-2025-43300 (Apple OS-level zero-day) | high | 6.0 | 1 | Zero-day exploit |
| 3618 | Delayed Detection of Coordinated Trading Patterns | high | 6.0 | 1 | Financial Fraud |
| 3619 | Rapid Response to Urgent Requests from Seniors | high | 6.0 | 1 | Social Engineering |
| 3620 | Unprotected RSYNC Server | high | 6.0 | 1 | Data Leak |
| 3621 | Weak Password Policy (Password: 'Louvre', 'Thales') | high | 6.0 | 1 | Physical Theft |
| 3622 | Sabre Hospitality Solutions' system | high | 6.0 | 1 | Data Breach |
| 3623 | Unsecured Wi-Fi network | high | 6.0 | 1 | Malware |
| 3624 | Improper Client Segregation | high | 6.0 | 1 | Data Breach |
| 3625 | E-Verify's inability to verify the authenticity of presented documents | high | 6.0 | 1 | Identity Theft |
| 3626 | MIME type and filename extension mismatches | high | 6.0 | 1 | Vulnerability Exploit |
| 3627 | Lack of multi-factor authentication (MFA) in some cases | high | 6.0 | 1 | Phishing (AI-enhanced) |
| 3628 | CVE-2025-2848 | high | 6.0 | 1 | Vulnerability Exploitation |
| 3629 | CVE-2025-59789 (Uncontrolled Recursion / Stack Overflow in json2pb component) | high | 6.0 | 1 | Denial-of-Service (DoS) |
| 3630 | Gaps in cybersecurity | high | 6.0 | 1 | Cyberattack (Hacking) |
| 3631 | Lack of Token Rotation | high | 6.0 | 1 | Unauthorized Access |
| 3632 | Weak Password/Credential Management | high | 6.0 | 1 | Data Breach |
| 3633 | User Trust in Legitimate Software Repositories | high | 6.0 | 1 | Malware Distribution |
| 3634 | human trust in authoritative messages (e.g., toll agencies) | high | 6.0 | 1 | phishing |
| 3635 | CSP frame-src Bypass (Compromised Allowed Domains) | high | 6.0 | 1 | Data Breach |
| 3636 | Default Weak Passwords | high | 6.0 | 1 | Unauthorized Access |
| 3637 | ADT Pulse Software Vulnerabilities | high | 6.0 | 1 | Unauthorized Access |
| 3638 | Unpatched Public-Facing Servers | high | 6.0 | 1 | DDoS Attack |
| 3639 | Unsecured Personal Laptop | high | 6.0 | 1 | Data Breach |
| 3640 | Automated Attack | high | 6.0 | 1 | Security Breach |
| 3641 | Point-of-sale terminals | high | 6.0 | 1 | Data Breach |
| 3642 | CVE-2025-61882, Oracle E-Business Suite (EBS) security flaws | high | 6.0 | 1 | Data Breach |
| 3643 | Absence of Passkey Support | high | 6.0 | 1 | Phishing |
| 3644 | Employee Mistake | high | 6.0 | 1 | Data Breach |
| 3645 | Lack of verification for payment changes (e.g., routing/banking number updates) | high | 6.0 | 1 | Fraud/Scam |
| 3646 | Human Carelessness | high | 6.0 | 1 | Human Error |
| 3647 | Third-Party CRM Integration Vulnerabilities | high | 6.0 | 1 | Data Breach |
| 3648 | URL Parameter Manipulation (collection) | high | 6.0 | 1 | Prompt Injection |
| 3649 | Lack of Device Encryption/Tracking | high | 6.0 | 1 | Data Security Incident |
| 3650 | Lack of robust security measures | high | 6.0 | 1 | Hacking |
| 3651 | Incorrect Address Usage | high | 6.0 | 1 | Data Breach |
| 3652 | Online Store Vulnerability | high | 6.0 | 1 | Data Breach |
| 3653 | Lack of Oversight/Enforcement of Access Controls | high | 6.0 | 1 | Data Breach |
| 3654 | Unspecified vulnerability in 2Keys MFA system (Interac-owned) | high | 6.0 | 1 | Data Breach |
| 3655 | lack of bulk email security measures | high | 6.0 | 1 | data breach |
| 3656 | Human (phishing) | high | 6.0 | 1 | Phishing |
| 3657 | unsecured email systems | high | 6.0 | 1 | phishing |
| 3658 | Stolen Laptop | high | 6.0 | 1 | Data Breach |
| 3659 | Accellion's File Transfer Appliance software | high | 6.0 | 1 | Data Breach |
| 3660 | TotoLink router firmware update server | high | 6.0 | 1 | DDoS Attack |
| 3661 | CVE-2026-21525 (NULL pointer dereference, CWE-476) | high | 6.0 | 1 | Zero-Day Vulnerability |
| 3662 | Lack of Device Encryption | high | 6.0 | 1 | Data Breach (Physical Theft) |
| 3663 | Internal SharePoint Site | high | 6.0 | 1 | Data Breach |
| 3664 | Non-secure data storage location | high | 6.0 | 1 | Data Breach |
| 3665 | Lack of API-Centric Threat Intelligence Sharing | high | 6.0 | 1 | Operational Risk |
| 3666 | lack of real-time maritime tracking safeguards | high | 6.0 | 1 | physical cyber convergence |
| 3667 | External Access to Validator Keys | high | 6.0 | 1 | Blockchain Security Breach |
| 3668 | CVE-2026-0231 (CWE-497) | high | 6.0 | 1 | Vulnerability |
| 3669 | Unsecured PHI on Laptop | high | 6.0 | 1 | Data Breach (Theft of Physical Device) |
| 3670 | user typographical errors | high | 6.0 | 1 | phishing |
| 3671 | improper authentication | high | 6.0 | 1 | unauthorized access |
| 3672 | Password Manager Bypass | high | 6.0 | 1 | Phishing |
| 3673 | Drift’s OAuth integration flow vulnerability | high | 6.0 | 1 | Data Breach |
| 3674 | Email Encryption | high | 6.0 | 1 | Data Breach |
| 3675 | Data mismatch error in system logic | high | 6.0 | 1 | Data Breach (Unauthorized Access/Disclosure) |
| 3676 | Unauthorized Change to Website | high | 6.0 | 1 | Data Breach |
| 3677 | Human factor - employees providing login credentials | high | 6.0 | 1 | Data Breach |
| 3678 | Brokerage Platforms Allowing MFA via Text/Call | high | 6.0 | 1 | Financial Fraud |
| 3679 | Vendor Misconfiguration | high | 6.0 | 1 | Data Breach |
| 3680 | Human (Email Compromise) | high | 6.0 | 1 | Data Breach |
| 3681 | Lack of Continuous Credential Monitoring | high | 6.0 | 1 | Credential Theft |
| 3682 | MOVEit file transfer program | high | 6.0 | 1 | Data Breach |
| 3683 | Human (Social Engineering) | high | 6.0 | 1 | Phishing |
| 3684 | Server vulnerability of a former IT service provider | high | 6.0 | 1 | Data Breach |
| 3685 | Potential compromise of routers by Chinese state-sponsored hackers | high | 6.0 | 1 | Security Concerns and Investigations |
| 3686 | Dangerous React Patterns (dangerouslySetInnerHTML near iframes) | high | 6.0 | 1 | Data Breach |
| 3687 | lack of verification by job seekers | high | 6.0 | 1 | social engineering |
| 3688 | Potentially CVE-2025-53779 (Windows Kerberos) | high | 6.0 | 1 | Data Breach |
| 3689 | Administrative Error | high | 6.0 | 1 | Data Breach |
| 3690 | Backup Payment Card Readers | high | 6.0 | 1 | Data Breach |
| 3691 | Configuration Mistake | high | 6.0 | 1 | Data Leak |
| 3692 | Inadvertent transfer of control of the account to a malicious actor | high | 6.0 | 1 | Hacking |
| 3693 | lack of domain registration oversight | high | 6.0 | 1 | phishing |
| 3694 | Lack of Public Awareness | high | 6.0 | 1 | Phishing |
| 3695 | Static Filtering in SEGs | high | 6.0 | 1 | Operational Risk |
| 3696 | Unauthorized Access due to Program Glitch | high | 6.0 | 1 | Data Breach |
| 3697 | Weak Internal Controls (Prior Embezzlement) | high | 6.0 | 1 | Fraud |
| 3698 | Internal Employee Privileges | high | 6.0 | 1 | Data Breach |
| 3699 | Publicly accessible Elasticsearch instance | high | 6.0 | 1 | Data Breach |
| 3700 | User trust in brand communications; exploitation of psychological urgency and fear tactics. No technical vulnerabilities in LastPass, Bitwarden, or 1Password systems were exploited. | high | 6.0 | 1 | Phishing |
| 3701 | Exposure of Install Action Tokens | high | 6.0 | 1 | Data Breach |
| 3702 | Human error leading to unauthorized access | high | 6.0 | 1 | Phishing |
| 3703 | Lack of Visibility in Rapid Development Cycles | high | 6.0 | 1 | DDoS Attack |
| 3704 | Student Access to Staff Devices | high | 6.0 | 1 | Insider Threat |
| 3705 | Unencrypted and Unprotected Data Storage | high | 6.0 | 1 | Data Breach |
| 3706 | developer reliance on third-party dependencies | high | 6.0 | 1 | supply chain attack |
| 3707 | Same password for multiple accounts | high | 6.0 | 1 | Cyber Attack |
| 3708 | Weak Administrator Password | high | 6.0 | 1 | Data Breach |
| 3709 | Apache HTTP server vulnerability | high | 6.0 | 1 | Cyber Espionage |
| 3710 | Unsecured Deleted Cloud Storage Buckets | high | 6.0 | 1 | Data Breach |
| 3711 | Unencrypted Device | high | 6.0 | 1 | Data Breach |
| 3712 | Misconfigured third-party service | high | 6.0 | 1 | Data Exposure |
| 3713 | Outdated Website | high | 6.0 | 1 | Data Breach |
| 3714 | Social engineering, user trust exploitation | high | 6.0 | 1 | Malware Campaign |
| 3715 | Disconnected Security Tools | high | 6.0 | 1 | DDoS Attack |
| 3716 | Realtek chips | high | 6.0 | 1 | DDoS Attack |
| 3717 | CVE-2025-57714 (Unquoted Search Path in NetBak Replicator 4.5.x) | high | 6.0 | 1 | Vulnerability |
| 3718 | GoAnywhere MFT zero-day vulnerability | high | 6.0 | 1 | Data Breach |
| 3719 | Four zero-day vulnerabilities in IBM Data Risk Manager | high | 6.0 | 1 | Zero-Day Exploit |
| 3720 | Unauthorized access from outside of Europe | high | 6.0 | 1 | DDoS Attack |
| 3721 | Weak Authentication (Slack Cookies) | high | 6.0 | 1 | Data Breach |
| 3722 | Unspecified software vulnerability in 2Keys MFA system | high | 6.0 | 1 | Data Breach |
| 3723 | Unpatched/Outdated Systems (Windows Server 2003) | high | 6.0 | 1 | Physical Theft |
| 3724 | Insecure Direct Object Reference (IDOR) in media access endpoints (/media/{ID}) | high | 6.0 | 1 | Data Breach |
| 3725 | Lack of Data Wiping and Encryption | high | 6.0 | 1 | Data Breach |
| 3726 | Unauthorized access to an employee's email account | high | 6.0 | 1 | Data Breach |
| 3727 | Overly Permissive Sandbox Attributes (allow-same-origin + allow-scripts) | high | 6.0 | 1 | Data Breach |
| 3728 | Third-Party Integration (Drift Email/Salesloft) | high | 6.0 | 1 | Data Breach |
| 3729 | Unencrypted Storage Devices | high | 6.0 | 1 | Data Breach |
| 3730 | Retired Internet Application | high | 6.0 | 1 | Data Breach |
| 3731 | Lack of Physical Security Measures at ATM | high | 6.0 | 1 | Data Breach (Card Skimming) |
| 3732 | Public Visibility of Venmo Transactions and Contacts | high | 6.0 | 1 | Data Leak |
| 3733 | Unvalidated PostMessage Origins | high | 6.0 | 1 | Data Breach |
| 3734 | Human error (successful phishing attack) | high | 6.0 | 1 | Data Breach |
| 3735 | Loss of Physical Control (Stolen Laptop) | high | 6.0 | 1 | Data Breach (Theft of Device) |
| 3736 | Lack of Secure Document Disposal Procedures | high | 6.0 | 1 | Data Breach (Physical) |
| 3737 | Folio/IIN Integration Flaws | high | 6.0 | 1 | Data Breach |
| 3738 | Data Privacy Policy | high | 6.0 | 1 | Data Disclosure |
| 3739 | Lack of data-sharing protocols in pilot programs | high | 6.0 | 1 | Data Breach / Unauthorized Data Sharing |
| 3740 | Unpatched external web servers (Nintendo) | high | 6.0 | 1 | Distributed Denial of Service (DDoS) |
| 3741 | CVE-2025-24061 | high | 6.0 | 1 | Vulnerability Disclosure |
| 3742 | Lack of Data Redaction/Validation in FOI Process | high | 6.0 | 1 | Data Breach (Unintentional Disclosure) |
| 3743 | Insufficient oversight of contractor personnel with privileged access | high | 6.0 | 1 | Insider Threat |
| 3744 | Test server misconfiguration | high | 6.0 | 1 | Data Breach |
| 3745 | Unsecured Collaborative Tools | high | 6.0 | 1 | Data Breach Risk |
| 3746 | unrestricted access to student email accounts | high | 6.0 | 1 | election fraud |
| 3747 | Privacy Controls | high | 6.0 | 1 | Data Breach |
| 3748 | Inadvertent Technical Error | high | 6.0 | 1 | Data Breach |
| 3749 | human error (lack of training) | high | 6.0 | 1 | phishing |
| 3750 | Employee Portal Accounts | high | 6.0 | 1 | Data Breach |
| 3751 | Improperly secured MongoDB database | high | 6.0 | 1 | Data Breach |
| 3752 | AI Platform Misconfiguration | high | 6.0 | 1 | Data Breach |
| 3753 | Player trust in unofficial marketplaces | high | 6.0 | 1 | Distributed Denial of Service (DDoS) |
| 3754 | Human Trust in Official-Looking Communications | high | 6.0 | 1 | Phishing |
| 3755 | Accela Software Error | high | 6.0 | 1 | Data Breach |
| 3756 | Social Engineering of Mobile Carriers | high | 6.0 | 1 | Account Takeover |
| 3757 | Unknown Oracle E-Business System Vulnerability | high | 6.0 | 1 | Cyber Attack |
| 3758 | CVE-2025-53770 (SharePoint Server, 'ToolShell') | high | 6.0 | 1 | Data Breach |
| 3759 | Unsecured Audio Files | high | 6.0 | 1 | Data Exposure |
| 3760 | Weak URL validation in RecursiveUrlLoader (String.startsWith() check) and lack of private IP range validation | high | 6.0 | 1 | Server-Side Request Forgery (SSRF) |
| 3761 | Data breach via third-party vendor | high | 6.0 | 1 | Phishing |
| 3762 | Inadequate Multi-Factor Authentication (MFA) | high | 6.0 | 1 | Human Error |
| 3763 | Basic Security Vulnerability | high | 6.0 | 1 | Data Breach |
| 3764 | Unknown Zero-Day Exploit (mentioned in Telegram chats) | high | 6.0 | 1 | Distributed Denial-of-Service (DDoS) Attack |
| 3765 | No Device Encryption | high | 6.0 | 1 | Data Breach Risk |
| 3766 | Compromise at a third party vendor's file servers | high | 6.0 | 1 | Data Breach |
| 3767 | Unauthorized access to payment card data | high | 6.0 | 1 | Data Breach |
| 3768 | Accès non autorisé aux données clients | high | 6.0 | 1 | Cyberattaque |
| 3769 | holiday distraction | high | 6.0 | 1 | phishing |
| 3770 | Employee email account credentials | high | 6.0 | 1 | Data Breach |
| 3771 | Insufficient Monitoring of Third-Party Integrations | high | 6.0 | 1 | Unauthorized Access |
| 3772 | lapses in cybersecurity measures | high | 6.0 | 1 | cyber intrusion |
| 3773 | Weak PIN reset security | high | 6.0 | 1 | Data Breach |
| 3774 | Lack of Real-Time Email Authentication | high | 6.0 | 1 | Phishing |
| 3775 | Human Trust in Branded Communications | high | 6.0 | 1 | Phishing |
| 3776 | Unencrypted Email | high | 6.0 | 1 | Data Breach |
| 3777 | Employee's Microsoft 365 Account | high | 6.0 | 1 | Data Breach |
| 3778 | Weakness in GPS Navigation System Authentication/Encryption | high | 6.0 | 1 | GPS Spoofing / Maritime Cyber Incident |
| 3779 | Lack of user awareness, trust in government services, and reusable phishing infrastructure | high | 6.0 | 1 | Phishing |
| 3780 | Website Configuration Error | high | 6.0 | 1 | Data Breach |
| 3781 | System-generated error | high | 6.0 | 1 | Data Breach |
| 3782 | Absence of Endpoint Monitoring | high | 6.0 | 1 | Data Breach Risk |
| 3783 | Weak passwords (e.g., 'LOUVRE', 'THALES') | high | 6.0 | 1 | Security Audit Findings |
| 3784 | Bug in open-source library | high | 6.0 | 1 | Data Leak |
| 3785 | Malicious Software Installation | high | 6.0 | 1 | Data Breach |
| 3786 | multilingual social engineering gaps | high | 6.0 | 1 | phishing |
| 3787 | Post-termination access to company passwords | high | 6.0 | 1 | Unauthorized Access |
| 3788 | Weak Authentication in Mobile Wallet Onboarding | high | 6.0 | 1 | Financial Fraud |
| 3789 | Vulnerable Laravel version or misconfiguration | high | 6.0 | 1 | Data Exposure |
| 3790 | Base64 Obfuscation Bypass | high | 6.0 | 1 | Prompt Injection |
| 3791 | Poor password hygiene (weak, reused, or easily guessable passwords) | high | 6.0 | 1 | data breach |
| 3792 | Exploitable Gaps in Contactless Payment Tokenization | high | 6.0 | 1 | Financial Fraud |
| 3793 | Insufficient network segmentation between office and operational systems | high | 6.0 | 1 | Cyber Intrusion |
| 3794 | Legacy IT systems and outdated infrastructure | high | 6.0 | 1 | Cybersecurity Awareness and Infrastructure Vulnerability |
| 3795 | Insider Tool Abuse | high | 6.0 | 1 | Account Takeover |
| 3796 | shared/default credentials | high | 6.0 | 1 | election fraud |
| 3797 | Bypass of Time-Limited MFA Windows | high | 6.0 | 1 | Financial Fraud |
| 3798 | Software vulnerability at vendor Infosys McCamish Systems LLC | high | 6.0 | 1 | Data Breach |
| 3799 | Failure to Protect Sensitive Location Data | high | 6.0 | 1 | Physical Security Breach |
| 3800 | Microsoft Exchange email servers | high | 6.0 | 1 | Data Breach |
| 3801 | Weak Access Controls in Citrix Systems | high | 6.0 | 1 | Data Breach |
| 3802 | Lack of Security Clearance Enforcement | high | 6.0 | 1 | Data Exposure |
| 3803 | Malware installation via phishing | high | 6.0 | 1 | Data Breach |
| 3804 | Phishing/Email Compromise | high | 6.0 | 1 | Cyber Attack |
| 3805 | Paycor's MOVEit Transfer software | high | 6.0 | 1 | Data Breach |
| 3806 | Internal Employee Access | high | 6.0 | 1 | Data Breach |
| 3807 | Weak ATM Security | high | 6.0 | 1 | Financial Fraud |
| 3808 | Security Misconfiguration | high | 6.0 | 1 | Data Leak |
| 3809 | CVE-2024-36347 | high | 6.0 | 1 | Vulnerability |
| 3810 | Publicly Available Environment Files | high | 6.0 | 1 | Data Exposure |
| 3811 | Lack of Access Controls (No Password Protection) | high | 6.0 | 1 | Data Breach (Unintentional Exposure) |
| 3812 | DVRs/NVRs | high | 6.0 | 1 | DDoS Attack |
| 3813 | Insufficient verification protocols for payment changes | high | 6.0 | 1 | Phishing (AI-enhanced) |
| 3814 | Business Continuity Dependencies | high | 6.0 | 1 | Third-Party Risk |
| 3815 | Weak Password Hashing (MD5 without salt) | high | 6.0 | 1 | Data Breach |
| 3816 | Alert System Failure | high | 6.0 | 1 | Data Breach |
| 3817 | Computer Infection | high | 6.0 | 1 | Financial Theft |
| 3818 | Human trust in fake USPS parcel delivery messages | high | 6.0 | 1 | Smishing Campaign |
| 3819 | Lack of Real-Time Verification for High-Risk Transactions | high | 6.0 | 1 | Social Engineering |
| 3820 | API security flaw in Kiln’s infrastructure (used for Solana staking operations) | high | 6.0 | 1 | cyberattack |
| 3821 | Human Error (Improper Data Handling) | high | 6.0 | 1 | Data Breach (Accidental Disclosure) |
| 3822 | Lack of oversight/guidance for opioid settlement fund allocation; flexible spending rules | high | 6.0 | 1 | Financial Misappropriation / Regulatory Non-Compliance |
| 3823 | Employee Credentials and Laptop | high | 6.0 | 1 | Data Breach |
| 3824 | Over-reliance on Limited Public Nodes (Centralization Risk) | high | 6.0 | 1 | Blockchain Security Breach |
| 3825 | Human Error (Falling for Spoofed Email) | high | 6.0 | 1 | Data Breach |
| 3826 | weak identity verification for wallet transfers | high | 6.0 | 1 | cyber theft |
| 3827 | Weak password ('solarwinds123') | high | 6.0 | 1 | Cyberattack |
| 3828 | misconfigured public-facing storage/exposure of sensitive backup file | high | 6.0 | 1 | data exposure |
| 3829 | Software Update Issue | high | 6.0 | 1 | Data Breach |
| 3830 | Location tracking vulnerabilities | high | 6.0 | 1 | Data Collection Incident |
| 3831 | Data server configuration error | high | 6.0 | 1 | Data Breach |
| 3832 | Rapid development cycles outpacing security reviews | high | 6.0 | 1 | Distributed Denial of Service (DDoS) |
| 3833 | On-board ports containing vehicle data | high | 6.0 | 1 | Vehicle Theft |
| 3834 | Coding techniques to enter the Naviance student site | high | 6.0 | 1 | Data Breach |
| 3835 | Compromised e-mail account | high | 6.0 | 1 | Data Breach |
| 3836 | human trust/urgency bias | high | 6.0 | 1 | social engineering |
| 3837 | Fault in the code of EOSBet's smart contracts | high | 6.0 | 1 | Cryptocurrency Theft |
| 3838 | Unencrypted USB Flash Drive | high | 6.0 | 1 | Data Breach |
| 3839 | Discord’s expired vanity URL reuse policy | high | 6.0 | 1 | Distributed Denial of Service (DDoS) |
| 3840 | NFC Protocol Abuse (Legitimate Traffic Relay) | high | 6.0 | 1 | Financial Fraud |
| 3841 | Lack of authentication on Kubernetes console | high | 6.0 | 1 | Cloud Security Breach |
| 3842 | Session Cookie Theft | medium | 5.0 | 1 | Security Breach |
| 3843 | OAuth Tokens | medium | 5.0 | 1 | Data Breach |
| 3844 | GiveWP WordPress Plugin Flaw | medium | 5.0 | 1 | Data Breach |
| 3845 | initramfs debug shell access during boot failures | medium | 5.0 | 1 | Vulnerability Exploitation |
| 3846 | Vbulletin CMS Flaw | medium | 5.0 | 1 | Data Breach |
| 3847 | Microsoft Exchange vulnerability | medium | 5.0 | 1 | Ransomware |
| 3848 | Typeform Vulnerability | medium | 5.0 | 1 | Data Breach |
| 3849 | Public Exposure of Sensitive Information | medium | 5.0 | 1 | Data Breach |
| 3850 | Data Entry Error | medium | 5.0 | 1 | Data Breach |
| 3851 | Third-Party Vendor Security Gaps | medium | 5.0 | 1 | Data Breach |
| 3852 | CVE-2025-9242 (Out-of-bounds Write in 'iked' process) | medium | 5.0 | 1 | Vulnerability |
| 3853 | Byte Pair Encoding (BPE) or WordPiece tokenization weaknesses in LLMs | medium | 5.0 | 1 | AI/ML Vulnerability Exploitation |
| 3854 | CVE-2025-48989 (HTTP/2 'Made You Reset' Memory Exhaustion) | medium | 5.0 | 1 | Vulnerability |
| 3855 | Inappropriate email handling | medium | 5.0 | 1 | Data Breach |
| 3856 | Progress Software's MOVEit file transfer software | medium | 5.0 | 1 | Data Breach |
| 3857 | Third-party vendor misconfiguration | medium | 5.0 | 1 | Data Breach |
| 3858 | Email Security | medium | 5.0 | 1 | Data Breach |
| 3859 | Insecure transmission of payment card data | medium | 5.0 | 1 | Payment Card Breach |
| 3860 | Improper Data Disposal | medium | 5.0 | 1 | Data Breach |
| 3861 | Technical Setting in Tracking Technology | medium | 5.0 | 1 | Data Breach |
| 3862 | Human Error (Mistaken Disclosure) | medium | 5.0 | 1 | Data Breach (Unauthorized Disclosure) |
| 3863 | Unsecured Paper Files | medium | 5.0 | 1 | Data Breach |
| 3864 | Improper output encoding | medium | 5.0 | 1 | Cross-Site Scripting (XSS) |
| 3865 | Incorrect Privacy Settings | medium | 5.0 | 1 | Data Breach |
| 3866 | Lack of verification of driver credentials and shipping paperwork | medium | 5.0 | 1 | Cyber Cargo Theft (Fictitious Pickup) |
| 3867 | CVE-2025-46176 | medium | 5.0 | 1 | Vulnerability Exploitation |
| 3868 | Bug in the GMX platform | medium | 5.0 | 1 | Cryptocurrency Theft |
| 3869 | Unauthorized Biometric Data Collection | medium | 5.0 | 1 | Privacy Breach |
| 3870 | Improper Access Restrictions | medium | 5.0 | 1 | Data Breach |
| 3871 | Human Factor (Insider Access Abuse) | medium | 5.0 | 1 | Insider Threat |
| 3872 | Exposed credentials from earlier data breaches | medium | 5.0 | 1 | Credential Stuffing |
| 3873 | Insecure Transport | medium | 5.0 | 1 | Data Leak |
| 3874 | Computer Programming Error | medium | 5.0 | 1 | Data Breach |
| 3875 | Email Indexing and Unsubscribe Vulnerability | medium | 5.0 | 1 | Data Exposure |
| 3876 | Insufficient input validation | medium | 5.0 | 1 | Cross-Site Scripting (XSS) |
| 3877 | Poor physical installation of hardware | medium | 5.0 | 1 | Hardware Security Oversight |
| 3878 | Lack of Output Encoding in Email Templates | medium | 5.0 | 1 | Email Spoofing |
| 3879 | Denial of Service (DoS) | medium | 5.0 | 1 | Data Breach, Denial of Service (DoS) |
| 3880 | Credentials left on GitHub | medium | 5.0 | 1 | Data Breach |
| 3881 | Vulnerability in Drift application’s Salesforce integration | medium | 5.0 | 1 | third-party breach |
| 3882 | Bug in Vine | medium | 5.0 | 1 | Data Breach |
| 3883 | Unsecured Public Trello Boards | medium | 5.0 | 1 | Data Leak |
| 3884 | Improper configuration of the website | medium | 5.0 | 1 | Data Breach |
| 3885 | Improper Account Use | medium | 5.0 | 1 | Data Breach |
| 3886 | Poor governance, lack of controls in records management, and inadequate note-taking practices | medium | 5.0 | 1 | Data Breach (Unauthorized Disclosure) |
| 3887 | Printing Error | medium | 5.0 | 1 | Data Breach |
| 3888 | Computer Error | medium | 5.0 | 1 | Data Breach |
| 3889 | Online quote system | medium | 5.0 | 1 | Data Breach |
| 3890 | Out-of-Bounds Write (CWE-787) | medium | 5.0 | 1 | Denial-of-Service (DoS) |
| 3891 | Stored HTML Injection via Budget Name Input Field | medium | 5.0 | 1 | Email Spoofing |
| 3892 | Inadequate data security program | medium | 5.0 | 1 | Data Breach |
| 3893 | Privileged credentials | medium | 5.0 | 1 | Data Breach |
| 3894 | Improper website data handling | medium | 5.0 | 1 | Data Breach (Accidental Disclosure) |
| 3895 | Policy Violation | medium | 5.0 | 1 | Data Breach |
| 3896 | Improper OAuth Token Security | medium | 5.0 | 1 | Data Breach |
| 3897 | Lateral Movement via Stolen Credentials | medium | 5.0 | 1 | Supply Chain Attack |
| 3898 | Trust in Urgent Requests | medium | 5.0 | 1 | Awareness Campaign |
| 3899 | Improper Disclosure of Research Funding | medium | 5.0 | 1 | Data Privacy Incident |
| 3900 | Flaw in proxy link handling | medium | 5.0 | 1 | Information Disclosure |
| 3901 | CVE-2025-61882 (critical zero-day in Oracle E-Business Suite allowing remote system control without authentication) | medium | 5.0 | 1 | ransomware |
| 3902 | Incorrect fax number | medium | 5.0 | 1 | Data Breach |
| 3903 | Weak administrator password, lack of Multi-Factor Authentication, exposed remote access | medium | 5.0 | 1 | Ransomware |
| 3904 | Metadata Harvesting in Salesforce | medium | 5.0 | 1 | Data Breach |
| 3905 | Information Sharing Program | medium | 5.0 | 1 | Data Breach |
| 3906 | Poor access controls | medium | 5.0 | 1 | Data Breach |
| 3907 | Insufficient Data Protection Measures | medium | 5.0 | 1 | Data Breach |
| 3908 | Unsecured Browser-Stored Passwords/Cookies | medium | 5.0 | 1 | Data Breach |
| 3909 | Misconfigured security protocols or automated password reset systems | medium | 5.0 | 1 | Potential Data Exposure |
| 3910 | Weak Username and Password Combinations | medium | 5.0 | 1 | Data Breach |
| 3911 | CVE-2025-59489 (Unity Engine Arbitrary Code Execution) | medium | 5.0 | 1 | Vulnerability Disclosure |
| 3912 | AI Algorithm Inefficiency | medium | 5.0 | 1 | System Malfunction |
| 3913 | CVE-2025-11001 | medium | 5.0 | 1 | Vulnerability Exploitation |
| 3914 | URL Redirection | medium | 5.0 | 1 | Vulnerability Exploit |
| 3915 | Accidental Sharing of Data | medium | 5.0 | 1 | Data Breach |
| 3916 | Unauthorized access to secrets during pull request process | medium | 5.0 | 1 | Unauthorized Access |
| 3917 | CVE-2026-24489 | medium | 5.0 | 1 | Vulnerability Exploitation |
| 3918 | Data Handling Error | medium | 5.0 | 1 | Data Breach |
| 3919 | Microsoft Power Apps portal configuration error | medium | 5.0 | 1 | Data Breach |
| 3920 | Trust in AI-assisted development tools | medium | 5.0 | 1 | Supply Chain Attack |
| 3921 | Customer service software misconfiguration | medium | 5.0 | 1 | Data Breach |
| 3922 | CVE-2025-45080 | medium | 5.0 | 1 | Vulnerability |
| 3923 | Human error (misconfigured download link) | medium | 5.0 | 1 | Extortion |
| 3924 | CVE-2025-22244: Stored XSS in Gateway Firewall Response Pages | medium | 5.0 | 1 | Vulnerability |
| 3925 | Bug | medium | 5.0 | 1 | Data Leak |
| 3926 | Weakness in Drift-Salesforce integration security | medium | 5.0 | 1 | data breach |
| 3927 | Older servers | medium | 5.0 | 1 | Data Breach |
| 3928 | Weak cybersecurity measures | medium | 5.0 | 1 | Data Breach |
| 3929 | Malicious JavaScript injection through API call | medium | 5.0 | 1 | Supply Chain Attack |
| 3930 | Point-of-Sale (POS) Systems | medium | 5.0 | 1 | Data Breach |
| 3931 | MOVEit file transfer tool vulnerability | medium | 5.0 | 1 | Data Breach |
| 3932 | Compromised email login credentials | medium | 5.0 | 1 | Data Breach |
| 3933 | Failure to redact information properly | medium | 5.0 | 1 | Data Breach |
| 3934 | Microsoft 365 Email Account | medium | 5.0 | 1 | Data Breach |
| 3935 | Improper Handling of Physical Records | medium | 5.0 | 1 | Data Breach |
| 3936 | Public-facing website | medium | 5.0 | 1 | Data Breach |
| 3937 | Remote Access through Third-Party POS Vendor | medium | 5.0 | 1 | Payment Card Breach |
| 3938 | Security hole in the in-house web application | medium | 5.0 | 1 | Data Breach |
| 3939 | Outdated Windows software (including video surveillance systems) | medium | 5.0 | 1 | Physical Burglary |
| 3940 | Exposed backup firewall preference files in MySonicWall cloud service | medium | 5.0 | 1 | Data Exposure |
| 3941 | Progress Software's MOVEit Transfer | medium | 5.0 | 1 | Data Breach |
| 3942 | Click2Gov System | medium | 5.0 | 1 | Data Breach, Fraud |
| 3943 | CVE-2025-22243: Stored XSS Vulnerability in NSX Manager UI | medium | 5.0 | 1 | Vulnerability |
| 3944 | Database Misconfiguration | medium | 5.0 | 1 | Data Breach |
| 3945 | Typosquatting (Visual Deception) | medium | 5.0 | 1 | Phishing |
| 3946 | Open Server | medium | 5.0 | 1 | Data Exposure |
| 3947 | CVE-2025-27915 | medium | 5.0 | 1 | Vulnerability Exploitation |
| 3948 | Service request lookup tool flaw allowing unauthorized access via bot | medium | 5.0 | 1 | Data Breach |
| 3949 | Instant Quote Platform | medium | 5.0 | 1 | Data Breach |
| 3950 | Archived website hosted by a now-former third-party vendor | medium | 5.0 | 1 | Data Breach |
| 3951 | CVE-2024-6914 | medium | 5.0 | 1 | Vulnerability Exploitation |
| 3952 | Software Glitch | medium | 5.0 | 1 | Data Breach |
| 3953 | Sorting Error | medium | 5.0 | 1 | Data Breach |
| 3954 | Physical Loss of Storage Device | medium | 5.0 | 1 | Data Breach |
| 3955 | Third-party contractor’s laptop | medium | 5.0 | 1 | Data Breach |
| 3956 | Samsung.com | medium | 5.0 | 1 | Data Breach |
| 3957 | Weak IAM credential security, lack of multifactor authentication (MFA) | medium | 5.0 | 1 | Cryptocurrency Mining |
| 3958 | Open Database Platform | medium | 5.0 | 1 | Data Exposure |
| 3959 | Human Error (Inadvertent Disclosure) | medium | 5.0 | 1 | Data Breach |
| 3960 | CVE-2025-61884 (potential, patched later) | medium | 5.0 | 1 | Data Breach |
| 3961 | Unknown Third Party Credential Leak | medium | 5.0 | 1 | Credential Stuffing |
| 3962 | Home internet connection access via VPN | medium | 5.0 | 1 | Security Breach |
| 3963 | Inadequate data erasure protocols | medium | 5.0 | 1 | Data Handling Incident |
| 3964 | Reused Usernames and Passwords | medium | 5.0 | 1 | Account Compromise |
| 3965 | CVE-2024-41710 | medium | 5.0 | 1 | DDoS Botnet |
| 3966 | Third-party software library vulnerability | medium | 5.0 | 1 | Data Breach |
| 3967 | Mistakenly attached sensitive information to email | medium | 5.0 | 1 | Data Breach |
| 3968 | Unsecured Vehicle | medium | 5.0 | 1 | Physical Theft |
| 3969 | CVE-2025-52891 | medium | 5.0 | 1 | Denial-of-Service |
| 3970 | Browser Cache Storage | medium | 5.0 | 1 | Data Breach |
| 3971 | Open database without authentication | medium | 5.0 | 1 | Data Breach |
| 3972 | Insufficient Email Client-Side Sanitization | medium | 5.0 | 1 | Email Spoofing |
| 3973 | Patient Billing System | medium | 5.0 | 1 | Data Breach |
| 3974 | User Account | medium | 5.0 | 1 | Data Breach |
| 3975 | Indirect prompt injection (IPI) | medium | 5.0 | 1 | Vulnerability Exploit |
| 3976 | Ignoring Robots Exclusion Protocol | medium | 5.0 | 1 | Data Scraping |
| 3977 | Weak SaaS Integration Controls | medium | 5.0 | 1 | Data Breach |
| 3978 | Unchecked third-party access, improper configurations, over-permissioned tools | medium | 5.0 | 1 | Data Exposure |
| 3979 | Improper third-party data sharing | medium | 5.0 | 1 | Data Breach |
| 3980 | Insufficient access controls and monitoring in office suites | medium | 5.0 | 1 | Physical Security Breach, Theft |
| 3981 | Accellion file sharing platform | medium | 5.0 | 1 | Data Breach |
| 3982 | User Credentials from an Unrelated Site | medium | 5.0 | 1 | Data Breach |
| 3983 | CVE-2023-2533 | medium | 5.0 | 1 | Vulnerability Exploitation |
| 3984 | Progress Software's MOVEit software vulnerability | medium | 5.0 | 1 | Data Breach |
| 3985 | CVE-2025-13223 (V8 JavaScript engine flaw) | medium | 5.0 | 1 | Zero-day vulnerability |
| 3986 | Improper truncation of payment card information on receipts | medium | 5.0 | 1 | Data Exposure |
| 3987 | Online appointment functionality failure | medium | 5.0 | 1 | Data Leak |
| 3988 | Web Page Configuration | medium | 5.0 | 1 | Data Breach |
| 3989 | CVE-2025-11002 | medium | 5.0 | 1 | Vulnerability Exploitation |
| 3990 | Lack of access controls, Unauthorized third-party server usage | medium | 5.0 | 1 | Data Misuse, Election Interference, Unauthorized Data Access |
| 3991 | Outdated Routers with Remote Administration Enabled | medium | 5.0 | 1 | Cyber Attack |
| 3992 | Website Programming Change | medium | 5.0 | 1 | Data Breach |
| 3993 | Improper Access Control (Publicly Accessible File) | medium | 5.0 | 1 | Data Exposure / Unauthorized Access |
| 3994 | Slack's link-rendering logic flaw (misinterpreting text as domains when missing spaces after punctuation) | medium | 5.0 | 1 | Vulnerability Exploitation |
| 3995 | Unprotected Excel Spreadsheet | medium | 5.0 | 1 | Data Breach |
| 3996 | Data Mishandling | medium | 5.0 | 1 | Data Breach |
| 3997 | CVE-2019-9621 | medium | 5.0 | 1 | Vulnerability Exploitation |
| 3998 | Lack of Awareness | medium | 5.0 | 1 | Awareness Campaign |
| 3999 | CVE-2025-48384 | medium | 5.0 | 1 | Vulnerability Exploitation |
| 4000 | Internal Logging Mechanism | medium | 5.0 | 1 | Data Exposure |
| 4001 | CVE-2025-22245: Stored XSS in Router Port Configurations | medium | 5.0 | 1 | Vulnerability |
| 4002 | Improper disposal of electronic devices | medium | 5.0 | 1 | Data Breach |
| 4003 | CVE-2024-22774 (Uncontrolled search path element) | low | 2.5 | 1 | Privilege Escalation |
| 4004 | CVE-2026-20841 (CWE-77: Command Injection) | low | 2.5 | 1 | Remote Code Execution (RCE) |
| 4005 | CVE-2025-49464 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4006 | CVE-2025-4230 | low | 2.5 | 1 | Command Injection |
| 4007 | Hard-coded secret values | low | 2.5 | 1 | Vulnerability Exploitation |
| 4008 | CVE-2025-9101 | low | 2.5 | 1 | DDoS |
| 4009 | Weak credentials/default passwords in IoT devices | low | 2.5 | 1 | Distributed Denial of Service (DDoS) |
| 4010 | Improper conversation/message ID verification | low | 2.5 | 1 | Vulnerability Exploitation |
| 4011 | Insufficient file authentication in the updater mechanism | low | 2.5 | 1 | Software Vulnerability |
| 4012 | Mailing Processes | low | 2.5 | 1 | Data Breach |
| 4013 | Credentials obtained from another website | low | 2.5 | 1 | Data Breach |
| 4014 | Flaw in HTML sanitizer (rcube_washtml) failing to block <feImage> SVG element | low | 2.5 | 1 | Privacy Bypass |
| 4015 | CVE-2025-59718 | low | 2.5 | 1 | Authentication Bypass |
| 4016 | Vulnerability in the outage app | low | 2.5 | 1 | Data Breach |
| 4017 | CVE-2024-11857 | low | 2.5 | 1 | Vulnerability |
| 4018 | Psychological manipulation (urgency, stress, perceived authority) | low | 2.5 | 1 | Phishing/Scam |
| 4019 | CVE-2025-59719 | low | 2.5 | 1 | Authentication Bypass |
| 4020 | Unprotected IoT Devices | low | 2.5 | 1 | IoT Device Hack |
| 4021 | Weaknesses in cloud security, insufficient encryption, inadequate identity management, lack of network segmentation | low | 2.5 | 1 | AI System Targeting, Cloud Infrastructure Exploitation |
| 4022 | Database Configuration Error | low | 2.5 | 1 | Data Breach |
| 4023 | unpatched_software | low | 2.5 | 1 | data_breach |
| 4024 | Fortinet EMS (CVE-2023-48788) | low | 2.5 | 1 | Ransomware |
| 4025 | Compromised IoT devices (routers, IP cameras, digital video recorders) | low | 2.5 | 1 | DDoS Attack |
| 4026 | Data Security Vulnerabilities | low | 2.5 | 1 | Data Security Vulnerability |
| 4027 | Unsecured FTP Server | low | 2.5 | 1 | Data Breach |
| 4028 | Lack of phishing controls, Unrestricted RMM tool usage, Insufficient EDR monitoring | low | 2.5 | 1 | Phishing, Social Engineering, RMM Abuse |
| 4029 | Exposed RDP server | low | 2.5 | 1 | Ransomware |
| 4030 | PHP Exploit in MyBB Codebase | low | 2.5 | 1 | Infrastructure Disruption |
| 4031 | CVE-2025-1087 | low | 2.5 | 1 | Template Injection |
| 4032 | Phishing Susceptibility | low | 2.5 | 1 | Security Awareness |
| 4033 | Unsecured attic access, potential food attractants | low | 2.5 | 1 | Physical Intrusion (Non-Cyber) |
| 4034 | Critical Issues | low | 2.5 | 1 | Vulnerability Exploitation |
| 4035 | Logic error in handling Authorization objects in ACME service, allowing improper reuse of domain validation data | low | 2.5 | 1 | Certificate Misissuance |
| 4036 | Zero-day vulnerability in Oracle’s eBusiness Suite | low | 2.5 | 1 | Data Breach |
| 4037 | Writable MFGSTAT.zip file with incorrect permissions | low | 2.5 | 1 | Vulnerability Exploitation |
| 4038 | Misprinting of personal information | low | 2.5 | 1 | Data Breach |
| 4039 | Vendor Service (Accellion) | low | 2.5 | 1 | Data Breach |
| 4040 | CVE-2025-34140 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4041 | Shared File Location | low | 2.5 | 1 | Data Breach |
| 4042 | Shared authentication systems, privileged access management gaps | low | 2.5 | 1 | Credential Exposure |
| 4043 | X11 clipboard functionality | low | 2.5 | 1 | Malware |
| 4044 | Programming Code Error | low | 2.5 | 1 | Data Breach |
| 4045 | Third-party file transfer software | low | 2.5 | 1 | Data Breach |
| 4046 | Improper error handling | low | 2.5 | 1 | Misconfiguration |
| 4047 | DNS misconfiguration (lame delegation), browser notification permissions | low | 2.5 | 1 | Push-Notification Scam |
| 4048 | Vulnerability on older game websites | low | 2.5 | 1 | Data Breach |
| 4049 | CVE-Unassigned (ASLR Bypass via NSKeyedArchiver Serialization Pointer Leak) | low | 2.5 | 1 | Vulnerability Disclosure |
| 4050 | CVE-2025-54957 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4051 | CVE-2025-5601 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4052 | CVE-2025-22234 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4053 | CVE-2026-23600 | low | 2.5 | 1 | Authentication Bypass |
| 4054 | CVE-2025-50165 (Uninitialized function pointer dereference in WindowsCodecs.dll) | low | 2.5 | 1 | Remote Code Execution (RCE) |
| 4055 | CVE-2025-7206 | low | 2.5 | 1 | Vulnerability |
| 4056 | CVE-2024-45434 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4057 | Improperly secured GitHub secrets (long-lived PyPI tokens stored in workflows) | low | 2.5 | 1 | supply chain attack |
| 4058 | Easily Exploitable Vulnerabilities | low | 2.5 | 1 | Vulnerability Exploitation |
| 4059 | Printing Software Vulnerability | low | 2.5 | 1 | Data Breach |
| 4060 | Rowhammer | low | 2.5 | 1 | Vulnerability Exploitation |
| 4061 | MOVEit file transfer program vulnerability | low | 2.5 | 1 | Data Breach |
| 4062 | CVE-2024-45432 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4063 | Arbitrary File Upload (CVE-2025-64374) | low | 2.5 | 1 | Vulnerability Exploitation |
| 4064 | CVE-2025-32756 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4065 | Debug code in production builds causing routing failure | low | 2.5 | 1 | Vulnerability |
| 4066 | Unsecured Storage of Usernames and Passwords | low | 2.5 | 1 | Data Breach |
| 4067 | CVE-2025-49825 | low | 2.5 | 1 | Vulnerability Exploit |
| 4068 | Serial number extraction | low | 2.5 | 1 | Authentication Bypass |
| 4069 | Unspecified | low | 2.5 | 1 | Phishing |
| 4070 | Human psychology (trust in job applications), abuse of trusted cloud infrastructure (AWS EC2/S3) | low | 2.5 | 1 | Phishing/Social Engineering, Malware Delivery |
| 4071 | Insufficient policy enforcement in the WebView tag | low | 2.5 | 1 | Security Bypass |
| 4072 | Stack-based buffer overflow | low | 2.5 | 1 | Vulnerability Exploitation |
| 4073 | Obsolete servers exposed to the internet | low | 2.5 | 1 | Cyberattack |
| 4074 | CVE-2025-53506 | low | 2.5 | 1 | Denial of Service (DoS) |
| 4075 | SSH password capture | low | 2.5 | 1 | Data Breach |
| 4076 | CVE-2025-7724 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4077 | Insufficient intrusion detection | low | 2.5 | 1 | Ransomware |
| 4078 | Critical Telnet vulnerability allowing unauthorized access | low | 2.5 | 1 | Vulnerability Exploitation |
| 4079 | Data Transfer Error | low | 2.5 | 1 | Data Breach |
| 4080 | CVE-2025-26147 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4081 | CVE-2025-55188 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4082 | XSS in *Software Acquisition Guide: Supplier Response Web Tool* | low | 2.5 | 1 | Vulnerability |
| 4083 | Bug introduced during an update of the email system | low | 2.5 | 1 | Data Leak |
| 4084 | CVE-2026-26127 (Out-of-bounds read weakness, CWE-125) | low | 2.5 | 1 | Denial-of-Service (DoS) |
| 4085 | Mailing Label Printing Error | low | 2.5 | 1 | Data Breach |
| 4086 | Unsecured Computer Server | low | 2.5 | 1 | Data Breach |
| 4087 | Trust in employment process | low | 2.5 | 1 | Insider Threat |
| 4088 | MOVEit server vulnerability | low | 2.5 | 1 | Data Breach |
| 4089 | GeminiJack | low | 2.5 | 1 | Zero-Click Exploit |
| 4090 | Third-party software vendor (MOVEit) | low | 2.5 | 1 | Data Breach |
| 4091 | Improper Storage of Sensitive Information | low | 2.5 | 1 | Data Breach |
| 4092 | CVE-2025-34141 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4093 | CVE-2025-34028 | low | 2.5 | 1 | Path Traversal Vulnerability |
| 4094 | Lack of Backup Procedure | low | 2.5 | 1 | Data Loss |
| 4095 | CVE-2026-20029 | low | 2.5 | 1 | Information Disclosure |
| 4096 | CVE-2025-2760 | low | 2.5 | 1 | Software Vulnerability |
| 4097 | CVE-2025-4563 | low | 2.5 | 1 | Vulnerability |
| 4098 | Software Error | low | 2.5 | 1 | Data Breach |
| 4099 | Weak message validation | low | 2.5 | 1 | Vulnerability Exploitation |
| 4100 | CVE-2025-12420 | low | 2.5 | 1 | Privilege Escalation |
| 4101 | CVE-2024-45433 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4102 | Vulnerability in data storage system | low | 2.5 | 1 | Data Breach |
| 4103 | Remote access to car's specialized computers | low | 2.5 | 1 | Cyberattack |
| 4104 | Improper fax transmission | low | 2.5 | 1 | Data Breach |
| 4105 | CVE-2026-20803 | low | 2.5 | 1 | Elevation of Privilege |
| 4106 | Identical authentication certificates, prolonged certificate validity (10 years), inadequate network access controls | low | 2.5 | 1 | Data Breach, Unauthorised Transactions, Malware Infection |
| 4107 | Unencrypted Hard Drive | low | 2.5 | 1 | Data Breach |
| 4108 | Mobile app API | low | 2.5 | 1 | Data Breach |
| 4109 | CVE-2024-45431 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4110 | CVE-2025-34142 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4111 | CVE-2026-2636 (Improper flag validation in CLFS.sys) | low | 2.5 | 1 | Denial-of-Service (DoS) |
| 4112 | CVE-2025-2761 | low | 2.5 | 1 | Software Vulnerability |
| 4113 | CVE-2025-3699 | low | 2.5 | 1 | Vulnerability |
| 4114 | Unattended Vehicle | low | 2.5 | 1 | Data Breach |
| 4115 | Unmonitored networks | low | 2.5 | 1 | Ransomware |
| 4116 | Known loopholes in SonicWall VPN | low | 2.5 | 1 | Exploitation of Vulnerability |
| 4117 | MOVEit secure file transfer application | low | 2.5 | 1 | Data Breach |
| 4118 | Faulty fuel injector | low | 2.5 | 1 | Product Recall |
| 4119 | CVE-2025-24016 (Unsafe Deserialization) | low | 2.5 | 1 | Botnet Exploitation |
| 4120 | Poor password practices | low | 2.5 | 1 | Ransomware |
| 4121 | Temporary API code misconfiguration | low | 2.5 | 1 | Data Breach |
| 4122 | ConnectWise ScreenConnect (CVE-2024-1709) | low | 2.5 | 1 | Ransomware |
| 4123 | CVE-2025-13348 | low | 2.5 | 1 | Vulnerability |
| 4124 | MOVEit Transfer tool vulnerability | low | 2.5 | 1 | Data Breach |
| 4125 | Barracuda Networks email application vulnerability | low | 2.5 | 1 | Data Breach |
| 4126 | Flaw in ASUS DriverHub | low | 2.5 | 1 | Vulnerability Exploit |
| 4127 | CVE-2025-27387 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4128 | Exposed .env file with database credentials | low | 2.5 | 1 | Data Exposure, Potential DoS Attack |
| 4129 | MOVEit Transfer tool vulnerabilities | low | 2.5 | 1 | Data Breach |
| 4130 | Damaged mailing | low | 2.5 | 1 | Data Breach |
| 4131 | CVE-2026-20805 | low | 2.5 | 1 | Information Disclosure |
| 4132 | CVE-2025-34143 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4133 | Public-facing website misconfiguration | low | 2.5 | 1 | Data Breach |
| 4134 | human_error | low | 2.5 | 1 | data_breach |
| 4135 | Unauthorized network access | low | 2.5 | 1 | Physical and Logical Security Breach |
| 4136 | Admin password bypass | low | 2.5 | 1 | Authentication Bypass |
| 4137 | CVE-2025-7723 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4138 | Reflected cross site scripting (XSS) | low | 2.5 | 1 | Vulnerability Exploitation |
| 4139 | CVE-2026-3483 (CWE-749 - Exposed Dangerous Method) | low | 2.5 | 1 | Privilege Escalation |
| 4140 | CVE-2025-50054 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4141 | CWE-400 | low | 2.5 | 1 | Uncontrolled Resource Consumption |
| 4142 | Server setup error | low | 2.5 | 1 | Data Breach |
| 4143 | Web Server | low | 2.5 | 1 | Data Breach |
| 4144 | Malformed ZIP archives evading security tools, native Windows unarchiving utility exploitation | low | 2.5 | 1 | Malware Campaign |
| 4145 | CVE-2025-5138 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4146 | Vulnerabilities in Cleo's platform | low | 2.5 | 1 | Data Breach |
| 4147 | Unauthorized access to historical emails | low | 2.5 | 1 | Data Breach |
| 4148 | CVE-2025-65606 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4149 | Vendor's Software Flaw | low | 2.5 | 1 | Data Breach |
| 4150 | Exploit in Trinity wallet app | low | 2.5 | 1 | Cryptocurrency Wallet Exploit |
| 4151 | CVE-2025-6029 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4152 | Hiring Process | low | 2.5 | 1 | State-Sponsored Hacker Infiltration |
| 4153 | CVE-2025-36537 | low | 2.5 | 1 | Vulnerability |
| 4154 | Unauthorized access to source code repository | low | 2.5 | 1 | Data Breach |
| 4155 | CVE-2026-20824 | low | 2.5 | 1 | Security Feature Bypass |
| 4156 | CVE-2026-2441 (use-after-free in CSS component) | low | 2.5 | 1 | Zero-Day Vulnerability |
| 4157 | CVE-2025-37103 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4158 | Missing portable data storage device | low | 2.5 | 1 | Data Breach |
| 4159 | CVE-2025-1234 | low | 2.5 | 1 | DDoS |
| 4160 | Accidental Disclosure | low | 2.5 | 1 | Data Breach |
| 4161 | Publicly Accessible S3 Bucket | low | 2.5 | 1 | Data Breach |
| 4162 | CVE-2025-24813 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4163 | Imperfect Process | low | 2.5 | 1 | Data Breach |
| 4164 | Device Tracking Vulnerabilities | low | 2.5 | 1 | Surveillance Investigation |
| 4165 | Unpatched firmware in home routers/cameras | low | 2.5 | 1 | Distributed Denial of Service (DDoS) |
| 4166 | CVE-2025-13878 | low | 2.5 | 1 | Denial-of-Service (DoS) |
| 4167 | CVE-2025-5678 | low | 2.5 | 1 | DDoS |
| 4168 | Improper link resolution in Windows Update Stack (CVE-2025-21204) | low | 2.5 | 1 | Privilege Escalation |
| 4169 | CVE-2025-46789 | low | 2.5 | 1 | Vulnerability Exploitation |
| 4170 | CVE-2025-24091 | low | 2.5 | 1 | Denial of Service (DoS) |
| 4171 | Website Search Function | low | 2.5 | 1 | Data Breach |
| 4172 | Lack of Awareness (pre-training) | low | 2.5 | 1 | Security Awareness |
| 4173 | Secure Email Account | low | 2.5 | 1 | Data Breach |
| 4174 | USBAnywhere | low | 2.5 | 1 | Remote Attack Vector |
| 4175 | CVE-2026-0227 | low | 2.5 | 1 | Denial-of-Service (DoS) |
| 4176 | Unauthorized physical access | low | 2.5 | 1 | Physical and Logical Security Breach |
| 4177 | Improper Access Control in fepblue Mobile App | low | 2.5 | 1 | Data Breach (Unauthorized Access) |
| 4178 | Insecure remote administration access | low | 2.5 | 1 | Security Breach |
| 4179 | Memory leak in embedded JavaScript engine | low | 2.5 | 1 | Resource Exhaustion |
| 4180 | vBulletin’s reliance on PHP’s Reflection API for its custom Model-View-Controller (MVC) framework and API system | low | 2.5 | 1 | Remote Code Execution (RCE) |