FactualRisk Cyber Intelligence
Mise à jour : 10 Apr 2026 · 10:56
← Accueil
🛡 Dashboard💥 Attaques🔧 Patches🦠 Ransomware📡 Exploitation🌍 Géopolitique🕵️ Acteurs⛓ Supply Chain🎯 IOC Tracker📋 Compliance📰 News📈 Statistiques📋 Briefing
← Retour FactualRisk
Incidents
29
CVEs SC
63
KEV
1
P0
1
Catégories
Supply Chain20
Package Compromise6
Backdoor3
CVEs supply chain actifs
CVEPrioCVSSEPSSVendorProduitATT&CKSignaux
CVE-2026-33634 P0 8.8 0.212 AquasecurityTrivy T1021.004, T1133, T1195 KEVITW
GHSA-w8g9-x8gx-crmm P2 0.0 0.000 npmopenclaw T1090, T1071, T1189 ITW
GHSA-fqrj-m88p-qf3v P2 0.0 0.000 npmopenclaw T1078, T1556, T1195 ITW
GHSA-3vvq-q2qc-7rmp P2 0.0 0.000 npmopenclaw T1021.004, T1133, T1195 ITW
GHSA-qx8j-g322-qj6m P2 0.0 0.000 npmopenclaw T1195, T1195.002 ITW
GHSA-68x5-xx89-w9mm P2 0.0 0.000 npmopenclaw T1195, T1195.002 ITW
GHSA-hhq4-97c2-p447 P2 0.0 0.000 npmopenclaw T1195, T1195.002 ITW
GHSA-cg6c-q2hx-69h7 P2 0.0 0.000 npmopenclaw T1195, T1195.002 ITW
CVE-2025-67030 P3 8.8 0.002 mavenorg.codehaus.plexus:plexus-utils T1083, T1005
CVE-2026-25044 P3 8.8 0.001 npm@budibase/server T1059.004, T1190, T1195
CVE-2026-39974 P3 8.5 0.000 npmn8n-mcp T1090, T1071, T1195
CVE-2026-39983 P3 8.6 0.000 npmbasic-ftp T1195, T1195.002
CVE-2026-39942 P3 8.5 0.000 npmdirectus T1195, T1195.002
CVE-2026-39885 P3 7.5 0.000 npmmcp-from-openapi T1090, T1071, T1021.004
CVE-2026-40070 P3 8.1 0.000 rubygemsbsv-sdk T1195, T1195.002
CVE-2026-40069 P3 7.5 0.000 rubygemsbsv-sdk
GHSA-2m67-wjpj-xhg9 P3 7.5 0.000 maventools.jackson.core:jackson-core T1021.004, T1133
CVE-2026-39959 P3 7.1 0.000 nugetTmds.DBus T1021.004, T1133
CVE-2026-33170 P3 6.1 0.000 rubygemsactivesupport T1059.007
CVE-2026-39943 P3 6.5 0.000 npmdirectus T1195, T1195.002, T1566
CVE-2026-39315 P3 6.1 0.000 npmunhead T1195, T1195.002
CVE-2026-34765 P3 6.0 0.001 npmelectron T1195, T1195.002
CVE-2026-33349 P3 5.9 0.000 npmfast-xml-parser T1190, T1059.007, T1195
CVE-2026-39411 P3 5.0 0.000 npm@lobehub/lobehub T1078, T1556, T1195
CVE-2026-39412 P3 5.3 0.000 npmliquidjs T1195, T1195.002
CVE-2026-35040 P3 5.3 0.000 npmfast-jwt T1195, T1195.002
CVE-2025-11537 P3 5.0 0.000 mavenorg.keycloak:keycloak-quarkus-server T1566, T1078
CVE-2026-35041 P3 4.2 0.000 npmfast-jwt T1195, T1195.002
CVE-2026-34166 P3 3.7 0.000 npmliquidjs T1195, T1195.002
CVE-2026-39859 P3 0.0 0.001 npmliquidjs T1083, T1005, T1021.004
GHSA-cm8v-2vh9-cxf3 P3 0.0 0.000 npmopenclaw T1059.004, T1190, T1195
GHSA-w9j9-w4cp-6wgr P3 0.0 0.000 npmopenclaw T1059.004, T1190, T1195
GHSA-vr5g-mmx7-h897 P3 0.0 0.000 npmopenclaw T1090, T1071, T1189
GHSA-3fv3-6p2v-gxwj P3 0.0 0.000 npmopenclaw T1090, T1071, T1195
GHSA-q2gc-xjqw-qp89 P3 0.0 0.000 npmopenclaw T1190, T1195, T1195.002
GHSA-7437-7hg8-frrw P3 0.0 0.000 npmopenclaw T1059.004, T1190, T1021.004
GHSA-6mqc-jqh6-x8fc P3 0.0 0.000 npmopenclaw T1078, T1556, T1195
CVE-2026-35525 P3 0.0 0.001 npmliquidjs T1021.004, T1133, T1195
GHSA-ccx3-fw7q-rr2r P3 0.0 0.000 npmopenclaw T1195, T1195.002
GHSA-4f8g-77mw-3rxc P3 0.0 0.000 npmopenclaw T1195, T1195.002
GHSA-67mf-f936-ppxf P3 0.0 0.000 npmopenclaw T1195, T1195.002
GHSA-5fc7-f62m-8983 P3 0.0 0.000 npmopenclaw T1195, T1195.002
GHSA-5h3f-885m-v22w P3 0.0 0.000 npmopenclaw T1195, T1195.002
GHSA-25wv-8phj-8p7r P3 0.0 0.000 npmopenclaw T1195, T1195.002
GHSA-5wj5-87vq-39xm P3 0.0 0.000 npmopenclaw T1195, T1195.002
GHSA-vc32-h5mq-453v P3 0.0 0.000 npmopenclaw T1021.004, T1133, T1195
GHSA-cmfr-9m2r-xwhq P3 0.0 0.000 npmopenclaw T1189, T1203, T1195
GHSA-whf9-3hcx-gq54 P3 0.0 0.000 npmopenclaw T1195, T1195.002
GHSA-qqq7-4hxc-x63c P3 0.0 0.000 npmopenclaw T1195, T1195.002
CVE-2025-62718 P3 0.0 0.000 npmaxios T1021.004, T1133, T1195
GHSA-jf56-mccx-5f3f P3 0.0 0.000 npmopenclaw T1195, T1195.002
GHSA-gfmx-pph7-g46x P3 0.0 0.000 npmopenclaw T1195, T1195.002
GHSA-3pm9-5j7m-59vc P3 0.0 0.000 npmopenclaw T1195, T1195.002
GHSA-3xv9-89fm-7h4r P3 0.0 0.000 npmopenclaw T1021.004, T1133, T1195
GHSA-f693-58pc-2gfr P3 0.0 0.000 npmopenclaw T1195, T1195.002
GHSA-wq58-2pvg-5h4f P3 0.0 0.000 npmopenclaw T1195, T1195.002
GHSA-rvqr-hrcc-j9vv P3 0.0 0.000 npmopenclaw T1195, T1195.002
GHSA-48vw-m3qc-wr99 P3 0.0 0.000 npmopenclaw T1195, T1195.002
GHSA-h5hg-h7rr-gpf3 P3 0.0 0.000 npmopenclaw T1189, T1203, T1195
GHSA-wv46-v6xc-2qhf P3 0.0 0.000 npmopenclaw T1195, T1195.002
GHSA-6336-qqw9-v6x6 P3 0.0 0.000 npmopenclaw T1195, T1195.002
GHSA-jjw7-3vjf-fg5j P3 0.0 0.000 npmopenclaw T1195, T1195.002
GHSA-4p4f-fc8q-84m3 P3 0.0 0.000 npmopenclaw T1195, T1195.002
📰 Incidents récents
Supply Chain OpenSSF Wed, 08 Ap
OpenSSF Tech Talk Recap: Securing Agentic AI
At our recent Open Source Security Foundation (OpenSSF) Tech Talk, experts from Microsoft, Thread AI, Canonical, and the OpenSSF AI/ML Security Working Group joined forces to dismantle the "black box" of AI security.
Package Compromise TheHackerNews Wed, 08 Ap
N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust
The North Korea-linked persistent campaign known as Contagious Interview has spread its tentacles by publishing malicious packages targeting the Go, Rust, and PHP ecosystems. "The threat actor's packages were designed to impersonate legitimate developer tooling [...], while quiet
Supply Chain DarkReading Wed, 08 Ap
AI-Led Remediation Crisis Prompts HackerOne to Pause Bug Bounties
Discovery used to be the bottleneck for open source bugs, but with automated discovery, remediation's the bottleneck, which bounties don't fund.
Supply Chain GitHub Security Wed, 01 Ap
Securing the open source supply chain across GitHub
Recent attacks on open source focus on exfiltrating secrets; here are the prevention steps you can take today, plus a look at the security capabilities GitHub is working on. The post Securing the open source supply chain across GitHub appeared first on The GitHub Blog .
Package Compromise DarkReading Tue, 31 Ma
Axios NPM Package Compromised in Precision Attack
The NPM package for Axios, a popular JavaScript HTTP client library, was briefly compromised this week, possibly by North Korean threat actors.
Supply Chain OpenSSF Tue, 17 Ma
Leading Tech Coalition Invests $12.5 Million Through OpenSSF and Alpha-Omega to Strengthen Open Source Security
Supply Chain GitHub Security Tue, 17 Ma
Investing in the people shaping open source and securing the future together
See how GitHub is investing in open source security funding maintainers, partnering with Alpha-Omega, and expanding access to help reduce burden and strengthen software supply chains. The post Investing in the people shaping open source and securing the future together appear
Supply Chain GitHub Security Thu, 26 Ma
A year of open source vulnerability trends: CVEs, advisories, and malware
Reviewed advisories hit a four-year low, malware advisories surged, and CNA publishing grew—here’s what changed and what it means for your triage and response. The post A year of open source vulnerability trends: CVEs, advisories, and malware appeared first on The GitHub Bl
Backdoor BleepingComputer Thu, 09 Ap
Smart Slider updates hijacked to push malicious WordPress, Joomla versions
Hackers hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla, and pushed a malicious version with multiple backdoors. [...]
Supply Chain BleepingComputer Thu, 09 Ap
Microsoft suspends dev accounts for high-profile open source projects
Microsoft has suspended developer accounts used to maintain multiple high-profile open-source projects without proper notification and no way to quickly reinstate them, effectively blocking them from publishing new software builds and security patches for Windows users. [...]
Supply Chain TheHackerNews Thu, 09 Ap
EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallet Installs
Details have emerged about a now-patched security vulnerability in a widely used third-party Android software development kit (SDK) called EngageLab SDK that could have put millions of cryptocurrency wallet users at risk. "This flaw allows apps on the same device to bypass Androi
Supply Chain OpenSSF Thu, 02 Ap
From AIxCC to OpenSSF: Welcoming OSS-CRS to Advance AI Driven Open Source Security
Backdoor TheHackerNews Thu, 02 Ap
ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories
The latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No corporate fluff or boring lectures here, just a quick and honest look at the messy reality of keeping systems safe this week. Things are moving fast. The list includes
Supply Chain TheHackerNews Thu, 02 Ap
The State of Trusted Open Source Report
In December 2025, we shared the first-ever The State of Trusted Open Source report, featuring insights from our product data and customer base on open source consumption across our catalog of container image projects, versions, images, language libraries, and builds. These insigh
Package Compromise TheHackerNews Sun, 05 Ap
36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants
Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different payloads to facilitate Redis and PostgreSQL exploitation, deploy reverse shells, harvest credentials, and drop a persistent implant
Package Compromise Snyk Blog Mon, 30 Ma
Axios npm Package Compromised: Supply Chain Attack Delivers Cross-Platform RAT
Meta description: Malicious versions of the Axios npm package (1.14.1 and 0.30.4) were published via a compromised maintainer account, injecting a hidden dependency that deploys a cross-platform remote access trojan. Here's what happened, who's affected, and how to check your exp
Supply Chain OpenSSF Mon, 23 Ma
Introducing the OpenSSF Ambassador Program
We're excited to launch the OpenSSF Ambassador Program - a global community of advocates who will help us promote secure open source development practices worldwide.
Supply Chain OpenSSF Mon, 23 Ma
Kusari Partners with OpenSSF to Strengthen Open Source Software Supply Chain Security
Supply Chain OpenSSF Mon, 06 Ap
What’s in the SOSS? Podcast #58 – S3E10 Big Thoughts, Open Sources: Beyond the Hype: Brian Fox on Securing the Agentic Future of Open Source
Supply Chain TheHackerNews Mon, 06 Ap
How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers
The most active piece of enterprise infrastructure in the company is the developer workstation. That laptop is where credentials are created, tested, cached, copied, and reused across services, bots, build tools, and now local AI agents. In March 2026, the TeamPCP threat actor pr
Supply Chain DarkReading Mon, 06 Ap
AI-Assisted Supply Chain Attack Targets GitHub
PRT-scan is the second campaign in recent months where a threat actor appears to have leveraged AI for automated targeting of a widespread GitHub misconfiguration.
Package Compromise DarkReading Mon, 06 Ap
Axios Attack Shows How Complex Social Engineering Is Industrialized
The attack on the popular NPM package Axios is just one of many targeting maintainers and has shone a light on how threat actors can scale sophisticated social engineering campaigns.
Backdoor TheHackerNews Fri, 10 Ap
Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers
Unknown threat actors have hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla to push a poisoned version containing a backdoor. The incident impacts Smart Slider 3 Pro version 3.5.1.35 for WordPress, per WordPress security company Patchstack. Sm
Supply Chain GitHub Security Fri, 06 Ma
How to scan for vulnerabilities with GitHub Security Lab’s open source AI-powered framework
GitHub Security Lab Taskflow Agent is very effective at finding Auth Bypasses, IDORs, Token Leaks, and other high-impact vulnerabilities. The post How to scan for vulnerabilities with GitHub Security Lab’s open source AI-powered framework appeared first on The GitHub Blog .
Package Compromise TheHackerNews Fri, 03 Ap
UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack
The maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly-targeted social engineering campaign orchestrated by North Korean threat actors tracked as UNC1069. Maintainer Jason Saayman said the attackers tailored their social
Supply Chain TheHackerNews Fri, 03 Ap
Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture
The next major breach hitting your clients probably won't come from inside their walls. It'll come through a vendor they trust, a SaaS tool their finance team signed up for, or a subcontractor nobody in IT knows about. That's the new attack surface, and most organizations are und
Supply Chain DarkReading Fri, 03 Ap
Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting
As organizations disclose breaches tied to TeamPCP's supply chain attacks, ShinyHunters and Lapsus$ are getting involved, taking credit, and creating a murky situation for enterprises.
Supply Chain DarkReading Fri, 03 Ap
Claude Source Code Leak Highlights Big Supply Chain Missteps
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer.
Supply Chain DarkReading Fri, 03 Ap
Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain
The rebuilt Chainguard platform adds deeper security designed to continuously reconcile open source artifacts across containers, libraries, agent skills, and GitHub Actions.