Skip to content

Commit fa56e44

Browse files
committed
Flat: latest data (2026-02-19T04:51:48.988Z)
{ "date": "2026-02-19T04:51:48.988Z", "files": [ { "name": "anac/drones.json", "deltaBytes": 57950, "source": "https://sistemas.anac.gov.br/dadosabertos/Aeronaves/drones%20cadastrados/SISANT.json" }, { "name": "known_exploited_vulnerabilities.json", "deltaBytes": 2287, "source": "https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json" } ] }
1 parent 55efa6d commit fa56e44

2 files changed

Lines changed: 34 additions & 4 deletions

File tree

anac/drones.json

Lines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.

known_exploited_vulnerabilities.json

Lines changed: 33 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,39 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2026.02.17",
4-
"dateReleased": "2026-02-17T20:07:57.4387Z",
5-
"count": 1522,
3+
"catalogVersion": "2026.02.18",
4+
"dateReleased": "2026-02-18T15:55:57.9151Z",
5+
"count": 1524,
66
"vulnerabilities": [
7+
{
8+
"cveID": "CVE-2021-22175",
9+
"vendorProject": "GitLab",
10+
"product": "GitLab",
11+
"vulnerabilityName": "GitLab Server-Side Request Forgery (SSRF) Vulnerability",
12+
"dateAdded": "2026-02-18",
13+
"shortDescription": "GitLab contains a server-side request forgery (SSRF) vulnerability when requests to the internal network for webhooks are enabled.",
14+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15+
"dueDate": "2026-03-11",
16+
"knownRansomwareCampaignUse": "Unknown",
17+
"notes": "https:\/\/gitlab.com\/gitlab-org\/cves\/-\/blob\/master\/2021\/CVE-2021-22175.json ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-22175",
18+
"cwes": [
19+
"CWE-918"
20+
]
21+
},
22+
{
23+
"cveID": "CVE-2026-22769",
24+
"vendorProject": "Dell",
25+
"product": "RecoverPoint for Virtual Machines (RP4VMs)",
26+
"vulnerabilityName": "Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability",
27+
"dateAdded": "2026-02-18",
28+
"shortDescription": "Dell RecoverPoint for Virtual Machines (RP4VMs) contains an use of hard-coded credentials vulnerability that could allow an unauthenticated remote attacker to gain unauthorized access to the underlying operating system and root-level persistence.",
29+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
30+
"dueDate": "2026-02-21",
31+
"knownRansomwareCampaignUse": "Unknown",
32+
"notes": "https:\/\/www.dell.com\/support\/kbdoc\/en-us\/000426773\/dsa-2026-079 ; https:\/\/www.dell.com\/support\/kbdoc\/en-us\/000426742\/recoverpoint-for-vms-apply-the-remediation-script-for-dsa ; https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/unc6201-exploiting-dell-recoverpoint-zero-day ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-22769",
33+
"cwes": [
34+
"CWE-798"
35+
]
36+
},
737
{
838
"cveID": "CVE-2020-7796",
939
"vendorProject": "Synacor",

0 commit comments

Comments
 (0)