# Vulnerabilidades
Base de conhecimento de vulnerabilidades críticas com análise de exploração ativa, contexto de impacto e orientações de mitigação. Cobertura focada em CVEs com **CVSS ≥ 7.0**, presença na **CISA KEV** (Known Exploited Vulnerabilities) ou evidências de uso em campanhas ativas.
**Critérios de priorização:**
- CVSS Score ≥ 7.0 (High ou Critical)
- Inclusão na lista CISA KEV (exploração ativa confirmada)
- EPSS Score ≥ 50% (alta probabilidade de exploração nos próximos 30 dias)
- Uso documentado por grupos APT ou ransomware ativos
- Relevância para infraestrutura comum em organizações brasileiras
---
## Framework de Priorização
```mermaid
graph TB
subgraph intake["Intake - Todas as CVEs"]
NVD["NVD / NIST<br/>~30k CVEs/ano"]
MSRC["Microsoft MSRC<br/>Patch Tuesday"]
VENDOR["Advisories<br/>Cisco · Fortinet · Palo Alto"]
end
subgraph filter["Filtro RunkIntel"]
F1["CVSS ≥ 7.0"]
F2["CISA KEV?"]
F3["EPSS ≥ 50%?"]
F4["Exploit público?"]
end
subgraph output["Cobertura"]
CRIT["CISA KEV<br/>Patch imediato"]
HIGH["CVSS Crítico<br/>Monitorar exploit"]
WATCH["Watch List<br/>Acompanhar evolução"]
end
NVD --> F1
MSRC --> F1
VENDOR --> F1
F1 --> F2
F2 -->|"Sim"| CRIT
F2 -->|"Não"| F3
F3 -->|"Sim"| HIGH
F3 -->|"Não"| F4
F4 -->|"Sim"| HIGH
F4 -->|"Não"| WATCH
classDef source fill:#2c3e50,color:#fff,stroke:#34495e
classDef filter fill:#1a3a5c,color:#fff,stroke:#2980b9
classDef critical fill:#5a1a1a,color:#fff,stroke:#e74c3c
classDef high fill:#4a3a1a,color:#fff,stroke:#f39c12
classDef watch fill:#1a4a2a,color:#fff,stroke:#27ae60
class NVD,MSRC,VENDOR source
class F1,F2,F3,F4 filter
class CRIT critical
class HIGH high
class WATCH watch
```
---
## CISA KEV - Exploração Ativa Confirmada
Vulnerabilidades com exploração ativa confirmada pela CISA. Prioridade máxima de remediação.
%%
```dataview
TABLE WITHOUT ID cve-id AS "CVE", cvss-score AS "CVSS", vendor AS "Fornecedor", product AS "Produto", patch-available AS "Patch Disponível"
FROM "vulnerabilities"
WHERE cisa-kev = true
SORT cvss-score DESC
```
%%
<!-- QueryToSerialize: TABLE WITHOUT ID link(file.link, cve-id) AS "CVE", cvss-score AS "CVSS", vendor AS "Fornecedor", product AS "Produto", patch-available AS "Patch Disponível" FROM "vulnerabilities" WHERE cisa-kev = true SORT cvss-score DESC -->
<!-- SerializedQuery: TABLE WITHOUT ID link(file.link, cve-id) AS "CVE", cvss-score AS "CVSS", vendor AS "Fornecedor", product AS "Produto", patch-available AS "Patch Disponível" FROM "vulnerabilities" WHERE cisa-kev = true SORT cvss-score DESC -->
| CVE | CVSS | Fornecedor | Produto | Patch Disponível |
| ---------------------------------------------------------- | ---- | -------------------------- | --------------------------------------------------------------------------------------- | ---------------- |
| [[cve-2017-7921\|CVE-2017-7921]] | 10 | Hikvision | Câmeras IP Hikvision | true |
| [[cve-2019-11510\|CVE-2019-11510]] | 10 | Ivanti (Pulse Secure) | Pulse Connect Secure | true |
| [[cve-2021-22681\|CVE-2021-22681]] | 10 | Rockwell Automation | Logix Controllers | true |
| [[cve-2021-22893\|CVE-2021-22893]] | 10 | Ivanti (Pulse Secure) | Pulse Connect Secure | true |
| [[cve-2021-44228\|CVE-2021-44228]] | 10 | Apache Software Foundation | Log4j 2 | true |
| [[cve-2024-1709\|CVE-2024-1709]] | 10 | ConnectWise | ScreenConnect | true |
| [[cve-2024-3400\|CVE-2024-3400]] | 10 | Palo Alto Networks | PAN-OS | true |
| [[cve-2024-45519\|CVE-2024-45519]] | 10 | Zimbra | Zimbra Collaboration Suite | true |
| [[cve-2025-20393\|CVE-2025-20393]] | 10 | Cisco | Cisco Catalyst Center | true |
| [[cve-2025-32432\|CVE-2025-32432]] | 10 | Pixel & Tonic | Craft CMS | true |
| [[cve-2025-37164\|CVE-2025-37164]] | 10 | HPE | HPE OneView | true |
| [[cve-2026-20131\|CVE-2026-20131]] | 10 | Cisco | Secure Firewall Management Center (FMC) | true |
| [[cve-2026-20127\|CVE-2026-20127]] | 10 | Cisco | Cisco Catalyst SD-WAN Controller (vSmart) / SD-WAN Manager (vManage) | true |
| [[cve-2026-22769\|CVE-2026-22769]] | 10 | Dell | RecoverPoint for VMs | true |
| [[cve-2025-49113\|CVE-2025-49113]] | 9.9 | Roundcube | Roundcube Webmail | true |
| [[cve-2016-4117\|CVE-2016-4117]] | 9.8 | Adobe | Adobe Flash Player | true |
| [[cve-2018-0150\|CVE-2018-0150]] | 9.8 | Cisco | Cisco IOS XE | true |
| [[cve-2018-0171\|CVE-2018-0171]] | 9.8 | Cisco | IOS / IOS XE (Smart Install) | true |
| [[cve-2018-13379\|CVE-2018-13379]] | 9.8 | Fortinet | FortiOS SSL VPN | true |
| [[cve-2018-4878\|CVE-2018-4878]] | 9.8 | Adobe | Flash Player | true |
| [[cve-2019-18935\|CVE-2019-18935]] | 9.8 | Telerik | Telerik UI for ASP.NET AJAX | true |
| [[cve-2019-19006\|CVE-2019-19006]] | 9.8 | Sangoma | FreePBX | true |
| [[cve-2019-19781\|CVE-2019-19781]] | 9.8 | Citrix | Application Delivery Controller (ADC) / Gateway / SD-WAN WANOP | true |
| [[cve-2019-2725\|CVE-2019-2725]] | 9.8 | Oracle | Oracle WebLogic Server | true |
| [[cve-2020-10148\|CVE-2020-10148]] | 9.8 | SolarWinds | Orion Platform | true |
| [[cve-2020-12812\|CVE-2020-12812]] | 9.8 | Fortinet | FortiOS SSL VPN | true |
| [[cve-2020-14750\|CVE-2020-14750]] | 9.8 | Oracle | Oracle WebLogic Server | true |
| [[cve-2020-14882\|CVE-2020-14882]] | 9.8 | Oracle | WebLogic Server | true |
| [[cve-2020-7796\|CVE-2020-7796]] | 9.8 | Synacor | Zimbra Collaboration Suite | true |
| [[cve-2021-22005\|CVE-2021-22005]] | 9.8 | VMware | VMware vCenter Server | true |
| [[cve-2021-22175\|CVE-2021-22175]] | 9.8 | GitLab | GitLab CE/EE | true |
| [[cve-2021-26084\|CVE-2021-26084]] | 9.8 | Atlassian | Confluence Server / Data Center | true |
| [[cve-2021-26855\|CVE-2021-26855]] | 9.8 | Microsoft | Microsoft Exchange Server | true |
| [[cve-2021-27101\|CVE-2021-27101]] | 9.8 | Accellion | File Transfer Appliance (FTA) | true |
| [[cve-2021-27103\|CVE-2021-27103]] | 9.8 | Accellion | File Transfer Appliance (FTA) | true |
| [[cve-2021-27104\|CVE-2021-27104]] | 9.8 | Accellion | File Transfer Appliance (FTA) | true |
| [[cve-2021-27860\|CVE-2021-27860]] | 9.8 | FatPipe Networks | WARP / IPVPN / MPVPN | true |
| [[cve-2021-34523\|CVE-2021-34523]] | 9.8 | Microsoft | Microsoft Exchange Server | true |
| [[cve-2021-40539\|CVE-2021-40539]] | 9.8 | Zoho | ManageEngine ADSelfService Plus | true |
| [[cve-2022-3236\|CVE-2022-3236]] | 9.8 | Sophos | Sophos Firewall | true |
| [[cve-2022-40684\|CVE-2022-40684]] | 9.8 | Fortinet | FortiOS / FortiProxy / FortiSwitchManager | true |
| [[cve-2023-23397\|CVE-2023-23397]] | 9.8 | Microsoft | Microsoft Outlook | true |
| [[cve-2023-27997\|CVE-2023-27997]] | 9.8 | Fortinet | FortiOS / FortiProxy SSL-VPN | true |
| [[cve-2023-34362\|CVE-2023-34362]] | 9.8 | Progress Software | MOVEit Transfer | true |
| [[cve-2023-35036\|CVE-2023-35036]] | 9.8 | Progress Software | MOVEit Transfer | true |
| [[cve-2023-3519\|CVE-2023-3519]] | 9.8 | Citrix | NetScaler ADC / NetScaler Gateway | true |
| [[cve-2023-42793\|CVE-2023-42793]] | 9.8 | JetBrains | TeamCity | true |
| [[cve-2024-0012\|CVE-2024-0012]] | 9.8 | Palo Alto Networks | PAN-OS | true |
| [[cve-2024-23113\|CVE-2024-23113]] | 9.8 | Fortinet | FortiOS / FortiPAM / FortiProxy / FortiWeb | true |
| [[cve-2024-37079\|CVE-2024-37079]] | 9.8 | Broadcom | vCenter Server | true |
| [[cve-2024-43468\|CVE-2024-43468]] | 9.8 | Microsoft | Configuration Manager (SCCM/MECM) | true |
| [[cve-2024-47575\|CVE-2024-47575]] | 9.8 | Fortinet | FortiManager | true |
| [[cve-2024-55591\|CVE-2024-55591]] | 9.8 | Fortinet | FortiOS / FortiProxy | true |
| [[cve-2024-50623\|CVE-2024-50623]] | 9.8 | Cleo | Cleo Harmony / VLTrader / LexiCom | true |
| [[cve-2024-55956\|CVE-2024-55956]] | 9.8 | Cleo | Harmony, VLTrader, LexiCom | true |
| [[cve-2025-11953\|CVE-2025-11953]] | 9.8 | React Native Community | CLI (@react-native-community/cli) — Metro Dev Server | true |
| [[cve-2025-14611\|CVE-2025-14611]] | 9.8 | Gladinet | CentreStack / Triofox | true |
| [[cve-2025-26399\|CVE-2025-26399]] | 9.8 | SolarWinds | Web Help Desk | true |
| [[cve-2025-40536\|CVE-2025-40536]] | 9.8 | SolarWinds | Web Help Desk | true |
| [[cve-2025-40551\|CVE-2025-40551]] | 9.8 | SolarWinds | Web Help Desk | true |
| [[cve-2025-53521\|CVE-2025-53521]] | 9.8 | F5 Networks | BIG-IP APM | true |
| [[cve-2025-54068\|CVE-2025-54068]] | 9.8 | Laravel | Livewire | true |
| [[cve-2025-59374\|CVE-2025-59374]] | 9.8 | ASUS | ASUS Live Update | true |
| [[cve-2025-59718\|CVE-2025-59718]] | 9.8 | Fortinet | FortiOS / FortiProxy / FortiSwitchManager | true |
| [[cve-2025-68461\|CVE-2025-68461]] | 9.8 | Ivanti | Ivanti Connect Secure / Policy Secure | true |
| [[cve-2025-68613\|CVE-2025-68613]] | 9.8 | n8n | n8n Workflow Automation | true |
| [[cve-2026-1142\|CVE-2026-1142]] | 9.8 | Apple | iOS | true |
| [[cve-2026-1281\|CVE-2026-1281]] | 9.8 | Ivanti | Ivanti Endpoint Manager Mobile (EPMM) | true |
| [[cve-2026-1731\|CVE-2026-1731]] | 9.8 | BeyondTrust | BeyondTrust Remote Support | true |
| [[cve-2026-20963\|CVE-2026-20963]] | 9.8 | Microsoft | SharePoint | true |
| [[cve-2026-24061\|CVE-2026-24061]] | 9.8 | GNU | Inetutils (telnetd) | true |
| [[cve-2026-24858\|CVE-2026-24858]] | 9.8 | Fortinet | Fortinet FortiGate / FortiCloud SSO | true |
| [[cve-2026-33017\|CVE-2026-33017]] | 9.8 | Langflow | Langflow | true |
| [[cve-2024-21762\|CVE-2024-21762]] | 9.6 | Fortinet | FortiOS SSL VPN | true |
| [[cve-2023-4966\|CVE-2023-4966]] | 9.4 | Citrix | NetScaler ADC / NetScaler Gateway | true |
| [[cve-2008-0015\|CVE-2008-0015]] | 9.3 | Microsoft | Windows Media Services (nssys32.dll) | true |
| [[cve-2009-0556\|CVE-2009-0556]] | 9.3 | Microsoft | PowerPoint | true |
| [[cve-2011-0611\|CVE-2011-0611]] | 9.3 | Adobe | Adobe Flash Player | true |
| [[cve-2016-4656\|CVE-2016-4656]] | 9.3 | Apple | iOS | true |
| [[cve-2017-0144\|CVE-2017-0144]] | 9.3 | Microsoft | Windows SMBv1 | true |
| [[cve-2023-48788\|CVE-2023-48788]] | 9.3 | Fortinet | FortiClientEMS | true |
| [[cve-2025-14733\|CVE-2025-14733]] | 9.3 | WatchGuard | Firebox (Fireware OS) | true |
| [[cve-2025-22224\|CVE-2025-22224]] | 9.3 | VMware (Broadcom) | VMware ESXi | true |
| [[cve-2026-23760\|CVE-2026-23760]] | 9.3 | SmarterTools | SmarterMail | true |
| [[cve-2025-3402\|CVE-2025-3402]] | 9.2 | Versa Networks | Versa Concerto SD-WAN | true |
| [[cve-2025-34026\|CVE-2025-34026]] | 9.2 | Versa Networks | Versa Concerto SD-WAN | true |
| [[cve-2021-22054\|CVE-2021-22054]] | 9.1 | VMware | Workspace ONE UEM | true |
| [[cve-2021-34473\|CVE-2021-34473]] | 9.1 | Microsoft | Microsoft Exchange Server | true |
| [[cve-2024-21887\|CVE-2024-21887]] | 9.1 | Ivanti | Connect Secure / Policy Secure | true |
| [[cve-2025-6218\|CVE-2025-6218]] | 9.1 | Craft CMS | Craft CMS | true |
| [[cve-2026-25108\|CVE-2026-25108]] | 9.1 | Soliton Systems | FileZen | true |
| [[cve-2021-45046\|CVE-2021-45046]] | 9 | Apache | Log4j | true |
| [[cve-2025-0282\|CVE-2025-0282]] | 9 | Ivanti | Connect Secure / Policy Secure / Neurons for ZTA | true |
| [[cve-2025-22457\|CVE-2025-22457]] | 9 | Ivanti | Connect Secure / Policy Secure / ZTA Gateways | true |
| [[cve-2026-21385\|CVE-2026-21385]] | 9 | Qualcomm | GPU Driver (Android) | true |
| [[cve-2026-1145\|CVE-2026-1145]] | 8.9 | Apple | iOS | true |
| [[cve-2016-4657\|CVE-2016-4657]] | 8.8 | Apple | iOS (WebKit) | true |
| [[cve-2018-20250\|CVE-2018-20250]] | 8.8 | RARLAB | WinRAR | true |
| [[cve-2018-4877\|CVE-2018-4877]] | 8.8 | Adobe | Adobe Flash Player | true |
| [[cve-2018-4990\|CVE-2018-4990]] | 8.8 | Adobe | Acrobat DC / Acrobat Reader DC | true |
| [[cve-2020-0688\|CVE-2020-0688]] | 8.8 | Microsoft | Microsoft Exchange Server | true |
| [[cve-2021-40444\|CVE-2021-40444]] | 8.8 | Microsoft | Windows MSHTML (Internet Explorer engine) | true |
| [[cve-2023-32435\|CVE-2023-32435]] | 8.8 | Apple | iOS / iPadOS | true |
| [[cve-2023-41974\|CVE-2023-41974]] | 8.8 | Apple | WebKit (Safari, macOS, iOS, iPadOS) | true |
| [[cve-2023-43000\|CVE-2023-43000]] | 8.8 | Apple | WebKit (Safari/macOS/iOS/iPadOS) | true |
| [[cve-2023-52163\|CVE-2023-52163]] | 8.8 | DigiEver | DS-2105 Pro NVR | false |
| [[cve-2025-31277\|CVE-2025-31277]] | 8.8 | Apple | Multiple Products (Safari, iOS, iPadOS, macOS, watchOS, tvOS, visionOS) | true |
| [[cve-2025-58360\|CVE-2025-58360]] | 8.8 | Roundcube | Roundcube Webmail | true |
| [[cve-2025-6864\|CVE-2025-6864]] | 8.8 | Zimbra | Zimbra Collaboration Suite | true |
| [[cve-2025-68645\|CVE-2025-68645]] | 8.8 | Synacor | Zimbra Collaboration Suite | true |
| [[cve-2025-8110\|CVE-2025-8110]] | 8.8 | Gogs | Gogs (self-hosted Git service) | true |
| [[cve-2026-21510\|CVE-2026-21510]] | 8.8 | Microsoft | Windows Shell | true |
| [[cve-2026-21513\|CVE-2026-21513]] | 8.8 | Microsoft | MSHTML (ieframe.dll / Windows) | true |
| [[cve-2026-21514\|CVE-2026-21514]] | 8.8 | Microsoft | Microsoft Office | true |
| [[cve-2026-21525\|CVE-2026-21525]] | 8.8 | Oracle | Oracle WebLogic Server | true |
| [[cve-2026-2441\|CVE-2026-2441]] | 8.8 | Google | Chrome | true |
| [[cve-2026-33634\|CVE-2026-33634]] | 8.8 | Aqua Security | Trivy | true |
| [[cve-2026-3909\|CVE-2026-3909]] | 8.8 | Google | Google Chrome (biblioteca Skia) | true |
| [[cve-2026-3910\|CVE-2026-3910]] | 8.8 | Google | Chrome (Chromium V8 Engine) | true |
| [[cve-2026-1146\|CVE-2026-1146]] | 8.7 | Apple | iOS | true |
| [[cve-2026-1603\|CVE-2026-1603]] | 8.6 | Ivanti | Ivanti Endpoint Manager (EPM) | true |
| [[cve-2025-54313\|CVE-2025-54313]] | 8.5 | Prettier | eslint-config-prettier (npm) | true |
| [[cve-2026-1147\|CVE-2026-1147]] | 8.5 | Apple | iOS | true |
| [[cve-2026-21533\|CVE-2026-21533]] | 8.4 | Microsoft | Windows Remote Desktop Services (RDS) | true |
| [[cve-2023-46805\|CVE-2023-46805]] | 8.2 | Ivanti | Connect Secure (ICS) / Policy Secure | true |
| [[cve-2025-22225\|CVE-2025-22225]] | 8.2 | VMware (Broadcom) | VMware ESXi | true |
| [[cve-2026-20045\|CVE-2026-20045]] | 8.2 | Cisco | Cisco Unified Communications Manager / IM & Presence / Unity Connection / Webex Calling | true |
| [[cve-2026-22719\|CVE-2026-22719]] | 8.1 | Broadcom (VMware) | VMware Aria Operations | true |
| [[cve-2016-5195\|CVE-2016-5195]] | 7.8 | Linux Kernel | Linux Kernel | true |
| [[cve-2018-0802\|CVE-2018-0802]] | 7.8 | Microsoft | Microsoft Office (Equation Editor) | true |
| [[cve-2018-14634\|CVE-2018-14634]] | 7.8 | Linux | Kernel Linux | true |
| [[cve-2018-4063\|CVE-2018-4063]] | 7.8 | Cisco | Wireless LAN Controller | true |
| [[cve-2021-27102\|CVE-2021-27102]] | 7.8 | Accellion | File Transfer Appliance (FTA) | true |
| [[cve-2021-30883\|CVE-2021-30883]] | 7.8 | Apple | iOS / iPadOS / macOS | true |
| [[cve-2021-30952\|CVE-2021-30952]] | 7.8 | Apple | WebKit | true |
| [[cve-2021-30983\|CVE-2021-30983]] | 7.8 | Apple | iOS / iPadOS | true |
| [[cve-2022-20775\|CVE-2022-20775]] | 7.8 | Cisco | Cisco IOS XE SD-WAN | true |
| [[cve-2022-30190\|CVE-2022-30190]] | 7.8 | Microsoft | Windows Support Diagnostic Tool (MSDT) | true |
| [[cve-2023-32434\|CVE-2023-32434]] | 7.8 | Apple | iOS / iPadOS / macOS | true |
| [[cve-2023-38831\|CVE-2023-38831]] | 7.8 | RARLAB | WinRAR | true |
| [[cve-2023-41990\|CVE-2023-41990]] | 7.8 | Apple | iOS / iPadOS | true |
| [[cve-2024-21338\|CVE-2024-21338]] | 7.8 | Microsoft | Windows Kernel (appid.sys) | true |
| [[cve-2024-38193\|CVE-2024-38193]] | 7.8 | Microsoft | Windows Ancillary Function Driver for WinSock (afd.sys) | true |
| [[cve-2025-15556\|CVE-2025-15556]] | 7.8 | Bitdefender | Bitdefender Total Security (componente legado) | true |
| [[cve-2025-62221\|CVE-2025-62221]] | 7.8 | Microsoft | Windows Cloud Files Mini Filter Driver | true |
| [[cve-2026-20700\|CVE-2026-20700]] | 7.8 | Apple | Apple dyld (iOS, iPadOS, macOS, tvOS, watchOS, visionOS) | true |
| [[cve-2026-21509\|CVE-2026-21509]] | 7.8 | Microsoft | Microsoft Office | true |
| [[cve-2026-21519\|CVE-2026-21519]] | 7.8 | Microsoft | Windows Desktop Window Manager (DWM) | true |
| [[cve-2018-8174\|CVE-2018-8174]] | 7.5 | Microsoft | Windows VBScript Engine (Internet Explorer) | true |
| [[cve-2021-39935\|CVE-2021-39935]] | 7.5 | GitLab | GitLab CE/EE | true |
| [[cve-2022-27924\|CVE-2022-27924]] | 7.5 | Synacor / Zimbra | Zimbra Collaboration Suite (ZCS) | true |
| [[cve-2023-27532\|CVE-2023-27532]] | 7.5 | Veeam | Veeam Backup & Replication | true |
| [[cve-2025-14847\|CVE-2025-14847]] | 7.5 | MongoDB | MongoDB Server | true |
| [[cve-2025-31125\|CVE-2025-31125]] | 7.5 | Vite | Vite (build tool) | true |
| [[cve-2025-47813\|CVE-2025-47813]] | 7.5 | Wing FTP | Wing FTP Server | true |
| [[cve-2021-31207\|CVE-2021-31207]] | 7.2 | Microsoft | Microsoft Exchange Server | true |
| [[cve-2023-0669\|CVE-2023-0669]] | 7.2 | Fortra | GoAnywhere MFT | true |
| [[cve-2024-7694\|CVE-2024-7694]] | 7.2 | TeamT5 | ThreatSonar Anti-Ransomware | true |
| [[cve-2024-9474\|CVE-2024-9474]] | 7.2 | Palo Alto Networks | PAN-OS | true |
| [[cve-2025-64328\|CVE-2025-64328]] | 7.2 | WordPress | WP Automatic Plugin | true |
| [[cve-2025-22226\|CVE-2025-22226]] | 7.1 | VMware (Broadcom) | VMware ESXi | true |
| [[cve-2025-43520\|CVE-2025-43520]] | 7.1 | Apple | Multiple Products (iOS, iPadOS, macOS, watchOS, tvOS, visionOS) | true |
| [[cve-2025-40602\|CVE-2025-40602]] | 6.6 | SonicWall | SMA1000 | true |
| [[cve-2024-43451\|CVE-2024-43451]] | 6.5 | Microsoft | Windows (múltiplas versões) | true |
| [[cve-2025-43510\|CVE-2025-43510]] | 6.3 | Apple | Multiple Products (iOS, iPadOS, macOS, watchOS, tvOS, visionOS) | true |
| [[cve-2023-37580\|CVE-2023-37580]] | 6.1 | Zimbra | Zimbra Collaboration Suite | true |
| [[cve-2024-11182\|CVE-2024-11182]] | 6.1 | MDaemon Technologies | MDaemon Email Server | true |
| [[cve-2025-66376\|CVE-2025-66376]] | 6.1 | Synacor | Zimbra Collaboration Suite (ZCS) | true |
| [[cve-2023-38606\|CVE-2023-38606]] | 5.5 | Apple | iOS / iPadOS / macOS | true |
| [[cve-2026-20805\|CVE-2026-20805]] | 0 | | | false |
| [[cve-2026-24423\|CVE-2026-24423]] | 0 | | | false |
<!-- SerializedQuery END -->
---
## CVEs Críticos (CVSS ≥ 9)
%%
```dataview
TABLE WITHOUT ID cve-id AS "CVE", cvss-score AS "CVSS", epss-score AS "EPSS", exploit-available AS "Exploit Público"
FROM "vulnerabilities"
WHERE cvss-score >= 9
SORT cvss-score DESC
LIMIT 20
```
%%
<!-- QueryToSerialize: TABLE WITHOUT ID link(file.link, cve-id) AS "CVE", cvss-score AS "CVSS", epss-score AS "EPSS", exploit-available AS "Exploit Público" FROM "vulnerabilities" WHERE cvss-score >= 9 SORT cvss-score DESC LIMIT 20 -->
<!-- SerializedQuery: TABLE WITHOUT ID link(file.link, cve-id) AS "CVE", cvss-score AS "CVSS", epss-score AS "EPSS", exploit-available AS "Exploit Público" FROM "vulnerabilities" WHERE cvss-score >= 9 SORT cvss-score DESC LIMIT 20 -->
| CVE | CVSS | EPSS | Exploit Público |
| ---------------------------------------------------------- | ---- | ------ | --------------- |
| [[cve-2008-4250\|CVE-2008-4250]] | 10 | 0.9354 | true |
| [[cve-2014-1776\|CVE-2014-1776]] | 10 | 0.8019 | true |
| [[cve-2015-3113\|CVE-2015-3113]] | 10 | 0.9242 | true |
| [[cve-2015-5122\|CVE-2015-5122]] | 10 | 0.9278 | true |
| [[cve-2017-7921\|CVE-2017-7921]] | 10 | 0.9423 | true |
| [[cve-2019-11510\|CVE-2019-11510]] | 10 | 0.9444 | true |
| [[cve-2020-1472\|CVE-2020-1472]] | 10 | 0.9438 | true |
| [[cve-2020-5902\|CVE-2020-5902]] | 10 | 0.9443 | true |
| [[cve-2021-22681\|CVE-2021-22681]] | 10 | 0.129 | true |
| [[cve-2021-22893\|CVE-2021-22893]] | 10 | 0.9361 | true |
| [[cve-2021-44228\|CVE-2021-44228]] | 10 | 0.9436 | true |
| [[cve-2023-22527\|CVE-2023-22527]] | 10 | 0.9436 | true |
| [[cve-2023-35078\|CVE-2023-35078]] | 10 | 0.9447 | true |
| [[cve-2023-41892\|CVE-2023-41892]] | 10 | 0.9389 | true |
| [[cve-2023-46604\|CVE-2023-46604]] | 10 | 0.9444 | true |
| [[cve-2024-1709\|CVE-2024-1709]] | 10 | 0.9432 | true |
| [[cve-2024-3400\|CVE-2024-3400]] | 10 | 0.9432 | true |
| [[cve-2024-45519\|CVE-2024-45519]] | 10 | | true |
| [[cve-2025-20393\|CVE-2025-20393]] | 10 | | true |
| [[cve-2025-31324\|CVE-2025-31324]] | 10 | 0.3216 | true |
<!-- SerializedQuery END -->
---
## CVEs de Alto Risco (CVSS 7–8.9)
%%
```dataview
TABLE WITHOUT ID cve-id AS "CVE", cvss-score AS "CVSS", vendor AS "Fornecedor", product AS "Produto"
FROM "vulnerabilities"
WHERE cvss-score >= 7 AND cvss-score < 9
SORT cvss-score DESC
LIMIT 20
```
%%
<!-- QueryToSerialize: TABLE WITHOUT ID link(file.link, cve-id) AS "CVE", cvss-score AS "CVSS", vendor AS "Fornecedor", product AS "Produto" FROM "vulnerabilities" WHERE cvss-score >= 7 AND cvss-score < 9 SORT cvss-score DESC LIMIT 20 -->
<!-- SerializedQuery: TABLE WITHOUT ID link(file.link, cve-id) AS "CVE", cvss-score AS "CVSS", vendor AS "Fornecedor", product AS "Produto" FROM "vulnerabilities" WHERE cvss-score >= 7 AND cvss-score < 9 SORT cvss-score DESC LIMIT 20 -->
| CVE | CVSS | Fornecedor | Produto |
| ---------------------------------------------------------- | ---- | --------------- | ----------------------------------------- |
| [[cve-2026-1145\|CVE-2026-1145]] | 8.9 | Apple | iOS |
| [[cve-2016-4657\|CVE-2016-4657]] | 8.8 | Apple | iOS (WebKit) |
| [[cve-2018-0798\|CVE-2018-0798]] | 8.8 | Microsoft | Microsoft Office (Equation Editor) |
| [[cve-2018-20250\|CVE-2018-20250]] | 8.8 | RARLAB | WinRAR |
| [[cve-2018-4877\|CVE-2018-4877]] | 8.8 | Adobe | Adobe Flash Player |
| [[cve-2018-4990\|CVE-2018-4990]] | 8.8 | Adobe | Acrobat DC / Acrobat Reader DC |
| [[cve-2020-0688\|CVE-2020-0688]] | 8.8 | Microsoft | Microsoft Exchange Server |
| [[cve-2020-10383\|CVE-2020-10383]] | 8.8 | MB Connect Line | mbCONNECT24 / mymbCONNECT24 |
| [[cve-2021-1675\|CVE-2021-1675]] | 8.8 | Microsoft | Windows Print Spooler |
| [[cve-2021-34527\|CVE-2021-34527]] | 8.8 | Microsoft | Windows Print Spooler |
| [[cve-2021-40444\|CVE-2021-40444]] | 8.8 | Microsoft | Windows MSHTML (Internet Explorer engine) |
| [[cve-2021-42359\|CVE-2021-42359]] | 8.8 | WordPress | WP DSGVO Tools Plugin |
| [[cve-2021-44730\|CVE-2021-44730]] | 8.8 | Canonical | snapd |
| [[cve-2022-41040\|CVE-2022-41040]] | 8.8 | Microsoft | Microsoft Exchange Server |
| [[cve-2022-41080\|CVE-2022-41080]] | 8.8 | Microsoft | Microsoft Exchange Server |
| [[cve-2022-41082\|CVE-2022-41082]] | 8.8 | Microsoft | Microsoft Exchange Server |
| [[cve-2023-1389\|CVE-2023-1389]] | 8.8 | TP-Link | TP-Link Archer AX21 (Wi-Fi Router) |
| [[cve-2023-32435\|CVE-2023-32435]] | 8.8 | Apple | iOS / iPadOS |
| [[cve-2023-37450\|CVE-2023-37450]] | 8.8 | Apple | WebKit (Safari, iOS, iPadOS, macOS) |
| [[cve-2023-41974\|CVE-2023-41974]] | 8.8 | Apple | WebKit (Safari, macOS, iOS, iPadOS) |
<!-- SerializedQuery END -->
---
## Publicações Recentes
%%
```dataview
TABLE WITHOUT ID cve-id AS "CVE", cvss-score AS "CVSS", vendor AS "Fornecedor", file.mtime AS "Publicado"
FROM "vulnerabilities"
SORT file.mtime DESC
LIMIT 10
```
%%
<!-- QueryToSerialize: TABLE WITHOUT ID link(file.link, cve-id) AS "CVE", cvss-score AS "CVSS", vendor AS "Fornecedor", file.mtime AS "Publicado" FROM "vulnerabilities" SORT file.mtime DESC LIMIT 10 -->
<!-- SerializedQuery: TABLE WITHOUT ID link(file.link, cve-id) AS "CVE", cvss-score AS "CVSS", vendor AS "Fornecedor", file.mtime AS "Publicado" FROM "vulnerabilities" SORT file.mtime DESC LIMIT 10 -->
| CVE | CVSS | Fornecedor | Publicado |
| ---------------------------------------------------------- | ---- | ---------- | ------------------------ |
| [[_vulnerabilities]] | \- | \- | 5:49 PM - March 30, 2026 |
| [[cve-2023-36025]] | \- | \- | 5:37 PM - March 30, 2026 |
| [[cve-2026-2783\|CVE-2026-2783]] | \- | \- | 5:37 PM - March 30, 2026 |
| [[cve-2026-4923\|CVE-2026-4923]] | \- | \- | 5:37 PM - March 30, 2026 |
| [[cve-2016-4655\|CVE-2016-4655]] | 5.5 | Apple | 5:36 PM - March 30, 2026 |
| [[vulnerabilities/2026/_2026.md\|_2026]] | \- | \- | 5:36 PM - March 30, 2026 |
| [[cve-2013-3660\|CVE-2013-3660]] | 7.2 | Microsoft | 5:33 PM - March 30, 2026 |
| [[cve-2017-7921\|CVE-2017-7921]] | 10 | Hikvision | 5:33 PM - March 30, 2026 |
| [[cve-2017-11882\|CVE-2017-11882]] | 7.8 | Microsoft | 5:33 PM - March 30, 2026 |
| [[cve-2016-1010\|CVE-2016-1010]] | 9.8 | Adobe | 5:33 PM - March 30, 2026 |
<!-- SerializedQuery END -->
---
## Últimas Atualizações
%%
```dataview
TABLE WITHOUT ID type AS "Tipo", dateformat(file.mtime, "yyyy-MM-dd HH:mm") AS "Modificado"
FROM "vulnerabilities"
WHERE publish = true AND !contains(file.name, "_")
SORT file.mtime DESC
LIMIT 5
```
%%
<!-- QueryToSerialize: TABLE WITHOUT ID link(file.link, title) AS "Nota", type AS "Tipo", dateformat(file.mtime, "yyyy-MM-dd HH:mm") AS "Modificado" FROM "vulnerabilities" WHERE publish = true AND !contains(file.name, "_") SORT file.mtime DESC LIMIT 5 -->
<!-- SerializedQuery: TABLE WITHOUT ID link(file.link, title) AS "Nota", type AS "Tipo", dateformat(file.mtime, "yyyy-MM-dd HH:mm") AS "Modificado" FROM "vulnerabilities" WHERE publish = true AND !contains(file.name, "_") SORT file.mtime DESC LIMIT 5 -->
| Nota | Tipo | Modificado |
| ---------------------------------------------------------- | ---- | ---------------- |
| [[cve-2016-4655\|CVE-2016-4655]] | cve | 2026-03-30 17:36 |
| [[cve-2013-3660\|CVE-2013-3660]] | cve | 2026-03-30 17:33 |
| [[cve-2017-7921\|CVE-2017-7921]] | cve | 2026-03-30 17:33 |
| [[cve-2017-11882\|CVE-2017-11882]] | cve | 2026-03-30 17:33 |
| [[cve-2016-1010\|CVE-2016-1010]] | cve | 2026-03-30 17:33 |
<!-- SerializedQuery END -->
---
*Scores CVSS e EPSS obtidos via NVD e FIRST. Presença na CISA KEV verificada diariamente. Para ver campanhas explorando vulnerabilidades específicas, consulte [[_campaigns|Campanhas e Incidentes]].*