Rankiteo Logo
Rankiteo

The Rankiteo MCP server is now available.

Discover MCP
! CVE-2025-1000CVE-2025-1001CVE-2025-1002CVE-2025-1003CVE-2025-1004

Top Exploited Vulnerabilities

The most actively exploited vulnerabilities across the companies tracked by Rankiteo. Aggregated from real incident data to help you prioritize patching.

4180
Vulnerabilities Tracked
3248
Critical Severity
584
High Severity
5,548
Total Exposures

Vulnerability Rankings

#VulnerabilitySeverityCVSSIncidentsAttack Type
1
Human Error
critical10.0
137
Awareness Campaign, Data Leak, Phishing
2
Unauthorized Access
critical10.0
79
Data Exfiltration, Security Concerns, Data Breach
3
Email Account
critical8.5
54
Phishing Scam, Data Breach
4
Physical Security
critical10.0
40
Data Theft, Data Breach
5
Lack of Multi-Factor Authentication (MFA)
critical10.0
34
defacement, cyber espionage, Unauthorized Access
6
Human
critical10.0
31
Phishing, Data Breach
7
Email Account Compromise
critical10.0
28
Data Breach
8
Misconfiguration
critical10.0
28
Data Leak, worm-driven campaign, Data Breach
9
Improper Access Control
critical10.0
28
data breach, Data Exposure, SCADA Tampering / Insider Threat
10
Employee Email Account
critical8.5
27
Data Breach
11
Unauthorized Access to Email Account
critical10.0
21
Data Theft, Data Breach
12
Social Engineering
critical10.0
20
Business Email Compromise (BEC), Phishing Scam, Phishing
13
Insider Threat
critical10.0
18
Data Leak, Data Breach, Unauthorized Access
14
SQL Injection
critical10.0
15
SQL Injection, Data Breach
15
MOVEit software vulnerability
critical10.0
15
Data Breach
16
Website Vulnerability
critical10.0
14
Data Breach
17
unpatched systems
critical10.0
14
Data Breach, cyber espionage, Cyberattack
18
Unsecured Database
critical10.0
13
Data Leak, Data Exposure, Data Breach
19
Improper Data Handling
critical10.0
13
data breach, Data Exposure, Data Breach
20
Weak password
critical10.0
13
Data Breach, Phishing, Awareness Campaign, Phishing
21
Human Error (Phishing Susceptibility)
critical10.0
12
cybercrime, Data Breach (Phishing), Phishing
22
Weak or Stolen Credentials
critical10.0
11
Data Breach (General Discussion), ransomware, Data Breach
23
Unencrypted Data
critical10.0
11
Awareness Campaign, data breach, Data Breach
24
Lack of Physical Security
critical10.0
11
cybercrime, Data Leak, Data Breach
25
Lack of Password Protection
critical10.0
11
Data Exposure, Data Breach
26
Compromised Email Account
critical10.0
11
Data Breach
27
Unsecured cloud environment
critical10.0
10
Data Breach
28
CVE-2024-57727
critical10.0
10
Supply-Chain Attack, ransomware, Ransomware
29
Previously unknown vulnerability
critical10.0
10
Ransomware, Ransomware Attack, Data Breach
30
Human Error (Social Engineering)
critical10.0
10
Cyber Extortion, Phishing, Data Breach
31
Unsecured Laptop
critical10.0
9
Data Breach
32
lack of access controls
critical10.0
9
Data Leak, Data Breach, ransomware
33
MOVEit Transfer application vulnerability
critical8.5
9
Data Breach
34
Unknown
critical10.0
8
Data Leak, Data Breach, Malware
35
Unencrypted Laptop
critical10.0
8
Data Breach
36
Stolen Credentials
critical10.0
8
Supply Chain Attack, Data Breach, Extortion, Destructive Cyberattack
37
Weak Access Controls
critical10.0
8
cyber attack, Unauthorized Access and Data Manipulation, Data Breach
38
Weak Password Policies
critical10.0
8
DDoS Attack, Data Breach, cyber espionage
39
Unencrypted Data Storage
critical8.5
8
Data Security Incident, Data Breach
40
Inadequately secured network
critical10.0
7
Data Breach
41
Unprotected Database
critical10.0
7
Data Leak, Data Exposure, Data Breach
42
Zero-day vulnerability
critical10.0
7
Cyber Attack, Ransomware Attack, Data Breach
43
MOVEit file transfer software
critical10.0
7
Ransomware, Ransomware Attack, Data Breach
44
Compromised Credentials
critical10.0
7
Quantum Computing Threat, Data Breach
45
Unpatched vulnerability
critical10.0
7
Data Breach, Ransomware, Ransomware, Ransomware Attack
46
Inadequate Access Controls
critical10.0
7
Data Breach, Data Breach Risk, unauthorized access
47
MOVEit Transfer software
critical8.5
7
Data Breach
48
Configuration Error
critical8.5
7
Data Leak, Data Breach
49
Email Compromise
critical8.5
7
Data Breach
50
MOVEit Transfer software vulnerability
critical8.5
7
Data Breach
51
Weak OAuth Token Security
critical10.0
6
Supply Chain Attack, Data Breach
52
MOVEit Transfer application
critical10.0
6
Data Breach
53
CVE-2024-57728
critical10.0
6
Supply-Chain Attack, Ransomware, ransomware
54
CVE-2024-57726
critical10.0
6
Supply-Chain Attack, Ransomware, ransomware
55
Human Factor
critical10.0
6
Data Theft, Phishing Attack, Social Engineering, Ransomware
56
Lack of Multi-Factor Authentication (MFA) Enforcement
critical10.0
6
Phishing, phishing, Account Takeover (ATO)
57
Lack of Multifactor Authentication (MFA)
critical10.0
6
Cybersecurity Incident, cyberespionage, Data Breach
58
MOVEit Transfer
critical8.5
6
Cyber Attack, Data Breach
59
Weak or Reused Passwords
critical8.5
6
Account Compromise, Credential-Stuffing Attack, Data Breach
60
Unauthorized Data Transfer
critical8.0
6
Data Breach
61
CVE-2025-55182 (React2Shell)
critical10.0
5
Remote Code Execution (RCE), Ransomware, Vulnerability Exploitation
62
Phishing
critical10.0
5
Phishing Scam, Phishing, Authentication Security Improvement
63
Human Error (Phishing)
critical10.0
5
Targeted Attack, Targeted Cyberattack, Data Breach
64
MOVEit file transfer software vulnerability
critical10.0
5
Cyber Attack, Ransomware
65
React2Shell
critical10.0
5
Web Traffic Hijacking, Data Breach, Ransomware
66
Lack of MFA
critical10.0
5
Compliance Failure, Social Engineering, Ransomware
67
CVE-2025-61882 (Oracle E-Business Suite)
critical10.0
5
Data Breach, Ransomware, Cybercriminal Alliance Formation, Data Breach
68
CVE-2025-61882
critical10.0
5
Cyberattack, ransomware, Data Breach
69
CVE-2023-34362
critical10.0
5
Data Breach and Ransomware Attack, Ransomware, Data Breach
70
Online Payment System
critical10.0
5
Data Breach
71
Zero-day vulnerabilities
critical10.0
5
Zero-day Exploit, Cyber Espionage, Ransomware
72
Unsecured cloud storage
critical10.0
5
Data Leak, data breach, Data Exposure
73
Software Vulnerability
critical10.0
5
Cyber Attack, Data Breach
74
Human Vulnerability
critical10.0
5
Sex Trafficking and Deepfake Pornography, Phishing, Data Breach
75
outdated software
critical10.0
5
phishing, ransomware, Ransomware
76
MOVEit Transfer programme
critical8.5
5
Data Breach
77
Lack of Authentication
critical8.5
5
Data Leak, Data Exposure
78
Human (Employee Email Compromise)
critical8.5
5
Data Breach
79
Password Reuse
critical8.5
5
Credential Theft, Credential Leak, Password Reuse Attack
80
Inadequate security measures
critical8.5
5
Data Breach
81
Lack of encryption and password protection
critical8.5
5
data breach, Data Exposure, Data Breach
82
Email Phishing
high6.0
5
Data Breach
83
Email Phishing Scam
high6.0
5
Data Breach
84
CVE-2025-47812
critical10.0
4
Remote Code Execution, Remote Code Execution (RCE), Vulnerability Exploitation
85
Weak or Compromised Credentials
critical10.0
4
Cyberattack, Data Breach
86
CVE-2025-11953
critical10.0
4
Remote Code Execution (RCE), OS Command Injection
87
CVE-2025-53770
critical10.0
4
Cyberattack, Ransomware, Ransomware Attack
88
Unknown vulnerability
critical10.0
4
Data Breach, Ransomware, Ransomware Attack, Data Breach
89
CVE-2025-49704
critical10.0
4
Cyberattack, Cyber Espionage, Ransomware
90
CVE-2025-49706
critical10.0
4
Cyberattack, Cyber Espionage, Ransomware
91
Internal Access
critical10.0
4
Data Theft, Data Breach
92
Zero-day vulnerability in MOVEit Transfer programme
critical10.0
4
Data Breach
93
Cloudbleed
critical10.0
4
Data Breach
94
SonicWall firewall vulnerability
critical10.0
4
Ransomware, Data Breach
95
MOVEit Transfer tool
critical10.0
4
Data Breach
96
human trust
critical10.0
4
phishing, fraud, social engineering
97
CVE-2023-27532
critical10.0
4
Ransomware Attack, ransomware, Ransomware
98
Web Application Vulnerability
critical10.0
4
Cyber Attack, Data Breach
99
Security breach on a third-party vendor
critical10.0
4
Data Breach
100
MOVEit
critical10.0
4
Ransomware, Data Breach
101
Insufficient Employee Training
critical10.0
4
Data Breach Risk, Cyber Attack, Data Breach
102
MOVEit file transfer software vulnerabilities
critical10.0
4
Data Breach, Unauthorized Access, Ransomware Attack, Data Breach
103
Lack of Network Segmentation
critical10.0
4
Cyberattack, Cyber-Physical Attack, cyber-espionage
104
Network Vulnerability
critical10.0
4
Ransomware Attack, Data Breach
105
Insecure Direct Object Reference (IDOR)
critical10.0
4
unauthorized access, Data Breach
106
Publicly Accessible Server
critical10.0
4
data exposure, Data Exposure, Data Breach
107
Weak email security
critical10.0
4
defacement, Cyberattack, Data Breach
108
Inadequate employee training
critical10.0
4
phishing, Data Leakage, Data Breach
109
Point-of-Sale System
critical10.0
4
Data Breach
110
Coding Error
critical8.5
4
Data Breach
111
Lack of Encryption
critical8.5
4
Data Breach
112
MOVEit Transfer vulnerability
critical8.5
4
Data Breach
113
Compromised login credentials
critical8.5
4
Data Breach
114
Unauthorized Access by Former Employee
critical8.5
4
Data Breach
115
Unsecured Server
critical8.5
4
Data Leak, Data Breach
116
Compromised Employee Email Account
critical8.5
4
Data Breach
117
CVE-2021-36942 (PetitPotam)
critical10.0
3
Cyber Espionage
118
Weak/Stolen Credentials
critical10.0
3
Data Breach
119
CVE-2024-7029
critical10.0
3
Malware, Botnet
120
Weak Authentication System
critical10.0
3
Data Breach
121
External System Breach
critical10.0
3
Data Breach
122
Stolen Employee Credentials
critical10.0
3
Data Breach
123
Excessive Permissions
critical10.0
3
Malware Infiltration, Data Breach
124
Weak Password Security
critical10.0
3
Data Breach
125
CVE-2026-21509
critical10.0
3
Zero-day exploitation, Zero-Day Vulnerability
126
CVE-2025-53771
critical10.0
3
Ransomware, Ransomware Attack
127
CVE-2024-40711
critical10.0
3
Vulnerability, ransomware, Ransomware
128
SQL Injection Flaws
critical10.0
3
Data Breach
129
Lack of Oversight
critical10.0
3
Data Breach (Alleged), Data Breach, Unauthorized Disclosure
130
Weak or Reused Credentials
critical10.0
3
Unauthorized Access, Data Breach
131
Lack of Role-Based Access Control (RBAC)
critical10.0
3
Data Breach Risk, Data Breach
132
Microsoft Exchange Server
critical10.0
3
Ransomware, Cyber Espionage, Security Breach
133
Lack of Data Encryption
critical10.0
3
Data Breach
134
Third-party software vulnerability
critical10.0
3
Ransomware Attack, Data Breach
135
unpatched software
critical10.0
3
Ransomware, general cybersecurity awareness, ransomware
136
legacy systems
critical10.0
3
Ransomware, Cyberattack, ransomware
137
outdated systems
critical10.0
3
Ransomware, data breach, ransomware
138
weak endpoint security
critical10.0
3
data breach, ransomware, Data Breach
139
Unpatched vulnerabilities
critical10.0
3
ransomware, Ransomware, Cyber Threat Alert
140
Weak Credential Management
critical10.0
3
Data Breach
141
Improper Email Handling
critical10.0
3
Data Breach
142
Employee Credentials
critical10.0
3
Data Breach, Phishing, Data Breach
143
Lack of Cybersecurity Expertise
critical10.0
3
ransomware, Data Breach
144
Zero-day exploit
critical10.0
3
Ransomware, Compliance Failure, Data Breach
145
Poor Network Segmentation
critical10.0
3
cyber attack, Ransomware
146
Misconfigured Amazon S3 bucket
critical9.0
3
Data Breach
147
Point of Sale Systems
critical8.5
3
Data Breach
148
MOVEit Transfer solution
critical8.5
3
Data Breach
149
MOVEit Transfer server
critical8.5
3
Data Breach
150
Security Vulnerability
critical8.5
3
Data Breach
151
Physical Theft
critical8.5
3
Data Breach
152
Third-party service provider
critical8.5
3
Data Breach
153
Inadequate Data Protection Measures
critical8.5
3
Data Breach
154
Weak security controls
critical8.5
3
Ransomware, Data Breach
155
human trust (social engineering)
critical8.5
3
Malware, cyber theft, phishing
156
Third-party vendor vulnerability
critical8.5
3
Data Breach
157
Insufficient Access Controls
critical8.5
3
Unauthorized Access, data breach, Data Breach
158
MOVEit file transfer application
critical8.5
3
Data Breach
159
Publicly Accessible Database
critical8.5
3
Data Exposure, Data Breach
160
Reused Passwords
critical8.5
3
Account Compromise, data breach (unverified), Data Breach
161
Payment Processing System
critical8.5
3
Data Breach
162
Lack of two-factor authentication
high6.0
3
Cyber Attack, Data Breach
163
Email Misconfiguration
high6.0
3
Data Breach
164
Unauthorized Data Access
high6.0
3
Data Exfiltration, Data Breach
165
Weak or Stolen Password
high6.0
3
Authentication Security Improvement, Data Breach (Unauthorized Access), Data Breach
166
Insider Access
low0.0
3
Insider Threat, Data Breach
167
CVE-unknown (MOVEit Transfer zero-day)
critical10.0
2
ransomware, Data Breach
168
Human vulnerability through phishing
critical10.0
2
Phishing, Ransomware
169
inadequate network segmentation
critical10.0
2
ransomware
170
CVE-2025-53770 (ToolShell)
critical10.0
2
Cyber Espionage
171
CVE-2024-1086
critical10.0
2
Privilege Escalation, vulnerability exploitation
172
Unpatched IoT Devices
critical10.0
2
Distributed Denial-of-Service (DDoS) Attack, Data Breach
173
Known vulnerability that had not been patched
critical10.0
2
Ransomware, Data Breach
174
CVE-2024-21412
critical10.0
2
Cyberattack, Ransomware
175
Unattended Devices
critical10.0
2
Awareness Campaign, Insider Threat
176
human vulnerability (social engineering)
critical10.0
2
phishing, data breach
177
Zero-day vulnerability in Oracle’s E-Business Suite
critical10.0
2
Ransomware
178
Supply chain vulnerabilities
critical10.0
2
Ransomware, Data Breach
179
MOVEit Transfer zero-day vulnerability
critical10.0
2
Data Breach
180
CVE-2025-4322
critical10.0
2
Privilege Escalation
181
CVE-2026-23760
critical10.0
2
Ransomware, Remote Code Execution (RCE)
182
Code Vulnerability
critical10.0
2
Data Breach
183
Remote code execution
critical10.0
2
Espionage, Data Privacy and Cybersecurity Advisory
184
CVE-2021-44026
critical10.0
2
Cyberespionage, Data Breach
185
CVE-2025-7775 (Citrix NetScaler)
critical10.0
2
Ransomware
186
null
critical10.0
2
Data Breach and Ransomware, Data Breach
187
Infostealer Malware
critical10.0
2
Data Breach
188
CVE-2025-33053
critical10.0
2
Advanced Persistent Threat (APT), Remote Code Execution
189
Email System
critical10.0
2
Data Breach
190
Oracle eBusiness Suite security flaw
critical10.0
2
Data Breach
191
CVE-2025-54309
critical10.0
2
Zero-Day Exploitation, Zero-Day Vulnerability
192
Known vulnerability not patched in time
critical10.0
2
Ransomware, Data Breach
193
CVE-2025-1268
critical10.0
2
Vulnerability, Vulnerability and Potential Breach
194
CVE-2024-50623
critical10.0
2
Ransomware, Data Breach
195
Oracle eBusiness Suite vulnerability
critical10.0
2
Data Breach
196
CVE-2017-17215
critical10.0
2
Malware, Botnet
197
Internal Account Compromise
critical10.0
2
Data Breach
198
Improper security configuration
critical10.0
2
Data Breach
199
lack of user awareness
critical10.0
2
phishing, social engineering
200
Cross-Site Scripting (XSS)
critical10.0
2
Vulnerability
201
SonicWall firewall
critical10.0
2
Ransomware Attack, Data Breach
202
Human (Help Desk Personnel)
critical10.0
2
Ransomware and Data Theft, Ransomware and Data Breach
203
Cleo file transfer software
critical10.0
2
Ransomware
204
Lack of Employee Awareness
critical10.0
2
Human Error, Data Breach
205
Signature-Based Detection Gaps
critical10.0
2
Supply Chain Attack, Operational Risk
206
Human vulnerability through impersonation
critical10.0
2
Social Engineering Attack, Data Breach
207
MOVEit Transfer software zero-day vulnerability
critical10.0
2
Data Breach
208
Phished login credentials
critical10.0
2
Cyber Attack, Hack
209
Unauthorized Access to Sensitive Data
critical10.0
2
Data Breach
210
Lack of Multi-Factor Authentication (MFA) (implied)
critical10.0
2
Phishing, Ransomware Attack
211
Unencrypted, non-password-protected database
critical10.0
2
Data Leak
212
Citrix Vulnerability
critical10.0
2
Cyberattack
213
CVE-2017-11882
critical10.0
2
cyber espionage
214
CVE-2025-6543
critical10.0
2
Cyber Attack, Zero-day exploitation
215
CVE-2026-0920
critical10.0
2
Backdoor
216
Lack of Encryption (Data at Rest/In Transit)
critical10.0
2
Data Breach (General Discussion), Data Breach
217
Weak Identity Controls
critical10.0
2
EDR/XDR Evasion, Data Breach
218
CVE-2025-48828
critical10.0
2
Remote Code Execution, Vulnerability Exploitation
219
Weak OAuth Token Management
critical10.0
2
Data Breach
220
Unauthorized access to an employee’s email account
critical10.0
2
Data Breach
221
CVE-2025-55182
critical10.0
2
Supply Chain Attack, Remote Code Execution (RCE)
222
CVE-2024-55956
critical10.0
2
Ransomware, Data Breach
223
CVE-2025-48827
critical10.0
2
Remote Code Execution, Vulnerability Exploitation
224
Network infrastructure
critical10.0
2
Data Breach, Cyber Sabotage
225
Default or Weak Credentials
critical10.0
2
Cloud Security Breach, Cyberattack
226
Poor Data Governance
critical10.0
2
Data Breach
227
CVE-2025-3248
critical10.0
2
Remote Code Execution, Vulnerability Exploitation
228
CVE-2024-36401
critical10.0
2
Malware Distribution and Data Exfiltration, Exploitation of Vulnerability
229
Non-password protected database
critical10.0
2
Data Breach
230
Outdated infrastructure
critical10.0
2
GPS spoofing, Ransomware
231
Weak Password Management
critical10.0
2
Malware Infection, Data Breach
232
CVE-2024-40766
critical10.0
2
Ransomware
233
Email System Vulnerability
critical10.0
2
Data Breach
234
CVE-2025-49113
critical10.0
2
Remote Code Execution (RCE)
235
CVE-2025-8110
critical10.0
2
Remote Code Execution (RCE)
236
ATM network processing
critical10.0
2
Data Breach
237
Outdated operating systems
critical10.0
2
Cyberattack, data breach
238
CVE-2025-61884 (Oracle E-Business Suite Zero-Day)
critical10.0
2
data breach, Data Breach
239
network vulnerabilities
critical10.0
2
Ransomware, ransomware
240
unknown security gap
critical10.0
2
ransomware
241
Phishing Email
critical10.0
2
Data Breach
242
third-party integration risks
critical10.0
2
third-party breach, Data Breach
243
Misconfigured access controls
critical10.0
2
Data Privacy and Cybersecurity Advisory, Data Breach
244
User Trust in App Store
critical10.0
2
Malware
245
Weak authentication
critical10.0
2
Ransomware, Data Breach
246
Known vulnerability
critical10.0
2
Data Leak, Ransomware Attack
247
Weak Authentication Mechanisms
critical10.0
2
cybercrime, Data Breach
248
Cloud Storage Service Vulnerability
critical10.0
2
Data Breach
249
lack_of_MFA
critical10.0
2
data_breach, ransomware
250
Misconfigured system
critical10.0
2
Alleged Data Breach, Data Breach
251
poor password hygiene
critical10.0
2
Human Error, ransomware
252
lack of employee training
critical10.0
2
phishing, Ransomware
253
Online Payment System Vulnerability
critical10.0
2
Data Breach
254
Lack of Signal Authentication
critical10.0
2
Data Interception, spoofing
255
Remote code execution vulnerability
critical10.0
2
Remote Code Execution, Remote Code Execution (RCE)
256
Misconfigured MongoDB database
critical10.0
2
Data Exposure, Data Breach
257
Zero-Day Vulnerability in SonicWall SSL VPN
critical10.0
2
Ransomware
258
Lack of phishing-resistant MFA
critical10.0
2
Extortion, Data Breach
259
Default credentials
critical10.0
2
Ransomware, Data Breach
260
Cloud misconfiguration
critical10.0
2
Cloud Misconfiguration Exploitation, Data Breach
261
Legacy IT Systems
critical10.0
2
Cyber Attack, Ransomware Attack
262
Human error (social engineering susceptibility)
critical10.0
2
Ransomware, Data Breach
263
Lack of multifactor authentication
critical10.0
2
Awareness Campaign, Supply Chain Breach
264
Lack of Package Integrity Verification
critical10.0
2
Supply Chain Attack, supply-chain attack
265
Misconfigured deployments
critical10.0
2
Misconfiguration, Ransomware
266
lack of multi-factor authentication
critical10.0
2
general cybersecurity awareness, Data Breach
267
Software Coding Issue
critical8.5
2
Data Breach
268
Compromised User Account
critical8.5
2
Data Breach
269
Inadequate Vendor Vetting
critical8.5
2
Data Breach
270
CVE-2026-22218
critical8.5
2
Vulnerability Exploitation, Data Breach
271
Lack of Identity Verification
critical8.5
2
Fraud, Data Breach
272
CVE-2026-23795
critical8.5
2
Supply Chain Attack, XXE (XML External Entity) Vulnerability
273
Progress Software's MOVEit Transfer software
critical8.5
2
Data Breach
274
Code Injection
critical8.5
2
Data Breach
275
Human Error (Falling for Phishing Scam)
critical8.5
2
Data Breach (Phishing), Data Breach
276
MOVEit Transfer (CVE-2023-34362 or related)
critical8.5
2
Data Breach
277
CVE-2025-55177 (WhatsApp incomplete authorization)
critical8.5
2
Zero-day vulnerability, Zero-day exploit
278
Weak email account security
critical8.5
2
Data Breach
279
CVE-2026-22219
critical8.5
2
Vulnerability Exploitation, Data Breach
280
Access Control
critical8.5
2
Data Breach
281
Inadvertent Disclosure
critical8.5
2
Data Breach
282
missing authentication
critical8.5
2
data breach
283
CVE-2026-2413
critical8.5
2
SQL Injection
284
CVE-2025-41244
critical8.5
2
Privilege Escalation
285
MOVEit web transfer application vulnerability
critical8.5
2
Data Breach
286
Oracle E-Business Suite software vulnerability
critical8.5
2
Data Breach
287
System Configuration Error
critical8.5
2
Data Breach
288
Unprotected Server
critical8.5
2
Data Breach
289
Server Misconfiguration
critical8.5
2
Data Breach
290
CVE-2026-26110 (Type Confusion - CWE-843)
critical8.5
2
Vulnerability, Remote Code Execution (RCE)
291
Insufficient Multi-Factor Authentication (MFA)
critical8.5
2
Data Breach
292
React2Shell vulnerability
critical8.5
2
Data Breach
293
Misconfigured Elasticsearch Database
critical8.5
2
Data Leak, Data Exposure
294
Incorrect privacy settings on a public mapping website
critical8.5
2
Data Exposure, Data Breach
295
CVE-2026-21510
critical8.5
2
Zero-Day Vulnerability
296
Information Disclosure
critical8.5
2
Data Leak, Data Breach
297
unencrypted sensitive data
critical8.5
2
Quantum Computing Threat, data breach
298
Weak Email Security Controls
critical8.5
2
data breach, Data Breach
299
Improper access controls on Amazon S3 bucket
critical8.5
2
Data Breach
300
Unsecured Amazon S3 Bucket
critical8.5
2
Data Breach
301
CVE-2025-21043 (Out-of-Bounds Write in libimagecodec.quram.so)
critical8.5
2
Vulnerability Exploitation
302
Unsecured MongoDB instance
critical8.5
2
Data Exposure, Data Breach
303
Access Credentials
critical8.5
2
Data Breach
304
Misconfigured Rsync Server
critical8.5
2
Data Exposure, Data Breach
305
Unsecured Flash Drive
critical8.5
2
Data Breach
306
Compromised employee credentials
critical8.5
2
Data Breach
307
Long-Lived Tokens
critical8.5
2
Data Breach
308
Publicly available data
critical8.5
2
Data Breach
309
Missing Access Controls
critical8.5
2
Unauthorized Access, Data Exposure
310
Credential Theft
critical8.5
2
Malware, Data Breach
311
Improper Access Controls (Publicly Accessible Database)
critical8.5
2
Data Leak, data breach
312
Unauthorized code injection
critical8.5
2
Data Breach
313
Lack of Physical Security for Sensitive Device
critical8.5
2
Data Breach (Physical Theft)
314
Misconfigured Elasticsearch Instance
critical8.5
2
Data Exposure, Data Breach
315
GoAnywhere Zero-Day Vulnerability
critical8.5
2
Data Breach, Ransomware, Ransomware
316
Technical Glitch
critical8.0
2
Data Breach
317
Improper Disposal of Sensitive Information
critical8.0
2
Data Breach
318
Identity Theft
critical8.0
2
Identity Theft, Data Breach
319
Unauthorized Data Sharing
critical8.0
2
Data Breach
320
Inadequate Physical Security
high7.5
2
physical cyber convergence, Data Breach
321
Inadvertent Email
high6.0
2
Data Breach
322
Compromised Account Credentials
high6.0
2
Unauthorized Access, DNS Manipulation, Data Breach
323
Loss of Physical Media
high6.0
2
Data Breach
324
MOVEit Transfer service
high6.0
2
Data Breach
325
Website Misconfiguration
high6.0
2
Data Exposure, Data Breach
326
CVE-2018-3952
high6.0
2
Vulnerability Exploit, Vulnerability Exploitation
327
Unencrypted Payment Card Information
high6.0
2
Data Breach
328
Human Error/Insider Threat
high6.0
2
Data Breach
329
ATM Security
high6.0
2
ATM Skimming/Shimming, Data Breach
330
Corporate Email Account
high6.0
2
Data Breach
331
Unauthorized Access to Employee Email Account
high6.0
2
Data Breach
332
Lack of Multi-Factor Authentication (MFA) on Slack
high6.0
2
data breach, Data Breach
333
Point-of-Sale Device
high6.0
2
Data Breach
334
Compromised Microsoft Office 365 account
high6.0
2
Business Email Compromise (BEC), Data Breach
335
Improper Disposal
medium5.0
2
Data Breach
336
MOVEit Transfer software vulnerabilities
medium5.0
2
Data Breach
337
Tax Filing Software
medium5.0
2
Data Breach
338
Reused credentials
medium5.0
2
Data Breach
339
HTML Injection
medium5.0
2
Prompt Injection, Vulnerability Exploitation
340
Unsecured Physical Records
low2.5
2
Data Breach
341
CVE-2024-7399
low2.5
2
Botnet Infection, Vulnerability Exploitation
342
CVE-2026-1504
low2.5
2
Vulnerability
343
Unencrypted POS devices
critical10.0
1
Data Breach
344
Citrix Bleed
critical10.0
1
Ransomware Attack
345
unrestricted RDP/remote tool access
critical10.0
1
ransomware
346
LNK file execution
critical10.0
1
spear-phishing
347
CVE-2025-59470
critical10.0
1
Vulnerability Exploitation
348
Critical SharePoint Vulnerabilities (July 2025)
critical10.0
1
Ransomware Attack
349
unencrypted storage of sensitive data in an internet-accessible environment
critical10.0
1
ransomware
350
Previously unknown vulnerability in email system
critical10.0
1
Ransomware
351
CVE-2026-25084
critical10.0
1
Vulnerability Exploitation
352
CVE-2024-8299
critical10.0
1
Vulnerabilities in SCADA Systems
353
Container escape vulnerabilities (e.g., CVE-2025-23266)
critical10.0
1
Malware Framework
354
Insufficient Vendor Oversight
critical10.0
1
Supply Chain Attack
355
CVE-2025-52691
critical10.0
1
Remote Code Execution (RCE)
356
Unpatched zero-day vulnerability in Oracle E-Business Suite (arbitrary code execution)
critical10.0
1
ransomware
357
Unauthorized access to video lessons
critical10.0
1
Data Breach
358
CVE-2025-0289 in BioNTdrv.sys driver
critical10.0
1
Ransomware
359
Overwhelming a server or website with excessive fake traffic
critical10.0
1
DDoS Attack
360
Vulnerabilities in MOVEit software
critical10.0
1
Cyberattack
361
lack of backups
critical10.0
1
data breach
362
Immutable Log Gaps in AI Pipelines
critical10.0
1
Data Breach (AI Models/Applications)
363
Insecure Data Storage Practices
critical10.0
1
Vulnerability Exploitation
364
Weak vendor security controls
critical10.0
1
Ransomware
365
Insufficient sanitization in serialize and compileMDX functions (CVE-2026-0969)
critical10.0
1
Remote Code Execution (RCE)
366
Inadequate Reporting Processes
critical10.0
1
Data Breach
367
Weak Identity Management (Lack of Privileged Account Separation)
critical10.0
1
Cyber Espionage
368
Publicly Accessible Executive Profiles (for AI Phishing)
critical10.0
1
Supply Chain Attack
369
Cisco IOS vulnerabilities
critical10.0
1
Data Breach
370
Human Error (Phishing/Vishing)
critical10.0
1
Data Breach
371
Entra ID application registration secrets
critical10.0
1
cyberespionage
372
lack of managed GenAI tools
critical10.0
1
ransomware
373
Poorly Secured ICS Components (PLCs, SCADA, HMIs, Industrial IoTs)
critical10.0
1
Cyber-Physical Attack
374
Manual Recovery Reliance
critical10.0
1
Supply Chain Attack
375
Insufficient Real-Time Monitoring
critical10.0
1
Insider Threat
376
Human behavior
critical10.0
1
Illegal intrusion
377
Inadequate access controls for sensitive spreadsheets
critical10.0
1
Data Breach
378
Human Error (lack of skepticism toward unsolicited interactions)
critical10.0
1
Cyber Theft
379
No rate-limiting or access restrictions on user data
critical10.0
1
Data Breach
380
Misaligned agent workflows
critical10.0
1
AI-driven breach
381
Internal mechanism for helping password-forgetting users reclaim their accounts
critical10.0
1
Data Privacy Breach
382
Poorly maintained systems
critical10.0
1
Ransomware
383
automated package update mechanisms
critical10.0
1
supply chain attack
384
Undisclosed (stolen vulnerability data)
critical10.0
1
Data Breach
385
Microsoft Word 2010 vulnerability
critical10.0
1
Cyber Espionage
386
inadequate least-privilege access controls
critical10.0
1
cyberespionage
387
Embedded Credentials in BIG-IP
critical10.0
1
Supply Chain Attack
388
Recently discovered vulnerability
critical10.0
1
Ransomware Attack
389
Weak SSH credentials
critical10.0
1
DDoS Attack
390
lack of package cooldown periods
critical10.0
1
supply chain attack
391
Database Injection
critical10.0
1
Website Defacement
392
Heap Metadata Corruption
critical10.0
1
Memory Corruption Vulnerability
393
Inadequate Risk Management Exercises
critical10.0
1
Data Breach
394
CVE-2025-30232
critical10.0
1
Vulnerability Exploitation
395
Unpatched Firmware/Software in Network Perimeter Devices
critical10.0
1
Cyber Espionage
396
Compromised administrative accounts (26 user accounts, including admin-level)
critical10.0
1
Ransomware Attack
397
Exposed Secrets in GitHub Repository
critical10.0
1
Data Breach
398
RC4 encryption (obsolete since 1980s)
critical10.0
1
ransomware
399
Opportunistic TLS
critical10.0
1
Cross-protocol Application Layer Desynchronization
400
CVE-2025-55182 (React2Shell, CVSS 10.0)
critical10.0
1
Web Application Exploitation
401
CVE-2025-32714 (Windows Installer EoP)
critical10.0
1
Patch Release
402
Improper Data Handling Practices
critical10.0
1
Data Breach
403
CVE-2020-12812
critical10.0
1
Ransomware
404
Undocumented Warbird framework
critical10.0
1
Supply Chain Attack
405
CVE-2017-7921 (CWE-287: Improper Authentication)
critical10.0
1
Vulnerability Exploitation
406
human error (weakness in operational security)
critical10.0
1
cyber theft
407
Compromised Polyfill.io service
critical10.0
1
Supply Chain Attack
408
Misconfigured Email Security Solutions (Mimecast, Proofpoint, Barracuda)
critical10.0
1
Data Breach
409
shadow IT (unapproved third-party tool integrations)
critical10.0
1
third-party breach
410
Trojanized Software Supply Chain
critical10.0
1
Targeted Attack
411
Lack of Robust Backup Systems
critical10.0
1
Supply Chain Attack
412
Insufficient Asset Discovery (IIoT Device Proliferation)
critical10.0
1
Cyber-Physical Attack
413
CVE-2024-53676
critical10.0
1
Vulnerability Exploitation
414
Remote Code Execution in Imunify360 AV deobfuscation logic (versions before v32.7.4.0)
critical10.0
1
Vulnerability
415
weak MFA implementations (Evilginx tool)
critical10.0
1
ransomware
416
Insufficient ESXi Logging Configurations
critical10.0
1
Ransomware Prevention Guide
417
Lack of strict removable media controls, insufficient monitoring of privileged users
critical10.0
1
Insider Threat, Data Exfiltration
418
Lack of End-to-End Email Encryption
critical10.0
1
Data Breach
419
Race Conditions in Object Destruction
critical10.0
1
Memory Corruption Vulnerability
420
myCare Integrity EMR system
critical10.0
1
Data Breach
421
Type confusion vulnerabilities in Java Card
critical10.0
1
Vulnerability Exploitation
422
CVE-2025-8876 (Command Injection via Improper Input Sanitization)
critical10.0
1
Vulnerability Exposure
423
Weak Data Integrity Checks
critical10.0
1
Supply Chain Attack
424
GitLab Server Misconfiguration (Red Hat)
critical10.0
1
Data Breach
425
Liquidity Token Contracts
critical10.0
1
Cyberattack
426
CVE-2024-56325
critical10.0
1
Vulnerability Exploit
427
external-facing RDP/VPN misconfigurations
critical10.0
1
ransomware
428
Vulnerability allowing linkage of email addresses and phone numbers to Twitter accounts
critical10.0
1
Data Breach
429
Unsecured GitHub Personal Access Tokens (PATs)
critical10.0
1
Supply-Chain Attack
430
Stolen personal data (Social Security numbers, birthdates, account credentials)
critical10.0
1
Data Breach, Identity Fraud, Account Takeover
431
Insecure Third-Party Integration Controls
critical10.0
1
Data Breach
432
CVE-2025-64328
critical10.0
1
Webshell Deployment
433
Inadequate Redaction
critical10.0
1
Data Breach
434
Stale service accounts
critical10.0
1
Ransomware
435
Social Media Account Compromise
critical10.0
1
Phishing, Social Engineering
436
XAML deserialization
critical10.0
1
Cyber Espionage
437
Inadequate Data Anonymization in AI Features (e.g., Grok AI)
critical10.0
1
Data Breach
438
Exposed VPN concentrators
critical10.0
1
Destructive Cyberattack
439
Cisco AnyConnect software vulnerability
critical10.0
1
Data Breach
440
CVE-2025-0282 (Ivanti Pulse Connect VPN)
critical10.0
1
cyberespionage
441
Improper data classification procedures
critical10.0
1
Data Breach
442
Insufficient Log Retention/Preservation
critical10.0
1
APT (Advanced Persistent Threat)
443
third-party compromises (35.5% of breaches in 2024)
critical10.0
1
ransomware
444
Lack of encryption or authentication in GPS signals
critical10.0
1
GPS spoofing
445
abuse of legitimate code-signing certificates
critical10.0
1
ransomware
446
Lack of Data Review Process / Gross Negligence
critical10.0
1
Data Breach
447
Inadequate penetration testing
critical10.0
1
Data Breach
448
Cloud Security Gaps
critical10.0
1
Cyberattack Surge
449
Hardcoded Credentials in Binaries
critical10.0
1
Supply Chain Attack
450
Trust in .gov/.police Domain Emails (Bypassing Technical Filters)
critical10.0
1
Account Compromise
451
Kernel driver update
critical10.0
1
Software Malfunction
452
Vehicle Tracking Systems (VTS), Immobilizer systems, Security systems
critical10.0
1
Cyber Attack, Satellite Interference, Vehicle Immobilization
453
Absence of Subresource Integrity (SRI) checks
critical10.0
1
Data Breach
454
cloud security misconfigurations
critical10.0
1
cyber espionage
455
CVE-2025-47950
critical10.0
1
Vulnerability
456
Inadequate Sandboxing for AI/ML Environments
critical10.0
1
Supply Chain Attack
457
Insecure Withdrawal Locking Mechanism
critical10.0
1
Data Breach
458
Weak Insider Controls
critical10.0
1
Data Breach
459
over-reliance on vendors
critical10.0
1
data breach
460
Failure to randomize hostnames in VMmanager, KMS-enabled unlicensed operation
critical10.0
1
ransomware
461
Lack of adequate detection and response capabilities for drone threats
critical10.0
1
Physical Security Threat
462
Unauthorized Access by Ex-Employee
critical10.0
1
Data Breach
463
accidental exposure of regional blacklist data
critical10.0
1
data breach
464
Misconfigured or stolen OAuth tokens, insufficient monitoring of API access logs
critical10.0
1
Supply Chain Attack
465
Insufficient Access Management
critical10.0
1
Data Breach
466
outdated cybersecurity protocols
critical10.0
1
cyber attack
467
Alert Fatigue and False Positives
critical10.0
1
EDR/XDR Evasion
468
Insufficient access controls, lack of root account protection
critical10.0
1
Data Destruction
469
Authentication Mechanisms
critical10.0
1
Data Breach
470
Human error (opening infected email attachment)
critical10.0
1
cyber espionage
471
weak RDP credentials
critical10.0
1
ransomware
472
CVE-2025-9491 (Windows Shortcut (LNK) file user interface misinterpretation)
critical10.0
1
Remote Code Execution
473
CVE-2025-7026
critical10.0
1
Firmware Vulnerability
474
Manual Redaction Errors
critical10.0
1
Data Leak
475
Outdated Security Software
critical10.0
1
Awareness Campaign
476
Weak vendor compliance enforcement
critical10.0
1
Ransomware
477
Spring4Shell
critical10.0
1
Vulnerability Exploitation
478
Unknown vulnerability in online platforms
critical10.0
1
Data Breach
479
End-of-support (EoS) devices (ASA 5500-X Series)
critical10.0
1
Zero-day exploitation
480
Internet-exposed databases
critical10.0
1
Ransomware
481
Third-party library bug in Google Chrome
critical10.0
1
Zero-Day Exploit
482
outdated IT infrastructure
critical10.0
1
data breach
483
Outdated encryption, weak cryptographic practices, poor key management
critical10.0
1
Cyber Threat Warning
484
Lack of Centralized Log Management
critical10.0
1
Data Breach
485
CVE-2025-21042 (CVSS 8.8) - Out-of-Bounds Write in libimagecodec.quram.so
critical10.0
1
Espionage
486
Azure Automation Service Vulnerability
critical10.0
1
Vulnerability Exploitation
487
Insecure Remote Work Tools
critical10.0
1
Data Breach (General Discussion)
488
Unauthorized Disclosure of Sensitive Information
critical10.0
1
Security Vulnerabilities
489
CVE-2026-29058 (CWE-78: Improper Neutralization of Special Elements)
critical10.0
1
Remote Code Execution (RCE)
490
Zero-Day Vulnerabilities (1 new CVE every 17 minutes)
critical10.0
1
Ransomware
491
Manque de sauvegardes régulières
critical10.0
1
Cyberattaque ciblée
492
Procedural errors by Special Agent Aaron Spivack; unsecured server in child exploitation forensic lab
critical10.0
1
Data Breach
493
lack of formal AI-use/data privacy policies
critical10.0
1
ransomware
494
unmanaged devices
critical10.0
1
ransomware
495
Unauthorized access to sensitive databases, insecure data handling
critical10.0
1
Data Breach
496
Data integrity
critical10.0
1
Security Concerns
497
Human error (opening malicious email attachment)
critical10.0
1
Phishing Attack
498
Server Crash
critical10.0
1
Vulnerability Exploitation
499
Sinkclose vulnerability
critical10.0
1
Vulnerability Exploitation
500
Maintenance errors
critical10.0
1
Physical Incident
501
Inadequate Incident Response Plans
critical10.0
1
Ransomware
502
Old vulnerabilities
critical10.0
1
Spyware
503
CVE-2024-20353 (Infinite Loop DoS)
critical10.0
1
Cyberattack
504
Inadequate Data Redaction in Spreadsheets
critical10.0
1
Data Breach
505
improper cloud storage configuration
critical10.0
1
ransomware
506
Claude Code Model Safeguard Bypass
critical10.0
1
Espionage
507
Insecure webcam
critical10.0
1
Ransomware
508
CVE-2025-20362
critical10.0
1
Vulnerability Exploitation
509
custom network architectures in CERs
critical10.0
1
supply chain attack
510
Unsupported hardware
critical10.0
1
Cyberattack
511
CVE-2024-45347
critical10.0
1
Authentication Bypass Vulnerability
512
Poorly Secured ICS
critical10.0
1
Cyberattack
513
Absence de formation des employés en cybersécurité
critical10.0
1
Cyberattaque ciblée
514
Custom IoT malware, IOCONTROL
critical10.0
1
Cyberattack
515
Phishing, Malicious Software Deployment
critical10.0
1
Data Breach, Ransomware
516
PCI DSS 4.0.1 compliance gaps in client-side data protection
critical10.0
1
Data Breach
517
Microsoft IIS
critical10.0
1
Supply Chain Attack
518
Over-Permissive Guest/External User Access
critical10.0
1
Social Engineering
519
CVE-2025-61882 (Critical Authentication Bypass in Oracle E-Business Suite)
critical10.0
1
Data Breach
520
Zero-day vulnerabilities (42% weaponized before public disclosure)
critical10.0
1
AI-driven cyber threats
521
CVE-2021-36260 (Hikvision - command injection)
critical10.0
1
Cyber Espionage, Reconnaissance
522
Outdated software in critical sectors (hospitals, governments)
critical10.0
1
Extortion
523
CVE-2025-23320
critical10.0
1
Vulnerability Exploitation
524
Weak Authentication in Third-Party Platforms
critical10.0
1
Data Breach
525
CVE-2025-12556 (Improper input validation in ICM Viewer’s WebSocket communication)
critical10.0
1
Remote Code Execution (RCE)
526
OAuth Application Abuse
critical10.0
1
Data Breach
527
Insecure Default Settings
critical10.0
1
Vulnerability Exploitation
528
Insufficient Backup Protocols
critical10.0
1
Ransomware
529
CVE-2025-47167 (Windows KDC Proxy Service Use-After-Free)
critical10.0
1
Patch Release
530
23 exploits across five attack chains (iOS 13-17.2.1)
critical10.0
1
Espionage
531
Microsoft Entra ID Enterprise Applications (mail.read, full_access_as_app scopes)
critical10.0
1
Espionage
532
Exposed management ports, weak authentication
critical10.0
1
Cyber Attack
533
Compromised IoT devices and routers, primarily Android TVs
critical10.0
1
DDoS
534
systemic weaknesses in data protection
critical10.0
1
data breach
535
PowerShell script abuse
critical10.0
1
spear-phishing
536
Human Trust (Fake CAPTCHA Social Engineering)
critical10.0
1
Social Engineering
537
Poor Access Controls for Sensitive Data
critical10.0
1
Data Breach
538
Improper Handling of Sensitive Material
critical10.0
1
Data Breach
539
Trello
critical10.0
1
Data Leak
540
inadequate data loss prevention controls
critical10.0
1
ransomware
541
SonicWall
critical10.0
1
Supply Chain Attack
542
package registries
critical10.0
1
ransomware
543
Weak governance mechanisms
critical10.0
1
DeFi Exploit
544
External call to 'transfer' function using a fake hash
critical10.0
1
Cryptocurrency Theft
545
Lack of Multi-Factor Authentication (2FA) for OAuth Apps
critical10.0
1
Data Breach
546
Outdated legacy systems
critical10.0
1
Cyberattack
547
CVE-2025-14733 (Out-of-bounds write in iked process)
critical10.0
1
Remote Code Execution (RCE)
548
Microsoft SharePoint zero-day
critical10.0
1
ransomware
549
Weak DNS Security Extensions (DNSSEC) Implementation
critical10.0
1
Domain Hijacking
550
CVE-2025-1727
critical10.0
1
Vulnerability Exploitation
551
Inadequate identity verification processes
critical10.0
1
Espionage
552
CVE in Tridium’s Niagara Framework (13 vulnerabilities, Nozomi Networks)
critical10.0
1
Cybersecurity Vulnerability Exposure
553
Lack of AI Agent Safeguards
critical10.0
1
Espionage
554
Lack of Compliance Oversight
critical10.0
1
Data Breach
555
unsecured_API
critical10.0
1
ransomware
556
Passive Storage Component Treatment (Missing Threat Signals)
critical10.0
1
Data Breach (AI Models/Applications)
557
Lack of Password or Encryption
critical10.0
1
Data Exposure
558
Inadequate security controls in femtocell management system, disabled end-to-end encryption
critical10.0
1
Malware
559
Visual Redaction Without Data Removal
critical10.0
1
Data Leak
560
Encrypted master key printed in plain, unencrypted digital language
critical10.0
1
Data Breach
561
CVE-2025-69258 (LoadLibraryEX vulnerability in MsgReceiver.exe)
critical10.0
1
Remote Code Execution (RCE)
562
CVE-2025-58434 (Unauthenticated Password Reset Token Disclosure in `/api/v1/account/forgot-password`)
critical10.0
1
Vulnerability Exploitation
563
CVE-2025-43200
critical10.0
1
Spyware
564
Student cybersecurity illiteracy
critical10.0
1
Data Breach
565
Schneider Electric safety equipment
critical10.0
1
Cyberattack
566
Progress Software's MOVEit Transfer vulnerability
critical10.0
1
ransomware
567
Compromised Software Development Tools
critical10.0
1
Malware
568
Browser Sandbox Exploitation (Clipboard Access)
critical10.0
1
Social Engineering
569
weaknesses in AIS (Automatic Identification System) authentication
critical10.0
1
AIS spoofing
570
CVE-2025-22226
critical10.0
1
Ransomware
571
Over-Privileged Accounts
critical10.0
1
Data Breach
572
enterprise software vulnerabilities
critical10.0
1
ransomware
573
Ivanti Connect Secure
critical10.0
1
Vulnerability Exploitation
574
unrestricted PowerShell usage
critical10.0
1
ransomware
575
DeFi infrastructure weaknesses (historical)
critical10.0
1
cyber theft
576
CVE-2025-49144
critical10.0
1
Privilege Escalation
577
Protection relays
critical10.0
1
Cyber Sabotage
578
CVE-2019-7192
critical10.0
1
Cyber Intrusion
579
abuse of Velociraptor tool
critical10.0
1
ransomware
580
CVE-2025-21042 (Samsung Android image processing library)
critical10.0
1
spyware
581
CVE-2025-10035 (Critical, CVSS 10.0) - Deserialization in License Servlet of GoAnywhere MFT
critical10.0
1
Vulnerability Exploitation
582
Unauthorized disclosure of SL2000 and SL3000 certificates
critical10.0
1
Data Breach
583
Weaknesses in maritime navigation security protocols
critical10.0
1
GPS spoofing
584
outdated business continuity plans
critical10.0
1
ransomware
585
Misconfigured Cloud Identity and Access Management (IAM)
critical10.0
1
Data Breach
586
Compromised OAuth token for a Heroku machine account
critical10.0
1
Security Breach
587
Stolen credentials from 2023 Salesloft Drift breach, weak credential management, lack of MFA enforcement
critical10.0
1
Data Breach
588
Hardware Vulnerabilities
critical10.0
1
Hardware Vulnerability Exploitation
589
CVE-2026-0542
critical10.0
1
Remote Code Execution (RCE)
590
AIS protocol lack of authentication
critical10.0
1
spoofing
591
Unmonitored Devices
critical10.0
1
Domain Hijacking
592
lack of package verification in CI/CD pipelines
critical10.0
1
supply chain attack
593
CVE-2025-3935
critical10.0
1
Cyberattack
594
CVE-2018-13379
critical10.0
1
Ransomware
595
User Trust in Popular Repositories
critical10.0
1
Malware Distribution and Phishing
596
Known vulnerability in legacy IT infrastructure (unpatched)
critical10.0
1
Ransomware, Data Breach
597
Weak or Compromised RDP Credentials
critical10.0
1
Malware
598
Unpatched IoT/OT Systems
critical10.0
1
EDR/XDR Evasion
599
overlooked vulnerabilities
critical10.0
1
ransomware
600
Previously unknown software flaw (zero-day)
critical10.0
1
Cyber Espionage
601
Insufficient Anomaly Detection
critical10.0
1
Data Breach
602
Client-side file type restrictions without server-side validation
critical10.0
1
Cloud Account Takeover
603
Undocumented WordPress Installation
critical10.0
1
Data Breach
604
human error (accidental download of malware-laced system administration tool)
critical10.0
1
ransomware
605
CVE-2024-40766 (SonicWall SSLVPN improper access control)
critical10.0
1
ransomware
606
DLL sideloading
critical10.0
1
Supply Chain Attack
607
CVE-2025-32713 (Windows Common Log File System Driver EoP)
critical10.0
1
Patch Release
608
Insufficient Employee Training on Vishing
critical10.0
1
Data Breach
609
Exposed Presence/Status Data
critical10.0
1
Social Engineering
610
Public-facing nodes and databases with inadequate security controls
critical10.0
1
Research Study
611
Limited Supply Chain Visibility (beyond first-tier vendors)
critical10.0
1
Ransomware
612
Unencrypted Satellite Backhaul
critical10.0
1
Data Interception
613
Potential Weak Authentication (if credentials were shared)
critical10.0
1
Insider Threat
614
Vulnerability in Cleo's file transfer products
critical10.0
1
Ransomware
615
Improper Access Controls / Platform Misconfiguration
critical10.0
1
Data Exposure
616
User Trust in Browser Prompts (Copy-Paste Commands, Fake Error Messages)
critical10.0
1
Browser-Based Attack
617
Vimar smart home devices
critical10.0
1
DDoS Attack
618
CVE-2025-48057
critical10.0
1
Vulnerability Exploitation
619
Customer misconfigurations (not AWS vulnerabilities)
critical10.0
1
Cyber Espionage, Lateral Movement, Credential Harvesting
620
Weak Helpdesk Authentication
critical10.0
1
Cyber Extortion
621
Dangling DNS records
critical10.0
1
Subdomain Hijacking
622
Adversarial AI Tactics Against Defensive Models (ENISA 2025)
critical10.0
1
Cyber-Physical Attack
623
Public-Key Cryptography (e.g., RSA, ECC)
critical10.0
1
Emerging Threat
624
Improper security configurations in Windows Named Pipe implementation within the Acer Control Center Service (ACCSvc.exe)
critical10.0
1
Vulnerability Exploitation
625
Obsolete Traditional Detection Systems
critical10.0
1
Ransomware
626
Lack of two-factor authentication (2FA), persistent access to Aeroflot’s infrastructure
critical10.0
1
Supply-Chain Attack
627
Avast Anti-Rootkit driver
critical10.0
1
Malware Campaign
628
visibility gaps
critical10.0
1
ransomware
629
Abuse of Legitimate Tools (BITSAdmin)
critical10.0
1
Targeted Attack
630
Manual SOC inefficiencies
critical10.0
1
Data Breach
631
FortiOS (unspecified CVEs)
critical10.0
1
ransomware
632
CVE-2025-37164
critical10.0
1
Botnet Campaign
633
Unpatched Systems (Historical)
critical10.0
1
Data Breach
634
failures in basic cyber hygiene
critical10.0
1
ransomware
635
CVE-2026-21902
critical10.0
1
Vulnerability Exploitation
636
Weak/Reused Passwords (88% of breaches per Verizon DBIR)
critical10.0
1
Data Breach
637
Delegated Administrative Privileges (DAP) in Microsoft cloud solutions
critical10.0
1
cyberespionage
638
Adobe Magento e-commerce platform
critical10.0
1
Magecart Attack
639
CVE-2026-1492
critical10.0
1
Privilege Escalation
640
CVE-2026-27966
critical10.0
1
Zero-Day Vulnerability
641
CVE-2025-29927
critical10.0
1
worm-driven campaign
642
CVE-2024-7014
critical10.0
1
Vulnerability Exploit
643
SQL Injection Vulnerability
critical10.0
1
Data Breach
644
CVE-2025-30247 (OS Command Injection in Firmware UI)
critical10.0
1
Vulnerability
645
API misconfiguration
critical10.0
1
Data Breach
646
UNECE R155 Non-Compliance (Insecure Deployed Software)
critical10.0
1
Cybersecurity Vulnerability Assessment
647
unpatched Windows SMB flaw (WannaCry)
critical10.0
1
ransomware
648
CVE-2026-21509 (RTF parsing flaw)
critical10.0
1
Cyber Espionage
649
CVE-2025-14894
critical10.0
1
Remote Code Execution (RCE)
650
Lack of Advanced DNS Monitoring
critical10.0
1
Domain Hijacking
651
CVE-2025-2171
critical10.0
1
Vulnerability Exploitation
652
React2Shell (CVE-2025-29927)
critical10.0
1
Cloud Exploitation Campaign
653
AI system weaknesses
critical10.0
1
ransomware
654
Zero-Day in Oracle E-Business Suite
critical10.0
1
Data Breach
655
unpatched VPN appliances
critical10.0
1
ransomware
656
Security holes in Verizon's systems
critical10.0
1
Data Breach
657
Outdated Software (e.g., Iranian oil tankers)
critical10.0
1
Ransomware
658
Potential CVE-2023-29357 (SharePoint RCE, linked to summer 2023 exploits)
critical10.0
1
Data Breach
659
weak identity management systems
critical10.0
1
cyberespionage
660
CVE-2026-24061
critical10.0
1
Remote Code Execution (RCE)
661
20 security vulnerabilities identified by Claude LLM
critical10.0
1
Data Breach, Cyber Espionage
662
Untrusted App Sources
critical10.0
1
Awareness Campaign
663
Inadequate safeguards for sensitive data
critical10.0
1
Data Breach
664
Lack of User Awareness for Non-Email Threats
critical10.0
1
Social Engineering
665
weak account/access controls (reactivation of default accounts, new privileged users)
critical10.0
1
ransomware
666
MOVEit Transfer zero-day (Clop gang, 2023)
critical10.0
1
ransomware
667
Physical Infrastructure
critical10.0
1
Sabotage
668
Cross-jurisdictional regulatory gaps
critical10.0
1
Cyber-Physical Threat
669
Weakness in GPS navigation systems (susceptibility to spoofing)
critical10.0
1
GPS spoofing
670
Adreno GPU Driver Vulnerabilities
critical10.0
1
Vulnerability
671
CVE-2026-24512 (Improper handling of `rules.http.paths.path` field in Ingress resources)
critical10.0
1
Code Execution Vulnerability
672
Kernel compromise
critical10.0
1
Espionage
673
Unpatched software, firmware, and operating systems
critical10.0
1
Ransomware
674
Saved Credentials in Browsers/Email Clients
critical10.0
1
Account Compromise
675
Internet-exposed systems
critical10.0
1
Cyber Threat Alert
676
Unknown vulnerabilities in routers and VPN appliances
critical10.0
1
Botnet
677
open ports
critical10.0
1
Ransomware
678
WhatsApp Artifact Exfiltration
critical10.0
1
APT (Advanced Persistent Threat)
679
Excessive agent authority
critical10.0
1
AI-driven breach
680
Unrestricted Access Controls
critical10.0
1
Ransomware
681
Non-password-protected database
critical10.0
1
Data Breach
682
Critical vulnerability in SAP NetWeaver Visual Composer development server
critical10.0
1
Zero-day attack
683
CVE-2025-55241 (Token Validation Failure in Microsoft Entra ID / Azure AD Graph API)
critical10.0
1
Privilege Escalation
684
Trust in fraudulent bank certificates
critical10.0
1
Identity Fraud
685
CVE-2023-38831
critical10.0
1
Cyberespionage
686
Lack of Browser-Specific Security Controls
critical10.0
1
Browser-Based Attack
687
CVE-2025-20362 (Cisco ASA/Firepower - Privilege Escalation)
critical10.0
1
Vulnerability Exploitation
688
Weak Caller Verification Processes
critical10.0
1
Social Engineering
689
Outdated Operating Systems/Applications
critical10.0
1
Malware
690
weak security in satellite communication systems
critical10.0
1
cyberattack
691
CVE-2022-37055
critical10.0
1
Vulnerability Exploitation
692
Unpatched bugs in internet-connected cameras
critical10.0
1
Espionage
693
Flaws in Tesla’s Mothership server
critical10.0
1
Remote Code Execution
694
Known flaws in outdated software
critical10.0
1
Ransomware
695
overlooked software vulnerabilities
critical10.0
1
ransomware
696
Oracle E-Business Suite vulnerability (patched post-incident)
critical10.0
1
Ransomware
697
CVE-2025-2502
critical10.0
1
Outage and Vulnerability
698
CVE-2026-1492 (Privilege Management Flaw in User Registration & Membership Plugin)
critical10.0
1
Privilege Escalation
699
CVE-2025-7742
critical10.0
1
Vulnerability Exploitation
700
Lack of basic security features such as two-factor authentication
critical10.0
1
Data Breach
701
CVE-2017-9805 (Apache Struts)
critical10.0
1
cyberespionage
702
Default password in Unitronics programmable logic controllers (PLCs)
critical10.0
1
Cyberattack
703
Exposed credentials through configuration API calls
critical10.0
1
Vulnerability Exploitation
704
Exposed network devices and vulnerabilities in OT systems
critical10.0
1
Cyberattack on Critical Infrastructure
705
Leaked credentials
critical10.0
1
Cloud Misconfiguration Exploitation
706
CVE-2025-49154
critical10.0
1
Vulnerability Exploitation
707
metadata retention in files
critical10.0
1
data breach
708
Improper access controls in Capital One's cloud-based firewall (AWS S3 bucket misconfiguration)
critical10.0
1
Data Breach
709
CVE-2026-0229
critical10.0
1
Denial-of-Service (DoS)
710
Protection insuffisante des terminaux
critical10.0
1
Cyberattaque ciblée
711
Lack of global standards for D2D services
critical10.0
1
Cyber-Physical Threat
712
authentication_bypass_flaw
critical10.0
1
ransomware
713
Human Vulnerability (Social Engineering via Impersonation)
critical10.0
1
Cyber Attack
714
Software Infrastructure Vulnerability
critical10.0
1
Ransomware Attack
715
Shallow Depth of Baltic Sea (Ease of Anchor Damage)
critical10.0
1
Physical Sabotage
716
Misconfigured WAF
critical10.0
1
Data Breach
717
CVE-2022-41082
critical10.0
1
Ransomware
718
Design Flaw in 'SAVE' Feature
critical10.0
1
Data Leak
719
unsecured GenAI prompts
critical10.0
1
ransomware
720
Zero-Day in Network Appliances (e.g., VMware vCenter, ESXi)
critical10.0
1
Espionage
721
Third-Party Supplier Weakness
critical10.0
1
Ransomware
722
Data Sharing with Third-Party
critical10.0
1
Data Breach
723
Programming Issue
critical10.0
1
Data Exposure
724
GHSA-7xvx-8pf2-pv5g (CVSS 9.1)
critical10.0
1
Sandbox Escape Vulnerability
725
Security gap in MOVEit Transfer
critical10.0
1
Data Breach
726
Lack of Regular Penetration Testing
critical10.0
1
Data Breach
727
insecure credential storage in CI/CD environments
critical10.0
1
supply chain attack
728
Kerberoasting in Active Directory
critical10.0
1
ransomware
729
Operational Security
critical10.0
1
Operational Security Breach
730
Unspecified vulnerability in third-party call center platform (linked to Salesforce customer management instances)
critical10.0
1
Data Breach
731
Poisoned machine-learning models
critical10.0
1
Malware Framework
732
unpatched or misconfigured endpoints
critical10.0
1
ransomware
733
CVE-2024-36904
critical10.0
1
Vulnerability Exploitation
734
improper access controls on cloud storage (public bucket setting)
critical10.0
1
data breach
735
Direct Internet Exposure
critical10.0
1
Cyber-Physical Attack
736
Unauthorized remote access, ATM jackpotting, Point-of-sale data compromise
critical10.0
1
Cyber Attack
737
Known vulnerabilities dating back to 2018
critical10.0
1
Espionage
738
Ivanti Policy Secure
critical10.0
1
Vulnerability Exploitation
739
Delayed Response to Security Alerts
critical10.0
1
Data Breach
740
Exposed Database
critical10.0
1
Ransomware Attack
741
CVE-2022-22948
critical10.0
1
Advanced Persistent Threat (APT)
742
Fortinet FortiGate appliances
critical10.0
1
AI-driven cyberattack tool
743
CVE-2025-42957 (ABAP Code Injection in SAP S/4HANA)
critical10.0
1
Vulnerability Exploitation
744
Invalid cast vulnerability in .NET Framework serialization processes
critical10.0
1
Vulnerability Exploitation
745
lack of multi-factor authentication for downloads
critical10.0
1
ransomware
746
Outdated network infrastructure
critical10.0
1
Data Breach
747
poor segmentation of payment systems
critical10.0
1
ransomware
748
Critical RCE flaw in Apache Tomcat
critical10.0
1
Remote Code Execution (RCE)
749
CVE-2025-0921, CVE-2024-7587
critical10.0
1
Denial-of-Service (DoS)
750
Poor Spam Filtering
critical10.0
1
Ransomware
751
Fragmented Security Posture (On-Premises vs. Cloud Visibility Gaps)
critical10.0
1
Data Breach
752
Limited Budget/Resources
critical10.0
1
Collaborative Initiative
753
CVE-2023-23397
critical10.0
1
Cyberespionage
754
Authentication key theft
critical10.0
1
Data Breach
755
Outdated Industrial Control Systems (ICS)
critical10.0
1
Cyber Espionage
756
Ineffective DMARC Protection
critical10.0
1
Data Breach
757
zero-day vulnerabilities in PDF readers
critical10.0
1
ransomware
758
CVE-2023-48788 (Fortinet EMS SQL injection)
critical10.0
1
Ransomware
759
Lack of IT Oversight
critical10.0
1
Unauthorized AI Deployment
760
Misconfigured cloud infrastructure
critical10.0
1
Cloud Exploitation Campaign
761
Output Messenger
critical10.0
1
Cyberespionage
762
Use-After-Free (UAF)
critical10.0
1
Memory Corruption Vulnerability
763
Misconfigured MongoDB databases (lack of authentication, outdated versions)
critical10.0
1
Ransomware
764
Influence of Radical Literature
critical10.0
1
Domestic Terrorism
765
Improper input validation in Gogs codebase
critical10.0
1
Zero-Day Exploitation
766
CVE-2021-33044 (Dahua - authentication bypass)
critical10.0
1
Cyber Espionage, Reconnaissance
767
GraphQL interfaces
critical10.0
1
Data Breach
768
Insufficient insider threat controls
critical10.0
1
Data Breach
769
Microsoft Exchange server vulnerabilities
critical10.0
1
Ransomware
770
Misconfigured or unmonitored edge devices
critical10.0
1
Ransomware
771
Human Error (Credential Sharing/System Access Granted via Deception)
critical10.0
1
Data Breach
772
Browser-Based Credential Storage (Syncing Across Devices)
critical10.0
1
Phishing (Non-Email)
773
CVE-2025-7544
critical10.0
1
Botnet Campaign
774
Weak private key generation algorithm
critical10.0
1
Cryptocurrency Theft
775
Absence of Memoranda of Agreement (MOAs) with LGUs
critical10.0
1
Data Privacy Violation
776
No AI-Enabled Identity Threat Detection
critical10.0
1
Identity Security Crisis
777
Human-Machine Interfaces (HMIs)
critical10.0
1
Cyber Sabotage
778
Inadequate monitoring for suspicious activity
critical10.0
1
Data Breach
779
Backup Restoration Failures
critical10.0
1
Ransomware
780
Permanent URL Accessibility
critical10.0
1
Data Leak
781
CVE-2026-2256 (Inadequate input sanitization in MS-Agent's 'Shell tool')
critical10.0
1
Remote Code Execution (RCE)
782
Inadequate Contractual Security Provisions
critical10.0
1
Data Breach
783
CVE-2025-25181
critical10.0
1
Security Breach
784
inconsistent security standards across geographies
critical10.0
1
supply chain attack
785
CVE-2025-25012
critical10.0
1
Vulnerability Exploit
786
publicly exposed personal data (e.g., YouTube videos)
critical10.0
1
cyber espionage
787
Over-reliance on single-source supply chain (China)
critical10.0
1
Geopolitical Risk
788
gaps in patching
critical10.0
1
Ransomware
789
Unspecified CVEs identified via Shodan/Censys scans
critical10.0
1
Research Study
790
Weak Detection/Response Capabilities (SMEs)
critical10.0
1
Ransomware
791
Prompt Injection (indirect)
critical10.0
1
Vulnerability Exploitation
792
Microsoft SharePoint Server Vulnerabilities (On-Premises)
critical10.0
1
Data Breach
793
Poor access controls and credential management for third-party code repositories
critical10.0
1
Data Breach
794
CVE-2026-21509 (Microsoft Office OLE flaw)
critical10.0
1
Cyberespionage
795
Human trust exploitation
critical10.0
1
Data Breach
796
Human Error (Support Staff Tricked via Impersonation)
critical10.0
1
Data Breach
797
CVE-2023-4966
critical10.0
1
Vulnerability Exploitation
798
third-party tokens
critical10.0
1
ransomware
799
Weak VPN authentication
critical10.0
1
Data Breach
800
Critical CVSS-rated vulnerabilities in legacy and new ICS devices
critical10.0
1
Exposure of Critical Infrastructure
801
Third-party software (Famly) used by Kido nursery chain
critical10.0
1
ransomware
802
Unsecured Infrastructure Controls
critical10.0
1
Cyber Attack
803
CVE-2024-1182
critical10.0
1
Vulnerabilities in SCADA Systems
804
Lack of Real-Time Monitoring for Undersea Infrastructure
critical10.0
1
Physical Sabotage
805
Kernel-level hooks in EDR products (28+ vendors targeted)
critical10.0
1
Ransomware
806
Lack of Cybersecurity Protocols
critical10.0
1
Cybercrime
807
SynologyPhotos application on BeeStation and DiskStation systems
critical10.0
1
Zero-Click Vulnerability
808
CVE-2021-36380
critical10.0
1
Cyber Attack
809
Poor Credential Hygiene (GitHub Repository)
critical10.0
1
Data Breach
810
Weaknesses and biases in AI models
critical10.0
1
Red-Teaming Event
811
SAP Netweaver (specific details undisclosed)
critical10.0
1
Cyberattack
812
CVE-2025-15576
critical10.0
1
Vulnerability Exploitation
813
End-of-Life (EoL) Hardware with No Security Updates
critical10.0
1
Cyber Espionage
814
third-party cybersecurity dependencies
critical10.0
1
cyberattack
815
Volume Shadow Copy Service
critical10.0
1
Ransomware
816
Cybersecurity Staffing Shortages
critical10.0
1
Collaborative Initiative
817
inadequate endpoint protection (Symantec Endpoint Protection failed to fully remediate backdoor)
critical10.0
1
ransomware
818
Microsoft products (17% of exploitations)
critical10.0
1
Vulnerability Exploitation
819
Inadequate cybersecurity training for non-IT staff
critical10.0
1
Ransomware
820
Critical vulnerabilities, unpatched systems, dark web credentials
critical10.0
1
Supply Chain Attack
821
Persistent IT/OT silos
critical10.0
1
Cyber Espionage
822
lack of AIS authentication mechanisms
critical10.0
1
sabotage
823
Weakness in mobile payment verification system (KT)
critical10.0
1
Data Breach
824
Publicly exposed servers and computers
critical10.0
1
Cyberattack
825
Absence of Multi-Factor Authentication (MFA)
critical10.0
1
Ransomware
826
Confluence Server Zero-Day Vulnerability
critical10.0
1
Zero-Day Exploit
827
Unlimited token allowances
critical10.0
1
Security Breach
828
Weak Endpoint Detection
critical10.0
1
Targeted Cyberattack
829
User Registration & Membership WordPress plugin vulnerability
critical10.0
1
Authentication Bypass
830
User Trust in Fake App
critical10.0
1
Malware Attack
831
DNS infrastructure
critical10.0
1
Cyberattack
832
CVE-2023-28252 (Cisco)
critical10.0
1
ransomware
833
CAN bus vulnerabilities in Tesla Model S
critical10.0
1
Remote Code Execution
834
Vulnerability in data exchange platform
critical10.0
1
Data Breach
835
insufficient user education on phishing/social engineering
critical10.0
1
cyber espionage
836
CVE-2025-47953 (Microsoft Office Heap-Based Buffer Overflow)
critical10.0
1
Patch Release
837
Previously unknown vulnerability in the payment processing system
critical10.0
1
Data Breach
838
Poor OAuth Protections
critical10.0
1
Data Breach
839
Insecure Database Configuration
critical10.0
1
Data Exposure
840
visibility gap in EDR/SIEM logs
critical10.0
1
ransomware
841
Weak Password Hashing (Early Breaches like LinkedIn 2012)
critical10.0
1
Data Breach
842
Lack of Secure Boot/Trust Anchor in ASA 5500-X Series
critical10.0
1
Zero-day exploitation
843
20+ Vulnerabilities
critical10.0
1
AI-Powered Cyberattack
844
Fortinet Fortigate
critical10.0
1
Supply Chain Attack
845
lack of physical security for copper wiring
critical10.0
1
physical security breach
846
Employee Use of Unvetted AI Tools
critical10.0
1
Unauthorized AI Deployment
847
weak supply chain security
critical10.0
1
data breach
848
Software flaw in Tesla's systems
critical10.0
1
Hacking
849
Insecure Backups
critical10.0
1
Compliance Failure
850
Exposed Boot Guard private keys
critical10.0
1
Security Breach
851
CVE-2024-42057
critical10.0
1
Ransomware Attack
852
CVE-2025-44179
critical10.0
1
Vulnerability Exploitation
853
weak encryption key management practices
critical10.0
1
ransomware
854
CVE-2025-68947 (NsecSoft NSecKrnl driver)
critical10.0
1
Ransomware
855
Fortinet security devices
critical10.0
1
Cyberespionage
856
unmanaged systems (for data theft and ransomware deployment)
critical10.0
1
ransomware
857
Minimal/No Authentication
critical10.0
1
Exposure of Vulnerable Systems
858
Misconfigured Security Controls
critical10.0
1
Malware
859
Insufficient Identity Security Policies for AI Agents
critical10.0
1
Identity Security Crisis
860
CVE-2026-20965
critical10.0
1
Unauthorized Access
861
Lack of Business Continuity Plans
critical10.0
1
Ransomware
862
Unpatched Cisco ASA device (last patched in 2024)
critical10.0
1
Cyberwarfare
863
User Trust in App Store and Social Media Ads
critical10.0
1
Data Breach
864
CI/CD pipeline compromise
critical10.0
1
supply chain attack
865
Lack of Rate-Limiting
critical10.0
1
Data Breach
866
Human error (help desk staff tricked into resetting credentials)
critical10.0
1
Cyberattack
867
Expiration of State and Local Cybersecurity Grant Program
critical10.0
1
Policy/Regulatory Failure
868
Over-Permissive API/OAuth Token Access
critical10.0
1
Data Breach
869
Interception and editing of RF signals
critical10.0
1
Vulnerability
870
MOVEit software
critical10.0
1
Data Breach
871
React2Shell (CVE-2025-55182)
critical10.0
1
Remote Code Execution (RCE)
872
Stolen Credentials (Infostealer Malware)
critical10.0
1
Supply Chain Attack
873
CVE-2024-7694
critical10.0
1
Supply Chain Attack
874
third-party ecosystem dependencies
critical10.0
1
ransomware
875
Actively exploited CVEs
critical10.0
1
Ransomware
876
CVE-2024-36401 (Critical RCE in GeoServer)
critical10.0
1
Cyber Espionage
877
Improper Use of Collaboration Tools (WhatsApp, Microsoft Forms)
critical10.0
1
Data Breach
878
insufficient physical security for network devices
critical10.0
1
cyber-espionage
879
MOVEit file transfer software zero-day vulnerability
critical10.0
1
Ransomware
880
Memory Injection (persistent threat mechanism)
critical10.0
1
Vulnerability Exploitation
881
Java Vulnerability
critical10.0
1
Data Breach
882
Oracle software vulnerability (identified in September 2023 by NCSC)
critical10.0
1
Data Breach, Ransomware
883
Blind SQL Vulnerability
critical10.0
1
Data Breach
884
Cached Administrative Credentials in Workstation Memory
critical10.0
1
Data Breach
885
limited financial resources for cybersecurity investments
critical10.0
1
ransomware
886
Unpatched vulnerability in the email system
critical10.0
1
Ransomware
887
Poor Access Controls (Lack of Tiered Admin Account Model)
critical10.0
1
Data Breach
888
Outsourced IT support vendor
critical10.0
1
Social Engineering
889
CVE-2025-69264 (CVSS 8.8)
critical10.0
1
Supply Chain Attack
890
Legacy Authentication Methods (Password-Only Logins)
critical10.0
1
Browser-Based Attack
891
CVE-2024-48248
critical10.0
1
Vulnerability Exploitation
892
Technical know-how gap in solvent extraction
critical10.0
1
Geopolitical Risk
893
Physical accessibility of undersea infrastructure
critical10.0
1
Physical sabotage (cyber-physical attack)
894
Social Engineering / Phishing
critical10.0
1
Spear Phishing
895
Citrix Netscaler ADC/Gateway vulnerabilities
critical10.0
1
Ransomware
896
Cryptographic Protocols
critical10.0
1
Cryptographic Risk
897
Insufficient IT resources
critical10.0
1
Cyberattack
898
Velociraptor CVE-2025-6264 (privilege escalation to arbitrary command execution)
critical10.0
1
Ransomware
899
Spoofable Workflow Notifications
critical10.0
1
Social Engineering
900
Microsoft SharePoint ToolShell vulnerabilities (zero-day, patched post-exploitation)
critical10.0
1
Ransomware
901
Lack of Zero-Trust for Non-Human Identities (AI agents)
critical10.0
1
Predictive Analysis
902
CVE-2019-17571 (Apache Log4j 1.2 deserialization issue)
critical10.0
1
Remote Code Execution (RCE)
903
CVE-2025-10035 (Critical, CVSS 10.0) in Fortra GoAnywhere MFT
critical10.0
1
Vulnerability Exploitation
904
over-reliance on technological defenses
critical10.0
1
phishing
905
Unprotected Fax Server
critical10.0
1
Data Breach
906
Abstract Threat Perception
critical10.0
1
Data Breach
907
Undetected network vulnerability
critical10.0
1
Data Breach
908
Kickidler employee monitoring tool
critical10.0
1
Ransomware
909
Data encryption software vulnerability
critical10.0
1
Data Breach
910
Human Vulnerability (Insider Threat)
critical10.0
1
Insider Threat (Attempted)
911
Known vulnerabilities in DNN platform
critical10.0
1
Data Breach
912
Decentralized App Ecosystem (Shadow IT, Unmanaged SaaS)
critical10.0
1
Browser-Based Attack
913
Stale Identity Tokens
critical10.0
1
Data Breach
914
Insufficient anti-jam technology
critical10.0
1
GPS spoofing
915
Vulnerabilities in Synology Network-Attached Storage (NAS) devices
critical10.0
1
Ransomware
916
CVE-2026-24423 (Missing Authentication for Critical Function - CWE-306)
critical10.0
1
Ransomware
917
Over-permissioning
critical10.0
1
AI-driven breach
918
Ungoverned AI Systems
critical10.0
1
Data Breach
919
Unsecured cloud environment, lack of proper oversight
critical10.0
1
Data Breach
920
Zero-day vulnerability (claimed by Qilin)
critical10.0
1
Ransomware
921
Provider Edge (PE) routers
critical10.0
1
Cyber Espionage
922
Error by a third-party contractor
critical10.0
1
Data Breach
923
CVE-2021-35587
critical10.0
1
Data Breach
924
No Backup Strategy
critical10.0
1
Ransomware
925
Software Bug in MCP Server
critical10.0
1
Data Exposure
926
CNAME DNS record
critical10.0
1
Data Breach
927
CVE-2024-57727 (SimpleHelp remote code execution)
critical10.0
1
ransomware
928
legacy systems in healthcare and critical infrastructure
critical10.0
1
ransomware
929
Undisclosed Zero-Day in Oracle E-Business Suite
critical10.0
1
Data Breach
930
Data blind spots
critical10.0
1
Ransomware Prediction
931
Failure to Implement Security Recommendations
critical10.0
1
Data Breach
932
Lack of OT Asset Management
critical10.0
1
Ransomware
933
AI-Enabled Attacks (industrial scale)
critical10.0
1
Cyberattack
934
Missing Alerts
critical10.0
1
Data Exposure
935
Misconfigured OAuth integrations (historical, via Salesloft's Drift)
critical10.0
1
Extortion
936
CVE-2025-22224
critical10.0
1
Ransomware
937
Absence of Automated Data Loss Prevention (DLP) Tools
critical10.0
1
Data Breach
938
lack of network segmentation (allowed lateral movement)
critical10.0
1
ransomware
939
Over-Reliance on Email-Based Security Controls
critical10.0
1
Social Engineering
940
Remote Control Software Vulnerability
critical10.0
1
Phishing Attack
941
Log4j (CVE-2021-44228)
critical10.0
1
ransomware
942
Human Vulnerability (Phishing/Social Engineering Susceptibility)
critical10.0
1
Account Compromise
943
Unauthorized data transfer to private cloud storage
critical10.0
1
Data Breach
944
Lack of Cybersecurity Preparedness
critical10.0
1
Ransomware Attack
945
Diversité des systèmes OT rendant difficile une protection standardisée
critical10.0
1
Cyberattaque ciblée
946
Lack of proper security policies post-migration due to human error (single employee responsible for manual compilation without second-layer checks)
critical10.0
1
data breach
947
Legacy Firewall Deployments (single point of failure for ecosystems)
critical10.0
1
Predictive Analysis
948
CVE-2026-27685 (Insecure deserialization in SAP NetWeaver Enterprise Portal Administration)
critical10.0
1
Remote Code Execution (RCE)
949
Systemic weaknesses in U.S. federal cybersecurity posture
critical10.0
1
Cyber Espionage
950
Weak Enforcement of ISO SAE 21434 (Pre-Release Security)
critical10.0
1
Cybersecurity Vulnerability Assessment
951
subdomain vulnerabilities
critical10.0
1
data breach
952
Data Sharing with Third-Party AI Services
critical10.0
1
Unauthorized AI Deployment
953
VMware virtual machines
critical10.0
1
Cyberespionage
954
Weak Supplier Security Controls
critical10.0
1
Ransomware
955
EternalBlue
critical10.0
1
Ransomware
956
Accellion File Transfer Appliance (FTA) vulnerabilities
critical10.0
1
Data Breach
957
Insufficient Access Controls (Assumed)
critical10.0
1
Ransomware
958
CVE-2024-20359 (Privilege Escalation: Admin → Root)
critical10.0
1
Cyberattack
959
zero-day vulnerabilities in SaaS provider cloud environments
critical10.0
1
cyberespionage
960
Broad systemic vulnerabilities including reliance on foreign manufacturing for supply chains, dependency on cyber-vulnerable space systems (GPS, satellite communications), and weaknesses in infrastructure resilience against climate events.
critical10.0
1
Ransomware Attack
961
understaffed municipal services
critical10.0
1
physical security breach
962
Legitimate Cybersecurity Testing Impersonation
critical10.0
1
Espionage
963
Third-party Salesforce CRM integration
critical10.0
1
Data Breach
964
AI System Autonomy (unsupervised decision-making)
critical10.0
1
Predictive Analysis
965
misuse of scientific research cover
critical10.0
1
espionage
966
CVE-2026-2329 (Stack-based buffer overflow in /cgi-bin/api.values.Get endpoint)
critical10.0
1
Zero-Day Vulnerability
967
IoT Device Vulnerabilities
critical10.0
1
Cybercrime
968
Budget Constraints
critical10.0
1
Operational Risk
969
inadequate monitoring of employee activity
critical10.0
1
data breach
970
Inadequate backup testing policy
critical10.0
1
Policy Deficiency
971
Lack of multi-factor authentication, Lack of encryption
critical10.0
1
Data Breach, Ransomware
972
Slow Detection Capabilities
critical10.0
1
Data Breach
973
Misconfigured Elasticsearch Cluster
critical10.0
1
Data Breach
974
Social Engineering (Disguised as Legitimate npm Package)
critical10.0
1
Malware Campaign
975
Off-by-one error in encryption process
critical10.0
1
Ransomware
976
Spear-phishing campaigns
critical10.0
1
Data Breach
977
Known vulnerability in data storage systems
critical10.0
1
Ransomware Attack
978
CVE-2025-20393
critical10.0
1
Cyberattack
979
Publicly exposed Ollama AI servers without authentication or monitoring
critical10.0
1
Remote Code Execution (RCE)
980
insufficient cloud-native security controls
critical10.0
1
ransomware
981
critical and zero-day vulnerabilities in internet-facing network equipment
critical10.0
1
ransomware
982
CVE-2020-3580 (Cisco)
critical10.0
1
ransomware
983
lack of real-time cross-verification of vessel identities
critical10.0
1
AIS spoofing
984
Non-public information disclosure
critical10.0
1
Bribery and Fraud
985
CVE-2025-3052
critical10.0
1
Secure Boot Bypass
986
lack of system isolation capabilities
critical10.0
1
cyberattack
987
Lack of contractual compliance and oversight, unauthorized offshore access
critical10.0
1
Data Breach
988
Videoconference Invitation
critical10.0
1
Data Breach
989
CVE-2023-6895 (Hikvision - OS command injection)
critical10.0
1
Cyber Espionage, Reconnaissance
990
OAuth vulnerability
critical10.0
1
Exploit
991
Trust in Professional Networking Platforms
critical10.0
1
Phishing (Non-Email)
992
CVE-2026-0755 (ZDI-26-021, ZDI-CAN-27783)
critical10.0
1
Zero-Day Vulnerability
993
Malicious code injection
critical10.0
1
Data Breach
994
known vulnerabilities
critical10.0
1
ransomware
995
Unpatched Self-Managed GitLab Community Edition
critical10.0
1
Data Breach
996
human error (social engineering via phishing)
critical10.0
1
cyberespionage
997
Lack of Access Controls During Layoffs
critical10.0
1
Data Breach
998
Sandbox escape
critical10.0
1
Espionage
999
LOLDrivers (Living Off The Land Drivers) - 'truesight.sys' from RogueKiller AntiRootkit
critical10.0
1
ransomware
1000
Funding constraints
critical10.0
1
Data Breach
1001
missing security patches
critical10.0
1
data breach
1002
Default/Weak Admin Credentials
critical10.0
1
Data Breach
1003
CVE-2018-0171
critical10.0
1
Vulnerability Exploitation
1004
Unvetted Browser Extensions (Cyberhaven Hack, 35+ Extensions in 2024)
critical10.0
1
Browser-Based Attack
1005
misconfigured AWS S3 bucket permissions
critical10.0
1
ransomware
1006
Arbitrary Code Execution
critical10.0
1
Vulnerability Exploitation
1007
Stack Buffer Overflow
critical10.0
1
Vulnerability Exploitation
1008
Phone data hijacking via malicious vCard
critical10.0
1
Vulnerability Exploitation
1009
Stolen secret code for cookie generation
critical10.0
1
Data Breach
1010
CVE-2025-5777
critical10.0
1
Vulnerability Exploitation
1011
Unencrypted and unprotected data accessible on the network
critical10.0
1
Data Breach, Ransomware
1012
Delayed access revocation for terminated employees
critical10.0
1
Data Breach, Unauthorized Access, Data Deletion
1013
Remote Terminal Units (RTUs)
critical10.0
1
Cyber Sabotage
1014
Inadequate Access Controls for PowerSource Portal
critical10.0
1
Data Breach
1015
CVE-2025-52562
critical10.0
1
Remote Code Execution (RCE)
1016
Oracle E-Business Suite vulnerability
critical10.0
1
Ransomware
1017
Unmonitored ESXCLI Command Usage
critical10.0
1
Ransomware Prevention Guide
1018
200+ vulnerabilities in CISA’s KEV catalog (2024–2025)
critical10.0
1
ransomware
1019
Potential vulnerability in Citrix NetScaler
critical10.0
1
Cyberattack
1020
Human Trust in Browser Update Prompts
critical10.0
1
Malware Infection
1021
Remote desktop gateway vulnerability
critical10.0
1
Ransomware
1022
VMware ESXi infrastructure (Linux ransomware)
critical10.0
1
ransomware
1023
Unintentional Misconfiguration
critical10.0
1
Data Exposure
1024
Cloud Misconfigurations (23% of cloud incidents)
critical10.0
1
Ransomware
1025
Insecure External Storage Device
critical10.0
1
Data Breach
1026
SHA-1
critical10.0
1
Data Breach
1027
Human vulnerability (tricking employees into divulging credentials)
critical10.0
1
Data Breach / Ransomware Attack
1028
Windows minifilter drivers
critical10.0
1
Ransomware
1029
Exposure management adoption
critical10.0
1
Ransomware Prediction
1030
Complacency in High-Turnover Workforces
critical10.0
1
Data Breach
1031
Unpatched VPN Devices
critical10.0
1
Supply Chain Attack
1032
CVE-2026-25108
critical10.0
1
OS Command Injection
1033
CVE-2025-68613
critical10.0
1
Botnet Campaign
1034
CVE-2025-1449
critical10.0
1
Vulnerability Exploit
1035
Known vulnerability in IT infrastructure
critical10.0
1
Data Breach
1036
Unknown vulnerability in the company's network
critical10.0
1
Data Breach
1037
Shared Accounts
critical10.0
1
Data Breach
1038
Insufficient Contractual Safeguards
critical10.0
1
Third-Party Breach
1039
CVE-2025-20333
critical10.0
1
Vulnerability Exploitation
1040
CVE-2026-20127 (CVSS 10.0)
critical10.0
1
Zero-Day Exploitation
1041
Previously unidentified vulnerability
critical10.0
1
Ransomware Attack
1042
Time-Triggered Ethernet (TTEthernet) vulnerabilities
critical10.0
1
Time Synchronization Attack
1043
Loose Sharing Permissions
critical10.0
1
Data Breach Risk
1044
Oracle zero-day vulnerability
critical10.0
1
Ransomware
1045
Alta Payment Portal
critical10.0
1
Data Breach
1046
Insufficient Real-Time Threat Intelligence
critical10.0
1
Domain Hijacking
1047
Neterbit routers
critical10.0
1
DDoS Attack
1048
GPS signal manipulation
critical10.0
1
cyber deception
1049
CVE-2026-25177
critical10.0
1
Privilege Escalation
1050
Lack of adequate security measures for USIM data (SK Telecom)
critical10.0
1
Data Breach
1051
Unsecured Network Servers
critical10.0
1
Cybersecurity Incident
1052
Legacy Authentication Protocols (e.g., SAMLjacking)
critical10.0
1
Phishing (Non-Email)
1053
CVE-2025-2857
critical10.0
1
Zero-day Vulnerability
1054
CVE-2026-27689 (DoS in SAP Supply Chain Management)
critical10.0
1
Remote Code Execution (RCE)
1055
CVE-2026-21643
critical10.0
1
SQL Injection
1056
Lack of Standardized Controls
critical10.0
1
Collaborative Initiative
1057
CVE-2023-3519 (Citrix NetScaler)
critical10.0
1
cyberespionage
1058
publicly available data misrepresented as 'secret' (hallucination exploit)
critical10.0
1
cyberespionage
1059
Unsecured Elasticsearch Server
critical10.0
1
Data Breach
1060
Unpatched Systems (Software/Hardware)
critical10.0
1
Data Breach
1061
Over-reliance on server-side WAFs/IDS for client-side threats
critical10.0
1
Data Breach
1062
Insufficient Workforce Training (phishing/social engineering)
critical10.0
1
Ransomware
1063
Memory Leak
critical10.0
1
Vulnerability Exploitation
1064
lack of MFA on critical systems
critical10.0
1
ransomware
1065
Third-Party Supply Chain Weaknesses
critical10.0
1
Data Breach
1066
CitrixBleed2 (CVE not explicitly mentioned but inferred as Citrix NetScaler vulnerability)
critical10.0
1
data breach
1067
MOVEit file-transfer software zero-day vulnerability
critical10.0
1
Data Breach
1068
Human Weakness
critical10.0
1
Data Breach
1069
human vulnerabilities (vishing, native-language social engineering)
critical10.0
1
ransomware
1070
CVE-2026-25108 (OS command injection)
critical10.0
1
Vulnerability Exploitation
1071
Insecure RDP configurations
critical10.0
1
Ransomware
1072
File transfer software vulnerability
critical10.0
1
Data Breach
1073
CVE-2024-13804
critical10.0
1
Vulnerability Exploit
1074
Static Authentication Methods (vulnerable to deepfakes)
critical10.0
1
Predictive Analysis
1075
CVE-2024-37085 (Cisco)
critical10.0
1
ransomware
1076
Website Software
critical10.0
1
Data Breach
1077
CVE-2015-2291
critical10.0
1
Cyberattack
1078
CVE-2025-34158 (Improper Input Validation)
critical10.0
1
Vulnerability Exposure
1079
SonicWall SSLVPN (Weak MFA/Access Controls)
critical10.0
1
Ransomware
1080
Weaknesses in SolarWinds' Orion platform
critical10.0
1
Supply Chain Attack
1081
unpatched Veeam backup servers
critical10.0
1
ransomware
1082
lack of continuous verification
critical10.0
1
phishing
1083
Misconfiguration of the project’s main smart contract
critical10.0
1
Cryptocurrency Heist
1084
Unidentified network vulnerability
critical10.0
1
Ransomware Attack
1085
Delayed Patch Management
critical10.0
1
Data Breach
1086
Unpatched Software (50% of CVEs in last 5 years)
critical10.0
1
Ransomware
1087
Human Error (Phishing Susceptibility) & Weak Remote Access Controls
critical10.0
1
Data Breach (Phishing & Unauthorized Access)
1088
NVIDIA NeMo Framework Vulnerabilities
critical10.0
1
Vulnerability Exploitation
1089
hijacked_maintainer_account
critical10.0
1
ransomware
1090
Unsecured MSSQL Database
critical10.0
1
Data Breach
1091
Weak Password in Remote-Control System
critical10.0
1
Cyberattack
1092
weak/recycled passwords
critical10.0
1
general cybersecurity awareness
1093
PROMISQROUTE (Prompt-based Router Open-Mode Manipulation Induced via SSRF-like Queries, Reconfiguring Operations Using Trust Evasion)
critical10.0
1
AI System Vulnerability
1094
Authentication keys
critical10.0
1
Cyberattack
1095
Unsecured Database Accessible Without Authentication
critical10.0
1
Data Breach
1096
Web application stack
critical10.0
1
Data Breach
1097
Outdated Android versions
critical10.0
1
Malware
1098
Compromised digital certificate, trusted update infrastructure
critical10.0
1
Supply Chain Attack
1099
Compromised Passwords
critical10.0
1
Data Breach
1100
weak intranet security
critical10.0
1
data breach
1101
Poorly configured firewalls
critical10.0
1
Ransomware
1102
remote access security
critical10.0
1
Ransomware
1103
Improper handling of configuration objects in the `mergeConfig` function (CVE-2026-25639)
critical10.0
1
Denial-of-Service (DoS)
1104
Orion Software Vulnerability
critical10.0
1
Software Exploitation
1105
CVE-2025-49157
critical10.0
1
Vulnerability Exploitation
1106
CVE-2024-37079 (CWE-787 - Out-of-bounds Write)
critical10.0
1
Remote Code Execution (RCE)
1107
CVE-2025-10035 (GoAnywhere MFT, CVSS 10.0)
critical10.0
1
data breach
1108
CVE-2026-21858
critical10.0
1
Vulnerability Exploitation
1109
Unpatched Domain Controllers (Privilege Escalation Flaw, April 2025)
critical10.0
1
Data Breach
1110
Poor Data Management
critical10.0
1
Data Breach
1111
CVE-2021-36942 (PetitPotam - Windows LSA Spoofing)
critical10.0
1
Cyber Espionage
1112
weak_or_reused_passwords
critical10.0
1
ransomware
1113
abuse of elevated privileges post-compromise (e.g., Trend Vision One uninstaller)
critical10.0
1
ransomware
1114
Improper Access Controls (Shared Credentials)
critical10.0
1
Cybersecurity Vulnerability Exposure
1115
Unsecured communication channels (WhatsApp)
critical10.0
1
Data Breach
1116
Reused Apple ID logins
critical10.0
1
Data Breach, Phishing
1117
CVE-2025-8875 (Insecure Deserialization Leading to Command Execution)
critical10.0
1
Vulnerability Exposure
1118
lack of physical safeguards
critical10.0
1
infrastructure vulnerability
1119
Poor IoT device oversight/management
critical10.0
1
Ransomware
1120
Outdated remote access policies
critical10.0
1
Ransomware
1121
Log4Shell vulnerability in an unpatched VMware Horizon server
critical10.0
1
Hacking
1122
weak supply chain links
critical10.0
1
ransomware
1123
PackageGate Vulnerabilities
critical10.0
1
Supply Chain Attack
1124
Unknown vulnerability in Microsoft SharePoint servers
critical10.0
1
Cyber Espionage
1125
CVE-2026-1731 (OS command injection, CWE-78)
critical10.0
1
Zero-Day Vulnerability
1126
CVE-2025-27507
critical10.0
1
Vulnerability Exploitation
1127
Absence of Multifactor Authentication
critical10.0
1
Ransomware
1128
Poor IAM practices
critical10.0
1
Ransomware
1129
Lack of IP Restrictions on Tokens
critical10.0
1
Supply Chain Attack
1130
SQL Injection in Main Application
critical10.0
1
Data Breach
1131
Lack of identity controls
critical10.0
1
AI-driven breach
1132
GPS reliance
critical10.0
1
GPS spoofing (disputed)
1133
Check Point gateway devices
critical10.0
1
Supply Chain Attack
1134
Unmonitored third-party script dependencies
critical10.0
1
Data Breach
1135
Employee downloaded malware from untrusted source
critical10.0
1
Ransomware Attack
1136
Understaffed security operations
critical10.0
1
Data Breach
1137
CVE-2024-21887
critical10.0
1
Ransomware
1138
SaaS supply chain blind spots
critical10.0
1
Ransomware
1139
Zero-day vulnerability in Oracle E-Business Suite (EBS) financial application
critical10.0
1
Data Breach
1140
Dependence on GPS/GNSS signals for navigation; lack of spoofing-resistant safeguards
critical10.0
1
GNSS spoofing
1141
Human Trust in Help-Desk Processes
critical10.0
1
Cyberattack
1142
weak insider threat detection
critical10.0
1
data breach
1143
Unlocked AWS S3 bucket
critical10.0
1
Data Breach
1144
Weak vendor credentials
critical10.0
1
Data Breach
1145
Improper Public Access Configuration
critical10.0
1
Data Exposure
1146
CVE-2025-23334
critical10.0
1
Vulnerability Exploitation
1147
Legacy Protocols (NTLM Enabled for Backward Compatibility)
critical10.0
1
Data Breach
1148
Network
critical10.0
1
Data Breach
1149
Long-standing vulnerabilities in SonicWall firewall systems, unmanaged exceptions, temporary rules, unprotected backups, administrative credentials
critical10.0
1
Ransomware, Data Breach
1150
Lack of monitoring for east-west traffic in cloud environments
critical10.0
1
Ransomware
1151
Lack of Visibility into Privileged Account Usage
critical10.0
1
Data Breach
1152
Dependence on unencrypted GPS signals for navigation and communication
critical10.0
1
GPS jamming
1153
Unsecured Kibana Dashboard
critical10.0
1
Data Leak
1154
Insufficient Physical Security for Fiber-Optic Cables
critical10.0
1
Cyber Espionage
1155
Log4Shell (CVE-2021-44228)
critical10.0
1
Ransomware Attack
1156
Public Internet Exposure
critical10.0
1
Exposure of Vulnerable Systems
1157
Default passwords, Outdated software, Lack of manual updates
critical10.0
1
Data Breach, Voyeurism, Illegal Content Distribution
1158
Unpatched Third-Party Integrations (Salesloft Drift)
critical10.0
1
Data Breach
1159
CWE-22: Path Traversal in Docker build context configuration (smithery.yaml)
critical10.0
1
Supply Chain Attack
1160
CVE-2020-12641
critical10.0
1
Cyberespionage
1161
third-party services and integrations
critical10.0
1
ransomware
1162
AI supply chain threats (e.g., LangFlow RCE)
critical10.0
1
Malware Framework
1163
Driver Vulnerability (eskle.sys for Anti-AV Bypass)
critical10.0
1
Social Engineering
1164
Unauthorized Cloud Storage
critical10.0
1
Data Breach (Alleged)
1165
Weak password policy (single compromised password)
critical10.0
1
Ransomware
1166
Legacy Infrastructure Weaknesses
critical10.0
1
Data Breach
1167
high_risk_assessment_ignored
critical10.0
1
data_at_risk
1168
Poor Vendor/Third-Party Risk Management
critical10.0
1
Ransomware
1169
Poorly Secured OT Systems (e.g., MV Dali electrical blackout)
critical10.0
1
Ransomware
1170
OAuth Token Misuse
critical10.0
1
Supply Chain Attack
1171
Incorrect configuration
critical10.0
1
Data Breach
1172
Progress Software MOVEit Transfer SQL Injection Vulnerability (CVE-2023-34362)
critical10.0
1
Data Breach
1173
AI Model Jailbreak (Disguised Malicious Tasks as Benign)
critical10.0
1
Espionage
1174
Unsecured IoT/Peripheral Devices
critical10.0
1
Ransomware
1175
Improper input sanitization in telnetd authentication mechanism (CWE-20)
critical10.0
1
Authentication Bypass
1176
Incorrect access permissions and configuration settings
critical10.0
1
Data Breach
1177
AI voice cloning limitations
critical10.0
1
social engineering
1178
AnyDesk Remote Access Application
critical10.0
1
Data Exfiltration
1179
Aging hardware
critical10.0
1
Hardware Malfunction
1180
CVE-2025-20333 (Cisco ASA VPN)
critical10.0
1
Ransomware
1181
Publicly accessible management interfaces
critical10.0
1
Cloud Exploitation Campaign
1182
Missing Function-Level Access Control (CWE-639)
critical10.0
1
Unauthorized Access
1183
REST API endpoints
critical10.0
1
Data Breach
1184
CVE-2024-50603
critical10.0
1
Cryptojacking and Backdoor Exploitation
1185
Lack of real-time detection for initial intrusion (May 14 to August 24)
critical10.0
1
Ransomware Attack
1186
Lack of validation check in ReceiverAxelar contract
critical10.0
1
Smart Contract Exploit
1187
Unpatched Web Applications
critical10.0
1
AI-Powered Cyberattack
1188
Unpatched APIs
critical10.0
1
Cyberattack Surge
1189
Insecure systems
critical10.0
1
Ransomware Attack
1190
Windows Defender Disabling
critical10.0
1
Ransomware
1191
Lack of Monitoring for Renamed Binaries
critical10.0
1
APT (Advanced Persistent Threat)
1192
no password protection on critical servers
critical10.0
1
data breach
1193
compromised laptop (physical or logical access)
critical10.0
1
data breach
1194
CVE-2025-10035 (Critical vulnerability in Fortra's GoAnywhere MFT)
critical10.0
1
Ransomware
1195
Weak Subcontractor Security Postures
critical10.0
1
Supply Chain Attack
1196
Lack of Syslog Forwarding to External Systems
critical10.0
1
Ransomware Prevention Guide
1197
Command Execution as Root
critical10.0
1
Vulnerability Exploitation
1198
Open academic networks
critical10.0
1
Data Breach
1199
Over-Reliance on Reactive Detection (EDR/XDR)
critical10.0
1
EDR/XDR Evasion
1200
Publicly Indexed 'Recent Links' Pages
critical10.0
1
Data Leak
1201
Flaw in smart contract calls
critical10.0
1
DeFi Exploit
1202
Veeam Backup & Replication (VBR) servers
critical10.0
1
Ransomware
1203
Lateral Movement from Contractor to MoD Systems
critical10.0
1
Data Breach
1204
public cloud
critical10.0
1
ransomware
1205
Google Play Store Security
critical10.0
1
Malware
1206
unauthorized remote access
critical10.0
1
cyber-physical attack
1207
CVE-2025-20281
critical10.0
1
Remote Code Execution
1208
Website Security
critical10.0
1
Data Breach
1209
CVE-2024-8300
critical10.0
1
Vulnerabilities in SCADA Systems
1210
Windows kernel vulnerabilities
critical10.0
1
Data Exfiltration, Ransomware, Extortion
1211
CVE-2025-47577
critical10.0
1
Software Vulnerability
1212
supply-chain weakness
critical10.0
1
data breach
1213
Unsecured ElasticSearch Database
critical10.0
1
Data Exposure
1214
Faulty access control mechanisms in Balancer's DeFi protocol
critical10.0
1
Cryptocurrency Theft
1215
CVE-2025-53690 (ViewState Deserialization in Sitecore XM/XP/XC/Managed Cloud)
critical10.0
1
Vulnerability Exploitation
1216
Dormant Service Accounts
critical10.0
1
Data Breach
1217
Insecure ICS Protocols (Plaintext Traffic)
critical10.0
1
Exposure of Vulnerable Systems
1218
supply chain trust abuse
critical10.0
1
supply chain attack
1219
Malicious macros in a document titled 'Act.doc'
critical10.0
1
Cyberattack
1220
TerraMaster NAS Vulnerability
critical10.0
1
Vulnerability Exploitation
1221
Lack of Network Segmentation in Targeted Systems
critical10.0
1
Distributed Denial of Service (DDoS)
1222
CVE-2026-24135
critical10.0
1
Remote Code Execution (RCE)
1223
Software Issue
critical10.0
1
Data Breach
1224
CVE-2025-33064 (Windows SMB Improper Access Control)
critical10.0
1
Patch Release
1225
Weak data protections
critical10.0
1
Data Breach
1226
inadequate security of payment systems
critical10.0
1
data breach
1227
Supply-chain vulnerabilities
critical10.0
1
Ransomware
1228
Vulnerability in Ivanti's security products
critical10.0
1
Malware
1229
CVE-2022-29499
critical10.0
1
Ransomware
1230
CVE-2025-27920 (directory traversal in Output Messenger)
critical10.0
1
cyberespionage
1231
Salesforce OAuth Misconfiguration (via Vishing)
critical10.0
1
Data Breach
1232
SQL injection vulnerability in Navy-SWM database
critical10.0
1
data breach
1233
Unpatched vulnerability in appointment system software
critical10.0
1
Data Breach
1234
token-based publishing model
critical10.0
1
supply chain attack
1235
ProxyLogon (Microsoft Exchange)
critical10.0
1
cyberespionage
1236
weak Wi-Fi security
critical10.0
1
cyber-espionage
1237
CVE-2024-56336
critical10.0
1
Vulnerability
1238
Lateral Movement via Salesforce OAuth
critical10.0
1
Supply Chain Attack
1239
insufficient encryption
critical10.0
1
data breach
1240
LLM Susceptibility to Prompt Injection
critical10.0
1
Prompt Injection
1241
Lack of BCC usage in group emails
critical10.0
1
Data Breach
1242
publicly available personal data (e.g., photos, job titles)
critical10.0
1
social engineering
1243
Insecure Protocols (e.g., Telnet)
critical10.0
1
Cyber Espionage
1244
Insecure data storage and handling
critical10.0
1
Data Breach
1245
Known vulnerability in cloud storage services
critical10.0
1
Data Breach
1246
CVE-2019-5786 (Google Chrome FileReader)
critical10.0
1
Memory Corruption Vulnerability
1247
Unspecified SQL Server Vulnerabilities
critical10.0
1
Cyber Espionage
1248
Unsegmented Networks
critical10.0
1
Data Breach
1249
Unsecured Data Storage
critical10.0
1
Data Breach
1250
CVE-2023-20269 (Cisco)
critical10.0
1
ransomware
1251
Unmaintained Software (e.g., FreeImage in Audi Vehicles)
critical10.0
1
Cybersecurity Vulnerability Assessment
1252
Microsoft Office Vulnerabilities
critical10.0
1
Cyber Espionage
1253
Weak Authentication (68% of breaches involve credentials)
critical10.0
1
Ransomware
1254
Lack of anti-jamming protection for GPS systems
critical10.0
1
GPS jamming
1255
Gaps in Endpoint Detection and Response (EDR)
critical10.0
1
Domain Hijacking
1256
CVE-2025-69263 (CVSS 7.5)
critical10.0
1
Supply Chain Attack
1257
Lack of domestic rare earth processing capacity
critical10.0
1
Geopolitical Risk
1258
Third-Party Integration Vulnerabilities (Salesforce-connected apps)
critical10.0
1
Data Breach
1259
Legacy network
critical10.0
1
Data Breach
1260
CVE-2025-6000
critical10.0
1
Vulnerability
1261
budget reductions
critical10.0
1
data breach
1262
CVE-2023-41347
critical10.0
1
botnet
1263
Weak IoT Device Security (e.g., default credentials, unpatched firmware)
critical10.0
1
Distributed Denial of Service (DDoS)
1264
Abandoned Vercel-hosted URL takeover
critical10.0
1
Phishing
1265
Uncontrolled AI Tool Integration
critical10.0
1
Data Breach Risk
1266
Potential lack of redundant navigation systems
critical10.0
1
GPS spoofing (disputed)
1267
CVE-2025-49155
critical10.0
1
Vulnerability Exploitation
1268
CVE-2024-37079
critical10.0
1
Remote Code Execution (RCE)
1269
Improper access controls and lack of technical safeguards
critical10.0
1
Data Breach
1270
Accessibility Services Permission, Device Admin Permission
critical10.0
1
Malware (Ransomware-like)
1271
Unspecified Cisco ASA Vulnerabilities (ArcaneDoor Campaign)
critical10.0
1
Espionage
1272
Poor visibility in cloud/hybrid environments
critical10.0
1
Ransomware
1273
CVE-2021-26828
critical10.0
1
Remote Code Execution (RCE)
1274
Oracle E-Business Suite
critical10.0
1
Ransomware
1275
Lack of modern defenses
critical10.0
1
GPS spoofing
1276
vulnerable computer systems
critical10.0
1
data breach
1277
CVE-2025-7028
critical10.0
1
Firmware Vulnerability
1278
Previously unknown vulnerability in file-sharing system
critical10.0
1
Ransomware Attack
1279
Path traversal (CVE-2025-64712)
critical10.0
1
Remote Code Execution (RCE)
1280
Outdated IT Systems
critical10.0
1
Cybercrime
1281
CVE-2024-38178
critical10.0
1
Cyber Espionage
1282
Improper Pointer Nullification
critical10.0
1
Memory Corruption Vulnerability
1283
Technical vulnerabilities
critical10.0
1
Illegal intrusion
1284
Mismanagement of sensitive data, lack of secure cloud storage
critical10.0
1
Data Breach
1285
unique implementation flaws
critical10.0
1
supply chain attack
1286
Technical Debt in Legacy OT Systems (15-20 year lifecycles)
critical10.0
1
Cyber-Physical Attack
1287
Adobe Flash Vulnerability
critical10.0
1
Vulnerability Exploitation
1288
Static Zero Trust Policies (Lack of Dynamic Guardrails)
critical10.0
1
Data Breach (AI Models/Applications)
1289
Stolen username and password of a UN employee purchased off the dark web
critical10.0
1
Data Breach
1290
Lack of regular security reviews
critical10.0
1
Data Breach
1291
Lack of Real-Time Identity Data Sync
critical10.0
1
Identity Security Crisis
1292
Stolen Passwords
critical10.0
1
Data Breach
1293
GPS signal susceptibility to jamming
critical10.0
1
GPS jamming
1294
Delayed Breach Detection (avg. 276 days per IBM 2025 report)
critical10.0
1
Supply Chain Attack
1295
Lack of Centralized Logging/Monitoring
critical10.0
1
Cyber Espionage
1296
Lack of real-time threat-sharing incentives
critical10.0
1
Policy/Regulatory Failure
1297
ATM Skimming Devices
critical10.0
1
ATM Skimming
1298
MSP software flaws
critical10.0
1
ransomware
1299
MOVEit Software Vulnerabilities
critical10.0
1
Cyber Attack
1300
Zero-day vulnerability in a third-party application (unspecified)
critical10.0
1
Ransomware Attack
1301
Credential leaks (reused passwords)
critical10.0
1
Extortion
1302
Poor detection of abnormal system activity
critical10.0
1
Data Breach
1303
CVE-2025-5309
critical10.0
1
Remote Code Execution
1304
Lack of MFA on FortiGate VPN devices
critical10.0
1
Destructive Cyberattack
1305
Unpatched vulnerability in TP-Link Archer routers
critical10.0
1
Botnet
1306
Remote Code Execution (RCE)
critical10.0
1
Security Vulnerabilities
1307
CVE-2017-17562 (GoAhead RCE)
critical10.0
1
cyberespionage
1308
CVE-2025-64111
critical10.0
1
Remote Code Execution (RCE)
1309
CVE-2026-25611
critical10.0
1
Denial of Service (DoS)
1310
Vulnerabilities present during high-risk phases like satellite deployment, where telemetry, software loadouts, and encryption keys are most exposed.
critical10.0
1
Cyber Espionage
1311
Caching Error
critical10.0
1
Data Breach
1312
Unknown Third-Party Relationships
critical10.0
1
Data Breach
1313
privileged credential abuse
critical10.0
1
ransomware
1314
Poorly secured networks, MFA vulnerabilities
critical10.0
1
Cyberattack, Initial Access Brokerage, Ransomware
1315
Weak or default credentials ('Password123', 'Austal123') purchased on the dark web
critical10.0
1
ransomware
1316
CVE-2021-44228 (Log4j)
critical10.0
1
cyberespionage
1317
IT-OT convergence risks
critical10.0
1
Ransomware
1318
Remote Work Security Blind Spots
critical10.0
1
Cybercrime
1319
Cloud storage platform
critical10.0
1
Data Breach
1320
CVE-2022-41328
critical10.0
1
Advanced Persistent Threat (APT)
1321
Remote access vulnerabilities
critical10.0
1
Ransomware
1322
Exploitation of Android’s Accessibility Service, Google Play Protect bypass techniques
critical10.0
1
Malware (Remote Access Trojan - RAT)
1323
network vulnerabilities (unspecified)
critical10.0
1
ransomware
1324
VIB Acceptance Level Tampering
critical10.0
1
Ransomware Prevention Guide
1325
Windows Safe Mode vulnerabilities
critical10.0
1
Ransomware
1326
CVE-2025-61882 (Critical, CVSS 9.8)
critical10.0
1
Ransomware
1327
Weak or Missing End-to-End Encryption
critical10.0
1
Data Breach
1328
Unsupervised automation
critical10.0
1
AI-driven breach
1329
SonicWall SSL VPN Vulnerability (Credentials in Backup Files)
critical10.0
1
Unauthorized Access
1330
Information Disclosure Vulnerability
critical10.0
1
Information Disclosure
1331
Unhashed Passwords
critical10.0
1
Data Breach
1332
CVE-2025-52665 (Improper Input Validation in Backup API Endpoint)
critical10.0
1
Remote Code Execution (RCE)
1333
CVE-2025-61882 (Oracle E-Business Suite Zero-Day)
critical10.0
1
Data Breach
1334
Compromised third-party vendor credentials
critical10.0
1
Data Breach
1335
Poor Endpoint Security
critical10.0
1
Data Breach (General Discussion)
1336
Compromised Okta SSO account
critical10.0
1
Data Breach
1337
developer mistyped dependency installation
critical10.0
1
supply chain attack
1338
Unmanaged OAuth App Permissions (Salesforce, Other SaaS)
critical10.0
1
Browser-Based Attack
1339
CVE-2025-33053 (WebDAV External Control of File Name or Path)
critical10.0
1
Patch Release
1340
Unpatched ICS/OT Systems
critical10.0
1
Ransomware
1341
CVE-2025-61882 (CVSS 9.8) - Oracle E-Business Suite Concurrent Processing Component
critical10.0
1
Data Breach
1342
Microsoft Hyper-V virtualization
critical10.0
1
Cyber Espionage
1343
Code block display bug (hiding malicious instructions)
critical10.0
1
Vulnerability Exploitation
1344
Inadequate cybersecurity frameworks for space-based infrastructure
critical10.0
1
Cyber-Physical Threat
1345
SolarWinds Orion Software
critical10.0
1
Supply Chain Attack
1346
Zero-Day Vulnerability in Fortra's GoAnywhere MFT
critical10.0
1
Data Breach
1347
CVE-2020-35730
critical10.0
1
Cyberespionage
1348
Open Redirect
critical10.0
1
Redirect Attack
1349
CVE-2025-60021 (Inadequate input validation in Apache bRPC heap profiler endpoint)
critical10.0
1
Remote Command Injection
1350
Unauthorized system access via help desk
critical10.0
1
Ransomware
1351
Insufficient Network Segmentation (implied)
critical10.0
1
Ransomware Attack
1352
Over-Permissioned IAM Roles
critical10.0
1
Predictive Analysis
1353
Impersonation of a colleague
critical10.0
1
Cyberattack
1354
Type Confusion via Memory Reuse
critical10.0
1
Memory Corruption Vulnerability
1355
GPS-based navigation and landing systems
critical10.0
1
cyber attack
1356
Insufficient Input Validation (CWE-20)
critical10.0
1
Unauthorized Access
1357
CVE-2023-46604 (Apache ActiveMQ)
critical10.0
1
Ransomware
1358
CVE-2025-42999
critical10.0
1
vulnerability
1359
Indirect prompt injection
critical10.0
1
Data Privacy and Cybersecurity Advisory
1360
Lack of Data Handling Training
critical10.0
1
Data Breach
1361
Low Digital Literacy in Business Software
critical10.0
1
Ransomware Attack
1362
CVE-2025-26512
critical10.0
1
Privilege Escalation
1363
At least 20 exploited vulnerabilities
critical10.0
1
Data Breach, Cyberattack, AI-Enabled Attack
1364
Unpatched vulnerability disclosed in December 2024
critical10.0
1
Data Breach
1365
Improper Credential Management
critical10.0
1
Supply Chain Attack
1366
Compromised Microsoft 365 Account
critical10.0
1
Data Breach
1367
unrestricted access to GitHub Actions environment variables
critical10.0
1
supply chain attack
1368
On Device Fraud (ODF) techniques
critical10.0
1
Malware
1369
Weak Employee Credentials
critical10.0
1
Cyberattack Surge
1370
Security flaw in Neighbors app
critical10.0
1
Data Breach
1371
Absence of Privacy-Enhancing Technologies (PETs)
critical10.0
1
Data Breach
1372
Endpoint Detection and Response (EDR) and antivirus process termination
critical10.0
1
Malware, Ransomware
1373
Inadequate Email Security Protocols
critical10.0
1
Data Breach
1374
Malicious Word documents
critical10.0
1
Security Breach
1375
Insufficient permission checks
critical10.0
1
DeFi Exploit
1376
Poor Email Security Practices
critical10.0
1
Data Breach
1377
AI Training Data Exposure
critical10.0
1
Cyber Espionage
1378
Digitized supply chains
critical10.0
1
Cyberattack
1379
AI guardrail bypass
critical10.0
1
AI-powered cyberattack
1380
Default or Weak ESXi Authentication Mechanisms
critical10.0
1
Ransomware Prevention Guide
1381
CVE-2026-27944
critical10.0
1
Vulnerability Exploitation
1382
Inadequately tested code in Token Bridge smart contracts, lack of secure coding practices, and absence of automated fraud monitoring
critical10.0
1
Data Breach, Cryptocurrency Theft
1383
Single Point of Failure in Critical Workflows
critical10.0
1
Supply Chain Attack
1384
Misconfigured MongoDB instances lacking authentication, typically listening on port 27017
critical10.0
1
Ransomware
1385
Exposed API endpoints returning call metadata/recordings without authentication
critical10.0
1
Data Breach
1386
CVE-2026-22719 (CWE-77 - Command Injection)
critical10.0
1
Vulnerability Exploitation
1387
API Key Exposure
critical10.0
1
Supply Chain Attack
1388
CVE-2023-22527
critical10.0
1
Cryptomining Campaign
1389
poor cyber defenses in supplier systems
critical10.0
1
supply chain attack
1390
Unpatched Software (e.g., Equifax)
critical10.0
1
Data Breach
1391
AES-CMAC algorithm flaw
critical10.0
1
Vulnerability Exploitation
1392
Reduced CISA staffing (from ~2,500 to <900)
critical10.0
1
Policy/Regulatory Failure
1393
Legitimate account compromise
critical10.0
1
Ransomware
1394
Flaw in SentinelOne's agent upgrade process
critical10.0
1
Ransomware
1395
CVE-2025-34067 (Hikvision - remote code execution)
critical10.0
1
Cyber Espionage, Reconnaissance
1396
EternalBlue (WannaCry, 2017)
critical10.0
1
ransomware
1397
Known vulnerability in database software
critical10.0
1
Data Breach
1398
Azure Data Factory service certificate vulnerability
critical10.0
1
Security Flaw
1399
Identity and Access Control Weaknesses
critical10.0
1
Data Breach
1400
Salesforce Instance Misconfiguration
critical10.0
1
Data Breach
1401
CVE-2025-5086 (Deserialization of Untrusted Data)
critical10.0
1
Vulnerability Exploitation
1402
Insufficient Threat Hunting Capabilities
critical10.0
1
EDR/XDR Evasion
1403
CVE-2025-46811
critical10.0
1
Vulnerability Exploitation
1404
Absence of MFA on Congruity’s virtual machines
critical10.0
1
Ransomware
1405
Lack of security monitoring
critical10.0
1
Cyberattack
1406
Stolen Credentials/API Tokens
critical10.0
1
Data Breach
1407
Abuse of Native Windows Utilities (curl, certutil)
critical10.0
1
APT (Advanced Persistent Threat)
1408
CVE-2025-27821 (Out-of-bounds write in HDFS native client)
critical10.0
1
Vulnerability
1409
SQL Injection vulnerabilities in WordPress-powered website
critical10.0
1
Data Breach
1410
Lack of file type limitations
critical10.0
1
Data Breach
1411
prolonged lapses in security oversight
critical10.0
1
data breach
1412
Human vulnerabilities (compromised adviser accounts)
critical10.0
1
Data Breach
1413
CVE-2026-24423
critical10.0
1
Ransomware
1414
Informant Malfeasance
critical10.0
1
Dissemination of Propaganda and Child Abuse Material
1415
unpatched software (suspected)
critical10.0
1
data breach
1416
public-facing application vulnerabilities
critical10.0
1
ransomware
1417
Exposed long-term IAM user credentials, Lambda function code injection
critical10.0
1
Cloud Breach
1418
CVE-2025-20333 (Cisco ASA/Firepower - RCE)
critical10.0
1
Vulnerability Exploitation
1419
Confluence Server Webwork OGNL injection
critical10.0
1
Vulnerability Exploitation
1420
BootROM keys extraction
critical10.0
1
Data Breach / Unauthorized Access
1421
CVE-2024-12686
critical10.0
1
Breach
1422
Unauthorized access via compromised civil servant credentials
critical10.0
1
Data Breach
1423
unpatched/end-of-life devices
critical10.0
1
unauthorized access
1424
Cultural Gap Between IT/OT Teams
critical10.0
1
Cyber-Physical Attack
1425
Oracle E-Business Suite (EBS) exploit (unspecified)
critical10.0
1
potential data breach
1426
Unpatched Software Vulnerabilities
critical10.0
1
Malware
1427
CVE-2026-0489 (DOM-based XSS in SAP Business One Job Service)
critical10.0
1
Remote Code Execution (RCE)
1428
Google Docs
critical10.0
1
Data Leak
1429
Data susceptible to interception or misuse during cloud processing
critical10.0
1
Privacy Breach
1430
Endpoint Detection Gaps (EDR Limitations)
critical10.0
1
Social Engineering
1431
Mobile device and app security weaknesses
critical10.0
1
Cyber Espionage
1432
CVE-2023-41348
critical10.0
1
botnet
1433
CVE-2026-20079
critical10.0
1
Vulnerability Exploitation
1434
CVE-2025-61882 (Oracle E-Business Suite - Unauthenticated RCE)
critical10.0
1
Data Breach
1435
Stored Credentials in Veeam Backup Infrastructure
critical10.0
1
Social Engineering
1436
CVE-2025-53770 (ToolShell SharePoint Flaw)
critical10.0
1
Cyber Espionage
1437
Outdated Junos OS routers
critical10.0
1
Espionage
1438
Weak supply chain controls for hardware distribution
critical10.0
1
Espionage
1439
Tool disparities
critical10.0
1
Ransomware Prediction
1440
Hidden registration form, JSESSIONID manipulation, and lack of server-side token validation
critical10.0
1
Privilege Escalation, Remote Code Execution
1441
Unmanaged machine identities
critical10.0
1
Ransomware
1442
CVE-2025-64175
critical10.0
1
Remote Code Execution (RCE)
1443
inadequate third-party access controls
critical10.0
1
data breach
1444
Outdated accounting infrastructure
critical10.0
1
Ransomware
1445
Internal System Compromise (mechanism unspecified)
critical10.0
1
Data Breach
1446
Unprotected 'Recent Links' feature with predictable URL format, enabling unauthorized data scraping via crawlers
critical10.0
1
Data Exposure
1447
CVE-2021-39935 (CWE-918)
critical10.0
1
Server-Side Request Forgery (SSRF)
1448
Follina
critical10.0
1
Zero-Day Vulnerability
1449
Default Teams App Permissions
critical10.0
1
Social Engineering
1450
Poor Data Residency Enforcement
critical10.0
1
Data Breach Risk
1451
NtQuerySystemInformation abuse (SystemCodeFlowTransition parameter)
critical10.0
1
Supply Chain Attack
1452
Over-Permissive API Access
critical10.0
1
Supply Chain Attack
1453
CVE-2025-1316
critical10.0
1
Vulnerability Exploitation
1454
Oracle Cloud Infrastructure Flaw (from March 2025 breach)
critical10.0
1
Data Breach
1455
Compromised Mailing List
critical10.0
1
Phishing
1456
CVE-2026-27684 (SQL injection in SAP NetWeaver Feedback Notification)
critical10.0
1
Remote Code Execution (RCE)
1457
CVE-2026-28289 (bypass of CVE-2026-27636)
critical10.0
1
Remote Code Execution (RCE)
1458
Social Engineering, Excessive Permissions
critical10.0
1
Data Breach, Extortion, Harassment
1459
Lack of browser-layer visibility
critical10.0
1
Session Hijacking
1460
Insufficient Code Review for Open-Source Dependencies
critical10.0
1
Supply Chain Attack
1461
Lack of 'Two Pairs of Eyes' Review (Pre-November 2021)
critical10.0
1
Data Breach
1462
Previously unknown vulnerability in file transfer software
critical10.0
1
Data Breach
1463
CVE-2025-23319
critical10.0
1
Vulnerability Exploitation
1464
Unpatched vulnerabilities in internet-facing applications
critical10.0
1
Data Breach
1465
Lack of Out-of-Band Authentication
critical10.0
1
Social Engineering
1466
Unaddressed software vulnerabilities in CM/ECF system (identified in 2019 after a prior 2020 breach)
critical10.0
1
Data Breach
1467
Insider access to classified systems, Lack of real-time monitoring for data exfiltration
critical10.0
1
Insider Threat, Espionage
1468
Misconfigurations in operational technology (OT) systems
critical10.0
1
Exposure of Critical Infrastructure
1469
Abuse of legitimate software (BitDefender, VLC Media Player, Sangfor)
critical10.0
1
Cyber Espionage
1470
lack of actionable alerting
critical10.0
1
ransomware
1471
Previously unknown RCE vulnerability in Max Messenger’s media processing engine, existing since the beta phase in early 2025
critical10.0
1
Data Breach
1472
Cyber-Illiterate Student Population
critical10.0
1
Data Breach
1473
Kaseya VSA platform
critical10.0
1
Ransomware Attack
1474
Unguarded Museum
critical10.0
1
Theft
1475
Technical error (premature website publication)
critical10.0
1
Data Leak / Unauthorized Disclosure
1476
CVE-2025-68615 (Buffer Overflow in snmptrapd)
critical10.0
1
Vulnerability Exploitation
1477
Weak Authentication (e.g., VPN Passwords)
critical10.0
1
Cyber Espionage
1478
Undisclosed BIG-IP Vulnerabilities (under investigation)
critical10.0
1
Supply Chain Attack
1479
npm supply chain compromise (Nx platform)
critical10.0
1
Supply Chain Attack
1480
Blind Spots in Monitoring
critical10.0
1
Ransomware
1481
Outdated Factory Digital Systems
critical10.0
1
Cyberattack Surge
1482
Systemic weaknesses in government cybersecurity
critical10.0
1
Unauthorized Access
1483
Unsecured BIM/cloud platforms
critical10.0
1
Ransomware
1484
Delayed Incident Notification
critical10.0
1
Cybersecurity Incident
1485
CVE-2024-43468
critical10.0
1
SQL Injection
1486
Microsoft Outlook vulnerability
critical10.0
1
Data Breach
1487
Malicious form injection
critical10.0
1
Data Breach
1488
Legitimate Administrative Tools (ScreenConnect, AnyDesk, RMM Platforms)
critical10.0
1
Social Engineering
1489
legacy software vulnerabilities
critical10.0
1
cyber espionage
1490
Unpatched Teams Clients
critical10.0
1
Social Engineering
1491
Fragmented security standards across subcontractors
critical10.0
1
Ransomware
1492
Weak Access Controls (e.g., AWS Misconfigurations)
critical10.0
1
Unauthorized AI Deployment
1493
Human Trust, Lack of Investment Verification
critical10.0
1
Investment Scam, Money Laundering, Cryptocurrency Fraud
1494
Outsourced Business Process Provider Vulnerabilities
critical10.0
1
Data Breach
1495
SSO Misconfigurations (e.g., Microsoft Entra, Google Workspace, Okta)
critical10.0
1
Phishing (Non-Email)
1496
Open Academic Networks in Universities
critical10.0
1
Data Breach
1497
Supply Chain Weakness
critical10.0
1
Supply Chain Attack
1498
Tool sprawl and visibility gaps
critical10.0
1
Data Breach
1499
CVE-2017-0199
critical10.0
1
cyber espionage
1500
Limited staffing
critical10.0
1
Cyberattack
1501
Lack of physical security for sensitive data display
critical10.0
1
Data Breach
1502
CVE-2025-55125
critical10.0
1
Vulnerability Exploitation
1503
lack of threat detection tuning
critical10.0
1
ransomware
1504
Public-facing file-sharing folder
critical10.0
1
Ransomware
1505
Email Spoofing, Unsecured Computer System
critical10.0
1
Hacking
1506
SharePoint Permissions Issue
critical10.0
1
Data Breach
1507
Web server vulnerability
critical10.0
1
Data Breach
1508
Security gaps in industrial networks
critical10.0
1
Cyber Espionage
1509
Geopolitical Tensions (NATO Expansion, Ukraine War)
critical10.0
1
Physical Sabotage
1510
Unspecified Salesforce vulnerability (likely API or authentication flaw)
critical10.0
1
Data Breach
1511
Architectural weakness in LLM input processing and trust boundaries
critical10.0
1
Zero-Click Remote Code Execution (RCE)
1512
CVE-2024-57968
critical10.0
1
Security Breach
1513
Unmanaged BYOD Devices
critical10.0
1
Social Engineering
1514
Lack of Multi-Factor Authentication (MFA) for high-value targets
critical10.0
1
Cyber Theft
1515
Accellion sharing software
critical10.0
1
Ransomware
1516
CVE-2024-40766 (SonicWall)
critical10.0
1
ransomware
1517
Misconfigured OIDC trust relationships
critical10.0
1
Supply-Chain Attack
1518
unmonitored vendor access to sensitive data
critical10.0
1
supply chain attack
1519
User Data Misuse
critical10.0
1
Data Breach
1520
zero-day vulnerability in Oracle EBusiness Suite
critical10.0
1
data breach
1521
Interconnexion non sécurisée entre IT et OT
critical10.0
1
Cyberattaque ciblée
1522
CVE-2026-21962
critical10.0
1
Vulnerability Exploitation
1523
identity governance gaps
critical10.0
1
ransomware
1524
Government mismanagement, lack of security protocols
critical10.0
1
Data Breach
1525
delayed maintenance response
critical10.0
1
physical security breach
1526
CVE-2025-61882 (Oracle E-Business Suite BI Publisher Integration Component)
critical10.0
1
Data Theft
1527
Inadequate privileged access management
critical10.0
1
Ransomware
1528
Legitimate Windows driver *truesight.sys* (Adlice Software’s RogueKiller) with IOCTL command abuse
critical10.0
1
ransomware
1529
underwater sensor network vulnerabilities
critical10.0
1
espionage
1530
Legacy System Risks
critical10.0
1
Data Breach
1531
Windows OS vulnerability (unspecified programming bug)
critical10.0
1
malware
1532
Weak Password Security (hypothetical, based on context)
critical10.0
1
Ransomware Attack
1533
OAuth Token Misconfiguration
critical10.0
1
Data Breach
1534
CVE-2025-40551 (CWE-502: Unsafe Deserialization)
critical10.0
1
Remote Code Execution (RCE)
1535
CVE-2024-0132, Docker DoS flaw on Linux
critical10.0
1
Vulnerability Exploitation, DoS Attack
1536
Infected Barcode Scanners
critical10.0
1
Data Breach
1537
Insufficient Vetting of Remote IT Workers
critical10.0
1
Cyber Theft
1538
Human Vulnerability (Bribery/Extortion)
critical10.0
1
Insider Threat
1539
disabled antivirus processes
critical10.0
1
ransomware
1540
Vulnerability in the virtual private network
critical10.0
1
Ransomware
1541
aging IT systems
critical10.0
1
data breach
1542
Improper GitHub Access Controls
critical10.0
1
Supply Chain Attack
1543
Inadequate validation of `gatewayUrl` parameter in ClawDBot Control UI (GHSA-g8p2-7wf7-98mq)
critical10.0
1
Authentication Bypass, Remote Code Execution (RCE)
1544
Insufficient regex anchoring in AWS CodeBuild webhook filters
critical10.0
1
Supply Chain Attack
1545
Unauthenticated SQL injection in Lilli’s API, publicly exposed endpoints
critical10.0
1
AI-driven cyberattack
1546
Limited incident response capabilities in SMEs
critical10.0
1
Extortion
1547
Unmonitored AI Data Flows
critical10.0
1
Data Breach
1548
CVE-2024-3721
critical10.0
1
Malware
1549
CrushFTP servers
critical10.0
1
Supply Chain Attack
1550
Citrix NetScaler Gateway Appliance (unspecified CVE)
critical10.0
1
Cyber Espionage
1551
CVE-2025-59469
critical10.0
1
Vulnerability Exploitation
1552
Exposed Credentials in Repositories
critical10.0
1
Data Breach
1553
Zero-day vulnerability in Oracle E-Business Suite
critical10.0
1
Ransomware
1554
weaknesses in AIS protocol
critical10.0
1
spoofing
1555
CVE-2025-3835
critical10.0
1
Remote Code Execution (RCE)
1556
CVE-2026-3497 (OpenSSH GSSAPI Key Exchange)
critical10.0
1
Vulnerability Exploitation
1557
Lack of Third-Party Supplier Accountability
critical10.0
1
Cybersecurity Vulnerability Assessment
1558
Lack of cybersecurity investment
critical10.0
1
Cyberattack
1559
NPM package integrity weakness
critical10.0
1
supply chain attack
1560
CVE-2026-1490 (Authorization Bypass via Reverse DNS Spoofing)
critical10.0
1
Vulnerability Exploitation
1561
React2Shell (CVE not specified)
critical10.0
1
Vulnerability Exploitation
1562
CitrixBleed2 (CVE unknown, related to Citrix Netscaler)
critical10.0
1
ransomware
1563
Service Accounts with Non-Expiring Passwords & Excessive Permissions
critical10.0
1
Data Breach
1564
CVE-2025-10725 (CVSS 9.9)
critical10.0
1
Privilege Escalation / Vulnerability Exploitation
1565
Vulnerable signed drivers (exploited via BYOVD)
critical10.0
1
Ransomware
1566
Funding Pressures in State Schools
critical10.0
1
Data Breach
1567
RenderShock 0-Click Vulnerability
critical10.0
1
Zero-Click Attack
1568
Novel method
critical10.0
1
Ransomware
1569
CVE-2025-20363 (Cisco ASA VPN)
critical10.0
1
Ransomware
1570
Inadequate Cybersecurity Defenses
critical10.0
1
Data Breach
1571
Improper input validation in USER environment variable handling
critical10.0
1
Authentication Bypass
1572
Broken Authentication (CWE-287)
critical10.0
1
Unauthorized Access
1573
Weak administrator access controls
critical10.0
1
Data Breach
1574
Weak perimeter defenses, inadequate network segmentation
critical10.0
1
Ransomware
1575
Previously undetected vulnerability
critical10.0
1
Ransomware Attack
1576
Unsecured internet-facing devices (used by China-affiliated actors)
critical10.0
1
Extortion
1577
Lax network security
critical10.0
1
Data Breach
1578
identity and access weaknesses
critical10.0
1
ransomware
1579
Infection via official website
critical10.0
1
Ransomware
1580
Unsalted MD5
critical10.0
1
Data Breach
1581
CVE-2025-27520
critical10.0
1
Vulnerability Exploitation
1582
Potential Weak MFA Implementation (2FA Prompt Bombing)
critical10.0
1
Insider Threat (Attempted)
1583
File transfer tool vulnerability
critical10.0
1
Ransomware
1584
Unpatched or zero-day flaws in technology platforms
critical10.0
1
Ransomware
1585
Authenticated Reflected XSS
critical10.0
1
Vulnerability Exploitation
1586
Unsecured Self-Service Password Reset
critical10.0
1
Cyber Espionage
1587
Network infiltration
critical10.0
1
Security Concerns
1588
Previously unknown software vulnerability in network infrastructure
critical10.0
1
Data Breach
1589
Inadequate Data Redaction Procedures
critical10.0
1
Data Breach
1590
Weakness in `url_safe` feature (Bing.com tracking link evasion)
critical10.0
1
Vulnerability Exploitation
1591
CVE-2024-20399
critical10.0
1
Advanced Persistent Threat (APT)
1592
Privacy Regulation Non-Compliance
critical10.0
1
Ransomware
1593
Progress MOVEit transfer systems
critical10.0
1
Data Breach
1594
Overcollection of Personal Data
critical10.0
1
Data Privacy Violation
1595
Security flaw in SonicWall’s systems
critical10.0
1
Ransomware
1596
Vulnerability in the online payment system
critical10.0
1
Data Breach
1597
Insufficient data access controls
critical10.0
1
Data Exfiltration
1598
insufficient AI governance
critical10.0
1
ransomware
1599
Compromised Apple ID logins and LinkedIn data
critical10.0
1
Data Breach
1600
CVE-2025-49156
critical10.0
1
Vulnerability Exploitation
1601
CVE-2025-22225
critical10.0
1
Ransomware
1602
Stolen Private Key
critical10.0
1
Cryptocurrency Theft
1603
excessive email/mailbox permissions (shared read access)
critical10.0
1
cyberespionage
1604
Process Drift in Third-Party Service Desk
critical10.0
1
Social Engineering
1605
Zero-day vulnerabilities in cloud infrastructure/SaaS platforms
critical10.0
1
Cybercriminal Alliance Formation
1606
Improper authorization/callback handling in V2 vaults
critical10.0
1
Exploit
1607
Valid Login Information
critical10.0
1
Data Breach
1608
Disabled Logging
critical10.0
1
Data Exposure
1609
Legitimate Tools Abuse (Bitsadmin, PowerShell, curl)
critical10.0
1
Targeted Cyberattack
1610
CVE-2024-XXXX
critical10.0
1
Vulnerability Exploitation
1611
Unknown vulnerability in file transfer software
critical10.0
1
Ransomware
1612
Lack of Endpoint Detection and Response (EDR) in Some Systems
critical10.0
1
Malware Infection
1613
Lack of In-House Cybersecurity Expertise (17% of shipyards)
critical10.0
1
Ransomware
1614
Lack of Zero-Trust Architecture
critical10.0
1
Cyber Espionage
1615
Disguised Malicious Commands as Benign Requests
critical10.0
1
Espionage
1616
Gaps in anomaly detection for behavioral baselines
critical10.0
1
Ransomware
1617
Improper input sanitization in GNU InetUtils telnetd (USER environment variable handling)
critical10.0
1
Authentication Bypass
1618
CVE-2023-34048
critical10.0
1
Advanced Persistent Threat (APT)
1619
AI Browser Design Flaw (Fragment Inclusion in Context)
critical10.0
1
Prompt Injection
1620
Shor's Algorithm (theoretical)
critical10.0
1
Emerging Threat
1621
undersea cable physical exposure
critical10.0
1
sabotage
1622
Citrix device vulnerabilities (specific CVE not disclosed)
critical10.0
1
Cyberattack
1623
OS auto-enumeration of mice on Windows 11 and macOS Sonoma, lack of HID trust models
critical10.0
1
Hardware-based Attack
1624
CV_2025_03_1
critical10.0
1
Vulnerability Exploitation
1625
CVE-2025-7027
critical10.0
1
Firmware Vulnerability
1626
Fortinet software
critical10.0
1
Cyber Attack
1627
Log4Shell vulnerability
critical10.0
1
Cyber Attack
1628
Third-Party Customer Service Provider (Discord)
critical10.0
1
Data Breach
1629
Lack of Content Security Policy (CSP) enforcement
critical10.0
1
Data Breach
1630
AI integrations with applications (e.g., Google Calendar, Zoom)
critical10.0
1
AI Exploitation
1631
blind spots in network visibility
critical10.0
1
ransomware
1632
Accidental transmission of private key information
critical10.0
1
Data Breach
1633
Lack of Email Filtering
critical10.0
1
Targeted Cyberattack
1634
Partial Logging of Data Access
critical10.0
1
Insider Threat
1635
CVE-2026-22844 (Command Injection)
critical10.0
1
Vulnerability Exploitation
1636
Data Scraping Vulnerability
critical10.0
1
Data Breach
1637
poor network segmentation (IT/OT convergence)
critical10.0
1
ransomware
1638
insufficient incident response plans
critical10.0
1
phishing
1639
Palo Alto PAN-OS
critical10.0
1
Ransomware
1640
CVE-2023-MoveIt (Critical File Transfer Vulnerability)
critical10.0
1
Ransomware
1641
Unauthorized access to security credentials
critical10.0
1
Financial Fraud, Insider Threat
1642
maritime domain awareness gaps
critical10.0
1
espionage
1643
Authenticated Local File Inclusion
critical10.0
1
Vulnerability Exploitation
1644
Backdoor in M.E.Doc software updates (Intellect Service)
critical10.0
1
Cyber Attack
1645
Compliance Blind Spots in Cross-Border AI Data Flows
critical10.0
1
Data Breach (AI Models/Applications)
1646
WordPress vulnerabilities
critical10.0
1
Botnet
1647
CVE-2024-1709 (ScreenConnect)
critical10.0
1
Ransomware
1648
Mobile carrier verification processes, SMS-based authentication
critical10.0
1
SIM Swap Attack
1649
Remote Disabling Capability
critical10.0
1
Repurposing of Commercial Technology for Military Use
1650
Security Incident During Server Setup
critical10.0
1
Ransomware
1651
Remote code execution vulnerability in SharePoint’s authentication mechanism
critical10.0
1
Cyberattack
1652
CVE-2025-59689 (Command injection in Libraesva ESG)
critical10.0
1
Zero-day exploitation
1653
outdated property assessment funding
critical10.0
1
physical security breach
1654
lack of asset visibility
critical10.0
1
unauthorized access
1655
AI Chatbot Feature
critical10.0
1
Copyright Infringement
1656
Excessive Privileges (God-level access)
critical10.0
1
Data Breach
1657
interconnected manufacturing systems
critical10.0
1
cyberattack
1658
CVE-2024-12856
critical10.0
1
DDoS
1659
Security protocol bypass, weak access controls, anti-virus circumvention, secret key exposure in source code
critical10.0
1
Insider Threat / AI Exploitation
1660
NPM package dependency trust model
critical10.0
1
supply chain attack
1661
CVE-2025-47171 (Windows Netlogon Use of Uninitialized Resources)
critical10.0
1
Patch Release
1662
Jira
critical10.0
1
Data Leak
1663
MFA bypass techniques
critical10.0
1
phishing
1664
Vulnerabilities in decentralized energy infrastructure and OT/ICS systems
critical10.0
1
Cyberattack on Critical Infrastructure
1665
Unburied or Lightly Buried Cables in Steep Terrain
critical10.0
1
Physical Sabotage
1666
Generative AI applications
critical10.0
1
ransomware
1667
QR Code Vulnerability
critical10.0
1
Espionage
1668
weak SCADA system security
critical10.0
1
cyber-physical attack
1669
Oracle zero-day (Clop gang)
critical10.0
1
ransomware
1670
Mismanagement of data storage
critical10.0
1
Data Breach
1671
dependency trust model
critical10.0
1
supply chain attack
1672
Malicious PowerPoint Add-Ins
critical10.0
1
Cyber Espionage
1673
Weak Authentication (compromised social media accounts)
critical10.0
1
Cyber Theft
1674
default LDAP group configurations
critical10.0
1
ransomware
1675
reliance on IT generalists without specialized security training
critical10.0
1
ransomware
1676
Hidden malicious proxy in AI agents
critical10.0
1
Vulnerability Exploit
1677
CVE-2025-64155 (CWE-78: Improper Neutralization of Special Elements used in an OS Command)
critical10.0
1
Vulnerability Exploitation
1678
Ghost Logins (Unmonitored Active Sessions)
critical10.0
1
Phishing (Non-Email)
1679
Unknown network vulnerability
critical10.0
1
Ransomware Attack
1680
Password reminder bug
critical10.0
1
Account Takeover
1681
CVE-2025-27915 (Stored XSS in Zimbra Classic Web Client via ICS files)
critical10.0
1
Cyber Espionage
1682
Malfunction at AWS data center (likely a configuration error)
critical10.0
1
Service Disruption
1683
Absence of Visibility/Monitoring for Non-Email Channels
critical10.0
1
Phishing (Non-Email)
1684
Shared Responsibility Model Gaps in Cloud Security
critical10.0
1
Predictive Analysis
1685
Open Amazon S3 bucket
critical10.0
1
Data Breach
1686
Lack of Access Controls for Sensitive Data Aggregation
critical10.0
1
Data Breach
1687
Precision rounding error in swap calculations
critical10.0
1
Exploit
1688
Vulnerabilities in the email system
critical10.0
1
Data Breach
1689
Legacy Infrastructure
critical10.0
1
AI-Powered Cyberattack
1690
CVE-2024-54085
critical10.0
1
Vulnerability Exploitation
1691
Outdated Cryptographic Protocols
critical10.0
1
Data Breach
1692
Unpatched Software in Data Centers
critical10.0
1
Cyber Espionage
1693
CVE-2024-12297 (Frontend Authorization Logic Disclosure)
critical10.0
1
Authentication Bypass
1694
Supply Chain Weaknesses
critical10.0
1
Domain Hijacking
1695
Zero-day vulnerability in GoAnywhere MFT (Managed File Transfer) software
critical10.0
1
Data Breach
1696
CVE-2025-64446
critical10.0
1
Ransomware
1697
Unspecified Adobe ColdFusion Vulnerabilities
critical10.0
1
Cyber Espionage
1698
Trust in technical support specialists
critical10.0
1
Data Breach
1699
CVE-2025-49158
critical10.0
1
Vulnerability Exploitation
1700
Email reply-chain exploitation
critical10.0
1
Phishing
1701
Bun runtime environment detection
critical10.0
1
supply chain attack
1702
Misconfigured AWS Bucket
critical10.0
1
Data Exposure
1703
Lack of Code Integrity Checks
critical10.0
1
Supply Chain Attack
1704
Political Distractions
critical10.0
1
Operational Risk
1705
Excessive Privileges in Connected Applications
critical10.0
1
Data Breach
1706
urgency/authority manipulation
critical10.0
1
social engineering
1707
Cleo file sharing tool
critical10.0
1
Data Breach
1708
Embedded credentials/API keys in source code
critical10.0
1
Supply Chain Compromise
1709
CVE-2025-20333 (Authentication bypass in Cisco ASA Software)
critical10.0
1
Zero-day exploitation
1710
Unsecured RDP access, absence of MFA
critical10.0
1
Ransomware
1711
potential prior SharePoint vulnerabilities (historical context for Storm-2603)
critical10.0
1
ransomware
1712
Understaffed Security Operations Center (SOC)
critical10.0
1
Data Breach
1713
CVE-2026-24747
critical10.0
1
Vulnerability Exploitation
1714
Opportunistic targeting
critical10.0
1
Data Breach
1715
weak backup protection (backups were deleted by attacker)
critical10.0
1
ransomware
1716
Publicly accessible links to call recordings/transcripts
critical10.0
1
Data Breach
1717
compromised backup configurations (SonicWall cloud breach)
critical10.0
1
ransomware
1718
weaknesses in distributed enforcement synchronization
critical10.0
1
data breach
1719
CVE-2025-4428
critical10.0
1
Cyber Espionage
1720
Satellite Communication Systems
critical10.0
1
Cyber Attack
1721
CVE-2025-52163
critical10.0
1
Vulnerability Disclosure
1722
Irregular software patching
critical10.0
1
Ransomware
1723
default weak password policies (privileged accounts <14 characters)
critical10.0
1
ransomware
1724
Lack of access controls (broad permissions)
critical10.0
1
Ransomware
1725
Improper escaping of LangChain’s internal marker key during serialization
critical10.0
1
Serialization/Deserialization Injection
1726
Known vulnerabilities in backbone routers
critical10.0
1
Cyber Espionage
1727
Stolen Employee Tokens
critical10.0
1
Data Breach
1728
Trust in open-source packages
critical10.0
1
Supply Chain Attack
1729
Typosquatting
critical10.0
1
Cyber Theft
1730
CVE-2023-41345
critical10.0
1
botnet
1731
Interconnexion entre datacenter et réseau internet
critical10.0
1
DDoS
1732
CVE-2025-14847
critical10.0
1
Vulnerability Disclosure
1733
Remote Code Execution (RCE) zero-day in Oracle E-Business Suite (versions 12.2.3-12.2.14)
critical10.0
1
ransomware
1734
emotional manipulation
critical10.0
1
phishing
1735
Inadequate HR and Compliance Monitoring
critical10.0
1
Data Breach
1736
Unpatched VPN services
critical10.0
1
Ransomware
1737
Lack of Multi-Factor Authentication (2FA) Enforcement
critical10.0
1
Data Breach
1738
Unsecured Health Declaration Portal
critical10.0
1
Data Breach
1739
Human factor (credentials theft)
critical10.0
1
Phishing
1740
Login bypass vulnerability, improper access controls
critical10.0
1
Data Leak, Unauthorized Access, Remote Exploitation
1741
Four-Faith industrial routers
critical10.0
1
DDoS Attack
1742
CVE-2026-1358 (Unrestricted File Upload)
critical10.0
1
Vulnerability Disclosure
1743
Insecure Build Process
critical10.0
1
Supply Chain Attack
1744
Weak Authentication for Publish Access (npm, PyPI)
critical10.0
1
Supply Chain Attack
1745
CVE-2025-4427
critical10.0
1
Cyber Espionage
1746
Reduced Workforce Capacity
critical10.0
1
Operational Risk
1747
Ivanti Endpoint Manager Mobile
critical10.0
1
Vulnerability Exploitation
1748
End-to-End Encryption
critical10.0
1
Government Order
1749
Legitimate utilities repurposed for malicious use (e.g., gpscript.exe)
critical10.0
1
Ransomware
1750
Ageing infrastructure, shared IT systems, lack of network segmentation
critical10.0
1
Data Breach
1751
CVE-2025-20337
critical10.0
1
Remote Code Execution
1752
lack of 2FA for publisher accounts
critical10.0
1
supply chain attack
1753
Gaps in GDPR Data Protection for Vehicle-Generated Data
critical10.0
1
Cybersecurity Vulnerability Assessment
1754
CVE-2023-20867
critical10.0
1
Advanced Persistent Threat (APT)
1755
CVE-2025-32434
critical10.0
1
Vulnerability Exploitation
1756
Security Vulnerabilities in Verizon’s Web site
critical10.0
1
Data Breach
1757
Unsanitized Metadata
critical10.0
1
Data Leak
1758
Misconfigured Cloud Storage (S3, MongoDB)
critical10.0
1
Data Breach
1759
lack_of_verified_security_controls
critical10.0
1
data_at_risk
1760
inadequate administrative/physical/technical safeguards (HIPAA)
critical10.0
1
data breach
1761
Insufficient Integration Lifecycle Management
critical10.0
1
Supply Chain Attack
1762
Critical vulnerabilities within the ESXi platform
critical10.0
1
Ransomware
1763
CVE-2025-20362 (Memory corruption in Cisco ASA Software)
critical10.0
1
Zero-day exploitation
1764
Access to sensitive infrastructure data
critical10.0
1
Insider Threat
1765
Unpatched vulnerability in the network defenses
critical10.0
1
Ransomware
1766
Pool initialization bypass
critical10.0
1
Exploit
1767
Zero-day vulnerability in Oracle E-Business Suite (advisory issued 2025-10-04)
critical10.0
1
Data Breach
1768
Fragmented accountability among OEMs, MNOs, and satellite operators
critical10.0
1
Cyber-Physical Threat
1769
CVE-2025-21590
critical10.0
1
Advanced Persistent Threat (APT)
1770
Lack of anti-jamming measures in ferry's GPS system
critical10.0
1
GPS jamming
1771
CVE-2025-55182 (CVSS 10.0)
critical10.0
1
worm-driven campaign
1772
MongoBleed
critical10.0
1
Data Breach
1773
Unencrypted Linux Partition in Dual-Boot Configuration
critical10.0
1
Vulnerability Exploitation
1774
CVE-2025-10035 (Critical deserialization flaw in GoAnywhere MFT)
critical10.0
1
Zero-day exploitation
1775
Content-Type confusion flaw in n8n's webhook and file handling mechanism (CVE-2026-21858)
critical10.0
1
Remote Code Execution (RCE)
1776
lack of centralized patching for consulting deliverables
critical10.0
1
supply chain attack
1777
Potential Salesforce Misconfigurations
critical10.0
1
Data Breach
1778
Lack of Fragment Inspection in Security Tools
critical10.0
1
Prompt Injection
1779
outsourcing risks
critical10.0
1
data breach
1780
Previously unknown vulnerability in data transfer software
critical10.0
1
Data Breach
1781
GDPR compliance leverage (ransom coercion)
critical10.0
1
ransomware
1782
Unrestricted Remote Access ('Always-On' Feature)
critical10.0
1
Data Breach
1783
Deteriorating cyber defenses
critical10.0
1
Cyberattack
1784
Lack of Behavioral Analytics for Insider Threat Detection
critical10.0
1
Insider Threat (Attempted)
1785
Undisclosed Vulnerabilities in BIG-IP (details not public)
critical10.0
1
Data Breach
1786
Exploit Kit
critical10.0
1
Malvertising
1787
CitrixBleed (CVE-2023-4966) - CVSS 9.3 in Netscaler ADC and Gateway (Session Token Theft, MFA Bypass)
critical10.0
1
Data Breach
1788
Over-Permissive Tool Access (e.g., Password Crackers, Network Scanners)
critical10.0
1
Espionage
1789
CVE-2025-34300
critical10.0
1
Remote Code Execution
1790
Shared-Service Model Vulnerabilities
critical10.0
1
Cyberattack
1791
CVE-2024-12912
critical10.0
1
botnet
1792
high market value of copper
critical10.0
1
infrastructure vulnerability
1793
High-risk extension permissions
critical10.0
1
Session Hijacking
1794
lack of email security by design
critical10.0
1
phishing
1795
Claude Code tool's contextual safeguard limitations
critical10.0
1
cyberespionage
1796
exposed SMB services
critical10.0
1
ransomware
1797
CVE-2025-36535 (Missing Authentication in MB-Gateway Devices)
critical10.0
1
Vulnerability Exploitation
1798
insecure communication protocols
critical10.0
1
unauthorized access
1799
LogoFAIL flaws (CVE-2023-40238)
critical10.0
1
UEFI Bootkit
1800
Lack of Multi-Factor Authentication (Assumed)
critical10.0
1
Ransomware
1801
GenAI data exfiltration
critical10.0
1
Session Hijacking
1802
poor_network_segmentation
critical10.0
1
ransomware
1803
Human Trust Vulnerability
critical10.0
1
Data Breach
1804
Lapse of CISA 2015 liability protections
critical10.0
1
Policy/Regulatory Failure
1805
Lack of Multi-Factor Authentication (MFA) for remote hires
critical10.0
1
Espionage
1806
CVE-2024-12297
critical10.0
1
Vulnerability Exploit
1807
Weak Cybersecurity Safeguards in Government Systems
critical10.0
1
Data Privacy Violation
1808
SAP Solution Manager
critical10.0
1
Cyber Espionage
1809
Remote-file-transfer vulnerabilities
critical10.0
1
Ransomware
1810
cloud security weaknesses
critical10.0
1
ransomware
1811
Unclear Accountability Frameworks
critical10.0
1
Data Privacy Violation
1812
operational lapses in rule propagation
critical10.0
1
data breach
1813
Classified information mishandling
critical10.0
1
Cyber Attack, Data Leak
1814
Security flaw in MOVEit software
critical10.0
1
Data Breach
1815
CVE-2025-29927 (React2Shell)
critical10.0
1
Cloud Misconfiguration Exploitation
1816
CVE-2025-7029
critical10.0
1
Firmware Vulnerability
1817
Policy Non-Compliance
critical10.0
1
Data Breach (Alleged)
1818
Previously Patched Vulnerabilities (Exploited Post-Patch)
critical10.0
1
Data Breach
1819
Weak Security Controls at Third-Party Contractor
critical10.0
1
Data Breach
1820
CVE-2025-8110 (Path traversal in PutContents API via symbolic links)
critical10.0
1
Remote Code Execution (RCE)
1821
Weakened power grid infrastructure
critical10.0
1
Cyberattack
1822
Insufficient cybersecurity training
critical10.0
1
Data Breach
1823
OAuth Token Theft
critical10.0
1
Data Breach
1824
user trust in search engine ads
critical10.0
1
ransomware
1825
CVE-2025-59287 (Windows Server Update Services - WSUS)
critical10.0
1
Remote Code Execution (RCE)
1826
Publicly Accessible Industrial Control Systems
critical10.0
1
Ransomware
1827
Weaknesses in satellite-ground station security
critical10.0
1
Cyber-Physical Threat
1828
BACnet/Modbus Protocol Flaws (No Encryption/Authentication)
critical10.0
1
Cybersecurity Vulnerability Exposure
1829
CVE-2024-7587
critical10.0
1
Vulnerabilities in SCADA Systems
1830
Weak login credentials
critical10.0
1
Data Breach
1831
Zero-day flaw in Oracle E-Business Suite
critical10.0
1
Data Breach
1832
Known vulnerability in the network
critical10.0
1
Ransomware Attack
1833
Remote Code Execution (RCE) in AhsayCBS backup system
critical10.0
1
Remote Code Execution
1834
Absence of Standardized Risk Assessments
critical10.0
1
Ransomware
1835
Lack of multi-factor authentication (MFA) on an outsourced partner’s administrator account
critical10.0
1
Ransomware
1836
ProxyShell (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207)
critical10.0
1
ransomware
1837
161 distinct CVEs in H1 2025 (up from 136 in H1 2024)
critical10.0
1
Vulnerability Exploitation
1838
CVE-2025-53771 (Path Traversal)
critical10.0
1
Cyber Espionage
1839
CVE-2024-11859
critical10.0
1
Malware Delivery
1840
CVE-2016-10033
critical10.0
1
Vulnerability Exploitation
1841
Excessive user permissions
critical10.0
1
Ransomware
1842
React2Shell vulnerability in React frontend application
critical10.0
1
Data Breach
1843
Trust in Employee
critical10.0
1
Insider Threat
1844
CVE-2025-2172
critical10.0
1
Vulnerability Exploitation
1845
Unmonitored API Queries (Graph, Teams)
critical10.0
1
Social Engineering
1846
Weak/Reused Passwords
critical10.0
1
Account Compromise
1847
Exposed Database Credentials
critical10.0
1
Data Exposure
1848
Limited control over shipping and air cargo spaces
critical10.0
1
Economic Vulnerability
1849
Customer Edge (CE) routers
critical10.0
1
Cyber Espionage
1850
Human operational error
critical10.0
1
GPS spoofing (disputed)
1851
Inadequate Backup Protection
critical10.0
1
Ransomware Attack
1852
CVE-2017-12637
critical10.0
1
Vulnerability Exploitation
1853
Ivanti Cloud Service Appliances
critical10.0
1
Supply Chain Attack
1854
outdated configurations
critical10.0
1
ransomware
1855
Lack of IT/OT Security Maturity (65% misalignment with NIST CSF 2.0)
critical10.0
1
Cyber-Physical Attack
1856
CVE-2025-47164 (Microsoft Office Use-After-Free)
critical10.0
1
Patch Release
1857
Lack of continuous vendor monitoring
critical10.0
1
Ransomware
1858
Publicly exposed cloud buckets with critical vulnerabilities and highly privileged data
critical10.0
1
Data Exposure
1859
Unsupported Firmware/OS (EOL Systems)
critical10.0
1
Cybersecurity Vulnerability Exposure
1860
Outdated Juniper Networks Junos OS MX routers
critical10.0
1
Cyber Espionage
1861
CVE-2021-Log4j (Remote Code Execution)
critical10.0
1
Ransomware
1862
insecure use of pull_request_target in GitHub Actions
critical10.0
1
supply chain attack
1863
CVE-2025-24893 (Critical RCE in XWiki)
critical10.0
1
Vulnerability Exploitation
1864
Unauthorized Admin Role Assignments
critical10.0
1
Ransomware Prevention Guide
1865
Weak Authentication for Third-Party Access
critical10.0
1
Cyberattack
1866
Banking security systems
critical10.0
1
Malware
1867
CVE-2025-27363
critical10.0
1
Vulnerability Exploitation
1868
Compromised Deloitte employee credentials
critical10.0
1
data breach
1869
Steganography
critical10.0
1
Malware Infection
1870
CVE-2024-40766 (SonicWall improper access control, CVSS 9.8)
critical10.0
1
ransomware
1871
CVE-2023-41346
critical10.0
1
botnet
1872
mismanaged certificates
critical10.0
1
third-party breach
1873
network security issues
critical10.0
1
third-party breach
1874
CVE-2025-2783
critical10.0
1
Zero-Day Vulnerability
1875
SonicWall SSLVPN misconfigurations
critical10.0
1
ransomware
1876
Incorrect host/guest network separation (allowed privilege escalation from guest to host)
critical10.0
1
Ransomware
1877
Payment processing system vulnerability
critical10.0
1
Data Breach
1878
poor staff training
critical10.0
1
data breach
1879
Legacy Authentication Protocols
critical10.0
1
Social Engineering
1880
Auto-update mechanisms
critical10.0
1
Session Hijacking
1881
CVE-2017-7921 (Hikvision - authentication bypass)
critical10.0
1
Cyber Espionage, Reconnaissance
1882
Poor Training on Data Protection Protocols
critical10.0
1
Data Breach
1883
unknown (zero-day)
critical10.0
1
cyberattack
1884
Insufficient Disaster Recovery Plans
critical10.0
1
Supply Chain Attack
1885
CVE-2025-2492
critical10.0
1
botnet
1886
weak token security
critical10.0
1
third-party breach
1887
Exposed Web-Accessible Operational Technology (OT) System
critical10.0
1
Cyberattack
1888
Insufficient client-side runtime monitoring
critical10.0
1
Data Breach
1889
Salesloft’s Drift AI Chat Integration (OAuth Token Theft)
critical10.0
1
Data Breach
1890
Juniper Networks routers
critical10.0
1
Cyberespionage
1891
Newly discovered vulnerability
critical10.0
1
Ransomware
1892
CVE-2026-20127
critical10.0
1
Authentication Bypass
1893
Exposure of GitHub token
critical10.0
1
Vulnerability
1894
Known software vulnerabilities
critical10.0
1
Cyber Espionage, Sabotage
1895
human error (e.g., clicking malicious links)
critical10.0
1
phishing
1896
Unencrypted AI Training Datasets/Model Checkpoints
critical10.0
1
Data Breach (AI Models/Applications)
1897
Unmonitored Privileged Accounts
critical10.0
1
Data Breach
1898
Insufficient Privileged Access Controls (e.g., standing admin roles)
critical10.0
1
Social Engineering
1899
Lack of Granular Network Segmentation
critical10.0
1
EDR/XDR Evasion
1900
Improper Whitelisting of Microsoft CDB
critical10.0
1
APT (Advanced Persistent Threat)
1901
human error (employee downloading malware-laced tool)
critical10.0
1
ransomware
1902
CVE-2020-3259 (Cisco)
critical10.0
1
ransomware
1903
Unauthorized access to cloud servers
critical10.0
1
Data Breach
1904
vendor distribution pipelines
critical10.0
1
ransomware
1905
Weak or Outdated Cryptographic Standards
critical10.0
1
Emerging Threat
1906
Vulnerabilities in AI development platforms
critical10.0
1
AI-driven cyber threats
1907
Unspecified (32% of attacks involved exploited vulnerabilities)
critical10.0
1
ransomware
1908
Absence of two-factor authentication
critical10.0
1
Ransomware
1909
Firewall rule exposing RDP on a management server
critical10.0
1
Ransomware
1910
legitimate platform abuse (e.g., Google Calendar, Azure domains)
critical10.0
1
ransomware
1911
Cryptographic Implementation Flaws
critical10.0
1
Security Vulnerability
1912
Internal Login
critical10.0
1
Data Breach
1913
help-desk protocol vulnerabilities
critical10.0
1
ransomware
1914
Unique validation node
critical10.0
1
Cryptocurrency Theft
1915
Security issue with Haltdos
critical10.0
1
Data Breach
1916
CVE-2026-20045 (Improper input validation in HTTP requests)
critical10.0
1
Zero-Day Exploitation
1917
Overwhelmed network infrastructure, misconfigurations, unused ports
critical10.0
1
DDoS
1918
Poor Patch Management
critical10.0
1
Compliance Failure
1919
Stale Accounts (Former Employees with Retained Access)
critical10.0
1
Data Breach
1920
Unmonitored API Traffic
critical10.0
1
Data Breach
1921
Default passwords
critical10.0
1
Exposure of Critical Infrastructure
1922
Third-party systems (Famly platform and one other unnamed system)
critical10.0
1
data breach
1923
Modified Files on Server
critical10.0
1
Data Breach
1924
delayed AV detection due to obfuscation
critical10.0
1
ransomware
1925
Incorrect mailing of care management letters
critical10.0
1
Data Breach
1926
Lack of Vendor Oversight
critical10.0
1
Data Breach
1927
CVE-2025-31324 (unspecified CRM/DBMS/SaaS target)
critical10.0
1
Cybercriminal Alliance Formation
1928
Lack of MFA Enforcement
critical10.0
1
Social Engineering
1929
Plaintext Credential Storage
critical10.0
1
Vulnerability Exploitation
1930
Design Flaws
critical10.0
1
Data Breach
1931
Exposed NAS devices
critical10.0
1
Ransomware
1932
Legitimate features of Signal
critical10.0
1
Phishing
1933
Lack of Real-Time Threat Detection
critical10.0
1
Third-Party Breach
1934
Insider Threat, Social Engineering
critical10.0
1
Espionage, Data Breach
1935
OpenClaw WebSocket-based AI agent framework vulnerability
critical10.0
1
Zero-Click Exploit
1936
Human Error (Compliance with Fraudulent Requests)
critical10.0
1
Data Breach
1937
Excessive Access Privileges
critical10.0
1
Insider Threat
1938
CVE-2017-11882 (Microsoft Office)
critical10.0
1
APT (Advanced Persistent Threat)
1939
CVE-2025-30401
critical10.0
1
Vulnerability Exploitation
1940
Compromised contractor credentials (specific vulnerability undisclosed)
critical10.0
1
Data Breach
1941
upstream services
critical10.0
1
ransomware
1942
unsecured copper infrastructure
critical10.0
1
infrastructure vulnerability
1943
CVE-2025-27816
critical10.0
1
Vulnerability Exploitation
1944
Self-propagating payload in NPM packages
critical10.0
1
Supply Chain Attack
1945
Lack of MFA on Personal/Social Media Accounts
critical10.0
1
Phishing (Non-Email)
1946
Vulnerability in Huawei routers' VRP network operating system
critical10.0
1
Cyberattack
1947
Alleged zero-day vulnerability in MyBB or misconfiguration
critical10.0
1
Data Breach
1948
Lack of AIS/GPS signal authentication
critical10.0
1
GPS spoofing
1949
System Migration Bug
critical10.0
1
Data Breach
1950
Legacy System Exploits
critical10.0
1
Ransomware
1951
Security Oversight
critical10.0
1
Data Breach
1952
Optional MFA (to be phased out)
critical10.0
1
Predictive Analysis
1953
Delayed Threat Response
critical10.0
1
Operational Risk
1954
CVE-2025-47962 (Windows SDK EoP)
critical10.0
1
Patch Release
1955
Obfuscation Techniques
critical10.0
1
Malware Infection
1956
Poor Access Management
critical10.0
1
Data Breach
1957
Lack of Segmentation
critical10.0
1
Data Exposure
1958
Outdated EnCase driver (EnPortv.sys) with revoked certificate, Windows signature validation loophole for pre-2015 certificates
critical10.0
1
BYOVD (Bring Your Own Vulnerable Driver)
1959
Lack of proactive threat detection and centralized incident response
critical10.0
1
Cyber Espionage
1960
Lack of IP restrictions
critical10.0
1
Data Breach
1961
Compromised Subcontractor Credentials
critical10.0
1
Data Breach
1962
Internet-facing edge devices (40% targeted by China-nexus actors)
critical10.0
1
AI-driven cyber threats
1963
Fragmented Cybersecurity Governance (no common procedures)
critical10.0
1
Ransomware
1964
User Information Exposure
critical10.0
1
Data Breach
1965
Unpatched Web Browser/Plugin Vulnerabilities
critical10.0
1
Cyber Espionage
1966
Over-reliance on remote desktop tools without geofencing
critical10.0
1
Espionage
1967
CVE-2022-41040
critical10.0
1
Ransomware
1968
Abuse of Device Admin and Accessibility Services permissions
critical10.0
1
Ransomware
1969
SonicWall SSL VPN endpoints
critical10.0
1
Ransomware
1970
Outdated versions of Windows
critical10.0
1
Data Breach, Ransomware
1971
Security software vulnerability
critical10.0
1
Ransomware
1972
CVE-2025-59468
critical10.0
1
Vulnerability Exploitation
1973
Weak password (no MFA) on internet-facing system
critical10.0
1
Ransomware Attack
1974
Lack of multi-factor authentication (MFA) on a critical server
critical10.0
1
ransomware
1975
lack of up-to-date incident response plans
critical10.0
1
cyber attack
1976
arbitrary code execution in CI/CD pipeline
critical10.0
1
supply chain attack
1977
Insufficient MFA Enforcement (Ghost Logins, SSO Gaps)
critical10.0
1
Browser-Based Attack
1978
CVE-2026-25049 (insufficient input sanitization in expression evaluation mechanism)
critical10.0
1
Remote Code Execution (RCE)
1979
CVE-2026-29000
critical10.0
1
Authentication Bypass
1980
Zero-day
critical10.0
1
Ransomware
1981
JIT compiler hijacking, .NET Reactor obfuscation, static constructor execution
critical10.0
1
Supply Chain Attack
1982
Weak Entra ID Configurations (e.g., external access policies)
critical10.0
1
Social Engineering
1983
unchanged default passwords in VSAT terminals
critical10.0
1
cyberattack
1984
Poor Oversight of Third-Party Vendor (PowerSchool)
critical10.0
1
Data Breach
1985
Wide Attack Surfaces (Retail: staff, suppliers, IT systems)
critical10.0
1
Ransomware
1986
CVE-2026-24789
critical10.0
1
Vulnerability Exploitation
1987
Default Authentication Bypasses
critical10.0
1
Vulnerability Exploitation
1988
Unauthenticated File Read
critical10.0
1
Vulnerability Exploitation
1989
exposed remote services
critical10.0
1
Ransomware
1990
CVE-2024-24919
critical10.0
1
Ransomware
1991
Dual-use technology misuse
critical10.0
1
Policy Violation and Dual-Use Technology Misuse
1992
Overlooked Access Rights
critical10.0
1
Data Breach
1993
Well-known attack vector (unspecified)
critical10.0
1
Data Breach
1994
over_permissive_cloud_settings
critical10.0
1
ransomware
1995
Insufficient multi-factor authentication (MFA) protections
critical10.0
1
Ransomware
1996
CVE-2024-21893
critical10.0
1
Ransomware
1997
Trust in AI Model Updates
critical10.0
1
Malware
1998
LLM scope violation (CVE-2025-32711)
critical10.0
1
Data Breach Vulnerability
1999
Lack of Timely Detection (6-month delay)
critical10.0
1
Supply Chain Attack
2000
CVEs in Cisco's routers
critical10.0
1
Data Breach
2001
CVE-2025-53770 (ToolShell, patch bypass for CVE-2025-49704/CVE-2025-49706)
critical10.0
1
Cyber Espionage
2002
Over-the-Air Broadcast Without Protection
critical10.0
1
Data Interception
2003
exploitation of maritime regulatory gaps
critical10.0
1
AIS spoofing
2004
limited transparency in global supply chains
critical10.0
1
supply chain attack
2005
CVE-2024-11120
critical10.0
1
Cyberattack
2006
Lack of Multi-Factor Authentication (MFA) for Vendor Logins
critical10.0
1
Cyberattack
2007
Compromised Vendor Credentials
critical10.0
1
Phishing, Malware Distribution
2008
Unsalted Password Hashes (pre-remediation)
critical10.0
1
Data Breach
2009
Unpatched Microsoft SharePoint Vulnerabilities
critical10.0
1
Cyber Espionage
2010
Potential zero-day in F5 products
critical10.0
1
Data Breach
2011
Known vulnerability in the email system
critical10.0
1
Data Breach
2012
Overly permissive IAM policies
critical10.0
1
Supply-Chain Attack
2013
Virtual Office portal public access
critical10.0
1
ransomware
2014
Lack of Monitoring for Insider Threats
critical10.0
1
SCADA Tampering / Insider Threat
2015
Content management system vulnerability
critical10.0
1
Data Breach
2016
lack of cyber-physical resilience in maritime navigation systems
critical10.0
1
cyber deception
2017
Inadequate Data Encryption
critical10.0
1
Ransomware
2018
Privilege Escalation
critical10.0
1
Vulnerability Exploitation
2019
Disconnected IAM Systems
critical10.0
1
Predictive Analysis
2020
Unspecified vulnerability in MOVEit file transfer platform (known to CL0P)
critical10.0
1
Data Breach
2021
Lack of Employee Cybersecurity Training
critical10.0
1
Ransomware
2022
Microsoft Exchange (unspecified CVEs)
critical10.0
1
ransomware
2023
IMSI-capturing
critical10.0
1
Surveillance
2024
CVE-2024-9852
critical10.0
1
Vulnerabilities in SCADA Systems
2025
Weak Third-Party Security Controls
critical10.0
1
Data Breach
2026
SCADA system vulnerabilities
critical10.0
1
DDoS
2027
CVE-2025-5777 (Citrix Bleed 2)
critical10.0
1
Ransomware
2028
Lack of Automated PII Detection
critical10.0
1
Data Leak
2029
CVE-2025-49844 (RediShell - Use-after-free in Lua sandbox)
critical10.0
1
Vulnerability
2030
Trustwave’s miscategorization of breach alert as 'moderate' (delayed response)
critical10.0
1
Ransomware
2031
Lack of a business associate agreement
critical10.0
1
Ransomware Attack
2032
CVE-2026-22755
critical10.0
1
Remote Code Execution (RCE)
2033
Technical Security Configuration Issue
critical10.0
1
Data Breach
2034
Absence of AI Governance Frameworks
critical10.0
1
Unauthorized AI Deployment
2035
AI's inability to recognize malicious intent in fragmented tasks
critical10.0
1
cyberespionage
2036
Employee Theft
critical10.0
1
Data Breach
2037
CVE-2022-26134 (Atlassian OGNL Injection)
critical10.0
1
cyberespionage
2038
Undisclosed vulnerabilities in F5 BIG-IP (actively patched but stolen pre-disclosure)
critical10.0
1
Supply Chain Compromise
2039
Improper oversight and mismanagement of data protection protocols
critical10.0
1
Data Breach
2040
API code change flaw, predictable device serial numbers, unencrypted MFA scratch codes
critical10.0
1
Ransomware
2041
weak credential management (golden ticket risk)
critical10.0
1
ransomware
2042
Lack of Security Layers
critical10.0
1
Ransomware
2043
human error (clicking suspicious links)
critical10.0
1
general cybersecurity awareness
2044
Lack of Data Processing Agreements (DPAs/DSAs)
critical10.0
1
Data Privacy Violation
2045
GPS signal weakness
critical10.0
1
spoofing
2046
third-party ecosystem vulnerabilities
critical10.0
1
ransomware
2047
Stale IAM Accounts in AI Environments
critical10.0
1
Data Breach (AI Models/Applications)
2048
Unsecured Public Wi-Fi
critical10.0
1
Awareness Campaign
2049
Poor Vendor Security Practices
critical10.0
1
Third-Party Breach
2050
CVE-2024-12356
critical10.0
1
Breach
2051
Lack of Anomaly Detection
critical10.0
1
Data Breach Risk
2052
CVE-2025-20352 (Cisco IOS SNMP Flaw)
critical10.0
1
Ransomware
2053
Weak Token Management in Drift Integration
critical10.0
1
Supply Chain Attack
2054
Inadequate Training
critical10.0
1
Data Breach
2055
kernel-level access via vulnerable driver
critical10.0
1
ransomware
2056
Malware in plug-ins
critical10.0
1
Data Privacy and Cybersecurity Advisory
2057
Implicit TLS
critical10.0
1
Cross-protocol Application Layer Desynchronization
2058
CVE-2022-42475
critical10.0
1
Advanced Persistent Threat (APT)
2059
Exposed Firewall Configuration Backups (Encrypted but Sensitive)
critical10.0
1
Unauthorized Access
2060
uneven cybersecurity maturity
critical10.0
1
data breach
2061
Software Development and Distribution Processes
critical10.0
1
Supply Chain Attack
2062
npm package hijacking
critical10.0
1
supply chain attack
2063
Previously unknown vulnerability in firewall software
critical10.0
1
Ransomware Attack
2064
Unsecured Email Channels
critical10.0
1
Data Breach (General Discussion)
2065
Legacy system integration vulnerabilities during platform consolidation
critical10.0
1
Ransomware Attack
2066
Unauthorized Access by Employee
critical10.0
1
Data Breach
2067
Lack of Behavioral Anomaly Detection
critical10.0
1
Insider Threat
2068
SonicWall SSL VPN Misconfiguration
critical10.0
1
Unauthorized Access
2069
CVE-2024-55591 (FortiOS/FortiProxy Race Condition Authentication Bypass)
critical10.0
1
Unauthorized Access
2070
Accellion FTA server vulnerability
critical9.0
1
Data Breach
2071
Lack of authentication controls
critical9.0
1
Data Exposure
2072
Past Data Breach
critical9.0
1
Phishing Campaign
2073
Customer Accounts
critical9.0
1
Credential Stuffing
2074
Charting software
critical9.0
1
Ransomware
2075
File Transfer Service Provider
critical9.0
1
Data Breach
2076
Unauthorized Access by Terminated Employee
critical9.0
1
Data Breach
2077
Misplaced Portable Flash Drive
critical9.0
1
Data Breach
2078
Weak or Stolen Login Credentials
critical9.0
1
Data Breach
2079
Multiple vulnerabilities in Cisco Small Business RV Series routers
critical9.0
1
Vulnerability Exploitation
2080
Sophos Firewall versions 18.5 MR3 (18.5.3)
critical9.0
1
Vulnerability Exploitation
2081
Critical CVEs
critical8.5
1
Identity Compromise
2082
Human Trust (Job Seekers)
critical8.5
1
APT (Advanced Persistent Threat)
2083
CVE-2026-26144
critical8.5
1
Vulnerability
2084
Missile defense system vulnerability
critical8.5
1
Data Breach
2085
CVE-2026-23595
critical8.5
1
Privilege Escalation
2086
insufficient workforce training
critical8.5
1
ransomware
2087
Misconfiguration in Salesforce environment, lack of least privilege principle, absence of Zero Trust architecture, inadequate behavioral monitoring
critical8.5
1
Data Breach
2088
CVE-2026-3062 (Out-of-bounds read/write in Tint shader engine)
critical8.5
1
Vulnerability Patch
2089
Mali GPU Data Compression
critical8.5
1
Data Theft
2090
Insider Knowledge (Ethan Lipnik's Willingness to Share)
critical8.5
1
Trade Secret Theft
2091
Lack of reasonable cyber security measures
critical8.5
1
Data Breach
2092
User trust and lack of awareness
critical8.5
1
Phishing
2093
Improper IAM Policies
critical8.5
1
Cloud Security Breach
2094
Oracle PeopleSoft vulnerability
critical8.5
1
Ransomware
2095
Third-party secure file transfer tool vulnerability
critical8.5
1
Data Breach
2096
Parking Permit System Flaw (since 2017)
critical8.5
1
Data Breach
2097
CVE-2025-54136 (MCPoison) - Trust Model Flaw in MCP Configuration Handling
critical8.5
1
Vulnerability
2098
weak validator key security
critical8.5
1
blockchain exploit
2099
Weaknesses in third-party integrations with Salesforce-connected applications (not Salesforce itself)
critical8.5
1
Data Breach
2100
Token Sprawl
critical8.5
1
Data Breach
2101
Publicly Exposed API Token
critical8.5
1
Data Breach (OAuth Token Compromise)
2102
No Technical Vulnerability (Human Factor)
critical8.5
1
Trade Secret Theft
2103
Unsecured Public LLM Interactions
critical8.5
1
Data Leakage
2104
ConnectWise software vulnerability
critical8.5
1
Data Breach
2105
lack of secret scanning
critical8.5
1
data exposure
2106
ZombieAgent (prompt injection in ChatGPT Connectors/Apps feature)
critical8.5
1
Prompt Injection
2107
Shopping cart portions of the company's websites
critical8.5
1
Data Breach
2108
DockerDash
critical8.5
1
Vulnerability Exploitation
2109
Progress Software's MOVEit Transfer application
critical8.5
1
Data Breach
2110
Weak security practices
critical8.5
1
Fraud/Scam
2111
Unspecified zero-day in FreePBX (versions 16 and 17 with endpoint module installed)
critical8.5
1
Zero-day exploitation
2112
Account Credentials
critical8.5
1
Data Breach
2113
Vulnerability in Progress Software Corporation's MOVEit Transfer product
critical8.5
1
Data Breach
2114
Lack of Authentication on Cloud Storage
critical8.5
1
Data Exposure
2115
Publicly Accessible Files
critical8.5
1
Data Leak
2116
CVE-2026-1281
critical8.5
1
Vulnerability Exploitation
2117
CVE-2025-13915 (CWE-305: Authentication Bypass by Primary Weakness)
critical8.5
1
Authentication Bypass
2118
Progress Software's MOVEit File Transfer solution
critical8.5
1
Data Breach
2119
CVE-2026-3337
critical8.5
1
Cryptographic Vulnerability
2120
malicious CI/CD pipeline injection
critical8.5
1
supply-chain attack
2121
Lack of AI-Specific Security Controls
critical8.5
1
Supply Chain Attack
2122
Vendor's security shortcomings (unspecified)
critical8.5
1
Data Breach (Third-Party Vendor)
2123
CVE-2026-3061 (Out-of-bounds read in Media component)
critical8.5
1
Vulnerability Patch
2124
Weak point in the network
critical8.5
1
Data Breach
2125
Support Credentials
critical8.5
1
Data Breach
2126
Lack of Multi-Layered Authentication for Integrations
critical8.5
1
Data Breach
2127
Zero-Click Prompt Injection in ChatGPT's Deep Research Tool
critical8.5
1
Data Breach
2128
Discord's API
critical8.5
1
Phishing
2129
Inconsistent DLP Policy Application
critical8.5
1
Data Breach
2130
MOVEit Transfer application vulnerabilities
critical8.5
1
Data Breach
2131
Visual Studio Code tasks.json
critical8.5
1
Supply Chain Attack
2132
Lack of AI Governance Policies
critical8.5
1
Data Leakage
2133
CVE-2026-20435 (MediaTek chipset boot chain weakness)
critical8.5
1
Vulnerability Exploitation
2134
Weak BYOD Policies
critical8.5
1
Insider Threat
2135
Identity and Access Management (IAM) Failures
critical8.5
1
Data Breach
2136
Authentication bypass in Passwordstate Emergency Access (CVE pending)
critical8.5
1
Authentication Bypass Vulnerability
2137
User account compromise
critical8.5
1
Data Breach
2138
Lack of Input Sanitization for Hidden Commands
critical8.5
1
Data Breach
2139
Human Error (Credential Theft via Smishing)
critical8.5
1
Data Breach / Unauthorized Access
2140
MOVEit file transfer service vulnerability
critical8.5
1
Data Breach
2141
MOVEit Transfer Critical Vulnerability (CVE-2023-34362)
critical8.5
1
Data Breach
2142
Unmonitored Data Exfiltration via AI Prompts
critical8.5
1
Data Leakage
2143
Unpatched vulnerabilities in third-party applications
critical8.5
1
Third-party data exploitation
2144
Publicly accessible database without proper security measures
critical8.5
1
Data Exposure
2145
CVE-2026-0958
critical8.5
1
Vulnerability Exploitation
2146
Abandoned software in trusted repository
critical8.5
1
Phishing
2147
Insufficient Conditional Access Controls
critical8.5
1
Cloud Security Breach
2148
Human error (phishing attack on staff)
critical8.5
1
Data Breach
2149
Phishing or Credential Compromise
critical8.5
1
Data Breach
2150
Inadequate data security controls / unauthorized access by insider
critical8.5
1
Data Breach
2151
lack of encryption for stored data
critical8.5
1
data breach
2152
human error (employee tricked into clicking malicious link)
critical8.5
1
phishing
2153
inadequate contractor oversight
critical8.5
1
data breach
2154
Improper deployment of third-party tracking technologies on public website leading to unauthorized data transfer
critical8.5
1
Data Privacy Violation
2155
Generic Out-of-Bounds Read/Write in C/C++ (e.g., unchecked array indexing, `strcpy` overflows)
critical8.5
1
Memory Corruption
2156
E-commerce Website
critical8.5
1
Data Breach
2157
CVE-2025-54820 (Stack-based buffer overflow in *fgtupdates* service)
critical8.5
1
Vulnerability
2158
mDNS Misconfiguration
critical8.5
1
Misconfiguration
2159
CVE-2025-23121
critical8.5
1
Vulnerability
2160
AcroForms, FlateDecode (PDF features), abuse of legitimate cloud services (Vercel Blob storage)
critical8.5
1
Phishing
2161
CVE-2025-14847 (MongoBleed) - unverified
critical8.5
1
In-game abuse
2162
unpatched cloud tools (speculated)
critical8.5
1
data breach
2163
Improper access control in cloud storage
critical8.5
1
Data Breach
2164
Unspecified vulnerability in Oracle EBS
critical8.5
1
Data Breach
2165
Cloud Database Platform
critical8.5
1
Data Breach
2166
Phone signal interception
critical8.5
1
Surveillance
2167
Lack of AI Governance Frameworks
critical8.5
1
Data Leakage
2168
human trust in search engine ads
critical8.5
1
phishing
2169
Lack of Robust Encryption/Monitoring in Data Flows
critical8.5
1
Data Breach
2170
previously_compromised_data
critical8.5
1
data_breach
2171
Weakness in OAuth token security for Salesloft Drift integrations
critical8.5
1
Data Breach
2172
Full takeover of Tesla’s infotainment system
critical8.5
1
Zero-Day Vulnerabilities
2173
Lack of Data Minimization
critical8.5
1
Data Breach
2174
Irreversible Identity Linking in NFT Ownership
critical8.5
1
Privacy Violation
2175
Compromised OAuth tokens in Gainsight-published applications (no vulnerability in Salesforce platform itself)
critical8.5
1
Data Breach
2176
Inadequate Third-Party Vetting
critical8.5
1
Data Breach
2177
no encryption
critical8.5
1
data breach
2178
CVE-2025-13328
critical8.5
1
Information Leak
2179
Outdated Security Protocols (vendor)
critical8.5
1
Data Breach
2180
Unsecured LLM infrastructure
critical8.5
1
Security Vulnerability
2181
Lack of Encryption on Laptop
critical8.5
1
Data Breach (Physical Theft)
2182
Morris Worm (1988 - Buffer Overflow in `fingerd`/`sendmail`)
critical8.5
1
Memory Corruption
2183
Exposed Elasticsearch Database without Password
critical8.5
1
Data Breach
2184
Silverlight
critical8.5
1
Cyber Attack
2185
Microsoft Entra SSO Code
critical8.5
1
Data Breach
2186
Vulnerabilities in online quote tools
critical8.5
1
data breach
2187
unauthorized data upload to external platform
critical8.5
1
data breach
2188
Malicious code in online store
critical8.5
1
Data Breach
2189
Software Misconfiguration in Online Grant System
critical8.5
1
Data Breach
2190
CVE-2026-26133
critical8.5
1
Cross-Prompt Injection Attack (XPIA)
2191
Weak Access Controls (Absent MFA, Insufficient Lockout Policies) in SonicWall SSLVPN
critical8.5
1
Ransomware
2192
Unpatched Security Gaps
critical8.5
1
Security Oversight
2193
Personal devices infected with malware
critical8.5
1
Credential Leak
2194
Inadequate cybersecurity measures
critical8.5
1
Data Breach
2195
Coruna (23 distinct security flaws)
critical8.5
1
Vulnerability Exploitation
2196
Lack of Content Verification Mechanisms
critical8.5
1
Content Theft and Fraud
2197
CWE-352: Cross-Site Request Forgery (CSRF) (via API manipulation)
critical8.5
1
Data Breach
2198
Instagram API (alleged)
critical8.5
1
Data Scrape / Alleged Breach
2199
improper access controls (configuration gap in S3 bucket permissions)
critical8.5
1
data breach
2200
Default Data Retention Policies in LLMs (e.g., OpenAI’s 30-day deletion lag)
critical8.5
1
Data Leakage
2201
CVE-2026-23598
critical8.5
1
Privilege Escalation
2202
Progress MOVEit Transfer tool
critical8.5
1
Data Breach
2203
Stolen Usernames and Passwords
critical8.5
1
Data Breach
2204
Unauthorized access to business email account
critical8.5
1
Data Breach
2205
Outdated TEE image reuse
critical8.5
1
Zero-day vulnerability
2206
Adobe Reader
critical8.5
1
Cyber Attack
2207
CVE-2025-43300 (Apple OS-level vulnerability)
critical8.5
1
Zero-day vulnerability
2208
Cloud Infrastructure Security
critical8.5
1
Cyberattack
2209
CVE-2024-5806
critical8.5
1
Supply Chain Attack, Data Breach, Ransomware
2210
Click2Gov Payment System
critical8.5
1
Data Breach
2211
CVE-2025-59452 (Cleartext Transmission)
critical8.5
1
Denial-of-Service
2212
Publicly accessible profile information
critical8.5
1
Data Scraping
2213
One-click IP leak via MTProxy
critical8.5
1
Data Leak
2214
Unpatched vulnerabilities, Unintentional installation of malware by IT personnel with admin privileges
critical8.5
1
Supply Chain Attack, Data Breach
2215
Improper handling of ACME HTTP-01 challenge paths in Cloudflare WAF
critical8.5
1
Zero-Day Vulnerability
2216
Okta SSO Credentials
critical8.5
1
Data Breach
2217
CWE-287: Improper Authentication (Authentication Bypass)
critical8.5
1
Data Breach
2218
Potential Configuration Flaws in Shared Platforms (e.g., Salesforce-like systems)
critical8.5
1
Data Breach
2219
Lack of organization-wide two-factor authentication
critical8.5
1
Data Breach
2220
Unverified JWT payload
critical8.5
1
Vulnerability Exploit
2221
ClawJacked (CVE not specified)
critical8.5
1
Vulnerability Exploitation
2222
Improper Access Control in SharePoint
critical8.5
1
Data Exposure
2223
Multi-factor Authentication (MFA) Bypass, Credential Theft
critical8.5
1
Vishing (Voice Phishing)
2224
Unsecured Kafka Broker instance
critical8.5
1
Data Exposure
2225
Publicly accessible production chatbots
critical8.5
1
LLMjacking
2226
Improperly configured AWS S3 storage
critical8.5
1
Data Breach
2227
CVE-2025-12807 (SQL Injection)
critical8.5
1
Denial-of-Service
2228
CVE-2026-21513
critical8.5
1
Zero-Day Vulnerability
2229
Semantic Drift in Multimodal AI
critical8.5
1
Prompt Extraction
2230
CVE-2026-1591
critical8.5
1
Supply Chain Attack
2231
Weaknesses in lock systems
critical8.5
1
Hardware vulnerability
2232
Insufficient MFA
critical8.5
1
Phishing
2233
CVE-2026-24281
critical8.5
1
Data Exposure
2234
Security access codes obtained through deception
critical8.5
1
Hacking, Identity Theft, Data Breach, Cyberstalking
2235
Lack of Physical Security for Development Device
critical8.5
1
Trade Secret Theft
2236
Progress Software
critical8.5
1
Data Breach
2237
Network Segmentation Protocols
critical8.5
1
Data Breach
2238
Data Exposure
critical8.5
1
Data Leak
2239
Private Code Repositories (GitLab, Visual Studio Code)
critical8.5
1
Malware Deployment
2240
CVE-2025-31334
critical8.5
1
Vulnerability Exploitation
2241
Default Password on Code Repository
critical8.5
1
Data Exposure
2242
Misconfigured AWS Storage Bucket
critical8.5
1
Data Exposure
2243
Major Security Flaw in Website
critical8.5
1
Data Exposure
2244
Access Control Weakness
critical8.5
1
Data Exposure
2245
Cross-border data storage without GDPR-equivalent protections
critical8.5
1
Data Breach Risk
2246
Lack of transparency in AI decision-making
critical8.5
1
Cybersecurity Risk Assessment
2247
CVE-2025-40778 (Logic Flaw in BIND 9’s Resolver - Bailiwick Principle Violation)
critical8.5
1
Vulnerability
2248
Auto-execution of URL parameters in Microsoft Copilot Personal sessions
critical8.5
1
Prompt Injection Attack
2249
unpatched vulnerabilities in enterprise software
critical8.5
1
ransomware
2250
Website Bug
critical8.5
1
Data Exposure
2251
Governance gap in data access controls
critical8.5
1
Third-party data exploitation
2252
Inadequate data retention/deletion policies
critical8.5
1
Data Breach Risk
2253
Weak Password Reset Mechanisms
critical8.5
1
Cyberattack
2254
Fractured auditability across communication channels
critical8.5
1
Data Governance Blind Spot
2255
Opportunistic scanning for sensitive file extensions (e.g., `.openclaw`)
critical8.5
1
Infostealer Attack
2256
Zero-day flaw in Oracle E-Business Suite (EBS)
critical8.5
1
Data Breach
2257
Web application vulnerability (Click2Gov online payment system)
critical8.5
1
Data Breach
2258
Unpatched VPN endpoint
critical8.5
1
Ransomware Attack
2259
Human Manipulation (Social Engineering)
critical8.5
1
Phishing (Vishing)
2260
Account verification procedure
critical8.5
1
Data Breach
2261
Remote code execution vulnerability in Secure Mobile Access (SMA) appliances
critical8.5
1
Remote Code Execution
2262
CVE-2026-21519
critical8.5
1
Privilege Escalation
2263
CVE-2025-61884 (CVSS 7.5 - Information Disclosure in Runtime UI)
critical8.5
1
Vulnerability Exploitation
2264
Insecure Amazon S3 databases
critical8.5
1
Data Exposure
2265
Long-Term Data Retention
critical8.5
1
Data Breach
2266
Legacy email protections
critical8.5
1
Phishing
2267
AI-generated_deepfakes
critical8.5
1
data_breach
2268
Transaction Front-running
critical8.5
1
Security Breach
2269
Previously unknown vulnerability in Oracle E-Business Suite
critical8.5
1
Data Breach
2270
Soliton Systems K.K FileZen
critical8.5
1
APT Activity
2271
Fragmented Data Access Controls
critical8.5
1
Data Privacy Fragmentation
2272
CVE-2025-22231
critical8.5
1
Vulnerability
2273
CVE-2024-38200 (MSHTML/Trident engine RCE)
critical8.5
1
Zero-Day Exploit
2274
Lack of default sandboxing, Ineffective filtering of untrusted content, Plaintext storage of API keys and session tokens, Reliance on language models for critical security decisions, Execution of tool calls without explicit user approval
critical8.5
1
Malware Distribution, Data Exfiltration, Prompt Injection, Backdoor Installation
2275
CVE-2026-3063 (Improper implementation in DevTools)
critical8.5
1
Vulnerability Patch
2276
potential Oracle E-Business Suite vulnerability
critical8.5
1
data breach
2277
Authorization control bypass in Google Gemini
critical8.5
1
Indirect Prompt Injection
2278
Verbose error messages exposing OAuth 2.0 bearer tokens
critical8.5
1
Phishing, Data Theft, Persistent Access
2279
MOVEit file transfer tool
critical8.5
1
Data Breach
2280
unsecured Azure Blob Storage
critical8.5
1
data breach
2281
CVE-2026-2836
critical8.5
1
HTTP Request Smuggling
2282
Weak authentication (Dior Instagram)
critical8.5
1
Data Breach
2283
Tracking code sharing data with third-party advertisers
critical8.5
1
Data Breach
2284
Quantum Model Memorization of Training Data
critical8.5
1
Privacy Breach
2285
Insufficient Monitoring of EHR Access
critical8.5
1
Data Breach
2286
CVE-2025-51683 (Blind SQL Injection)
critical8.5
1
SQL Injection
2287
CVE-2026-0709
critical8.5
1
Supply Chain Attack
2288
Notepad++ WinGUp Update Verification Flaw
critical8.5
1
Supply Chain Attack
2289
Hardcoded Google API keys with expanded authentication capabilities
critical8.5
1
Data Exposure
2290
CVE-2026-27970
critical8.5
1
Cross-Site Scripting (XSS)
2291
Cardinality-Based Rate Limiting Bypass
critical8.5
1
Privacy Violation
2292
Vendor Error
critical8.5
1
Data Breach
2293
Over-Permissive Third-Party App Access (Gmail, Google Drive, Dropbox)
critical8.5
1
Data Breach
2294
Unsanitized parameters in database queries leading to SQL injection
critical8.5
1
SQL Injection
2295
Authentication vulnerabilities in Coupang's servers
critical8.5
1
Data Breach
2296
CVE-not-yet-assigned (as of description) – RCE via `new Function()` in `expr-eval` < 2.0.2
critical8.5
1
Vulnerability
2297
Timing Attack via Rendering Pipeline
critical8.5
1
Data Theft
2298
CVE-2026-21519 (Type Confusion - CWE-843)
critical8.5
1
Elevation of Privilege
2299
CVE-2024-9680
critical8.5
1
Zero-Day Exploit
2300
Legacy email protocols (IMAP/POP3)
critical8.5
1
Data Breach
2301
Unauthorized Access to Customer Account Information
critical8.5
1
Data Exposure
2302
IDOR
critical8.5
1
Data Breach
2303
Hardcoded Supabase API key in client-side JavaScript with no Row Level Security (RLS) policies
critical8.5
1
Data Breach
2304
Auto-execution of `runOptions.runOn: 'folderOpen'` in tasks
critical8.5
1
Arbitrary Code Execution
2305
CVE-2026-20163 (Improper Neutralization of Special Elements used in a Command - CWE-77)
critical8.5
1
Remote Command Execution (RCE)
2306
Oracle E-Business Suite (versions 12.2.3 to 12.2.14)
critical8.5
1
Data Breach
2307
No Rate Limiting
critical8.5
1
Data Breach
2308
Unsecured AWS bucket
critical8.5
1
Data Breach
2309
Endpoint Detection and Response (EDR) Services
critical8.5
1
Ransomware Attack
2310
npm run dev execution
critical8.5
1
Supply Chain Attack
2311
Back-end system vulnerability
critical8.5
1
Data Breach
2312
Unauthorized access due to exposed credentials
critical8.5
1
Data Breach
2313
Lack of Authentication or Access Restrictions
critical8.5
1
Data Leak
2314
Employee Bypass of Sanctioned Tools
critical8.5
1
Data Leakage
2315
Gateway between the airline and a payment processor
critical8.5
1
Data Breach
2316
CVE-2026-26123
critical8.5
1
Vulnerability Exploitation
2317
CVE-2026-22219 (CVSS 8.3)
critical8.5
1
Data Breach
2318
Critical security flaw in License Express system
critical8.5
1
Data Breach
2319
API vulnerabilities
critical8.5
1
Quantum Computing Threat
2320
Employee deception, potential weak passwords or third-party vulnerabilities (Okta identity management service)
critical8.5
1
Data Breach
2321
CVE-2025-41115 (Improper Mapping of SCIM 'externalId' to Internal 'user.uid')
critical8.5
1
Vulnerability
2322
Weak Authentication in AI Platforms
critical8.5
1
Data Leakage
2323
Biometric authentication exploitation
critical8.5
1
Data Breach
2324
Plain text storage of login details
critical8.5
1
Data Breach
2325
CVE-2025-54309 (CrushFTP)
critical8.5
1
Ransomware
2326
Stolen Personal Data from External Sources
critical8.5
1
Data Breach
2327
Node.js workflows
critical8.5
1
Supply Chain Attack
2328
Compromised Administrator Account
critical8.5
1
Ransomware
2329
Lack of visibility into employee AI tool usage
critical8.5
1
Data Leakage
2330
Hardcoded login credentials in the source code
critical8.5
1
Data Breach
2331
Misunderstandings over Data Ownership
critical8.5
1
Insider Threat
2332
inadequate staff training
critical8.5
1
data breach
2333
legitimate credentials misuse
critical8.5
1
phishing
2334
Vulnerability with technology vendor
critical8.5
1
Data Breach
2335
GoAnywhere MFT (specific CVE not mentioned)
critical8.5
1
Data Breach
2336
Weak encryption (unsalted MD5 password hashes)
critical8.5
1
Data Breach
2337
Improper FOIA Redaction Procedures
critical8.5
1
Data Breach
2338
Weak DMARC/SPF policies, Missing MTA-STS, Unvalidated/Expired Server Certificates, Misconfigured Microsoft 365 Security Tools
critical8.5
1
Data Breach
2339
Architectural weakness in Google Gemini Enterprise and Vertex AI Search (RAG-based trust boundary exploitation)
critical8.5
1
Zero-Click Vulnerability, Indirect Prompt Injection
2340
Hardcoded API Keys in Public Repositories and Websites
critical8.5
1
Data Exposure
2341
Integer Overflow
critical8.5
1
Privilege Escalation
2342
Lack of Access Controls / Unencrypted Data Storage
critical8.5
1
Data Exposure
2343
CVE-2026-3102
critical8.5
1
Vulnerability Exploitation
2344
CVE-2025-61882 (Zero-day in Oracle E-Business Suite)
critical8.5
1
Data Breach
2345
CVE-2025-52436 (Improper Neutralization of Input During Web Page Generation - CWE-79)
critical8.5
1
Cross-Site Scripting (XSS)
2346
Absence of Visibility/Monitoring Tools
critical8.5
1
Data Leakage
2347
NPM Dependencies
critical8.5
1
Malware Deployment
2348
Bias in AI algorithms (e.g., loan approvals, credit scoring)
critical8.5
1
Cybersecurity Risk Assessment
2349
Oracle’s eBusiness Suite software vulnerability
critical8.5
1
Data Breach
2350
MOVEit® Secure File Transfer software
critical8.5
1
Data Breach
2351
Inadequate security measures (unspecified)
critical8.5
1
Data Breach
2352
Client-Side Reward Points Validation (Mobile App)
critical8.5
1
Data Exposure
2353
lack of phishing-resistant authentication
critical8.5
1
phishing
2354
Unlimited Coupon Redemptions (CosMc’s App)
critical8.5
1
Data Exposure
2355
Multi-Factor Authentication (MFA) bypass, Session token hijacking, Credential theft via phishing kits
critical8.5
1
Phishing/Vishing, Credential Theft, Data Breach, Session Hijacking
2356
CVE-2026-23597
critical8.5
1
Privilege Escalation
2357
Customer inadvertent disclosure of credentials
critical8.5
1
Data Breach
2358
improper access controls / misconfigured portal
critical8.5
1
data breach
2359
Fragmented policies for data in motion
critical8.5
1
Data Governance Blind Spot
2360
Lack of input validation controls
critical8.5
1
Data Security Audit
2361
Incorrect privacy settings on public maps
critical8.5
1
Data Exposure
2362
Unsecured email API endpoints with improper input validation
critical8.5
1
Phishing, Data Theft, Persistent Access
2363
Insufficient data filtering in AI screenshot feature
critical8.5
1
Data Breach
2364
Improper data handling via third-party tracking tools (e.g., Google Analytics, Meta Pixel)
critical8.5
1
Data Privacy Breach
2365
Human Error (Improper Document Upload)
critical8.5
1
Data Breach (Inadvertent Disclosure)
2366
CVE-2024-13496
critical8.5
1
SQL Injection
2367
CVE-2025-5806
critical8.5
1
Cross-Site Scripting (XSS)
2368
Weak or default SSH credentials
critical8.5
1
Botnet
2369
CVE-2026-XXXXX (Local WebSocket Gateway Authentication Bypass)
critical8.5
1
Vulnerability Exploitation
2370
Unpatched flaw (addressed in July 2023 update, additional vulnerabilities patched in October 2023)
critical8.5
1
Data Breach
2371
Lack of Data Encryption in University Advancement Database
critical8.5
1
Data Breach
2372
Arbitrary Order Data Injection (CosMc’s App)
critical8.5
1
Data Exposure
2373
Misconfigured Remote Access Systems
critical8.5
1
Data Breach
2374
Improper Access by Employee
critical8.5
1
Data Breach
2375
CVE-2026-22218 (Arbitrary File Read)
critical8.5
1
Vulnerability Exploitation
2376
Improper Access Control (Publicly Exposed Sensitive Data)
critical8.5
1
Data Breach
2377
Compromised Salesforce integrations, Zendesk customer support system
critical8.5
1
Data Breach
2378
CVE-2026-24308
critical8.5
1
Data Exposure
2379
Download of malicious apps
critical8.5
1
Malware
2380
CVE-2025-7399 (Unauthenticated RCE in Samsung MagicINFO 9 Server)
critical8.5
1
Vulnerability Exploitation
2381
CVE-2026-20046
critical8.5
1
Privilege Escalation
2382
Human error (employee susceptibility to scams), lack of robust multi-factor authentication (MFA) enforcement
critical8.5
1
Data Breach
2383
Improper Token Management
critical8.5
1
Data Breach
2384
CVE pending (related to 'node-forge' cryptographic signature verification flaw)
critical8.5
1
Vulnerability
2385
Human Factor (Social Engineering)
critical8.5
1
Data Breach
2386
Delayed Incident Reporting
critical8.5
1
Data Breach
2387
MOVEit secure file transfer tool vulnerability
critical8.5
1
Data Breach
2388
Improperly secured file on public-facing website
critical8.5
1
Data Breach
2389
Inadequate IT security measures
critical8.5
1
Data Breach
2390
Automated link preview generation in AI agents
critical8.5
1
Data Exfiltration
2391
Improper disposal of hardware containing sensitive data
critical8.5
1
Data Breach (Physical/Improper Disposal)
2392
Inadequate encryption, insufficient vendor security vetting
critical8.5
1
Data Breach
2393
CVE-2026-1602
critical8.5
1
Authentication Bypass
2394
CVE-2025-55227 (SQL Server Privilege Escalation)
critical8.5
1
Malware (Infostealer)
2395
Reuse of leaked personal data, Lack of user awareness
critical8.5
1
Phishing / Social Engineering
2396
Social engineering, in-memory execution, process hollowing, AMSI/ETW bypass
critical8.5
1
Spear-Phishing, Malware (Keylogger), Credential Theft
2397
CVE-2026-25108 (OS Command Injection - CWE-78)
critical8.5
1
Command Injection
2398
CW1226324 (Copilot DLP bypass)
critical8.5
1
AI Integration Bug
2399
Logic error in NextAuth JWT callback (GHSA-7hg4-x4pr-3hrg)
critical8.5
1
Authentication Bypass
2400
CVE-2025-54236 (SessionReaper - Session Data Storage on File System)
critical8.5
1
Vulnerability Disclosure
2401
Absence of web application firewall (WAF)
critical8.5
1
Data Security Audit
2402
Hardcoded Flask secret key, weak authentication controls, disabled security tools (Windows Defender), DLP bypass
critical8.5
1
AI-driven security bypass, vulnerability exploitation, data exfiltration
2403
Misconfigured Google Firebase database
critical8.5
1
Data Breach
2404
Default Network Access Settings (Pro/Max accounts)
critical8.5
1
Data Exfiltration
2405
Lack of Encryption on Portable Device
critical8.5
1
Data Breach (Physical Theft)
2406
Privilege Escalation Flaw in FIA Driver Categorisation Website
critical8.5
1
Data Breach
2407
Human error (social engineering of third-party employee)
critical8.5
1
Data Breach
2408
Weak Password ('123456')
critical8.5
1
Data Breach
2409
Net-NTLMv1 Authentication Protocol
critical8.5
1
Vulnerability Disclosure
2410
Click2Gov online payment system
critical8.5
1
Data Breach
2411
Improper Disposal of Sensitive Data
critical8.5
1
Data Breach
2412
lack of access controls and encryption for cloud-hosted databases
critical8.5
1
data breach
2413
Accellion FTA (specific CVE not mentioned)
critical8.5
1
Data Breach
2414
Valid Log-in Credentials
critical8.5
1
Data Breach
2415
Excessive account permissions
critical8.5
1
Data Breach
2416
Human Error (Compromised Employee Email Account)
critical8.5
1
Data Breach
2417
VMware Vulnerabilities
critical8.5
1
Ransomware
2418
unsecured backup databases co-located with active databases
critical8.5
1
data breach
2419
Hard-coded passwords in HTML/APIs
critical8.5
1
Unauthorized Access
2420
Poor security practices for remote logins
critical8.5
1
Data Breach
2421
Login Page Bug
critical8.5
1
Data Breach
2422
Absence of defensible deletion policies
critical8.5
1
Data Breach
2423
Reused credentials from older data breaches
critical8.5
1
Data Breach
2424
High-severity vulnerability in ADSelfService Plus software
critical8.5
1
Vulnerability Exploit
2425
Insufficient validation process for third-party API access
critical8.5
1
Data Breach
2426
Unsecured Elasticsearch cluster
critical8.5
1
Data Breach
2427
CVE-2025-14560
critical8.5
1
Vulnerability Exploitation
2428
improper data retention practices (government IDs)
critical8.5
1
data breach
2429
Compromised company account on GitHub
critical8.5
1
Data Breach
2430
WebKit memory-related errors
critical8.5
1
Vulnerability Exploitation
2431
Insufficient Behavioral Monitoring for Authorized Users
critical8.5
1
Data Breach
2432
OpenClaw WebSocket API Authentication Bypass
critical8.5
1
Supply Chain Attack
2433
CVE-2025-1724
critical8.5
1
Authentication Vulnerability
2434
Unsecured digital identities for AI agents
critical8.5
1
Data Leakage
2435
Human vulnerability (bribery of overseas support agents)
critical8.5
1
Data Breach
2436
Internal Collaboration Tool
critical8.5
1
Data Breach
2437
Internal system flaw exposing plain text passwords
critical8.5
1
Data Breach
2438
Failure to Follow Standard Operating Procedures
critical8.5
1
Data Breach
2439
faiblesse des mots de passe utilisateurs
critical8.5
1
cyberattaque
2440
outdated software (13 months without updates)
critical8.5
1
data breach
2441
Unknown vulnerability in Oracle E-Business Suite (CVE not specified)
critical8.5
1
Data Breach / Ransomware Attack
2442
Lack of multi-factor authentication (MFA), Basic security lapses (MMH)
critical8.5
1
Data Breach
2443
CVE-2025-5777 (CitrixBleed 2)
critical8.5
1
Reconnaissance
2444
Mishandled private keys in AI-generated JavaScript
critical8.5
1
Data Breach
2445
improper access controls / misconfigured storage
critical8.5
1
data exposure
2446
active former employee credentials
critical8.5
1
data breach
2447
abuse of LaunchAgents for persistence
critical8.5
1
malware
2448
Inconsistent security measures
critical8.5
1
Phishing
2449
Human error (tricked employees into handing over login credentials for internal Salesforce software)
critical8.5
1
Data Breach
2450
Unauthorized access to third-party system storing customer data
critical8.5
1
Data Breach
2451
improper access controls in the Texas Integrated Grant Reporting system
critical8.5
1
data breach
2452
Human Error (Telecommunications Employee Deception)
critical8.5
1
Data Breach
2453
Progress MOVEit Transfer
critical8.5
1
Data Breach
2454
Exploitation of accessibility permissions, fake overlays
critical8.5
1
Trojan
2455
Insecure data transmission by browser extensions
critical8.5
1
Data Leakage
2456
Publicly Accessible Firebase Storage Bucket
critical8.5
1
Data Breach
2457
MOVEit file transfer platform vulnerability
critical8.5
1
Data Breach
2458
vBulletin security hole
critical8.5
1
Data Breach
2459
Incorrect System Settings
critical8.5
1
Data Leak
2460
GoAnywhere MFT SaaS
critical8.5
1
Data Breach
2461
Confidential Virtual Machine (CVM) exploitation
critical8.5
1
Zero-day vulnerability
2462
Abandoned domain takeover, lack of runtime URL validation in Microsoft add-ins
critical8.5
1
Phishing
2463
Insecure 'super admin' APIs allowing unauthenticated high-privilege account creation
critical8.5
1
Data Exposure
2464
Unpatched Cloud Services
critical8.5
1
Cloud Security Breach
2465
Computer Virus
critical8.5
1
Data Breach
2466
missing server-side encryption
critical8.5
1
data breach
2467
Delayed breach detection
critical8.5
1
Data Breach
2468
Unmonitored mass data downloads/email exfiltration
critical8.5
1
Data Breach
2469
Lack of access controls and encryption
critical8.5
1
Data Breach
2470
Legacy accounts
critical8.5
1
Phishing
2471
Unpatched React frontend application
critical8.5
1
Data Breach
2472
Inadequate cybersecurity measures (alleged)
critical8.5
1
Data Breach
2473
Coding Transmission Error
critical8.5
1
Data Breach
2474
CWE-269: Improper Privilege Management
critical8.5
1
Data Exposure
2475
Insufficient DLP and behavioral analytics
critical8.5
1
Data Breach
2476
CVE-2025-3648
critical8.5
1
Vulnerability Exploitation
2477
Third-party vendor vulnerabilities (historical reference: Target 2013 breach)
critical8.5
1
Data Breach
2478
CVE-2025-54136 (MCPoison - MCP Trust Bypass)
critical8.5
1
Vulnerability Exploitation
2479
unpatched vulnerabilities in network devices
critical8.5
1
ransomware
2480
Supply chain weakness in analytics data handling
critical8.5
1
Data Breach
2481
Broken Access Control (OWASP Top 10)
critical8.5
1
Data Exposure
2482
Unauthenticated vulnerabilities (56% of tracked vulnerabilities in 2025)
critical8.5
1
Supply Chain Attack
2483
CVE-2025-4123
critical8.5
1
Vulnerability Exploitation
2484
MOVEit application by IBM
critical8.5
1
Data Breach
2485
Social Engineering, Trust Exploitation
critical8.5
1
Phishing
2486
Lack of user verification for extension authenticity and over-permissioned access
critical8.5
1
Malware (Malicious Browser Extension)
2487
MOVEit Transfer Zero-Day (CVE-2023-34362)
critical8.5
1
Data Breach
2488
weak password practices
critical8.5
1
data breach
2489
CVE-2026-21514 (CWE-807)
critical8.5
1
Security Feature Bypass
2490
Unsecured personal information handling
critical8.5
1
Data Breach
2491
CWE-200: Exposure of Sensitive Information
critical8.5
1
Data Exposure
2492
Vertex AI Agent Engine Service Agent Hijacking
critical8.5
1
Privilege Escalation
2493
CVE-2026-23596
critical8.5
1
Privilege Escalation
2494
CVE-2025-9368 (Resource Allocation Without Limits)
critical8.5
1
Denial-of-Service
2495
Inadequate acceptable use policies for AI
critical8.5
1
Data Leakage
2496
Lack of Command-Line Execution Awareness
critical8.5
1
APT (Advanced Persistent Threat)
2497
Unspecified security flaw
critical8.5
1
Data Leak
2498
CVE-2025-32896
critical8.5
1
Remote Code Execution (RCE)
2499
weak threat-detection system
critical8.5
1
data breach
2500
Oracle E-Business Suite (EBS) vulnerability
critical8.5
1
Data Breach
2501
Clerical Error
critical8.5
1
Data Breach
2502
Contact Discovery Mechanism Flaw
critical8.5
1
Privacy Violation
2503
CVE-2025-49870 (Unauthenticated SQL Injection in PayPal IPN handling)
critical8.5
1
Vulnerability
2504
Third-Party Application Misconfiguration
critical8.5
1
Data Breach
2505
Poor Security Practices
critical8.5
1
Data Breach
2506
Inadequate governance for AI systems
critical8.5
1
Cybersecurity Risk Assessment
2507
CVE-2025-7775
critical8.5
1
Vulnerability Exploitation
2508
Human Error / Social Engineering
critical8.5
1
Phishing Attack
2509
Lack of Multi-Factor Authentication (MFA) (inferred)
critical8.5
1
Data Breach
2510
Lack of separation between instructions and data in large language models
critical8.5
1
AI Vulnerability Misunderstanding
2511
Inadequate employee training on cybersecurity risks
critical8.5
1
Data Breach
2512
lack of sandboxing for physical GPU-equipped machines
critical8.5
1
malware
2513
Human Error (Failure to Redact Sensitive Data)
critical8.5
1
Data Breach (Unintentional Disclosure)
2514
CVE-2025-54910 (Office RCE)
critical8.5
1
Malware (Infostealer)
2515
CWE-798: Use of Hard-coded Credentials
critical8.5
1
Data Breach
2516
Vulnerability in GoAnywhere file transfer platform
critical8.5
1
Data Breach
2517
Software Flaw
critical8.5
1
Ransomware
2518
Lack of Policy Enforcement for AI Tool Usage
critical8.5
1
Data Breach
2519
CVE-2025-54253 (Misconfiguration in AEM Forms - Apache Struts 'devMode' enabled + Authentication Bypass)
critical8.5
1
Vulnerability Exploitation
2520
Lack of Security Reviews
critical8.5
1
Security Oversight
2521
Outdated SCADA systems, integrated IT/OT environment
critical8.5
1
Ransomware
2522
Data Migration Error
critical8.5
1
Data Breach
2523
CVE-2025-8088
critical8.5
1
Zero-day exploitation, Phishing, Malware installation
2524
Unapplied security patches to its software
critical8.5
1
Data Breach
2525
Unauthorized access to Microsoft Office 365 email account
critical8.5
1
Data Breach
2526
CVE-2026-1603
critical8.5
1
Authentication Bypass
2527
internal API vulnerability (details undisclosed)
critical8.5
1
data breach
2528
Obscured opt-out tools, 'no index' instructions, and dark patterns
critical8.5
1
Data Breach
2529
Compromised GitHub Tokens
critical8.5
1
Identity Compromise
2530
Authentication Bypass
critical8.5
1
Authentication Bypass
2531
Human error (deception of individuals into disclosing confidential information)
critical8.5
1
Data Breach
2532
Incorrectly configured database
critical8.5
1
Data Leak
2533
Unauthorized access to cloud system
critical8.5
1
Data Exposure
2534
CVE-2025-68428
critical8.5
1
Local File Inclusion / Path Traversal
2535
Human Error (Employee fell for phishing scam)
critical8.5
1
Data Breach
2536
CVE-2025-54236 (Improper Input Validation in Adobe Commerce/Magento)
critical8.5
1
Vulnerability Exploitation
2537
Decentralized data movement systems
critical8.5
1
Data Governance Blind Spot
2538
SQL Injection vulnerability in MOVEit Transfer
critical8.5
1
Ransomware
2539
human trust in legacy inheritance process
critical8.5
1
phishing
2540
Improper data storage practices
critical8.5
1
Data Breach
2541
Unauthorized Access to API Key
critical8.5
1
Data Breach
2542
Single Sign-On (SSO) accounts (Okta and other identity platforms), MFA manipulation
critical8.5
1
Phishing (Vishing), Data Breach, Credential Theft
2543
CVE-2026-0709 (Insufficient Input Validation)
critical8.5
1
Command Execution Vulnerability
2544
persistent background execution via detached screen sessions
critical8.5
1
malware
2545
Lack of account management (inactive accounts not decommissioned)
critical8.5
1
Data Breach
2546
Weak encryption in data-sharing mandates
critical8.5
1
Cybersecurity Risk Assessment
2547
Weak verification processes for new user accounts on online gambling platforms
critical8.5
1
Fraud Scheme
2548
CVE-2025-7659
critical8.5
1
Vulnerability Exploitation
2549
Inadequately secured network (Salesloft)
critical8.5
1
Data Breach (Third-Party Vendor Compromise)
2550
Programming Errors
critical8.5
1
Data Breach
2551
Illicit tactics to bypass digital rights management (DRM)
critical8.5
1
Data Breach
2552
Inadequate logging
critical8.5
1
Data Breach
2553
Improperly secured database
critical8.5
1
Data Exposure
2554
Third-party Salesforce tenant misconfiguration/access controls
critical8.5
1
Data Breach
2555
Zero-day vulnerability in third-party software platform
critical8.5
1
Data Breach
2556
Unauthorized access by authorized user
critical8.5
1
Data Breach
2557
CVE-2026-25921 (CWE-345: Insufficient Verification of Data Authenticity)
critical8.5
1
Supply-Chain Attack
2558
CVE-2025-33228
critical8.5
1
Vulnerability
2559
Misconfigured Stravito Access (Internal Documents)
critical8.5
1
Data Exposure
2560
Disabled Workspace Trust in Cursor (VS Code fork)
critical8.5
1
Arbitrary Code Execution
2561
CVE-2024-49039
critical8.5
1
Zero-Day Exploit
2562
User Trust in Signature Requests
critical8.5
1
DNS Hijacking
2563
CVE-2026-0628 (declarativeNetRequest API misconfiguration in Gemini AI panel)
critical8.5
1
Privilege Escalation
2564
CVE-2026-22153 (FG-IR-25-1052), CWE-305 (Authentication Bypass by Primary Weakness)
critical8.5
1
Authentication Bypass
2565
Third-Party Platform Security (Salesforce)
critical8.5
1
Data Breach
2566
Poor Cybersecurity Practices
critical8.5
1
Data Breach
2567
Trivial vulnerability
critical8.5
1
Data Breach
2568
user susceptibility to phishing
critical8.5
1
phishing
2569
user trust in legitimate-looking emails/websites
critical8.5
1
spear-phishing
2570
compromised Booking.com accounts
critical8.5
1
phishing
2571
Progress Software MOVEit file transfer application vulnerability
critical8.5
1
Data Breach
2572
lack of enterprise-grade security for AI tools
critical8.5
1
ransomware
2573
Internal Glitch
critical8.5
1
Data Exposure
2574
Info-stealing malware infections, lack of multi-factor authentication
critical8.5
1
Credential Stuffing
2575
Weaknesses in IVR System Authentication
critical8.5
1
Cyberattack
2576
Unauthorized access to internal systems
critical8.5
1
Data Breach, Extortion
2577
CVE-2025-55177 (WhatsApp Zero-Click)
critical8.5
1
Vulnerability Exploitation
2578
account takeover (ATO)
critical8.5
1
supply-chain attack
2579
CWE-284: Improper Access Control
critical8.5
1
Data Exposure
2580
Unsecured Data Transfer Methods
critical8.5
1
Insider Threat
2581
Improper Database Security
critical8.5
1
Data Leak
2582
Inadequate physical access controls
critical8.5
1
Data Breach
2583
Inadequate AI governance and security oversight
critical8.5
1
Data Breach
2584
Weaknesses in vendor credential management
critical8.5
1
Data Breach
2585
Docker MCP Gateway RCE
critical8.5
1
Supply Chain Attack
2586
manque de protection des terminaux personnels
critical8.5
1
cyberattaque
2587
Signal’s 'linked devices' feature
critical8.5
1
Cyber Espionage
2588
Zero-day vulnerability in third-party software (patched post-incident)
critical8.5
1
Data Breach
2589
Absence of phishing-resistant MFA
critical8.5
1
Data Breach
2590
Java
critical8.5
1
Cyber Attack
2591
CVE-2024-3210
critical8.5
1
Data Breach
2592
BeyondTrust (CVE-2026-1731)
critical8.5
1
APT Activity
2593
Stolen Login Information
critical8.5
1
Data Breach
2594
Technical failure in recognizing court updates
critical8.5
1
Data Leak
2595
Compromised remote access credentials from third-party service providers
critical8.5
1
Data Breach
2596
Social engineering, lack of multi-factor authentication
critical8.5
1
Phishing Campaign
2597
CVE-2026-20040
critical8.5
1
Privilege Escalation
2598
Unknown system flaws in retail/luxury brand infrastructure
critical8.5
1
Data Breach
2599
Poor Internal Access Controls
critical8.5
1
Data Breach
2600
Context Poisoning in AI Conversation History
critical8.5
1
Data Breach
2601
Improper data retention (post-contract)
critical8.5
1
Data Breach
2602
CVE-2026-21533
critical8.5
1
Elevation of Privilege
2603
Intermediate Data Leakage (Predictions, Losses)
critical8.5
1
Privacy Breach
2604
Insufficient data encryption
critical8.5
1
Data Breach
2605
CVE-2025-9242 (Out-of-bounds write in Fireware OS ‘iked’ process)
critical8.5
1
Vulnerability Exposure
2606
Fragmented Token Extraction via Optical/Transcription Methods
critical8.5
1
Prompt Extraction
2607
CVE-2025-59367 (Authentication Bypass in DSL-series routers)
critical8.5
1
Vulnerability
2608
Insider access to patient records
critical8.5
1
Data Breach
2609
CVE-2024-40766 (SonicWall Improper Access Control)
critical8.5
1
Malware (Infostealer)
2610
UAC bypass via COM auto-elevation (ICMLuaUtil through cmlua.dll)
critical8.5
1
Trojan
2611
Unauthorized use of Stripe API key
critical8.5
1
Data Breach
2612
unsecured teacher credentials
critical8.5
1
unauthorized access
2613
Insufficient de-identification
critical8.5
1
Data Breach
2614
Third-party platforms used for marketing and operations
critical8.5
1
Data Breach
2615
Misconfigured database lacking proper authentication controls
critical8.5
1
Data Breach
2616
Insufficient Bot Detection/Prevention
critical8.5
1
Cyberattack
2617
Account recovery workflows (password resets, MFA re-enrollment, help-desk recovery requests)
critical8.5
1
Identity Breach
2618
Cisco SD-WAN flaws
critical8.5
1
APT Activity
2619
Deceptive chats impersonating Signal Support chatbot
critical8.5
1
Cyber Espionage
2620
CVE-2026-21514 (CWE-807 - Improper security decision-making based on untrusted inputs)
critical8.5
1
Zero-Day Vulnerability Exploitation
2621
Prolonged Email Retention (6+ years)
critical8.5
1
Data Breach
2622
Human Error (Misaddressed Email)
critical8.5
1
Data Breach (Phishing / Unauthorized Disclosure)
2623
Unencrypted data storage in an internet-accessible environment
critical8.5
1
Data Breach
2624
Excessive Discord SDK logging writing private data to local log files in plaintext
critical8.5
1
Data Exposure
2625
human trust in AI-generated content
critical8.5
1
fraud
2626
MOVEit Transfer Server Vulnerability
critical8.5
1
Data Breach
2627
lack of code signing verification for replaced applications
critical8.5
1
malware
2628
MOVEit file transfer platform
critical8.5
1
Data Breach
2629
Progress Software's MOVEit secure file transfer tool
critical8.5
1
Data Breach
2630
Unusual access to GitHub repositories
critical8.5
1
Hacking/Unauthorized Access
2631
Employee Access
critical8.5
1
Data Breach
2632
Improper use of tracking technologies on authenticated pages (patient portals) without HIPAA-compliant authorizations or business associate agreements
critical8.5
1
Data Breach
2633
Autofill Functionality Abuse
critical8.5
1
Vulnerability Disclosure
2634
Misconfiguration in Electron framework
critical8.5
1
Security Vulnerability
2635
Remote Access to Car Functions
critical8.5
1
Vulnerability Exploit
2636
Lack of disclosure and user consent for data collection
critical8.5
1
Data Exfiltration
2637
SOHO devices
critical8.5
1
Credential Theft
2638
eCompli application vulnerability
critical8.5
1
Data Breach
2639
gaps in business associate oversight
critical8.5
1
ransomware
2640
CVE-2025-33229
critical8.5
1
Vulnerability
2641
misconfigured data visualization tool
critical8.5
1
data exposure
2642
Time-of-Check to Time-of-Use vulnerability in Alpitronic HYC50 EV charger
critical8.5
1
Zero-Day Vulnerabilities
2643
Lack of input validation in web configuration interfaces
critical8.5
1
DNS Hijacking
2644
Secure file transfer software
critical8.5
1
Data Breach
2645
CVE-2026-1220 (Race Condition in V8 JavaScript Engine)
critical8.5
1
Vulnerability Exploitation
2646
Website Setup Error
critical8.5
1
Credential Leak
2647
CVE-2026-20817 (CWE-280: Improper Handling of Insufficient Permissions)
critical8.5
1
Privilege Escalation
2648
Password recovery and sharing features
critical8.5
1
Data Breach/Vulnerability Exposure
2649
Debug Log File
critical8.5
1
Data Breach
2650
Lack of Monitoring for Unauthorized Data Exfiltration
critical8.5
1
Data Breach
2651
CVE-2025-67601
critical8.5
1
Vulnerability Exploitation
2652
CVE-2025-59451 (Predictable Identifiers)
critical8.5
1
Denial-of-Service
2653
Known system vulnerability
critical8.5
1
Data Breach
2654
improper access controls / lack of authentication for cloud storage
critical8.5
1
data breach
2655
Accellion File Transfer Appliance vulnerability
critical8.5
1
Data Breach
2656
Log4Shell
critical8.5
1
Ransomware
2657
Leaked Passwords
critical8.5
1
Data Breach
2658
Publicly Accessible .env Files
critical8.5
1
Data Exposure
2659
Unauthenticated Admin Functions (GRS Panel, HTML Injection)
critical8.5
1
Data Exposure
2660
Lack of multi-factor authentication (MFA) on file-transfer services (ShareFile, OwnCloud, Nextcloud)
critical8.5
1
Data Breach
2661
User Privacy
critical8.5
1
Privacy Breach
2662
Insufficient monitoring and control over non-human credentials
critical8.5
1
Data Breach / Lateral Movement
2663
Key Reuse Vulnerability (Android)
critical8.5
1
Privacy Violation
2664
Insufficient Agent Permission Controls
critical8.5
1
AI Security Vulnerabilities
2665
Insufficient URL Security
critical8.5
1
Data Breach
2666
Over-permissioned OAuth scopes
critical8.5
1
Data Breach
2667
lack of monitoring
critical8.5
1
data breach
2668
DOM-Based UI Manipulation
critical8.5
1
Vulnerability Disclosure
2669
Prompt Injection Vulnerabilities
critical8.5
1
AI Security Vulnerabilities
2670
CVE-2023-28771
critical8.5
1
Remote Code Execution
2671
CVE-2025-30248 (CWE-427: Uncontrolled Search Path Element)
critical8.5
1
DLL Hijacking
2672
third-party vendor (Salesforce) security flaw
critical8.5
1
data breach
2673
Unrotated Service Account Token
critical8.5
1
Data Breach (OAuth Token Compromise)
2674
Unknown (zero-day) vulnerability in Oracle E-Business Suite (EBS)
critical8.5
1
Data Breach
2675
Trusted domain chaining, search engine trust exploitation
critical8.5
1
Phishing
2676
Insufficient sanitization of user input in XML processing
critical8.5
1
XML External Entity (XXE) Injection
2677
Lack of software updates for gear shifters
critical8.5
1
Vulnerability Exploitation
2678
Weaknesses in Almaviva’s infrastructure
critical8.5
1
Data Breach
2679
Insecure Direct Object Reference (Sapphos API)
critical8.5
1
Malware (Infostealer)
2680
Recently patched vulnerability in Oracle E-Business Suite (for Cl0p ransomware incident)
critical8.5
1
Data Breach
2681
Misconfigured Ollama endpoints (port 11434)
critical8.5
1
LLMjacking
2682
Storage and transmission of device-specific data (e.g., precise geolocation, browsing history, search queries)
critical8.5
1
Data Exposure
2683
Unspecified vulnerability in Salesloft Drift's OAuth token management
critical8.5
1
Supply Chain Attack
2684
CWE-319: Cleartext Transmission of Sensitive Information (weak AES encryption)
critical8.5
1
Data Breach
2685
Poor Staff Awareness of Insider Threats
critical8.5
1
Unauthorized Access
2686
improper data retention by third-party vendor
critical8.5
1
data breach
2687
Publicly Accessible Cloud Database
critical8.5
1
Data Exposure
2688
Social Engineering, macOS TCC Bypass (SQL Injection into Privacy Database)
critical8.5
1
Phishing, Malware
2689
CVE-2026-20700 (Memory-corruption in dyld component)
critical8.5
1
Zero-Day Exploit
2690
Insufficient Monitoring
critical8.5
1
Data Breach
2691
OpenAI-compatible APIs (port 8000)
critical8.5
1
LLMjacking
2692
Sleeping Beauty
critical8.5
1
Vulnerability Exploitation
2693
MongoDB database vulnerability
critical8.5
1
Data Breach
2694
Mistake that exposed personal and financial information
critical8.5
1
Data Breach
2695
Insufficient Authentication/Authorization Controls for Reimbursement Account Access
critical8.5
1
Data Breach / Unauthorized Access
2696
Inadequate Audit Logs
critical8.5
1
Data Breach
2697
Missing Reporting Mechanisms for Objectionable Content
critical8.5
1
Data Breach
2698
SureTriggers Vulnerability
critical8.5
1
Vulnerability Exploitation
2699
Human Error (Improper Handling of Public Records Request)
critical8.5
1
Data Breach (Unintentional Disclosure)
2700
publicly accessible repositories
critical8.5
1
data exposure
2701
Lack of Input Validation
critical8.5
1
Data Breach
2702
Backup Database Access
critical8.5
1
Data Breach
2703
Unsecured database, malware infection via phishing emails/malicious websites/cracked software
critical8.5
1
Data Exposure
2704
Unpatched 'n-day' vulnerability in end-of-life software
critical8.5
1
Data Breach
2705
Unspecified coding error in SchoolMessenger application
critical8.5
1
Data Breach
2706
Unauthorized data transmission via third-party integrations
critical8.5
1
Data Breach
2707
Excessive OAuth permissions (Mail.Read, offline_access, profile/openid)
critical8.5
1
OAuth Abuse
2708
CVE-2023-6895
critical8.5
1
Espionage
2709
social engineering targeting IT helpdesks
critical8.5
1
data breach
2710
Insufficient internal access controls
critical8.5
1
Data Breach
2711
Trust in community integrations, lack of sandboxing in n8n community nodes
critical8.5
1
Supply Chain Attack
2712
Critical vulnerability
critical8.5
1
Data Breach, Account Hijacking
2713
A setting within one of Petco's software applications that inadvertently allowed certain files to be accessible online
critical8.5
1
Data Breach
2714
Human error (tricked customer support employees into granting access)
critical8.5
1
Data Breach
2715
Lack of Multi-Factor Authentication (MFA) for Call-In Access
critical8.5
1
Cyberattack
2716
CVE-2025-48561
critical8.5
1
Data Theft
2717
Frontend Access Control
critical8.5
1
DNS Hijacking
2718
CVE-2025-43300 (Apple Zero-Day)
critical8.5
1
Vulnerability Exploitation
2719
Improper use of private email account
critical8.5
1
Data Breach
2720
Absence of vendor security assessments for AI tools
critical8.5
1
Data Leakage
2721
CVE-2025-1080
critical8.5
1
Remote Code Execution
2722
ShadowLeak (CVE pending)
critical8.5
1
Data Exfiltration
2723
Insufficient sanitization in the `serialize` function (CVE-2026-0969)
critical8.5
1
Remote Code Execution (RCE)
2724
Weak Authentication (SSO)
critical8.5
1
Data Breach
2725
CVE-2025-13834
critical8.5
1
Information Leak
2726
Failure to remediate known vulnerabilities
critical8.5
1
Data Breach
2727
CVE-2026-1235
critical8.5
1
Cross-Site Scripting (XSS)
2728
Weak MFA
critical8.5
1
Data Breach
2729
Unverified Update Mechanism (Lack of Code Signing)
critical8.5
1
Vulnerability
2730
Access Control Mechanisms
critical8.5
1
Data Breach
2731
third-party security gaps
critical8.5
1
data breach
2732
Weak Authentication Mechanisms (e.g., no 2FA)
critical8.5
1
Privacy Violation
2733
CVE-2025-33230
critical8.5
1
Vulnerability
2734
CVE-2025-33231
critical8.5
1
Vulnerability
2735
Unpatched RCE vulnerabilities
critical8.5
1
Botnet
2736
Architectural flaw in GitHub MCP server allowing AI agents to access and exfiltrate data from private repositories
critical8.5
1
Prompt Injection
2737
Lack of Visibility into AI Data Flows
critical8.5
1
AI Security Vulnerabilities
2738
Coding error in PayPal Working Capital (PPWC) loan application
critical8.5
1
Data Breach
2739
CVE-2025-55232 (Microsoft HPC Pack RCE)
critical8.5
1
Malware (Infostealer)
2740
Unrestricted internet access to real-time surveillance data without authentication
critical8.5
1
Data Breach
2741
Failure to implement and maintain reasonable security measures
critical8.5
1
Data Breach
2742
Human Error (Inadvertent Publication of Sensitive Data)
critical8.5
1
Data Breach (Inadvertent Disclosure)
2743
Improper Access Controls (Publicly Accessible Folder)
critical8.5
1
Data Breach
2744
Sequentially numbered and guessable URLs
critical8.5
1
Data Exposure
2745
AirSnitch (exploits gaps in MAC address, encryption key, and IP address linking across network layers)
critical8.5
1
Vulnerability Exploitation
2746
CVE-2025-20333 & CVE-2025-20363 (Cisco ASA VPN)
critical8.5
1
Ransomware
2747
Unauthorized Access to Personal Information
critical8.5
1
Data Theft
2748
Lack of encryption for sensitive data
critical8.5
1
Data Breach
2749
VMware Aria Operations
critical8.5
1
APT Activity
2750
MOVEit Transfer programme zero-day vulnerability
critical8.5
1
Data Breach
2751
Weak or Stolen OAuth Token Management (External App Connection to Salesforce)
critical8.5
1
Data Breach
2752
Security flaw in third-party software
critical8.5
1
Data Breach
2753
AI Supply Chain Weaknesses
critical8.5
1
Supply Chain Attack
2754
CVE-2025-20352 (SNMP RCE in Cisco IOS/IOS XE)
critical8.5
1
unauthorized access
2755
Plug-in on e-commerce platform
critical8.5
1
Data Breach
2756
Incremental features and customizations accumulating risk, lack of proper access controls
critical8.5
1
Misconfiguration
2757
Excessive permissions, hidden app functionality, cloud service abuse (Firebase, Google Apps Script, Telegram, Google Drive)
critical8.5
1
Malware (Remote Access Trojan - RAT)
2758
CVE-2025-4632 (Improper Pathname Limitation Leading to Arbitrary File Write)
critical8.5
1
Vulnerability Exploitation
2759
Outdated cryptographic practices
critical8.5
1
Data Breach/Vulnerability Exposure
2760
CVE-2025-41244 (VMware Aria Operations and VMware Tools Privilege Escalation)
critical8.5
1
Privilege Escalation
2761
CVE-2025-4366
critical8.5
1
HTTP Request Smuggling
2762
Improper data handling and lack of safeguards
critical8.5
1
Data Breach
2763
CVE-2025-54135
critical8.5
1
Vulnerability Exploitation
2764
Legacy encryption
critical8.5
1
Data Breach/Vulnerability Exposure
2765
Employee Access Abuse
critical8.5
1
Data Leak
2766
Unconstrained CI/CD Service Accounts
critical8.5
1
Identity Compromise
2767
Operational security lapse (SSH authentication key reuse across servers)
critical8.5
1
phishing
2768
FG-IR-26-060 (CWE-288: Authentication Bypass Using an Alternate Path or Channel)
critical8.5
1
Authentication Bypass
2769
SIM-swapping
critical8.5
1
SIM-swapping
2770
Inadequate cybersecurity protocols, weak security controls
critical8.5
1
Data Breach
2771
RoguePilot (GitHub Codespaces/Copilot)
critical8.5
1
Vulnerability Exploitation
2772
Lack of end-to-end encryption for ID uploads
critical8.5
1
Data Breach Risk
2773
Employee Impersonation
critical8.5
1
Data Breach
2774
System misconfiguration reactivating disabled feature
critical8.5
1
Data Breach
2775
unencrypted patient records
critical8.5
1
ransomware
2776
Lack of robust identity verification during hiring process
critical8.5
1
Data Breach (Insider Threat / Identity Misuse)
2777
Human Error (Social Engineering via Phone Calls)
critical8.5
1
Data Breach
2778
Reused passwords across multiple accounts
critical8.5
1
Credential Stuffing
2779
Unsecured storage of sensitive data
critical8.5
1
Data Breach
2780
Ineffective Security Configurations
critical8.5
1
Data Breach
2781
Unencrypted student data
critical8.5
1
Data Breach
2782
Insufficient Third-Party Vendor Security
critical8.5
1
Data Breach
2783
WebOTP API, Clipboard Access, Notification Control, PWA Installation Permissions, Android Permissions Abuse
critical8.5
1
Phishing
2784
Overprivileged OAuth Tokens
critical8.5
1
Data Breach (OAuth Token Compromise)
2785
CVE-2025-3155
critical8.5
1
Vulnerability Exploit
2786
CVE-2025-XXXX (WebKit Zero-Day 2)
critical8.5
1
Zero-Day Exploit
2787
Excessive data access privileges
critical8.5
1
Data Breach
2788
Critical vulnerability in VIGI camera series
critical8.5
1
Vulnerability Exploitation
2789
CVE-2026-1357
critical8.5
1
Remote Code Execution (RCE)
2790
Design bug in the FOIA request search feature
critical8.5
1
Data Exposure
2791
Skimming
critical8.5
1
Data Breach
2792
CVE-2025-32711 (CVSS 9.3)
critical8.5
1
AI Command Injection
2793
CVE-2026-2447 (Heap buffer overflow in libvpx video codec)
critical8.5
1
Vulnerability Exploitation
2794
Unencrypted data on decommissioned equipment
critical8.5
1
Data Breach
2795
CVE-2025-48927
critical8.5
1
Vulnerability Exploitation
2796
CVE-2026-23550 (CVSS 10.0)
critical8.5
1
Privilege Escalation
2797
AI-Specific Attack Vectors (Prompt Injection, Model Poisoning)
critical8.5
1
Supply Chain Attack
2798
Zero-click indirect prompt injection (*PleaseFix*)
critical8.5
1
AI Prompt Injection
2799
Improper Authentication (MongoDB instance left unsecured)
critical8.5
1
Data Leak
2800
Unsecured MongoDB Database
critical8.5
1
Data Breach
2801
CVE-2025-9142 (JWT manipulation and directory traversal in Perimeter81 service component)
critical8.5
1
Privilege Escalation
2802
Unspecified vulnerability in OT security solutions
critical8.5
1
Data Breach
2803
Shared Inbox Access
critical8.5
1
Data Breach
2804
Lack of Data Loss Prevention (DLP) Controls
critical8.5
1
Data Breach
2805
Server Security Issue
critical8.5
1
Data Breach
2806
Reused passwords from data leaks
critical8.5
1
Fraud/Scam
2807
Inconsistent DLP controls
critical8.5
1
Data Breach
2808
Lack of multi-factor authentication (MFA), Third-party vendor compromise
critical8.5
1
Data Breach
2809
Insufficient VPN authentication, ineffective abnormal behavior detection
critical8.5
1
Data Breach
2810
Unauthorized Plugin
critical8.5
1
Data Breach
2811
Lack of access controls / improper employee oversight
critical8.5
1
Unauthorized Access / Insider Threat
2812
CVE (3 high-severity with publicly available exploit code)
critical8.5
1
Misconfiguration
2813
CVE-2026-22218 (CVSS 7.1)
critical8.5
1
Data Breach
2814
Over-collection of sensitive PII (e.g., full ID scans vs. minimal verification)
critical8.5
1
Data Breach Risk
2815
Lack of Robust Security Controls on Third-Party Platforms
critical8.5
1
Data Breach
2816
Improper access controls on PDF-generating page
critical8.5
1
Data Exposure
2817
CVE-2025-0033 (Race Condition in AMD SEV-SNP RMP Initialization)
critical8.5
1
Vulnerability
2818
Lack of least-privilege access controls
critical8.5
1
Data Breach
2819
trust in open-source dependencies
critical8.5
1
supply-chain attack
2820
CVE-2026-3336
critical8.5
1
Cryptographic Vulnerability
2821
Lack of Robust Guardrails for Non-Text Modalities
critical8.5
1
Prompt Extraction
2822
Android Activity Layering
critical8.5
1
Data Theft
2823
Lack of API Key Ownership Validation
critical8.5
1
Data Exfiltration
2824
CVE-2026-27728
critical8.5
1
Command Injection
2825
Third-party shopping cart software
critical8.5
1
Data Breach
2826
Path traversal in Microsoft NLWeb (reading `/etc/passwd`, `.env`)
critical8.5
1
Arbitrary Code Execution
2827
Windows’ Restart Manager (RstrtMgr.dll) exploitation for disabling security processes
critical8.5
1
Potentially Unwanted Application (PUA)
2828
Out-of-bounds write flaw in Alpitronic HYC50 EV charger
critical8.5
1
Zero-Day Vulnerabilities
2829
CVE-2025-54820 (Stack-based buffer overflow, CWE-121)
critical8.5
1
Remote Code Execution (RCE)
2830
identity weaknesses
critical8.5
1
credential compromise
2831
Remote-viewing software
critical8.5
1
Data Breach
2832
Expired domain takeover, lack of ongoing security validation for Office add-ins
critical8.5
1
Phishing, Credential Theft, Data Exfiltration
2833
CVE-2026-25903
critical8.5
1
Authorization Bypass
2834
Inability to Distinguish Content from Directives in Prompts
critical8.5
1
Data Exfiltration
2835
Data Corruption
critical8.5
1
Data Leak
2836
Unauthenticated AI services
critical8.5
1
LLMjacking
2837
Lack of Access Controls / Insider Threat
critical8.5
1
Data Breach
2838
Weak authentication measures in Fast Pair protocol
critical8.5
1
Vulnerability Exploitation
2839
Starlink network access control
critical8.5
1
Data Breach
2840
OAuth 2.0 protocol behavior (RFC 6749/9700)
critical8.5
1
Phishing
2841
Weak authentication in verification APIs
critical8.5
1
Data Breach Risk
2842
third-party integrations (speculated)
critical8.5
1
data breach
2843
Oracle EBS vulnerability
critical8.5
1
Data Breach
2844
CVE-2025-8099
critical8.5
1
Vulnerability Exploitation
2845
E-commerce web platform
critical8.5
1
Data Breach
2846
CVE-2026-0629
critical8.5
1
Authentication Bypass
2847
Insider Threat / Unauthorized Access
critical8.5
1
Data Breach
2848
Clickjacking (CWE-1021)
critical8.5
1
Vulnerability Disclosure
2849
Citrix Software Vulnerability (unspecified)
critical8.5
1
Data Breach
2850
CVE-2024-28989
critical8.5
1
Vulnerability Exploit
2851
Weak User Authentication
critical8.5
1
Data Breach
2852
E-commerce Site Vulnerability
critical8.5
1
Data Breach
2853
CVE-2026-1340
critical8.5
1
Vulnerability Exploitation
2854
URL fetcher failing to block internal domains
critical8.5
1
Autonomous AI-driven cyber attack
2855
CVE-2025-53770 (Microsoft SharePoint 'ToolShell')
critical8.5
1
Ransomware
2856
Vendor Software
critical8.5
1
Data Breach
2857
MOVEit secure file transfer solution vulnerability
critical8.5
1
Data Breach
2858
compromised signed access token
critical8.5
1
data breach
2859
CVE-2025-0994
critical8.5
1
Cyber Attack
2860
Lack of authentication and access controls in Firebase instances
critical8.5
1
Data Breach
2861
Centralized Points of Failure in Hybrid Platforms
critical8.5
1
Privacy Violation
2862
Postinstall hook abuse, self-dependency trick
critical8.5
1
Supply Chain Attack
2863
Salesforce Environments
critical8.5
1
Data Breach
2864
User trust in AI-themed extensions, lack of stringent Chrome Web Store security checks
critical8.5
1
Malicious Browser Extensions
2865
CVE-2025-61882 (CVSS 9.8 - Remote Code Execution in BI Publisher Integration/Concurrent Processing)
critical8.5
1
Vulnerability Exploitation
2866
Insufficient access controls and monitoring
critical8.5
1
Insider Threat
2867
CVE-2026-21385
critical8.5
1
Zero-Day Vulnerability
2868
Sending sensitive data in unencrypted emails
critical8.5
1
Data Breach
2869
Unauthorized administrative access
critical8.5
1
Data Leak
2870
Weak Authentication in AI Hiring System (Password '123456')
critical8.5
1
Data Exposure
2871
Software vulnerabilities in AI tools (e.g., backdoors, bugs)
critical8.5
1
Data Leakage
2872
inadequate cloud security measures
critical8.5
1
data breach
2873
Lack of segmentation between IT and operational systems
critical8.5
1
Data Breach
2874
Juniper PTX router RCE flaw
critical8.5
1
APT Activity
2875
Gemini Browsing Tool (Web Page Summarization Data Exfiltration)
critical8.5
1
Vulnerability Exploitation
2876
lack of data access controls
critical8.5
1
data breach
2877
Branch Predictor Race Conditions (BPRC) in Intel Processors (Speculative Execution Side Channel)
critical8.5
1
Hardware Vulnerability
2878
SMS phishing (smishing) attack
critical8.5
1
Data Breach
2879
SQLi in Postgres MCP (bypassing read-only restrictions)
critical8.5
1
Arbitrary Code Execution
2880
Web vulnerabilities in Subaru's Starlink service
critical8.5
1
Web Vulnerabilities
2881
CWE-798: Hard-coded Credentials
critical8.5
1
Data Exposure
2882
Spree IDOR Flaws (CVE-2026-22588/22589)
critical8.5
1
Supply Chain Attack
2883
Weak or Compromised Employee Credentials
critical8.5
1
Data Breach
2884
Human error, limited cybersecurity resources
critical8.5
1
Data Breach
2885
Software misconfiguration exposing files to the internet
critical8.5
1
Data Breach
2886
unprotected storage bucket
critical8.5
1
data breach
2887
Flash Player
critical8.5
1
Cyber Attack
2888
Impersonation of legitimate Go module (*golang.org/x/crypto*)
critical8.5
1
Supply-Chain Attack
2889
Lack of clear user consent
critical8.5
1
Privacy Violation
2890
Compromise of private keys
critical8.5
1
Security Breach
2891
CVE-2026-21513 (Security Feature Bypass - CWE-693)
critical8.5
1
Zero-Day Exploit
2892
Weak third-party credential management
critical8.5
1
Data Breach
2893
Static default password in remote desktop software
critical8.5
1
Data Breach
2894
Unprotected Cloud Repository
critical8.5
1
Data Leak
2895
open-source_software_vulnerabilities
critical8.5
1
data_breach
2896
Error in server configuration change
critical8.5
1
Data Breach
2897
Credentials exploitation
critical8.5
1
Data Breach
2898
Insufficient network monitoring for suspicious activity
critical8.5
1
Data Breach
2899
Unsecured admin panel, IDOR vulnerability
critical8.5
1
Data Exposure
2900
Several vulnerabilities in the Likud app
critical8.5
1
Data Breach
2901
Human Weakness in Customer Service
critical8.5
1
Data Breach
2902
GraphQL API Misconfiguration
critical8.5
1
Data Leak
2903
Misconfigured Storage Buckets
critical8.5
1
Data Leak
2904
Login and Sign-up Service
critical8.5
1
Data Breach
2905
Human error, lack of centralized IT control, decentralized IT departments
critical8.5
1
Data Breach
2906
AI-Generated Convincing Impersonations
critical8.5
1
Data Breach
2907
Progress Software’s MOVEit Transfer solution
critical8.5
1
Data Breach
2908
Unsecured legacy server
critical8.5
1
Data Exposure
2909
Open Registration Endpoint (Design Hub)
critical8.5
1
Data Exposure
2910
CVE-2024-34102 (CosmicSting)
critical8.5
1
Vulnerability Exploitation
2911
Weaknesses in university authentication processes
critical8.5
1
Data Breach
2912
CVE-2023-43000 (WebKit RCE - terrorbird)
critical8.5
1
Exploit Kit / Malware Campaign
2913
Third-Party CRM Security Weaknesses
critical8.5
1
Data Breach
2914
MOVEit Secure File Transfer server
critical8.5
1
Data Breach
2915
Checkout page code issue
critical8.5
1
Data Breach
2916
Weak Authentication Credentials / Use of Non-Corporate Devices
critical8.5
1
Data Breach / Unauthorized Access
2917
CVE-2025-47934
critical8.5
1
Vulnerability Exploitation
2918
Lack of MFA resilience, Human susceptibility to social engineering
critical8.5
1
Phishing/Social Engineering
2919
Failure to Enforce 'Minimum Necessary' HIPAA Requirements
critical8.5
1
Data Breach
2920
Abuse of Shared Access Signature (SAS) tokens and trusted cloud tools
critical8.5
1
Ransomware
2921
Inadequate Technology and Agency Understaffing
critical8.5
1
Data Exposure
2922
Aeries Software
critical8.5
1
Data Breach
2923
Improper Token Management (Unrotated API Tokens)
critical8.5
1
Data Breach
2924
CVE-2025-54106 (Windows RRAS RCE)
critical8.5
1
Malware (Infostealer)
2925
Partner system compromise leading to unauthorized API access
critical8.5
1
Data Exposure
2926
CVE-2025-59489 (Unity Editor Command-Line Argument Injection)
critical8.5
1
Vulnerability
2927
Insufficient identity verification in hiring processes, reliance on social media badges
critical8.5
1
Identity Fraud, Insider Threat, Cyber Espionage
2928
Leak of User Emails
critical8.5
1
Data Breach
2929
Lack of Second-Layer Security Checks in API Configurations
critical8.5
1
Data Breach
2930
URL Vulnerability
critical8.5
1
Data Breach
2931
CVE-2026-1592
critical8.5
1
Supply Chain Attack
2932
CVE-2025-8088 (WinRAR path traversal flaw in Windows versions < 7.13)
critical8.5
1
Zero-day exploit
2933
CVE-2025-43300 (Image I/O framework - out-of-bounds write)
critical8.5
1
Zero-day vulnerability
2934
Third-party authentication (Okta SSO)
critical8.5
1
Data Breach
2935
Inadequate security measures, potential internal mismanagement
critical8.5
1
Data Breach
2936
Online customer service system vulnerability
critical8.5
1
Data Breach
2937
CVE-2026-1234
critical8.5
1
Cross-Site Scripting (XSS)
2938
improper decommissioning of legacy cloud storage
critical8.5
1
data breach
2939
Unique Identification Number Guessing
critical8.5
1
Data Breach
2940
Lack of Timely Incident Reporting
critical8.5
1
Data Breach
2941
CVE-2026-23594
critical8.5
1
Privilege Escalation
2942
Trusted Hiring Pipelines
critical8.5
1
Malware Deployment
2943
CVE-2025-30247 (OS Command Injection in My Cloud UI)
critical8.5
1
Vulnerability
2944
Improper Handling of Sensitive Data
critical8.5
1
Data Breach
2945
Gemini Search Personalization Model (Prompt Injection via Browsing History)
critical8.5
1
Vulnerability Exploitation
2946
System Setup Error
critical8.5
1
Data Exposure
2947
CVE-2026-1237
critical8.5
1
Cross-Site Scripting (XSS)
2948
Ivanti Endpoint Manager Mobile flaw
critical8.5
1
Data Breach
2949
Improper data handling during system restoration
critical8.5
1
Data Breach
2950
Insider Access Abuse
critical8.5
1
Data Breach
2951
CVE-2024-23222 (WebKit RCE - cassowary)
critical8.5
1
Exploit Kit / Malware Campaign
2952
Overbroad OAuth Token Permissions
critical8.5
1
Data Breach
2953
E-commerce System
critical8.5
1
Data Breach
2954
Lack of Multi-Factor Authentication (implied)
critical8.5
1
Data Breach
2955
AWS Trusted Advisor Bypass via S3 Bucket Policy Misconfiguration (Deny Rules for `s3:GetBucketPolicyStatus`, `s3:GetBucketPublicAccessBlock`, `s3:GetBucketAcl`)
critical8.5
1
Misconfiguration
2956
MOVEit file transfer tool (global exploit)
critical8.5
1
Data Breach
2957
CVE-2025-54236 (SessionReaper)
critical8.5
1
Vulnerability Exploitation
2958
Unauthenticated Access to TRT Tool (Employee Data)
critical8.5
1
Data Exposure
2959
Resource Constraints in DHS
critical8.5
1
Security Oversight
2960
Human error, Social engineering, Internal leaks
critical8.5
1
Data Breach
2961
Limited IT Infrastructure
critical8.5
1
Data Privacy Fragmentation
2962
Poor credential management
critical8.5
1
Unauthorized Access
2963
Social Engineering, Fake Authentication Screens
critical8.5
1
Phishing
2964
Weak or Stolen Employee Credentials
critical8.5
1
Data Breach
2965
absence of suspicious login alerts
critical8.5
1
data breach
2966
Progress Software’s MOVEit Transfer application
critical8.5
1
Data Breach
2967
inadequate data retention policies
critical8.5
1
data breach
2968
Salesforce integration flaw (Drift-Salesloft)
critical8.5
1
data breach
2969
Misconfigured access control, lack of IP whitelisting
critical8.5
1
Data Leak
2970
Lack of Monitoring for Existing Threats
critical8.5
1
Data Breach
2971
Mishandling of sensitive data by workers
critical8.5
1
Data Breach
2972
Improper permission handling in Windows Error Reporting Service (wersvc.dll)
critical8.5
1
Privilege Escalation
2973
MOVEit® Transfer application
critical8.5
1
Data Breach
2974
Undisclosed zero-day vulnerability in WhatsApp calling feature
critical8.5
1
Zero-Day Exploit
2975
Unauthenticated Access
critical8.5
1
Data Breach
2976
Apple Notarization Bypass (ChillyHell)
critical8.5
1
Malware (Infostealer)
2977
Contact-importing features
critical8.5
1
Data Leak
2978
Excessive guest user permissions, misconfigured guest access to public APIs
critical8.5
1
Data Theft
2979
Remote Dynamic Dependencies (RDD)
critical8.5
1
Supply Chain Attack
2980
Policy/Procedural Failure
critical8.5
1
Data Breach
2981
Misuse of legitimate access credentials post-employment
critical8.5
1
Data Breach
2982
MOVEit Server
critical8.5
1
Data Breach
2983
Lack of Authentication (No Password Protection)
critical8.5
1
Data Exposure / Unsecured Database
2984
Social Engineering (Fake App Update)
critical8.5
1
Cyberespionage
2985
Unauthorized access to shared network drive
critical8.5
1
Data Breach
2986
Automatic Opt-Ins
critical8.5
1
Data Privacy Issue
2987
AutoConsent JS bridge in DuckDuckGo Android browser (UXSS)
critical8.5
1
Vulnerability Exploitation
2988
Memory address mapping manipulation via DDR4 interposer
critical8.5
1
Supply Chain Attack
2989
Insufficient input sanitization and double-parsing bug in 'Dispatch Search' feature
critical8.5
1
Data Breach
2990
CVE-2026-21262 (Improper Access Control - CWE-284)
critical8.5
1
Privilege Escalation
2991
Exposed API Keys
critical8.5
1
Cloud Security Breach
2992
Exposed Elasticsearch Database
critical8.5
1
Data Leak
2993
Poor M365 configurations
critical8.5
1
Data Breach
2994
Lack of monitoring for suspicious activity
critical8.5
1
Data Breach
2995
CVE-2025-31191
critical8.5
1
Sandbox Escape Vulnerability
2996
Account Compromise
critical8.5
1
Data Breach
2997
Phishing-susceptible MFA methods
critical8.5
1
Data Breach
2998
Improper Privilege Management (CWE-269)
critical8.5
1
Privilege Escalation
2999
failure to deactivate former employee accounts
critical8.5
1
data breach
3000
App cloning, Reverse engineering, Bypassing App Store security (iOS), JavaScript bundle interception, RSA-encrypted payload exfiltration
critical8.5
1
Backdoor Attack, Cryptocurrency Wallet Hack
3001
Improper key management, lack of automated key rotation
critical8.5
1
Data Leak
3002
CVE-2025-27920 (Directory Traversal), CVE-2025-27921 (Reflected XSS - unused)
critical8.5
1
Cyber Espionage
3003
Missing role checks during user onboarding
critical8.5
1
Autonomous AI-driven cyber attack
3004
Over-Permissive Access to CRM/Donor Data
critical8.5
1
Data Breach
3005
Website Vulnerabilities
critical8.5
1
Data Leak
3006
Vulnerability in Gladinet CentreStack
critical8.5
1
Data Breach
3007
CVE-2025-10184 (Improper Permission Handling in OxygenOS Telephony Package)
critical8.5
1
Vulnerability
3008
CVE-2025-54113 (Windows RRAS RCE)
critical8.5
1
Malware (Infostealer)
3009
Unpatched Smart Contract Bugs
critical8.5
1
Privacy Violation
3010
Inadequate safeguards in government online portals
critical8.5
1
Credential Stuffing
3011
Lack of Privacy-Preserving Mechanisms in QML
critical8.5
1
Privacy Breach
3012
Weak/Reused Passwords (from third-party sources)
critical8.5
1
Account Takeover
3013
Insider access, malware backdoor
critical8.5
1
Cyber-enabled drug trafficking
3014
Inadequate security protections
critical8.5
1
Data Breach / Cybersecurity Failure
3015
CVE-2025-7776
critical8.5
1
Vulnerability Exploitation
3016
Outdated or poorly secured API interfaces
critical8.5
1
Data Breach
3017
Ray on Vertex AI Insecure Default Access
critical8.5
1
Privilege Escalation
3018
Decentralized Security Coordination
critical8.5
1
Data Breach
3019
Perimeter security measures
critical8.5
1
Data Breach
3020
DNS Infrastructure Weakness (Box Domains)
critical8.5
1
DNS Hijacking
3021
Lack of sandboxing in AI-generated test cases (Claude Code)
critical8.5
1
Arbitrary Code Execution
3022
CSRF Protection Mechanism in Ruby on Rails
critical8.5
1
Vulnerability
3023
CVE-2026-27739
critical8.5
1
SSRF (Server-Side Request Forgery)
3024
Lack of Network Segmentation in Cloud
critical8.5
1
Cloud Security Breach
3025
Unknown vulnerability in the spam quarantine server software
critical8.5
1
Data Breach
3026
CVE-2016-5817 (Critical SQL injection in Navis WebAccess)
critical8.5
1
cyberattack
3027
Human Error (Tricked Call Center Worker)
critical8.5
1
Data Breach
3028
Exposed Magicbell API Keys and Secrets
critical8.5
1
Data Exposure
3029
Insecure Third-Party Integration (Drift-Salesforce/Google Workspace)
critical8.5
1
Data Breach
3030
Human (Employee Susceptibility to Phishing)
critical8.5
1
Data Breach
3031
Incorrect authorization (Lovable, CVE-2025-48757)
critical8.5
1
Arbitrary Code Execution
3032
Missing row-level security (RLS), role-based access controls, and logic flaws in authentication
critical8.5
1
Data Breach
3033
Improper Input/Output Sanitization in AI Chatbot (XSS)
critical8.5
1
Vulnerability Exploitation
3034
Ability to self-apply for admin privileges on the FIA Driver Categorisation portal
critical8.5
1
data breach
3035
Unencrypted and non-password-protected database
critical8.5
1
Data Leak
3036
CVE-2026-25049
critical8.5
1
Supply Chain Attack
3037
lack of multi-factor authentication (MFA) enforcement on phishing sites
critical8.5
1
phishing
3038
Cryptographic Flaw in Infineon Microcontroller
critical8.5
1
Cryptographic Vulnerability
3039
Email Misdirection
critical8.5
1
Data Breach
3040
Windows automatic DLL loading
critical8.5
1
Malware Campaign
3041
WebSocket auth bypass (CVE-2025-52882, CVSS: 8.8)
critical8.5
1
Arbitrary Code Execution
3042
Stolen web cookies (session IDs, personal data)
critical8.5
1
Data Exposure
3043
Lack of security audits for employee-facing ecommerce platforms
critical8.5
1
Keylogger Attack
3044
Client-side vulnerabilities
critical8.5
1
Data Breach/Vulnerability Exposure
3045
Unverified Assessment Domains
critical8.5
1
APT (Advanced Persistent Threat)
3046
Vulnerability in SonicWall firewall
critical8.5
1
Data Breach
3047
Customer Contract Search Tool
critical8.5
1
Data Breach
3048
Use of Unlicensed Software
critical8.5
1
Malware
3049
NULL Pointer Dereference
critical8.5
1
Privilege Escalation
3050
Potential Weak Email Security Controls
critical8.5
1
Phishing
3051
CVE-2023-32409 (WebKit Sandbox Escape - IronLoader)
critical8.5
1
Exploit Kit / Malware Campaign
3052
inadequate segmentation between Discord and vendor systems
critical8.5
1
data breach
3053
Human Error (Employee Susceptibility to Phishing)
critical8.5
1
Data Breach
3054
Insufficient user identification and authentication (UIA) controls
critical8.5
1
Data Security Audit
3055
Setting turned on by Patient Portal vendor
critical8.5
1
Data Breach
3056
CVE-2026-29191
critical8.5
1
Cross-Site Scripting (XSS)
3057
User trust in online platforms
critical8.5
1
Phishing
3058
delayed breach notifications
critical8.5
1
ransomware
3059
Lack of password encryption
critical8.5
1
Unauthorized Access
3060
fragmented infrastructure
critical8.5
1
ransomware
3061
Misconfigured Cloud Storage
critical8.5
1
Data Breach
3062
Weak IT Help Desk Authentication Protocols
critical8.5
1
Data Breach
3063
Mobile Application Vulnerability
critical8.5
1
Data Breach
3064
Test mode left enabled allowing OTP login via email keyword
critical8.5
1
Autonomous AI-driven cyber attack
3065
API scraping via automated harvesting of user profiles
critical8.5
1
Data Breach
3066
weak cybersecurity safeguards in third-party vendor (Salesforce)
critical8.5
1
data breach
3067
CVE-2025-54897 (SharePoint RCE)
critical8.5
1
Malware (Infostealer)
3068
misconfigured Azure Blob storage permissions
critical8.5
1
data exposure
3069
CVE-2025-59448 (Session Token Lifetimes)
critical8.5
1
Denial-of-Service
3070
Plaintext Password Transmission (Design Hub)
critical8.5
1
Data Exposure
3071
Legitimate Telegram API authentication mechanisms
critical8.5
1
Phishing
3072
Disabled security tools, outdated cyber hygiene practices
critical8.5
1
Cyber Intrusion
3073
eForms System Vulnerability
critical8.5
1
Data Breach
3074
Weak password storage (base64 hashes or unhashed passwords)
critical8.5
1
Data Breach
3075
Website Migration
critical8.5
1
Data Breach
3076
Social Engineering (ClickFix technique)
critical8.5
1
Malware Campaign
3077
limited_cybersecurity_resources
critical8.5
1
data_breach
3078
Critical security flaw allowing unauthorized 'super admin' account creation
critical8.5
1
Data Breach
3079
Technical Issue with Third-Party Service Provider
critical8.5
1
Data Breach
3080
weaknesses in backend systems
critical8.5
1
data breach
3081
CVE-2026-21509 (Microsoft Office Security Feature Bypass)
critical8.5
1
Cyber-Espionage
3082
Amazon S3 Storage Account
critical8.5
1
Data Breach
3083
Lack of Secure Document Destruction Procedures
critical8.5
1
Data Breach (Improper Disposal / Physical Security Failure)
3084
Third-party Cloud Service
critical8.5
1
Data Breach
3085
Unsecured third-party server
critical8.5
1
Data Breach
3086
Improper sanitization of authorization URLs in n8n
critical8.5
1
Stored Cross-Site Scripting (XSS)
3087
Inconsistent Compliance Practices
critical8.5
1
Data Privacy Fragmentation
3088
Sophisticated hacking attempts
critical8.5
1
Data Breach
3089
Lack of multi-factor authentication, Human error (victims sharing access codes)
critical8.5
1
Phishing, Social Engineering, Identity Theft, Data Theft
3090
Service Account Credential
critical8.5
1
Data Breach
3091
Oracle E-Business Suite (Zero-Day)
critical8.5
1
Cyberattack (Data Breach)
3092
misconfigured AWS S3 bucket (lack of access controls)
critical8.5
1
data exposure
3093
Insecure defaults in Google Cloud Platform (GCP) API key architecture
critical8.5
1
Data Exposure
3094
passkey storage in password managers
critical8.5
1
phishing
3095
Human Error (Employee Susceptibility to Social Engineering)
critical8.5
1
Data Breach (Social Engineering)
3096
Improper Firebase security rules (publicly accessible database)
critical8.5
1
Data Breach
3097
Claude Code flaws
critical8.5
1
APT Activity
3098
Poor credential hygiene (hard-coded/exposed credentials)
critical8.5
1
Data Breach
3099
CWE-20: Improper Input Validation (lack of server-side checks)
critical8.5
1
Data Breach
3100
Insufficient Identity Management
critical8.5
1
Data Breach
3101
Google Tag Manager
critical8.5
1
Data Breach
3102
hardcoded secrets in code
critical8.5
1
data exposure
3103
Technical error in user data retrieval/logic (likely session or caching misconfiguration)
critical8.5
1
Data Exposure (Unintentional Disclosure)
3104
CVE-2021-39935
critical8.5
1
Server-Side Request Forgery (SSRF)
3105
Zero-day vulnerability in MOVEit Transfer application
critical8.5
1
Data Breach
3106
Theft of banking credentials and sensitive financial data
critical8.5
1
Malware
3107
Legitimate API traffic for command-and-control (C2) communications
critical8.5
1
Cyber Espionage
3108
Insufficient security measures
critical8.5
1
Data Breach
3109
Improper Access Controls, Undisclosed System Features
critical8.5
1
Unauthorized Data Access
3110
Human error, lack of phishing awareness
critical8.5
1
Data Breach
3111
Lack of organizational safeguards for AI chatbot usage
critical8.5
1
Data Breach
3112
Outdated security protocols
critical8.5
1
Data Breach
3113
Shared Access Protocols with Weak Authentication
critical8.5
1
Data Breach
3114
lack of multi-signature validation for critical operations
critical8.5
1
blockchain exploit
3115
Server Vulnerabilities
critical8.5
1
Smishing Scam
3116
MOVEit Transfer Vulnerability (CVE-2023-34362)
critical8.5
1
Data Breach
3117
Lateral Movement within Internal Systems
critical8.5
1
Data Breach
3118
Unprotected Elasticsearch instance
critical8.5
1
Data Exposure
3119
CVE-2025-XXXX (WebKit Zero-Day 1)
critical8.5
1
Zero-Day Exploit
3120
misconfiguration in HR/finance team servers
critical8.5
1
ransomware
3121
Vulnerability in MOBO subscriber management tool
critical8.5
1
Data Breach
3122
CVE-Pending (CamoLeak: Copilot Chat's parsing of invisible markdown + Camo image-proxy exfiltration)
critical8.5
1
Data Exfiltration
3123
Bias and Unverified Data Propagation
critical8.5
1
Data Privacy Issue
3124
Improper handling of technical identifiers
critical8.5
1
Data Exposure
3125
Citrix Software Vulnerability (specific CVE unidentified)
critical8.5
1
Data Breach
3126
CVE-2014-0160 (Heartbleed - Out-of-Bounds Read in OpenSSL)
critical8.5
1
Memory Corruption
3127
Impersonation Feature in Employee Portals
critical8.5
1
Data Exposure
3128
Insufficient Mass Email Controls
critical8.5
1
Data Breach
3129
Oracle EBS zero-day flaw
critical8.5
1
Data Breach
3130
CVE-2025-3102
critical8.5
1
Vulnerability Exploitation
3131
Lack of Data Minimization in Blockchain Transactions
critical8.5
1
Privacy Violation
3132
Unauthorized data sharing via embedded tracking tools
critical8.5
1
Data Breach
3133
weak MFA implementations
critical8.5
1
phishing
3134
Unauthorized data transmission via third-party trackers
critical8.5
1
Data Breach
3135
Remote Work Vulnerabilities (COVID-19 Exploitation)
critical8.5
1
Data Breach
3136
Unsecured System
critical8.5
1
Data Breach
3137
Human Trust and Error (Bypassed Security Awareness Training)
critical8.5
1
Data Breach
3138
Lack of proper access controls or oversight during training
critical8.5
1
Data Breach / Espionage
3139
hardcoded credentials in source code
critical8.5
1
data breach
3140
Unregulated AI Tool Integration
critical8.5
1
Data Privacy Fragmentation
3141
Use-After-Free
critical8.5
1
Privilege Escalation
3142
Overly permissive guest user settings in Salesforce Experience Cloud
critical8.5
1
Data Harvesting
3143
CVE-2025-14847 (Improper handling of length parameter inconsistency, CWE-130)
critical8.5
1
Memory-Read Vulnerability
3144
Potential unauthorized access to LDLC's customer database (timing suggests link to LDLC's server breach)
critical8.5
1
phishing
3145
CVE-2017-7921
critical8.5
1
Espionage
3146
Unencrypted Computers
critical8.5
1
Data Breach
3147
Over-Permissive Third-Party Access
critical8.5
1
Data Breach
3148
Gemini Cloud Assist (Log Summarization Flaw)
critical8.5
1
Vulnerability Exploitation
3149
Inherited permissions from privileged users
critical8.5
1
Data Breach
3150
Lack of Cybersecurity Leadership
critical8.5
1
Potential Data Breach
3151
improper data retention
critical8.5
1
data breach
3152
Abuse of Android’s Accessibility Service
critical8.5
1
Malware (Remote Access Trojan - RAT)
3153
Lack of Email Spoofing Protections
critical8.5
1
Data Breach
3154
Improper scoping of OAuth permissions in Salesloft Drift (Salesforce-integrated tool)
critical8.5
1
Data Breach
3155
Unprotected 'unlink()' call enabling unauthenticated file deletion
critical8.5
1
SQL Injection
3156
Google Analytics and Google Ads misconfiguration
critical8.5
1
Data Breach
3157
Lack of domain verification during account creation
critical8.5
1
Autonomous AI-driven cyber attack
3158
CVE-2025-5775
critical8.5
1
Reconnaissance
3159
Unauthenticated DNS modification
critical8.5
1
DNS Hijacking
3160
CVE-2025-54254 (Improper Restriction of XML External Entity Reference)
critical8.5
1
Vulnerability Exploitation
3161
CVE-2026-1236
critical8.5
1
Cross-Site Scripting (XSS)
3162
inadequate validation of third-party services (Cloudflare Pages)
critical8.5
1
phishing
3163
lack of encryption and authentication (non-password-protected database)
critical8.5
1
data exposure
3164
MOVEit Transfer zero-day vulnerability (CVE-2023-34362)
critical8.5
1
Data Breach
3165
Weak multi-factor authentication (MFA) enforcement, password reuse, exposed network edge devices (e.g., Fortinet FortiGate-60E with open ports)
critical8.5
1
Credential Stuffing
3166
CVE-2025-53652
critical8.5
1
Command Injection
3167
Overly permissive guest user configurations in Salesforce Experience Cloud
critical8.5
1
Data Theft
3168
GitHub Account Security Weakness
critical8.5
1
Data Breach
3169
Inadequate safeguards for international data transfers
critical8.5
1
Data Breach
3170
Incomplete cross-origin controls (Ollama Desktop)
critical8.5
1
Arbitrary Code Execution
3171
Lack of Physical Security for Devices Containing Sensitive Data
critical8.5
1
Data Breach (Physical Theft)
3172
lack of credential rotation
critical8.5
1
data breach
3173
Remote Code Execution Vulnerability in DS-2105 Pro DVRs
critical8.5
1
Botnet
3174
Lack of encryption in radio communications used by public health systems
critical8.5
1
Data Breach
3175
Public web server misconfiguration
critical8.5
1
Data Breach
3176
Vulnerabilities in Salesforce-hosted databases
critical8.5
1
Data Breach
3177
Supply-chain risks
critical8.5
1
Third-party data exploitation
3178
Backend API endpoint lacking proper authentication checks
critical8.5
1
Data Breach
3179
Excessive Data Access Permissions
critical8.5
1
Data Breach
3180
Unsecured Internet-Connected Database
critical8.5
1
Data Exposure
3181
Unauthorized Software Installation
critical8.5
1
Data Breach
3182
Prompt Injection (AI agent misinterprets embedded commands in untrusted data as legitimate instructions)
critical8.5
1
Vulnerability Exploitation
3183
CVE-2025-49596
critical8.5
1
Remote Code Execution (RCE)
3184
CVE-2017-3881 (Cluster Management Protocol RCE in Cisco IOS/IOS XE)
critical8.5
1
unauthorized access
3185
MOVEit Transfer environment vulnerability
critical8.5
1
Data Breach
3186
automated CI/CD pipeline execution
critical8.5
1
supply-chain attack
3187
Incorrect access settings
critical8.5
1
Data Breach
3188
CVE-2025-64496
critical8.5
1
Code Injection
3189
Unmaintained VPN remote access server, inadequate network monitoring, ambiguous division of responsibilities, accumulation of unmanaged data on network drives
critical8.5
1
Data Breach
3190
CVE-2025-61984 (Inadequate filtering of control characters in usernames for ProxyCommand in OpenSSH)
critical8.5
1
Vulnerability
3191
Misconfigured Amazon Web Services S3 buckets
critical8.5
1
Data Leak
3192
Inactive user accounts not deactivated
critical8.5
1
Data Breach
3193
Improper TLS Certificate Validation (CWE-295)
critical8.5
1
Vulnerability
3194
Improper CSV processing allowing unauthenticated file reads
critical8.5
1
SQL Injection
3195
Blender’s 'Auto Run Python Scripts' feature
critical8.5
1
malware
3196
Publicly Available Code Repository
critical8.5
1
Data Breach
3197
User Email Accounts
critical8.5
1
Data Breach
3198
Security hole in MOVEit Transfer software
critical8.5
1
Ransomware
3199
CVE-2025-14756
critical8.5
1
Command Injection
3200
inadequate vendor oversight
critical8.5
1
data breach
3201
Temporary unsecured storage of user data and PGP keys
critical8.5
1
Data Breach
3202
compromised personal data
critical8.5
1
fraud
3203
CVE-2025-10547 (Uninitialized Stack Value Leading to Arbitrary Free)
critical8.5
1
Vulnerability
3204
Cloud Vendor Compromise
critical8.5
1
Data Breach
3205
weak access controls at third-party vendor
critical8.5
1
data breach
3206
Previously unknown security vulnerability in Oracle E-Business Suite
critical8.5
1
Data Breach
3207
Salesforce Misconfiguration
critical8.5
1
Data Breach
3208
Human vulnerability (bribery of customer support agents)
critical8.5
1
Data Breach
3209
Lack of access controls and monitoring
critical8.5
1
Unauthorized Data Access
3210
Disabled Workspace Trust (Cursor Editor)
critical8.5
1
Malware (Infostealer)
3211
CVE-2025-37899 (Use-After-Free in ksmbd SMB2 LOGOFF handler)
critical8.5
1
Zero-Day Vulnerability
3212
CVE-2025-59449 (Incorrect Authorization)
critical8.5
1
Denial-of-Service
3213
CVE-2025-33206 (Improper Input Validation - CWE-78)
critical8.5
1
Vulnerability Exploitation
3214
Inadequate User Data Protection
critical8.5
1
Data Breach
3215
Inadequate Data Security Measures
critical8.5
1
Data Breach
3216
CWE-601: URL Redirection to Untrusted Site (Open Redirect) (via token manipulation)
critical8.5
1
Data Breach
3217
CVE-2026-3338
critical8.5
1
Cryptographic Vulnerability
3218
CVE-2025-8424
critical8.5
1
Vulnerability Exploitation
3219
configuration gap in Amazon S3 server
critical8.5
1
data breach
3220
Weak cybersecurity defenses, lack of dedicated cybersecurity staff, reliance on ed-tech tools
critical8.5
1
Ransomware
3221
VPN appliances
critical8.5
1
Credential Theft
3222
Security flaw
critical8.5
1
Data Breach
3223
Software Vulnerabilities
critical8.5
1
Data Breach
3224
Internal Authentication API bug
critical8.5
1
Authentication Vulnerability
3225
Application misconfiguration
critical8.5
1
Data Breach
3226
CVE-2025-23120
critical8.5
1
Vulnerability
3227
Preventable authorization flaw, path manipulation in web address
critical8.5
1
Data Breach
3228
CVE-2026-24512
critical8.5
1
Supply Chain Attack
3229
Unauthorized code in third-party vendor's application
critical8.5
1
Data Breach
3230
Three separate flaws in Automotive Grade Linux
critical8.5
1
Zero-Day Vulnerabilities
3231
CVE-2026-2835
critical8.5
1
HTTP Request Smuggling
3232
CVE-2026-20098
critical8.5
1
Vulnerability Exploitation
3233
Human Error (Misconfigured Email Distribution List)
critical8.5
1
Data Breach (Unintentional Disclosure)
3234
CVE (not specified)
critical8.5
1
Vulnerability Exploitation
3235
Trust in the platform's review system and verification processes
critical8.5
1
Disinformation and Scams
3236
Network Access Feature in Claude (Sandbox Environment)
critical8.5
1
Data Exfiltration
3237
compromised user devices (suspected)
critical8.5
1
data breach (unverified)
3238
Listable Algolia Search Indexes (PII Exposure)
critical8.5
1
Data Exposure
3239
Lack of Physical Security / Unencrypted Device
critical8.5
1
Data Breach (Physical Theft)
3240
Inadequate Data Handling Controls
critical8.5
1
Data Breach
3241
user trust in legitimate cryptocurrency wallet applications
critical8.5
1
malware
3242
Weak security measures in credit card terminals
critical8.5
1
Cyber Crime
3243
Inadequate security on WordPress-hosted infrastructure
critical8.5
1
Data Breach
3244
Incomplete redaction of sensitive documents
critical8.5
1
Data Exposure
3245
Inadequate security awareness training
critical8.5
1
Phishing
3246
Progress MOVEit platform
critical8.5
1
Data Breach
3247
Third-party system vulnerability
critical8.5
1
Data Breach
3248
Use of Pirated Corporate Software
critical8.5
1
Info-Stealing
3249
CVE-2026-22219 (SSRF)
critical8.5
1
Vulnerability Exploitation
3250
Impersonation of law enforcement officials
critical8.0
1
Data Leak
3251
Human Resources Information Access
critical8.0
1
Data Breach
3252
System Bug
critical8.0
1
Data Disclosure
3253
Employee Sharing Sensitive Information
critical8.0
1
Data Breach
3254
Application Vulnerability
critical8.0
1
Data Breach
3255
Accellion file-sharing system
critical8.0
1
Data Breach
3256
Database Access
critical8.0
1
Data Breach
3257
Compromised Administrative Staff Account
critical8.0
1
Data Breach
3258
Physical Loss of Device
critical8.0
1
Data Breach
3259
Authentication process for My Account login details
critical8.0
1
Data Breach
3260
Accellion’s FTA
critical8.0
1
Data Breach
3261
Third-party Vendor Access
critical8.0
1
Data Breach
3262
Improper Data Redaction
critical8.0
1
Data Breach
3263
Lack of security safeguards in the contract
critical8.0
1
Data Breach
3264
Software Update
critical8.0
1
Data Breach
3265
Misconfigured Server
critical8.0
1
Data Breach
3266
Points of Sale
critical8.0
1
Data Breach
3267
Misconfiguration in computer system
critical8.0
1
Data Breach
3268
Keyboard Software Bug
critical8.0
1
Software Vulnerability
3269
RCE vulnerability in Dynamicweb software
critical8.0
1
Remote Code Execution (RCE)
3270
Security flaw in the patient portal
critical8.0
1
Data Breach
3271
Unsecured Data Storage Device
critical8.0
1
Data Breach
3272
Misconfigured GitHub repository
critical8.0
1
Data Leak
3273
Sequential User ID Bug
critical8.0
1
Data Breach
3274
Radio Communications Disruption
critical8.0
1
Vulnerability Exploitation
3275
Unauthorized Access by Insider
critical8.0
1
Data Breach
3276
CWE Exposure of Resource to Wrong Sphere
critical8.0
1
Vulnerability
3277
Various vulnerabilities scanned by the Angler exploit kit
critical8.0
1
Malvertising
3278
Insufficient security protections in cloud-based storage container
critical8.0
1
Data Breach
3279
CVE-2025-61884 (potential, not yet confirmed as exploited)
high7.5
1
ransomware
3280
legacy perimeter firewall
high7.5
1
Ransomware
3281
Compromised Update Server
high7.5
1
Malware Distribution
3282
Firewall Vulnerability
high7.5
1
Ransomware Attack
3283
security systems vulnerability
high7.5
1
data breach
3284
Fragmented security tools, insufficient email security coverage
high7.5
1
Ransomware
3285
CVE-2023-34362 (MOVEit)
high7.5
1
ransomware
3286
IT System Glitch
high7.5
1
Data Breach
3287
Obfuscated Code in Extensions
high7.5
1
Malicious Software
3288
Employee login credentials
high7.5
1
Ransomware Attack
3289
Lack of multi-factor authentication (MFA) on domain accounts
high7.5
1
Ransomware Attempt
3290
Improper handling of sensitive information
high7.5
1
Data Breach
3291
Review Process Bypass
high7.5
1
Ransomware
3292
CVE-2025-61884
high7.5
1
Cyberattack
3293
Stack space exhaustion in user code with async_hooks enabled
high7.5
1
Denial-of-Service (DoS)
3294
Vulnerabilities in global digital infrastructure
high7.5
1
Ransomware
3295
outdated software, overworked staff, limited holiday response times
high7.5
1
phishing
3296
Oracle E-Business Suite Zero-Day (Unauthenticated, Low Complexity)
high7.5
1
Cyberattack
3297
POS Systems
high7.5
1
Data Breach
3298
Internet-accessible flaws
high7.5
1
Ransomware
3299
Payment system vulnerability
high7.5
1
Data Breach
3300
Zero-day vulnerability in third-party software (Oracle E-Business Suite)
high7.5
1
Data Breach
3301
Weak Password Policy
high6.5
1
Hacking Incident
3302
Database vulnerability
high6.0
1
Data Breach
3303
lack of multi-factor authentication (MFA) on crypto accounts
high6.0
1
cyber theft
3304
Human error, Credential harvesting
high6.0
1
Data Breach
3305
Human Error (Misplaced Trust in Email Communication)
high6.0
1
Business Email Compromise (BEC)
3306
Misconfigured Docker Daemon (Exposed to Internet)
high6.0
1
DDoS Attack
3307
Compromised software via phishing
high6.0
1
Phishing Attack
3308
Third-party application vulnerability
high6.0
1
Data Breach
3309
Lack of Data Governance Policies
high6.0
1
Data Leakage
3310
Compromised Office 365 Account
high6.0
1
Data Breach
3311
weaknesses in social media platform moderation
high6.0
1
fraud
3312
Unauthorized access to an employee email account
high6.0
1
Data Breach
3313
Security flaw in Progress' MOVEit data transfer programme
high6.0
1
Data Breach
3314
Hardcoded Credentials in Internal Portals
high6.0
1
Data Breach
3315
CVE-2025-0128
high6.0
1
Denial of Service (DoS)
3316
Unsecured Zoom Classroom
high6.0
1
Cyber Attack
3317
Human Trust in Authority Figures
high6.0
1
Social Engineering
3318
unprotected storage
high6.0
1
data exposure
3319
Insufficient Email Security Protocols
high6.0
1
Phishing
3320
System Malfunction
high6.0
1
Data Leak
3321
Human Error / Lack of Authentication Protocols
high6.0
1
Data Breach
3322
Improper Access Controls on AWS EC2
high6.0
1
DDoS Attack
3323
NEXTEP self-service kiosks
high6.0
1
Data Breach
3324
lack of authentication for mobile device pairing
high6.0
1
fraud
3325
improper use of email fields (To/CC instead of BCC)
high6.0
1
data breach
3326
potential weaknesses in email system security
high6.0
1
phishing
3327
Compromised Employee Mailbox
high6.0
1
Data Breach
3328
Lack of end-to-end encryption in standard email protocols, Absence of proper email authentication mechanisms
high6.0
1
Business Email Compromise (BEC)
3329
Employee Mailboxes
high6.0
1
Data Breach
3330
Psychological manipulation (urgency, authority impersonation)
high6.0
1
Phishing (AI-enhanced)
3331
Insecure use of pull_request_target in GitHub Actions workflows
high6.0
1
Supply Chain Attack
3332
Backdoor in the system
high6.0
1
Fraud
3333
Medium and high severity vulnerabilities in Ivanti EPMM software
high6.0
1
Cyber Attack
3334
Unsecured Active Directory
high6.0
1
Data Breach
3335
Unmanaged Secrets in CI/CD Pipelines
high6.0
1
Credential Theft
3336
Shadow IT
high6.0
1
Security Control Bypass
3337
Unauthorized access to WiFi management system
high6.0
1
Cyber Attack
3338
Insufficient Staff Training
high6.0
1
Data Breach
3339
Reused passwords across multiple services
high6.0
1
Credential Stuffing
3340
Use of Personal Device for Corporate Access
high6.0
1
Data Breach
3341
Unsecured Endpoints
high6.0
1
Data Security Incident
3342
JavaScript File Modification
high6.0
1
Malware
3343
Human vulnerability through social engineering
high6.0
1
Social Engineering Attack
3344
Email login credentials
high6.0
1
Data Breach
3345
inadequate contractor monitoring
high6.0
1
insider threat
3346
Error in resetting network settings
high6.0
1
Data Breach
3347
Over-Permissive Ticket Transfer Features
high6.0
1
Account Takeover (ATO)
3348
Weak Authentication for OAuth Tokens
high6.0
1
Data Breach
3349
Misconfiguration of AWS Application Load Balancer Authentication
high6.0
1
Misconfiguration
3350
Unpatched flaw in a commercial MDM system
high6.0
1
Data Breach
3351
Lax privacy settings
high6.0
1
Data Breach
3352
Compromised official Belgian Grand Prix email account
high6.0
1
Multi-vector attack
3353
Email Account and Tax Preparation Software
high6.0
1
Data Breach
3354
Human Error (Unauthorized Information Disclosure)
high6.0
1
Data Breach
3355
lack of anomaly detection for screenshot activities
high6.0
1
insider threat
3356
Outdated Antivirus/Anti-Malware Tools
high6.0
1
Data Breach Risk
3357
Browsealoud Plugin
high6.0
1
Cryptojacking
3358
Legacy X-Frame-Options Ineffectiveness
high6.0
1
Data Breach
3359
Employee Malpractice
high6.0
1
Data Breach
3360
Credential theft, Stolen payment tokens
high6.0
1
Fraud
3361
CMS vulnerability
high6.0
1
Data Breach
3362
Human Error/Employee Misconduct
high6.0
1
Unauthorized Access and Data Breach
3363
Human Trust in Branded Communications / Lack of Multi-Channel Verification
high6.0
1
Phishing / Social Engineering
3364
Business Email Compromise
high6.0
1
Data Breach
3365
Potential SharePoint vulnerability (unconfirmed)
high6.0
1
Cyberattack
3366
Routers from T-Mobile, Zyxel, D-Link, Linksys
high6.0
1
DDoS Attack
3367
Web-based payroll program
high6.0
1
Data Breach
3368
lack of package registry enforcement
high6.0
1
supply chain attack
3369
Human Trust in Known Contacts
high6.0
1
Phishing
3370
Unsecured MongoDB Server
high6.0
1
Data Exposure
3371
Weak or compromised email account security
high6.0
1
Data Breach
3372
Weak credential security (IT vendor account compromise)
high6.0
1
unauthorized access
3373
Website platform configuration error (password-protected documents made publicly accessible via search)
high6.0
1
data breach
3374
AI-related blind spots
high6.0
1
Data Breach
3375
Public exposure of environment configuration file
high6.0
1
Data Breach
3376
Misconfigured AWS S3 storage
high6.0
1
Data Leak
3377
Data Collection Practices
high6.0
1
Data Privacy Issue
3378
Employee Misconfiguration
high6.0
1
Data Breach
3379
Abuse of trusted .arpa domain for reverse DNS lookups
high6.0
1
Phishing
3380
Unspecified vulnerability
high6.0
1
Cyber Attack
3381
Android system permissions bypass
high6.0
1
Vulnerability
3382
Weak Data Access Controls
high6.0
1
Data Exposure
3383
Improper backup file storage
high6.0
1
Data Breach
3384
Employee Account
high6.0
1
Data Breach
3385
Open Elastic Search Instances
high6.0
1
Data Exposure
3386
Unauthorized access to Microsoft 365 account
high6.0
1
Data Breach
3387
Programming Update Error
high6.0
1
Data Breach
3388
Excessive OAuth Token Scopes
high6.0
1
Unauthorized Access
3389
unsecured QR code access
high6.0
1
fraud
3390
CVE-2025-33206 (CWE-78: Improper Neutralization of Special Elements in OS Commands)
high6.0
1
Vulnerability
3391
Fortra's GoAnywhere MFT platform's zero-day vulnerability
high6.0
1
Data Breach
3392
Human Vulnerability (Blackmail)
high6.0
1
Extortion, Insider Threat, Retail Theft
3393
Unmonitored DOM Changes (Lack of MutationObserver)
high6.0
1
Data Breach
3394
Poor Employee Training
high6.0
1
Data Leak
3395
Cached Credentials
high6.0
1
Data Security Incident
3396
Unguarded Physical Access Points
high6.0
1
Physical Theft
3397
Email Privacy Misconfigurations
high6.0
1
Data Breach
3398
Insufficiently Secure Settings
high6.0
1
Data Breach
3399
Payment Card Network
high6.0
1
Data Breach
3400
Weak password hashing (SHA-256)
high6.0
1
Data Breach
3401
Accidental Exposure
high6.0
1
Data Breach
3402
Default/Lack of Credentials
high6.0
1
DDoS Attack
3403
Microsoft Copilot email summarization flaw
high6.0
1
Phishing
3404
Insufficient Access Controls for High-Risk Secrets
high6.0
1
Credential Theft
3405
Email Account Security
high6.0
1
Email Hijacking
3406
exploitation of job application platforms
high6.0
1
social engineering
3407
Credential Stuffing
high6.0
1
Authentication Security Improvement
3408
Lack of Email Gateway HTML Attachment Blocking
high6.0
1
Phishing
3409
CVE-2025-66168
high6.0
1
Denial-of-Service (DoS)
3410
Absence of Document Automation/Redaction Tools
high6.0
1
Data Leakage
3411
PCI DSS 4.0.1 Non-Compliance (Unmanaged Scripts on Payment Pages)
high6.0
1
Data Breach
3412
Unattended Property
high6.0
1
Data Theft
3413
IT vendor vulnerability confirmed by the Ministry of Health
high6.0
1
Data Breach
3414
Over-reliance on email/text-based communication without secondary validation
high6.0
1
Phishing (AI-enhanced)
3415
Unsecured Remote Work Environments
high6.0
1
Human Error
3416
MOVEit Transfer platform vulnerability (likely CVE-2023-34362)
high6.0
1
Data Breach
3417
Poor Data Handling Protocols
high6.0
1
Data Breach
3418
Critical Infrastructure Vulnerabilities (e.g., Power Grid Exploitation)
high6.0
1
Cybercrime Network Dismantling
3419
Weak Cloud Security (Nintendo)
high6.0
1
DDoS Attack
3420
publicly available personal data (for voice cloning)
high6.0
1
phishing
3421
Flaw in the online application
high6.0
1
Data Breach
3422
Human Error (Inadvertent Disclosure in Public Documents)
high6.0
1
Data Breach
3423
CVE-2025-12779
high6.0
1
Vulnerability
3424
trust in automated AI-driven code analysis
high6.0
1
supply chain attack
3425
Security Setting Error
high6.0
1
Data Breach
3426
Human Error (IT Support Tricked)
high6.0
1
Data Breach
3427
Unquoted Search Path Weakness in Plantronics Hub
high6.0
1
Privilege Escalation
3428
Surveillance software
high6.0
1
Surveillance
3429
System Misconfiguration
high6.0
1
Data Breach
3430
Physical ATM Security
high6.0
1
Data Breach
3431
Unsecured Email Account
high6.0
1
Data Breach
3432
Employee Self Service system
high6.0
1
Data Breach
3433
lack of multi-factor verification
high6.0
1
phishing
3434
Improper data management practices
high6.0
1
Data Leak
3435
Human Error (Fatigue/Jetlag)
high6.0
1
Phishing
3436
Unrelated software bugs in vendor’s trading software
high6.0
1
Hacking, Software Bug
3437
Software used by a third-party service provider
high6.0
1
Data Breach
3438
CVE-2025-32432 (Craft CMS)
high6.0
1
cyberattack
3439
Backup Device Misconfiguration
high6.0
1
Data Breach
3440
lack of verification for online investments
high6.0
1
fraud
3441
Compromised user credentials
high6.0
1
Data Breach
3442
Insufficient User Awareness Training
high6.0
1
Phishing
3443
Improper access to email account
high6.0
1
Data Breach
3444
DNS misconfiguration (abandoned domains with improper nameserver delegation)
high6.0
1
DNS Misconfiguration Exploitation
3445
Flaw in Ivanti Endpoint Manager Mobile (EPMM)
high6.0
1
Data Breach
3446
Hardcoded Secrets in Code Repositories
high6.0
1
Credential Theft
3447
Lack of Email Encryption / Employee Negligence
high6.0
1
Data Breach
3448
Fragmented Security Tool Integration
high6.0
1
Operational Risk
3449
Poor Data Protection Practices
high6.0
1
Insider Threat
3450
Human trust in authentic-looking communications
high6.0
1
Phishing (AI-enhanced)
3451
TOCTOU Vulnerability
high6.0
1
Vulnerability Exploitation
3452
Unencrypted device with sensitive data (despite password protection)
high6.0
1
Data Breach (Physical Theft)
3453
AI Agent Memory Access
high6.0
1
Prompt Injection
3454
Fortra GoAnywhere secure file transfer platform
high6.0
1
Data Breach
3455
Password Reset Token Leak
high6.0
1
Account Hijacking
3456
Weak password encryption (unsalted MD5 and SHA-1)
high6.0
1
Data Breach
3457
Weak Third-Party Compliance Standards
high6.0
1
Data Leakage
3458
Human error (email misdelivery)
high6.0
1
Data Breach (Human Error / Misdelivery)
3459
Unauthorized access to Workday payroll accounts
high6.0
1
Data Breach
3460
System Vulnerability
high6.0
1
Data Breach
3461
Compromised Email Credentials
high6.0
1
Data Breach
3462
Improper Data Handling / Public-Facing Website Misconfiguration
high6.0
1
Data Breach
3463
Browser and plugin vulnerabilities
high6.0
1
Malvertising
3464
Developer oversight leading to token exposure in public repositories
high6.0
1
credential compromise
3465
Weak Authentication (SMS-based 2FA)
high6.0
1
Social Engineering
3466
CVE-2025-24071
high6.0
1
Vulnerability Disclosure
3467
MOVEit zero-day vulnerability
high6.0
1
Data Breach
3468
Third-party file sharing product
high6.0
1
Data Breach
3469
Data processing error
high6.0
1
Data Breach
3470
Generic Design of Legitimate Settlement Sites
high6.0
1
Phishing
3471
Unsecured IoT Devices (DVRs, WiFi Routers)
high6.0
1
DDoS Attack
3472
Weak SMS-based Multi-Factor Authentication (MFA)
high6.0
1
Financial Fraud
3473
Weak PIN reset security questions
high6.0
1
Data Breach
3474
Lack of Physical Security / Unencrypted Laptops
high6.0
1
Data Breach (Physical Theft)
3475
Google Business Profile verification loophole
high6.0
1
defacement
3476
Human Trust in Legitimate Breach Alerts
high6.0
1
Phishing / Social Engineering
3477
Use of Non-Official Communication Channels
high6.0
1
Phishing
3478
Mistaken Disclosure
high6.0
1
Data Breach
3479
Outdated Technology Infrastructure
high6.0
1
Data Leakage
3480
Family Member Trust Exploitation
high6.0
1
Fraud
3481
SSRF
high6.0
1
SSRF Vulnerability
3482
Unpatched Endpoints
high6.0
1
Credential Theft
3483
URL Spoofing
high6.0
1
Phishing
3484
Standard employee account credentials
high6.0
1
Cyberattack
3485
Incorrectly Configured AWS Bucket
high6.0
1
Data Exposure
3486
CVE-2025-37735 (Improper Preservation of Permissions)
high6.0
1
Vulnerability / Privilege Escalation
3487
Human Trust in IT Support Impersonation
high6.0
1
Data Breach
3488
Security weaknesses in NHS websites
high6.0
1
Cyberattack
3489
unauthorized data access/exfiltration by terminated employee
high6.0
1
data breach
3490
Weak Multi-Factor Authentication (MFA) on Twitter Employee Accounts
high6.0
1
Account Takeover
3491
Business Email Accounts
high6.0
1
Data Breach
3492
Suspicious WordPress plugin
high6.0
1
Cyberattack
3493
Stolen authentication cookie
high6.0
1
Cyber Espionage
3494
Weak Cybersecurity Standards in Financial and E-Commerce Sectors
high6.0
1
Cybercrime Network Dismantling
3495
Inadequate Vetting Procedures
high6.0
1
Data Exposure
3496
Weak DDoS mitigation (gaming platforms)
high6.0
1
Distributed Denial of Service (DDoS)
3497
Lack of Regulatory Oversight in Cryptocurrency Operations
high6.0
1
Cybercrime Network Dismantling
3498
misconfigured database
high6.0
1
data exposure
3499
Exposure of Customer Data
high6.0
1
Data Exposure
3500
Zero-Day Vulnerability in ESG Equipment
high6.0
1
Data Theft
3501
alleged exploitation of parking permit system to gain unauthorized access
high6.0
1
phishing
3502
Inadequate Remote Work Policies
high6.0
1
Data Leak
3503
Exposed Private Data
high6.0
1
Data Leak
3504
Internal Access Controls
high6.0
1
Data Breach
3505
Setup Configuration
high6.0
1
Data Leak
3506
Neglected to fix vulnerabilities
high6.0
1
Data Breach
3507
Citrix Remote Desktop Software Vulnerability
high6.0
1
Unauthorized Access
3508
Unsecured Employee Roster
high6.0
1
Data Breach
3509
insufficient monitoring of collaboration platforms
high6.0
1
data breach
3510
Trust in official app marketplaces, deceptive email outreach
high6.0
1
Phishing
3511
Legacy Access Controls, Identity Vulnerabilities
high6.0
1
Data Breach
3512
human error (successful phishing)
high6.0
1
data breach
3513
Email Access
high6.0
1
Business Email Compromise
3514
CVE-2026-26127 (Out-of-bounds read, CWE-125)
high6.0
1
Denial-of-Service (DoS)
3515
Browser-Stored Credentials
high6.0
1
Credential Theft
3516
Unauthorized access due to call center employee negligence
high6.0
1
Data Breach
3517
Misconfigured database backup access
high6.0
1
Data Breach
3518
Same-Origin Policy Gaps (postMessage Wildcards, CORS Misconfigurations)
high6.0
1
Data Breach
3519
Cloud Storage System
high6.0
1
Data Breach
3520
Lack of Automated Secrets Rotation
high6.0
1
Credential Theft
3521
Suspicious code on online payment portal
high6.0
1
Data Breach
3522
Brute Force Attacks
high6.0
1
Authentication Security Improvement
3523
Authentication protocol vulnerabilities
high6.0
1
Cyberattack
3524
Click2Gov
high6.0
1
Data Breach
3525
Improper data storage
high6.0
1
Data Breach
3526
Improper handling of sensitive documents
high6.0
1
Data Breach
3527
Vulnerable version of Trust Wallet browser extension (v2.68)
high6.0
1
Supply Chain Attack
3528
Human Error / Policy Violation (Email Mismanagement)
high6.0
1
Data Breach / Unauthorized Disclosure
3529
Website Payment Page
high6.0
1
Data Breach
3530
Inadequate User Consent Mechanisms
high6.0
1
Data Breach
3531
Misplaced Thumb Drive
high6.0
1
Data Breach
3532
Lack of endpoint security for attendee devices
high6.0
1
Malware
3533
Compromised Emails
high6.0
1
Cyber Fraud
3534
Delay introduction via VPN
high6.0
1
Cheating via VPN
3535
Human vulnerability (phishing)
high6.0
1
Phishing
3536
Abuse of trusted cloud services (Firebase, Google Translate)
high6.0
1
Phishing
3537
Phishable OTP Tokens for Mobile Wallet Provisioning
high6.0
1
Financial Fraud
3538
Human factor (phishing)
high6.0
1
Phishing
3539
Unsupported OS (Windows 2000, XP, Server 2003)
high6.0
1
Security Audit Findings
3540
Payment card processing system
high6.0
1
Data Breach
3541
Public Venmo Account
high6.0
1
Data Exposure
3542
Permission Misconfiguration
high6.0
1
Data Exposure
3543
Three additional undisclosed vulnerabilities (details not specified)
high6.0
1
Spoofing
3544
Improper folder permissions on file servers
high6.0
1
Data Breach
3545
Package look-up capabilities
high6.0
1
Data Breach
3546
Inadequate Training Programs
high6.0
1
Data Breach
3547
Lack of vetting for third-party game demos (Valve/Steam)
high6.0
1
Distributed Denial of Service (DDoS)
3548
misconfigured slot machine software
high6.0
1
fraud
3549
Exposed Google API key
high6.0
1
Data Exposure
3550
Weak authentication mechanism (Phone Number/PIN model)
high6.0
1
Unauthorized Access
3551
Loss of Physical Hard Drives
high6.0
1
Data Breach
3552
Misconfiguration in talent management software
high6.0
1
Data Breach
3553
CVE-2025-27610
high6.0
1
Vulnerability Exploitation
3554
Unsecured Physical Device (Password-protected laptop)
high6.0
1
Data Breach (Physical Theft)
3555
Unspecified vulnerability in a development server
high6.0
1
Data Breach
3556
Human (Insider Trust)
high6.0
1
Unauthorized Disclosure
3557
Employee System Credentials
high6.0
1
Data Breach
3558
weakness in AIS tampering detection
high6.0
1
physical cyber convergence
3559
Phishing/Malware
high6.0
1
Data Breach
3560
Insertion of malicious script
high6.0
1
Data Breach
3561
Sitting Ducks (DNS misconfiguration)
high6.0
1
Scam / Fraudulent Push Notifications
3562
Unauthorized Disclosure of Surveillance Footage
high6.0
1
Physical Security Breach
3563
Skill Gaps in Workforce
high6.0
1
Data Breach
3564
Legal Access via Emergency Order
high6.0
1
Data Breach
3565
Human error (opening malicious attachment)
high6.0
1
Phishing
3566
Reused/Weak Passwords
high6.0
1
Data Breach
3567
Absence of Technical Safeguards (Encryption/De-identification)
high6.0
1
Data Breach
3568
Reused/Weak Passwords (Phishing)
high6.0
1
DDoS Attack
3569
Lack of U2F/Physical Security Key Enforcement
high6.0
1
Financial Fraud
3570
File Decompression in Kernel
high6.0
1
Vulnerability Exploit
3571
human trust in FIFA branding
high6.0
1
phishing
3572
Mandatory login gate on social media platform
high6.0
1
Notification System Failure
3573
GitHub Credentials
high6.0
1
Data Breach
3574
Inadequate Coordination of Security Escort
high6.0
1
Physical Security Breach
3575
Donation Page
high6.0
1
Data Breach
3576
Human Trust in Email Communication
high6.0
1
Phishing
3577
CVE-2025-53770 (Microsoft SharePoint, CVSS 9.8)
high6.0
1
Data Breach
3578
Lack of Cross-Border Data Transfer Compliance
high6.0
1
Data Breach
3579
Exposed Data on Website
high6.0
1
Data Leak
3580
Insufficient Contextual Risk Awareness
high6.0
1
Social Engineering
3581
User Trust in Discounted/Rare Item Offers
high6.0
1
DDoS Attack
3582
CitrixBleed
high6.0
1
Data Breach
3583
Lack of insider threat detection and prevention measures
high6.0
1
Insider Threat
3584
Lack of Geofencing for Transaction Validation
high6.0
1
Financial Fraud
3585
Faiblesse dans les procédures de vérification d'identité
high6.0
1
Cyberattaque
3586
WhatsApp screen-sharing feature (misuse)
high6.0
1
social engineering
3587
Improper storage of personal information
high6.0
1
Data Breach
3588
Unencrypted CouchDB installation
high6.0
1
Data Leak
3589
Weak/Leaked Credentials
high6.0
1
Data Breach
3590
Installation management process in Mobile VPN with IPSec client for Windows
high6.0
1
Privilege Escalation
3591
Payment .php file vulnerability
high6.0
1
Data Breach
3592
Default Configurations in Security Tools
high6.0
1
Operational Risk
3593
External System Breach (Hacking)
high6.0
1
Data Breach
3594
Security vulnerabilities in IP cameras
high6.0
1
DDoS Attack
3595
Weak Security Questions
high6.0
1
Data Breach
3596
Inadvertent Permissions
high6.0
1
Cyber Attack
3597
Gmail accounts
high6.0
1
Data Breach
3598
Unpatched systems in video surveillance and access control
high6.0
1
Security Audit Findings
3599
Lack of rate-limiting or size restrictions on contact list uploads, enabling mass verification of phone numbers associated with WhatsApp accounts.
high6.0
1
Privacy Vulnerability
3600
Fake pop-up window
high6.0
1
Data Breach
3601
CVE-2024-38197 (CVSS 6.5: Medium)
high6.0
1
Spoofing
3602
Fortinet VPN vulnerability
high6.0
1
Data Breach
3603
Browser hijacking via malicious script
high6.0
1
DDoS Attack, Content Tampering, Malicious JavaScript Injection
3604
privileged access controls
high6.0
1
insider threat
3605
Complexity in visibility and control
high6.0
1
Data Breach
3606
insufficient security protections
high6.0
1
cyber intrusion
3607
Zero-Day Vulnerability in Fortran GoAnywhere MFT
high6.0
1
Data Breach
3608
Human Error (Incorrect Address Usage)
high6.0
1
Data Breach
3609
Public Access to Amazon S3 Bucket
high6.0
1
Data Exposure
3610
Improper Access
high6.0
1
Data Breach
3611
Lack of Strict Marketplace Vetting
high6.0
1
Malware Distribution
3612
psychological manipulation (e.g., fear of missing out on high returns)
high6.0
1
fraud
3613
Backend Update Bug
high6.0
1
Bug/Exploit
3614
Compromised email account credentials
high6.0
1
Phishing
3615
Lack of proactive domain monitoring and registration of brand variations
high6.0
1
Cybersquatting, Phishing, Malware Distribution, Fraud
3616
Weak Login Verification
high6.0
1
Data Breach
3617
CVE-2025-43300 (Apple OS-level zero-day)
high6.0
1
Zero-day exploit
3618
Delayed Detection of Coordinated Trading Patterns
high6.0
1
Financial Fraud
3619
Rapid Response to Urgent Requests from Seniors
high6.0
1
Social Engineering
3620
Unprotected RSYNC Server
high6.0
1
Data Leak
3621
Weak Password Policy (Password: 'Louvre', 'Thales')
high6.0
1
Physical Theft
3622
Sabre Hospitality Solutions' system
high6.0
1
Data Breach
3623
Unsecured Wi-Fi network
high6.0
1
Malware
3624
Improper Client Segregation
high6.0
1
Data Breach
3625
E-Verify's inability to verify the authenticity of presented documents
high6.0
1
Identity Theft
3626
MIME type and filename extension mismatches
high6.0
1
Vulnerability Exploit
3627
Lack of multi-factor authentication (MFA) in some cases
high6.0
1
Phishing (AI-enhanced)
3628
CVE-2025-2848
high6.0
1
Vulnerability Exploitation
3629
CVE-2025-59789 (Uncontrolled Recursion / Stack Overflow in json2pb component)
high6.0
1
Denial-of-Service (DoS)
3630
Gaps in cybersecurity
high6.0
1
Cyberattack (Hacking)
3631
Lack of Token Rotation
high6.0
1
Unauthorized Access
3632
Weak Password/Credential Management
high6.0
1
Data Breach
3633
User Trust in Legitimate Software Repositories
high6.0
1
Malware Distribution
3634
human trust in authoritative messages (e.g., toll agencies)
high6.0
1
phishing
3635
CSP frame-src Bypass (Compromised Allowed Domains)
high6.0
1
Data Breach
3636
Default Weak Passwords
high6.0
1
Unauthorized Access
3637
ADT Pulse Software Vulnerabilities
high6.0
1
Unauthorized Access
3638
Unpatched Public-Facing Servers
high6.0
1
DDoS Attack
3639
Unsecured Personal Laptop
high6.0
1
Data Breach
3640
Automated Attack
high6.0
1
Security Breach
3641
Point-of-sale terminals
high6.0
1
Data Breach
3642
CVE-2025-61882, Oracle E-Business Suite (EBS) security flaws
high6.0
1
Data Breach
3643
Absence of Passkey Support
high6.0
1
Phishing
3644
Employee Mistake
high6.0
1
Data Breach
3645
Lack of verification for payment changes (e.g., routing/banking number updates)
high6.0
1
Fraud/Scam
3646
Human Carelessness
high6.0
1
Human Error
3647
Third-Party CRM Integration Vulnerabilities
high6.0
1
Data Breach
3648
URL Parameter Manipulation (collection)
high6.0
1
Prompt Injection
3649
Lack of Device Encryption/Tracking
high6.0
1
Data Security Incident
3650
Lack of robust security measures
high6.0
1
Hacking
3651
Incorrect Address Usage
high6.0
1
Data Breach
3652
Online Store Vulnerability
high6.0
1
Data Breach
3653
Lack of Oversight/Enforcement of Access Controls
high6.0
1
Data Breach
3654
Unspecified vulnerability in 2Keys MFA system (Interac-owned)
high6.0
1
Data Breach
3655
lack of bulk email security measures
high6.0
1
data breach
3656
Human (phishing)
high6.0
1
Phishing
3657
unsecured email systems
high6.0
1
phishing
3658
Stolen Laptop
high6.0
1
Data Breach
3659
Accellion's File Transfer Appliance software
high6.0
1
Data Breach
3660
TotoLink router firmware update server
high6.0
1
DDoS Attack
3661
CVE-2026-21525 (NULL pointer dereference, CWE-476)
high6.0
1
Zero-Day Vulnerability
3662
Lack of Device Encryption
high6.0
1
Data Breach (Physical Theft)
3663
Internal SharePoint Site
high6.0
1
Data Breach
3664
Non-secure data storage location
high6.0
1
Data Breach
3665
Lack of API-Centric Threat Intelligence Sharing
high6.0
1
Operational Risk
3666
lack of real-time maritime tracking safeguards
high6.0
1
physical cyber convergence
3667
External Access to Validator Keys
high6.0
1
Blockchain Security Breach
3668
CVE-2026-0231 (CWE-497)
high6.0
1
Vulnerability
3669
Unsecured PHI on Laptop
high6.0
1
Data Breach (Theft of Physical Device)
3670
user typographical errors
high6.0
1
phishing
3671
improper authentication
high6.0
1
unauthorized access
3672
Password Manager Bypass
high6.0
1
Phishing
3673
Drift’s OAuth integration flow vulnerability
high6.0
1
Data Breach
3674
Email Encryption
high6.0
1
Data Breach
3675
Data mismatch error in system logic
high6.0
1
Data Breach (Unauthorized Access/Disclosure)
3676
Unauthorized Change to Website
high6.0
1
Data Breach
3677
Human factor - employees providing login credentials
high6.0
1
Data Breach
3678
Brokerage Platforms Allowing MFA via Text/Call
high6.0
1
Financial Fraud
3679
Vendor Misconfiguration
high6.0
1
Data Breach
3680
Human (Email Compromise)
high6.0
1
Data Breach
3681
Lack of Continuous Credential Monitoring
high6.0
1
Credential Theft
3682
MOVEit file transfer program
high6.0
1
Data Breach
3683
Human (Social Engineering)
high6.0
1
Phishing
3684
Server vulnerability of a former IT service provider
high6.0
1
Data Breach
3685
Potential compromise of routers by Chinese state-sponsored hackers
high6.0
1
Security Concerns and Investigations
3686
Dangerous React Patterns (dangerouslySetInnerHTML near iframes)
high6.0
1
Data Breach
3687
lack of verification by job seekers
high6.0
1
social engineering
3688
Potentially CVE-2025-53779 (Windows Kerberos)
high6.0
1
Data Breach
3689
Administrative Error
high6.0
1
Data Breach
3690
Backup Payment Card Readers
high6.0
1
Data Breach
3691
Configuration Mistake
high6.0
1
Data Leak
3692
Inadvertent transfer of control of the account to a malicious actor
high6.0
1
Hacking
3693
lack of domain registration oversight
high6.0
1
phishing
3694
Lack of Public Awareness
high6.0
1
Phishing
3695
Static Filtering in SEGs
high6.0
1
Operational Risk
3696
Unauthorized Access due to Program Glitch
high6.0
1
Data Breach
3697
Weak Internal Controls (Prior Embezzlement)
high6.0
1
Fraud
3698
Internal Employee Privileges
high6.0
1
Data Breach
3699
Publicly accessible Elasticsearch instance
high6.0
1
Data Breach
3700
User trust in brand communications; exploitation of psychological urgency and fear tactics. No technical vulnerabilities in LastPass, Bitwarden, or 1Password systems were exploited.
high6.0
1
Phishing
3701
Exposure of Install Action Tokens
high6.0
1
Data Breach
3702
Human error leading to unauthorized access
high6.0
1
Phishing
3703
Lack of Visibility in Rapid Development Cycles
high6.0
1
DDoS Attack
3704
Student Access to Staff Devices
high6.0
1
Insider Threat
3705
Unencrypted and Unprotected Data Storage
high6.0
1
Data Breach
3706
developer reliance on third-party dependencies
high6.0
1
supply chain attack
3707
Same password for multiple accounts
high6.0
1
Cyber Attack
3708
Weak Administrator Password
high6.0
1
Data Breach
3709
Apache HTTP server vulnerability
high6.0
1
Cyber Espionage
3710
Unsecured Deleted Cloud Storage Buckets
high6.0
1
Data Breach
3711
Unencrypted Device
high6.0
1
Data Breach
3712
Misconfigured third-party service
high6.0
1
Data Exposure
3713
Outdated Website
high6.0
1
Data Breach
3714
Social engineering, user trust exploitation
high6.0
1
Malware Campaign
3715
Disconnected Security Tools
high6.0
1
DDoS Attack
3716
Realtek chips
high6.0
1
DDoS Attack
3717
CVE-2025-57714 (Unquoted Search Path in NetBak Replicator 4.5.x)
high6.0
1
Vulnerability
3718
GoAnywhere MFT zero-day vulnerability
high6.0
1
Data Breach
3719
Four zero-day vulnerabilities in IBM Data Risk Manager
high6.0
1
Zero-Day Exploit
3720
Unauthorized access from outside of Europe
high6.0
1
DDoS Attack
3721
Weak Authentication (Slack Cookies)
high6.0
1
Data Breach
3722
Unspecified software vulnerability in 2Keys MFA system
high6.0
1
Data Breach
3723
Unpatched/Outdated Systems (Windows Server 2003)
high6.0
1
Physical Theft
3724
Insecure Direct Object Reference (IDOR) in media access endpoints (/media/{ID})
high6.0
1
Data Breach
3725
Lack of Data Wiping and Encryption
high6.0
1
Data Breach
3726
Unauthorized access to an employee's email account
high6.0
1
Data Breach
3727
Overly Permissive Sandbox Attributes (allow-same-origin + allow-scripts)
high6.0
1
Data Breach
3728
Third-Party Integration (Drift Email/Salesloft)
high6.0
1
Data Breach
3729
Unencrypted Storage Devices
high6.0
1
Data Breach
3730
Retired Internet Application
high6.0
1
Data Breach
3731
Lack of Physical Security Measures at ATM
high6.0
1
Data Breach (Card Skimming)
3732
Public Visibility of Venmo Transactions and Contacts
high6.0
1
Data Leak
3733
Unvalidated PostMessage Origins
high6.0
1
Data Breach
3734
Human error (successful phishing attack)
high6.0
1
Data Breach
3735
Loss of Physical Control (Stolen Laptop)
high6.0
1
Data Breach (Theft of Device)
3736
Lack of Secure Document Disposal Procedures
high6.0
1
Data Breach (Physical)
3737
Folio/IIN Integration Flaws
high6.0
1
Data Breach
3738
Data Privacy Policy
high6.0
1
Data Disclosure
3739
Lack of data-sharing protocols in pilot programs
high6.0
1
Data Breach / Unauthorized Data Sharing
3740
Unpatched external web servers (Nintendo)
high6.0
1
Distributed Denial of Service (DDoS)
3741
CVE-2025-24061
high6.0
1
Vulnerability Disclosure
3742
Lack of Data Redaction/Validation in FOI Process
high6.0
1
Data Breach (Unintentional Disclosure)
3743
Insufficient oversight of contractor personnel with privileged access
high6.0
1
Insider Threat
3744
Test server misconfiguration
high6.0
1
Data Breach
3745
Unsecured Collaborative Tools
high6.0
1
Data Breach Risk
3746
unrestricted access to student email accounts
high6.0
1
election fraud
3747
Privacy Controls
high6.0
1
Data Breach
3748
Inadvertent Technical Error
high6.0
1
Data Breach
3749
human error (lack of training)
high6.0
1
phishing
3750
Employee Portal Accounts
high6.0
1
Data Breach
3751
Improperly secured MongoDB database
high6.0
1
Data Breach
3752
AI Platform Misconfiguration
high6.0
1
Data Breach
3753
Player trust in unofficial marketplaces
high6.0
1
Distributed Denial of Service (DDoS)
3754
Human Trust in Official-Looking Communications
high6.0
1
Phishing
3755
Accela Software Error
high6.0
1
Data Breach
3756
Social Engineering of Mobile Carriers
high6.0
1
Account Takeover
3757
Unknown Oracle E-Business System Vulnerability
high6.0
1
Cyber Attack
3758
CVE-2025-53770 (SharePoint Server, 'ToolShell')
high6.0
1
Data Breach
3759
Unsecured Audio Files
high6.0
1
Data Exposure
3760
Weak URL validation in RecursiveUrlLoader (String.startsWith() check) and lack of private IP range validation
high6.0
1
Server-Side Request Forgery (SSRF)
3761
Data breach via third-party vendor
high6.0
1
Phishing
3762
Inadequate Multi-Factor Authentication (MFA)
high6.0
1
Human Error
3763
Basic Security Vulnerability
high6.0
1
Data Breach
3764
Unknown Zero-Day Exploit (mentioned in Telegram chats)
high6.0
1
Distributed Denial-of-Service (DDoS) Attack
3765
No Device Encryption
high6.0
1
Data Breach Risk
3766
Compromise at a third party vendor's file servers
high6.0
1
Data Breach
3767
Unauthorized access to payment card data
high6.0
1
Data Breach
3768
Accès non autorisé aux données clients
high6.0
1
Cyberattaque
3769
holiday distraction
high6.0
1
phishing
3770
Employee email account credentials
high6.0
1
Data Breach
3771
Insufficient Monitoring of Third-Party Integrations
high6.0
1
Unauthorized Access
3772
lapses in cybersecurity measures
high6.0
1
cyber intrusion
3773
Weak PIN reset security
high6.0
1
Data Breach
3774
Lack of Real-Time Email Authentication
high6.0
1
Phishing
3775
Human Trust in Branded Communications
high6.0
1
Phishing
3776
Unencrypted Email
high6.0
1
Data Breach
3777
Employee's Microsoft 365 Account
high6.0
1
Data Breach
3778
Weakness in GPS Navigation System Authentication/Encryption
high6.0
1
GPS Spoofing / Maritime Cyber Incident
3779
Lack of user awareness, trust in government services, and reusable phishing infrastructure
high6.0
1
Phishing
3780
Website Configuration Error
high6.0
1
Data Breach
3781
System-generated error
high6.0
1
Data Breach
3782
Absence of Endpoint Monitoring
high6.0
1
Data Breach Risk
3783
Weak passwords (e.g., 'LOUVRE', 'THALES')
high6.0
1
Security Audit Findings
3784
Bug in open-source library
high6.0
1
Data Leak
3785
Malicious Software Installation
high6.0
1
Data Breach
3786
multilingual social engineering gaps
high6.0
1
phishing
3787
Post-termination access to company passwords
high6.0
1
Unauthorized Access
3788
Weak Authentication in Mobile Wallet Onboarding
high6.0
1
Financial Fraud
3789
Vulnerable Laravel version or misconfiguration
high6.0
1
Data Exposure
3790
Base64 Obfuscation Bypass
high6.0
1
Prompt Injection
3791
Poor password hygiene (weak, reused, or easily guessable passwords)
high6.0
1
data breach
3792
Exploitable Gaps in Contactless Payment Tokenization
high6.0
1
Financial Fraud
3793
Insufficient network segmentation between office and operational systems
high6.0
1
Cyber Intrusion
3794
Legacy IT systems and outdated infrastructure
high6.0
1
Cybersecurity Awareness and Infrastructure Vulnerability
3795
Insider Tool Abuse
high6.0
1
Account Takeover
3796
shared/default credentials
high6.0
1
election fraud
3797
Bypass of Time-Limited MFA Windows
high6.0
1
Financial Fraud
3798
Software vulnerability at vendor Infosys McCamish Systems LLC
high6.0
1
Data Breach
3799
Failure to Protect Sensitive Location Data
high6.0
1
Physical Security Breach
3800
Microsoft Exchange email servers
high6.0
1
Data Breach
3801
Weak Access Controls in Citrix Systems
high6.0
1
Data Breach
3802
Lack of Security Clearance Enforcement
high6.0
1
Data Exposure
3803
Malware installation via phishing
high6.0
1
Data Breach
3804
Phishing/Email Compromise
high6.0
1
Cyber Attack
3805
Paycor's MOVEit Transfer software
high6.0
1
Data Breach
3806
Internal Employee Access
high6.0
1
Data Breach
3807
Weak ATM Security
high6.0
1
Financial Fraud
3808
Security Misconfiguration
high6.0
1
Data Leak
3809
CVE-2024-36347
high6.0
1
Vulnerability
3810
Publicly Available Environment Files
high6.0
1
Data Exposure
3811
Lack of Access Controls (No Password Protection)
high6.0
1
Data Breach (Unintentional Exposure)
3812
DVRs/NVRs
high6.0
1
DDoS Attack
3813
Insufficient verification protocols for payment changes
high6.0
1
Phishing (AI-enhanced)
3814
Business Continuity Dependencies
high6.0
1
Third-Party Risk
3815
Weak Password Hashing (MD5 without salt)
high6.0
1
Data Breach
3816
Alert System Failure
high6.0
1
Data Breach
3817
Computer Infection
high6.0
1
Financial Theft
3818
Human trust in fake USPS parcel delivery messages
high6.0
1
Smishing Campaign
3819
Lack of Real-Time Verification for High-Risk Transactions
high6.0
1
Social Engineering
3820
API security flaw in Kiln’s infrastructure (used for Solana staking operations)
high6.0
1
cyberattack
3821
Human Error (Improper Data Handling)
high6.0
1
Data Breach (Accidental Disclosure)
3822
Lack of oversight/guidance for opioid settlement fund allocation; flexible spending rules
high6.0
1
Financial Misappropriation / Regulatory Non-Compliance
3823
Employee Credentials and Laptop
high6.0
1
Data Breach
3824
Over-reliance on Limited Public Nodes (Centralization Risk)
high6.0
1
Blockchain Security Breach
3825
Human Error (Falling for Spoofed Email)
high6.0
1
Data Breach
3826
weak identity verification for wallet transfers
high6.0
1
cyber theft
3827
Weak password ('solarwinds123')
high6.0
1
Cyberattack
3828
misconfigured public-facing storage/exposure of sensitive backup file
high6.0
1
data exposure
3829
Software Update Issue
high6.0
1
Data Breach
3830
Location tracking vulnerabilities
high6.0
1
Data Collection Incident
3831
Data server configuration error
high6.0
1
Data Breach
3832
Rapid development cycles outpacing security reviews
high6.0
1
Distributed Denial of Service (DDoS)
3833
On-board ports containing vehicle data
high6.0
1
Vehicle Theft
3834
Coding techniques to enter the Naviance student site
high6.0
1
Data Breach
3835
Compromised e-mail account
high6.0
1
Data Breach
3836
human trust/urgency bias
high6.0
1
social engineering
3837
Fault in the code of EOSBet's smart contracts
high6.0
1
Cryptocurrency Theft
3838
Unencrypted USB Flash Drive
high6.0
1
Data Breach
3839
Discord’s expired vanity URL reuse policy
high6.0
1
Distributed Denial of Service (DDoS)
3840
NFC Protocol Abuse (Legitimate Traffic Relay)
high6.0
1
Financial Fraud
3841
Lack of authentication on Kubernetes console
high6.0
1
Cloud Security Breach
3842
Session Cookie Theft
medium5.0
1
Security Breach
3843
OAuth Tokens
medium5.0
1
Data Breach
3844
GiveWP WordPress Plugin Flaw
medium5.0
1
Data Breach
3845
initramfs debug shell access during boot failures
medium5.0
1
Vulnerability Exploitation
3846
Vbulletin CMS Flaw
medium5.0
1
Data Breach
3847
Microsoft Exchange vulnerability
medium5.0
1
Ransomware
3848
Typeform Vulnerability
medium5.0
1
Data Breach
3849
Public Exposure of Sensitive Information
medium5.0
1
Data Breach
3850
Data Entry Error
medium5.0
1
Data Breach
3851
Third-Party Vendor Security Gaps
medium5.0
1
Data Breach
3852
CVE-2025-9242 (Out-of-bounds Write in 'iked' process)
medium5.0
1
Vulnerability
3853
Byte Pair Encoding (BPE) or WordPiece tokenization weaknesses in LLMs
medium5.0
1
AI/ML Vulnerability Exploitation
3854
CVE-2025-48989 (HTTP/2 'Made You Reset' Memory Exhaustion)
medium5.0
1
Vulnerability
3855
Inappropriate email handling
medium5.0
1
Data Breach
3856
Progress Software's MOVEit file transfer software
medium5.0
1
Data Breach
3857
Third-party vendor misconfiguration
medium5.0
1
Data Breach
3858
Email Security
medium5.0
1
Data Breach
3859
Insecure transmission of payment card data
medium5.0
1
Payment Card Breach
3860
Improper Data Disposal
medium5.0
1
Data Breach
3861
Technical Setting in Tracking Technology
medium5.0
1
Data Breach
3862
Human Error (Mistaken Disclosure)
medium5.0
1
Data Breach (Unauthorized Disclosure)
3863
Unsecured Paper Files
medium5.0
1
Data Breach
3864
Improper output encoding
medium5.0
1
Cross-Site Scripting (XSS)
3865
Incorrect Privacy Settings
medium5.0
1
Data Breach
3866
Lack of verification of driver credentials and shipping paperwork
medium5.0
1
Cyber Cargo Theft (Fictitious Pickup)
3867
CVE-2025-46176
medium5.0
1
Vulnerability Exploitation
3868
Bug in the GMX platform
medium5.0
1
Cryptocurrency Theft
3869
Unauthorized Biometric Data Collection
medium5.0
1
Privacy Breach
3870
Improper Access Restrictions
medium5.0
1
Data Breach
3871
Human Factor (Insider Access Abuse)
medium5.0
1
Insider Threat
3872
Exposed credentials from earlier data breaches
medium5.0
1
Credential Stuffing
3873
Insecure Transport
medium5.0
1
Data Leak
3874
Computer Programming Error
medium5.0
1
Data Breach
3875
Email Indexing and Unsubscribe Vulnerability
medium5.0
1
Data Exposure
3876
Insufficient input validation
medium5.0
1
Cross-Site Scripting (XSS)
3877
Poor physical installation of hardware
medium5.0
1
Hardware Security Oversight
3878
Lack of Output Encoding in Email Templates
medium5.0
1
Email Spoofing
3879
Denial of Service (DoS)
medium5.0
1
Data Breach, Denial of Service (DoS)
3880
Credentials left on GitHub
medium5.0
1
Data Breach
3881
Vulnerability in Drift application’s Salesforce integration
medium5.0
1
third-party breach
3882
Bug in Vine
medium5.0
1
Data Breach
3883
Unsecured Public Trello Boards
medium5.0
1
Data Leak
3884
Improper configuration of the website
medium5.0
1
Data Breach
3885
Improper Account Use
medium5.0
1
Data Breach
3886
Poor governance, lack of controls in records management, and inadequate note-taking practices
medium5.0
1
Data Breach (Unauthorized Disclosure)
3887
Printing Error
medium5.0
1
Data Breach
3888
Computer Error
medium5.0
1
Data Breach
3889
Online quote system
medium5.0
1
Data Breach
3890
Out-of-Bounds Write (CWE-787)
medium5.0
1
Denial-of-Service (DoS)
3891
Stored HTML Injection via Budget Name Input Field
medium5.0
1
Email Spoofing
3892
Inadequate data security program
medium5.0
1
Data Breach
3893
Privileged credentials
medium5.0
1
Data Breach
3894
Improper website data handling
medium5.0
1
Data Breach (Accidental Disclosure)
3895
Policy Violation
medium5.0
1
Data Breach
3896
Improper OAuth Token Security
medium5.0
1
Data Breach
3897
Lateral Movement via Stolen Credentials
medium5.0
1
Supply Chain Attack
3898
Trust in Urgent Requests
medium5.0
1
Awareness Campaign
3899
Improper Disclosure of Research Funding
medium5.0
1
Data Privacy Incident
3900
Flaw in proxy link handling
medium5.0
1
Information Disclosure
3901
CVE-2025-61882 (critical zero-day in Oracle E-Business Suite allowing remote system control without authentication)
medium5.0
1
ransomware
3902
Incorrect fax number
medium5.0
1
Data Breach
3903
Weak administrator password, lack of Multi-Factor Authentication, exposed remote access
medium5.0
1
Ransomware
3904
Metadata Harvesting in Salesforce
medium5.0
1
Data Breach
3905
Information Sharing Program
medium5.0
1
Data Breach
3906
Poor access controls
medium5.0
1
Data Breach
3907
Insufficient Data Protection Measures
medium5.0
1
Data Breach
3908
Unsecured Browser-Stored Passwords/Cookies
medium5.0
1
Data Breach
3909
Misconfigured security protocols or automated password reset systems
medium5.0
1
Potential Data Exposure
3910
Weak Username and Password Combinations
medium5.0
1
Data Breach
3911
CVE-2025-59489 (Unity Engine Arbitrary Code Execution)
medium5.0
1
Vulnerability Disclosure
3912
AI Algorithm Inefficiency
medium5.0
1
System Malfunction
3913
CVE-2025-11001
medium5.0
1
Vulnerability Exploitation
3914
URL Redirection
medium5.0
1
Vulnerability Exploit
3915
Accidental Sharing of Data
medium5.0
1
Data Breach
3916
Unauthorized access to secrets during pull request process
medium5.0
1
Unauthorized Access
3917
CVE-2026-24489
medium5.0
1
Vulnerability Exploitation
3918
Data Handling Error
medium5.0
1
Data Breach
3919
Microsoft Power Apps portal configuration error
medium5.0
1
Data Breach
3920
Trust in AI-assisted development tools
medium5.0
1
Supply Chain Attack
3921
Customer service software misconfiguration
medium5.0
1
Data Breach
3922
CVE-2025-45080
medium5.0
1
Vulnerability
3923
Human error (misconfigured download link)
medium5.0
1
Extortion
3924
CVE-2025-22244: Stored XSS in Gateway Firewall Response Pages
medium5.0
1
Vulnerability
3925
Bug
medium5.0
1
Data Leak
3926
Weakness in Drift-Salesforce integration security
medium5.0
1
data breach
3927
Older servers
medium5.0
1
Data Breach
3928
Weak cybersecurity measures
medium5.0
1
Data Breach
3929
Malicious JavaScript injection through API call
medium5.0
1
Supply Chain Attack
3930
Point-of-Sale (POS) Systems
medium5.0
1
Data Breach
3931
MOVEit file transfer tool vulnerability
medium5.0
1
Data Breach
3932
Compromised email login credentials
medium5.0
1
Data Breach
3933
Failure to redact information properly
medium5.0
1
Data Breach
3934
Microsoft 365 Email Account
medium5.0
1
Data Breach
3935
Improper Handling of Physical Records
medium5.0
1
Data Breach
3936
Public-facing website
medium5.0
1
Data Breach
3937
Remote Access through Third-Party POS Vendor
medium5.0
1
Payment Card Breach
3938
Security hole in the in-house web application
medium5.0
1
Data Breach
3939
Outdated Windows software (including video surveillance systems)
medium5.0
1
Physical Burglary
3940
Exposed backup firewall preference files in MySonicWall cloud service
medium5.0
1
Data Exposure
3941
Progress Software's MOVEit Transfer
medium5.0
1
Data Breach
3942
Click2Gov System
medium5.0
1
Data Breach, Fraud
3943
CVE-2025-22243: Stored XSS Vulnerability in NSX Manager UI
medium5.0
1
Vulnerability
3944
Database Misconfiguration
medium5.0
1
Data Breach
3945
Typosquatting (Visual Deception)
medium5.0
1
Phishing
3946
Open Server
medium5.0
1
Data Exposure
3947
CVE-2025-27915
medium5.0
1
Vulnerability Exploitation
3948
Service request lookup tool flaw allowing unauthorized access via bot
medium5.0
1
Data Breach
3949
Instant Quote Platform
medium5.0
1
Data Breach
3950
Archived website hosted by a now-former third-party vendor
medium5.0
1
Data Breach
3951
CVE-2024-6914
medium5.0
1
Vulnerability Exploitation
3952
Software Glitch
medium5.0
1
Data Breach
3953
Sorting Error
medium5.0
1
Data Breach
3954
Physical Loss of Storage Device
medium5.0
1
Data Breach
3955
Third-party contractor’s laptop
medium5.0
1
Data Breach
3956
Samsung.com
medium5.0
1
Data Breach
3957
Weak IAM credential security, lack of multifactor authentication (MFA)
medium5.0
1
Cryptocurrency Mining
3958
Open Database Platform
medium5.0
1
Data Exposure
3959
Human Error (Inadvertent Disclosure)
medium5.0
1
Data Breach
3960
CVE-2025-61884 (potential, patched later)
medium5.0
1
Data Breach
3961
Unknown Third Party Credential Leak
medium5.0
1
Credential Stuffing
3962
Home internet connection access via VPN
medium5.0
1
Security Breach
3963
Inadequate data erasure protocols
medium5.0
1
Data Handling Incident
3964
Reused Usernames and Passwords
medium5.0
1
Account Compromise
3965
CVE-2024-41710
medium5.0
1
DDoS Botnet
3966
Third-party software library vulnerability
medium5.0
1
Data Breach
3967
Mistakenly attached sensitive information to email
medium5.0
1
Data Breach
3968
Unsecured Vehicle
medium5.0
1
Physical Theft
3969
CVE-2025-52891
medium5.0
1
Denial-of-Service
3970
Browser Cache Storage
medium5.0
1
Data Breach
3971
Open database without authentication
medium5.0
1
Data Breach
3972
Insufficient Email Client-Side Sanitization
medium5.0
1
Email Spoofing
3973
Patient Billing System
medium5.0
1
Data Breach
3974
User Account
medium5.0
1
Data Breach
3975
Indirect prompt injection (IPI)
medium5.0
1
Vulnerability Exploit
3976
Ignoring Robots Exclusion Protocol
medium5.0
1
Data Scraping
3977
Weak SaaS Integration Controls
medium5.0
1
Data Breach
3978
Unchecked third-party access, improper configurations, over-permissioned tools
medium5.0
1
Data Exposure
3979
Improper third-party data sharing
medium5.0
1
Data Breach
3980
Insufficient access controls and monitoring in office suites
medium5.0
1
Physical Security Breach, Theft
3981
Accellion file sharing platform
medium5.0
1
Data Breach
3982
User Credentials from an Unrelated Site
medium5.0
1
Data Breach
3983
CVE-2023-2533
medium5.0
1
Vulnerability Exploitation
3984
Progress Software's MOVEit software vulnerability
medium5.0
1
Data Breach
3985
CVE-2025-13223 (V8 JavaScript engine flaw)
medium5.0
1
Zero-day vulnerability
3986
Improper truncation of payment card information on receipts
medium5.0
1
Data Exposure
3987
Online appointment functionality failure
medium5.0
1
Data Leak
3988
Web Page Configuration
medium5.0
1
Data Breach
3989
CVE-2025-11002
medium5.0
1
Vulnerability Exploitation
3990
Lack of access controls, Unauthorized third-party server usage
medium5.0
1
Data Misuse, Election Interference, Unauthorized Data Access
3991
Outdated Routers with Remote Administration Enabled
medium5.0
1
Cyber Attack
3992
Website Programming Change
medium5.0
1
Data Breach
3993
Improper Access Control (Publicly Accessible File)
medium5.0
1
Data Exposure / Unauthorized Access
3994
Slack's link-rendering logic flaw (misinterpreting text as domains when missing spaces after punctuation)
medium5.0
1
Vulnerability Exploitation
3995
Unprotected Excel Spreadsheet
medium5.0
1
Data Breach
3996
Data Mishandling
medium5.0
1
Data Breach
3997
CVE-2019-9621
medium5.0
1
Vulnerability Exploitation
3998
Lack of Awareness
medium5.0
1
Awareness Campaign
3999
CVE-2025-48384
medium5.0
1
Vulnerability Exploitation
4000
Internal Logging Mechanism
medium5.0
1
Data Exposure
4001
CVE-2025-22245: Stored XSS in Router Port Configurations
medium5.0
1
Vulnerability
4002
Improper disposal of electronic devices
medium5.0
1
Data Breach
4003
CVE-2024-22774 (Uncontrolled search path element)
low2.5
1
Privilege Escalation
4004
CVE-2026-20841 (CWE-77: Command Injection)
low2.5
1
Remote Code Execution (RCE)
4005
CVE-2025-49464
low2.5
1
Vulnerability Exploitation
4006
CVE-2025-4230
low2.5
1
Command Injection
4007
Hard-coded secret values
low2.5
1
Vulnerability Exploitation
4008
CVE-2025-9101
low2.5
1
DDoS
4009
Weak credentials/default passwords in IoT devices
low2.5
1
Distributed Denial of Service (DDoS)
4010
Improper conversation/message ID verification
low2.5
1
Vulnerability Exploitation
4011
Insufficient file authentication in the updater mechanism
low2.5
1
Software Vulnerability
4012
Mailing Processes
low2.5
1
Data Breach
4013
Credentials obtained from another website
low2.5
1
Data Breach
4014
Flaw in HTML sanitizer (rcube_washtml) failing to block <feImage> SVG element
low2.5
1
Privacy Bypass
4015
CVE-2025-59718
low2.5
1
Authentication Bypass
4016
Vulnerability in the outage app
low2.5
1
Data Breach
4017
CVE-2024-11857
low2.5
1
Vulnerability
4018
Psychological manipulation (urgency, stress, perceived authority)
low2.5
1
Phishing/Scam
4019
CVE-2025-59719
low2.5
1
Authentication Bypass
4020
Unprotected IoT Devices
low2.5
1
IoT Device Hack
4021
Weaknesses in cloud security, insufficient encryption, inadequate identity management, lack of network segmentation
low2.5
1
AI System Targeting, Cloud Infrastructure Exploitation
4022
Database Configuration Error
low2.5
1
Data Breach
4023
unpatched_software
low2.5
1
data_breach
4024
Fortinet EMS (CVE-2023-48788)
low2.5
1
Ransomware
4025
Compromised IoT devices (routers, IP cameras, digital video recorders)
low2.5
1
DDoS Attack
4026
Data Security Vulnerabilities
low2.5
1
Data Security Vulnerability
4027
Unsecured FTP Server
low2.5
1
Data Breach
4028
Lack of phishing controls, Unrestricted RMM tool usage, Insufficient EDR monitoring
low2.5
1
Phishing, Social Engineering, RMM Abuse
4029
Exposed RDP server
low2.5
1
Ransomware
4030
PHP Exploit in MyBB Codebase
low2.5
1
Infrastructure Disruption
4031
CVE-2025-1087
low2.5
1
Template Injection
4032
Phishing Susceptibility
low2.5
1
Security Awareness
4033
Unsecured attic access, potential food attractants
low2.5
1
Physical Intrusion (Non-Cyber)
4034
Critical Issues
low2.5
1
Vulnerability Exploitation
4035
Logic error in handling Authorization objects in ACME service, allowing improper reuse of domain validation data
low2.5
1
Certificate Misissuance
4036
Zero-day vulnerability in Oracle’s eBusiness Suite
low2.5
1
Data Breach
4037
Writable MFGSTAT.zip file with incorrect permissions
low2.5
1
Vulnerability Exploitation
4038
Misprinting of personal information
low2.5
1
Data Breach
4039
Vendor Service (Accellion)
low2.5
1
Data Breach
4040
CVE-2025-34140
low2.5
1
Vulnerability Exploitation
4041
Shared File Location
low2.5
1
Data Breach
4042
Shared authentication systems, privileged access management gaps
low2.5
1
Credential Exposure
4043
X11 clipboard functionality
low2.5
1
Malware
4044
Programming Code Error
low2.5
1
Data Breach
4045
Third-party file transfer software
low2.5
1
Data Breach
4046
Improper error handling
low2.5
1
Misconfiguration
4047
DNS misconfiguration (lame delegation), browser notification permissions
low2.5
1
Push-Notification Scam
4048
Vulnerability on older game websites
low2.5
1
Data Breach
4049
CVE-Unassigned (ASLR Bypass via NSKeyedArchiver Serialization Pointer Leak)
low2.5
1
Vulnerability Disclosure
4050
CVE-2025-54957
low2.5
1
Vulnerability Exploitation
4051
CVE-2025-5601
low2.5
1
Vulnerability Exploitation
4052
CVE-2025-22234
low2.5
1
Vulnerability Exploitation
4053
CVE-2026-23600
low2.5
1
Authentication Bypass
4054
CVE-2025-50165 (Uninitialized function pointer dereference in WindowsCodecs.dll)
low2.5
1
Remote Code Execution (RCE)
4055
CVE-2025-7206
low2.5
1
Vulnerability
4056
CVE-2024-45434
low2.5
1
Vulnerability Exploitation
4057
Improperly secured GitHub secrets (long-lived PyPI tokens stored in workflows)
low2.5
1
supply chain attack
4058
Easily Exploitable Vulnerabilities
low2.5
1
Vulnerability Exploitation
4059
Printing Software Vulnerability
low2.5
1
Data Breach
4060
Rowhammer
low2.5
1
Vulnerability Exploitation
4061
MOVEit file transfer program vulnerability
low2.5
1
Data Breach
4062
CVE-2024-45432
low2.5
1
Vulnerability Exploitation
4063
Arbitrary File Upload (CVE-2025-64374)
low2.5
1
Vulnerability Exploitation
4064
CVE-2025-32756
low2.5
1
Vulnerability Exploitation
4065
Debug code in production builds causing routing failure
low2.5
1
Vulnerability
4066
Unsecured Storage of Usernames and Passwords
low2.5
1
Data Breach
4067
CVE-2025-49825
low2.5
1
Vulnerability Exploit
4068
Serial number extraction
low2.5
1
Authentication Bypass
4069
Unspecified
low2.5
1
Phishing
4070
Human psychology (trust in job applications), abuse of trusted cloud infrastructure (AWS EC2/S3)
low2.5
1
Phishing/Social Engineering, Malware Delivery
4071
Insufficient policy enforcement in the WebView tag
low2.5
1
Security Bypass
4072
Stack-based buffer overflow
low2.5
1
Vulnerability Exploitation
4073
Obsolete servers exposed to the internet
low2.5
1
Cyberattack
4074
CVE-2025-53506
low2.5
1
Denial of Service (DoS)
4075
SSH password capture
low2.5
1
Data Breach
4076
CVE-2025-7724
low2.5
1
Vulnerability Exploitation
4077
Insufficient intrusion detection
low2.5
1
Ransomware
4078
Critical Telnet vulnerability allowing unauthorized access
low2.5
1
Vulnerability Exploitation
4079
Data Transfer Error
low2.5
1
Data Breach
4080
CVE-2025-26147
low2.5
1
Vulnerability Exploitation
4081
CVE-2025-55188
low2.5
1
Vulnerability Exploitation
4082
XSS in *Software Acquisition Guide: Supplier Response Web Tool*
low2.5
1
Vulnerability
4083
Bug introduced during an update of the email system
low2.5
1
Data Leak
4084
CVE-2026-26127 (Out-of-bounds read weakness, CWE-125)
low2.5
1
Denial-of-Service (DoS)
4085
Mailing Label Printing Error
low2.5
1
Data Breach
4086
Unsecured Computer Server
low2.5
1
Data Breach
4087
Trust in employment process
low2.5
1
Insider Threat
4088
MOVEit server vulnerability
low2.5
1
Data Breach
4089
GeminiJack
low2.5
1
Zero-Click Exploit
4090
Third-party software vendor (MOVEit)
low2.5
1
Data Breach
4091
Improper Storage of Sensitive Information
low2.5
1
Data Breach
4092
CVE-2025-34141
low2.5
1
Vulnerability Exploitation
4093
CVE-2025-34028
low2.5
1
Path Traversal Vulnerability
4094
Lack of Backup Procedure
low2.5
1
Data Loss
4095
CVE-2026-20029
low2.5
1
Information Disclosure
4096
CVE-2025-2760
low2.5
1
Software Vulnerability
4097
CVE-2025-4563
low2.5
1
Vulnerability
4098
Software Error
low2.5
1
Data Breach
4099
Weak message validation
low2.5
1
Vulnerability Exploitation
4100
CVE-2025-12420
low2.5
1
Privilege Escalation
4101
CVE-2024-45433
low2.5
1
Vulnerability Exploitation
4102
Vulnerability in data storage system
low2.5
1
Data Breach
4103
Remote access to car's specialized computers
low2.5
1
Cyberattack
4104
Improper fax transmission
low2.5
1
Data Breach
4105
CVE-2026-20803
low2.5
1
Elevation of Privilege
4106
Identical authentication certificates, prolonged certificate validity (10 years), inadequate network access controls
low2.5
1
Data Breach, Unauthorised Transactions, Malware Infection
4107
Unencrypted Hard Drive
low2.5
1
Data Breach
4108
Mobile app API
low2.5
1
Data Breach
4109
CVE-2024-45431
low2.5
1
Vulnerability Exploitation
4110
CVE-2025-34142
low2.5
1
Vulnerability Exploitation
4111
CVE-2026-2636 (Improper flag validation in CLFS.sys)
low2.5
1
Denial-of-Service (DoS)
4112
CVE-2025-2761
low2.5
1
Software Vulnerability
4113
CVE-2025-3699
low2.5
1
Vulnerability
4114
Unattended Vehicle
low2.5
1
Data Breach
4115
Unmonitored networks
low2.5
1
Ransomware
4116
Known loopholes in SonicWall VPN
low2.5
1
Exploitation of Vulnerability
4117
MOVEit secure file transfer application
low2.5
1
Data Breach
4118
Faulty fuel injector
low2.5
1
Product Recall
4119
CVE-2025-24016 (Unsafe Deserialization)
low2.5
1
Botnet Exploitation
4120
Poor password practices
low2.5
1
Ransomware
4121
Temporary API code misconfiguration
low2.5
1
Data Breach
4122
ConnectWise ScreenConnect (CVE-2024-1709)
low2.5
1
Ransomware
4123
CVE-2025-13348
low2.5
1
Vulnerability
4124
MOVEit Transfer tool vulnerability
low2.5
1
Data Breach
4125
Barracuda Networks email application vulnerability
low2.5
1
Data Breach
4126
Flaw in ASUS DriverHub
low2.5
1
Vulnerability Exploit
4127
CVE-2025-27387
low2.5
1
Vulnerability Exploitation
4128
Exposed .env file with database credentials
low2.5
1
Data Exposure, Potential DoS Attack
4129
MOVEit Transfer tool vulnerabilities
low2.5
1
Data Breach
4130
Damaged mailing
low2.5
1
Data Breach
4131
CVE-2026-20805
low2.5
1
Information Disclosure
4132
CVE-2025-34143
low2.5
1
Vulnerability Exploitation
4133
Public-facing website misconfiguration
low2.5
1
Data Breach
4134
human_error
low2.5
1
data_breach
4135
Unauthorized network access
low2.5
1
Physical and Logical Security Breach
4136
Admin password bypass
low2.5
1
Authentication Bypass
4137
CVE-2025-7723
low2.5
1
Vulnerability Exploitation
4138
Reflected cross site scripting (XSS)
low2.5
1
Vulnerability Exploitation
4139
CVE-2026-3483 (CWE-749 - Exposed Dangerous Method)
low2.5
1
Privilege Escalation
4140
CVE-2025-50054
low2.5
1
Vulnerability Exploitation
4141
CWE-400
low2.5
1
Uncontrolled Resource Consumption
4142
Server setup error
low2.5
1
Data Breach
4143
Web Server
low2.5
1
Data Breach
4144
Malformed ZIP archives evading security tools, native Windows unarchiving utility exploitation
low2.5
1
Malware Campaign
4145
CVE-2025-5138
low2.5
1
Vulnerability Exploitation
4146
Vulnerabilities in Cleo's platform
low2.5
1
Data Breach
4147
Unauthorized access to historical emails
low2.5
1
Data Breach
4148
CVE-2025-65606
low2.5
1
Vulnerability Exploitation
4149
Vendor's Software Flaw
low2.5
1
Data Breach
4150
Exploit in Trinity wallet app
low2.5
1
Cryptocurrency Wallet Exploit
4151
CVE-2025-6029
low2.5
1
Vulnerability Exploitation
4152
Hiring Process
low2.5
1
State-Sponsored Hacker Infiltration
4153
CVE-2025-36537
low2.5
1
Vulnerability
4154
Unauthorized access to source code repository
low2.5
1
Data Breach
4155
CVE-2026-20824
low2.5
1
Security Feature Bypass
4156
CVE-2026-2441 (use-after-free in CSS component)
low2.5
1
Zero-Day Vulnerability
4157
CVE-2025-37103
low2.5
1
Vulnerability Exploitation
4158
Missing portable data storage device
low2.5
1
Data Breach
4159
CVE-2025-1234
low2.5
1
DDoS
4160
Accidental Disclosure
low2.5
1
Data Breach
4161
Publicly Accessible S3 Bucket
low2.5
1
Data Breach
4162
CVE-2025-24813
low2.5
1
Vulnerability Exploitation
4163
Imperfect Process
low2.5
1
Data Breach
4164
Device Tracking Vulnerabilities
low2.5
1
Surveillance Investigation
4165
Unpatched firmware in home routers/cameras
low2.5
1
Distributed Denial of Service (DDoS)
4166
CVE-2025-13878
low2.5
1
Denial-of-Service (DoS)
4167
CVE-2025-5678
low2.5
1
DDoS
4168
Improper link resolution in Windows Update Stack (CVE-2025-21204)
low2.5
1
Privilege Escalation
4169
CVE-2025-46789
low2.5
1
Vulnerability Exploitation
4170
CVE-2025-24091
low2.5
1
Denial of Service (DoS)
4171
Website Search Function
low2.5
1
Data Breach
4172
Lack of Awareness (pre-training)
low2.5
1
Security Awareness
4173
Secure Email Account
low2.5
1
Data Breach
4174
USBAnywhere
low2.5
1
Remote Attack Vector
4175
CVE-2026-0227
low2.5
1
Denial-of-Service (DoS)
4176
Unauthorized physical access
low2.5
1
Physical and Logical Security Breach
4177
Improper Access Control in fepblue Mobile App
low2.5
1
Data Breach (Unauthorized Access)
4178
Insecure remote administration access
low2.5
1
Security Breach
4179
Memory leak in embedded JavaScript engine
low2.5
1
Resource Exhaustion
4180
vBulletin’s reliance on PHP’s Reflection API for its custom Model-View-Controller (MVC) framework and API system
low2.5
1
Remote Code Execution (RCE)
Top Exploited Vulnerabilities | Rankiteo