{"notices":false,"list":[{"cb_seq":"4274","cb_code":"2","cb_notice":"0","cb_title":"WordPress \ud50c\ub7ec\uadf8\uc778 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"<\/colgroup><\/tr><\/thead>

\u25a1 \uac1c\uc694<\/span>
 o <\/span>WordPress<\/span>\uc758 <\/span>WPvivid Backup & Migration <\/span>\ud50c\ub7ec\uadf8\uc778 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c <\/span>[1]<\/span><\/p>

<\/span> o <\/span>\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span><\/p>

  <\/span>* WPvivid Backup & Migration <\/span>\ud50c\ub7ec\uadf8\uc778 <\/span>: <\/span>\ubc31\uc5c5<\/span>\/<\/span>\ub9c8\uc774\uadf8\ub808\uc774\uc158<\/span>\/<\/span>\uc2a4\ud14c\uc774\uc9d5 \uae30\ub2a5 \uc81c\uacf5 \ud50c\ub7ec\uadf8\uc778<\/span><\/p>


\u25a1 \uc124\uba85<\/span>
 o <\/span>WPvivid Backup & Migration <\/span>\ud50c\ub7ec\uadf8\uc778\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc784\uc758 \ud30c\uc77c \uc5c5\ub85c\ub4dc \ucde8\uc57d\uc810<\/span>(CVE-2026-1357) [1][2]<\/span><\/p>

<\/span>
\u25a1 \uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548<\/span><\/p>

\ucde8\uc57d\uc810<\/span><\/p><\/td>

\uc81c\ud488\uba85<\/span><\/p><\/td>

\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td>

\ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>

CVE-2026-1357<\/span><\/p><\/td>

WPvivid Backup & Migration<\/span><\/p><\/td>

0.9.123 <\/span>\uc774\ud558<\/span><\/p><\/td>

0.9.124<\/span><\/p><\/td><\/tr><\/tbody><\/table>

<\/span> \u203b <\/span>\ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 <\/span>[1]<\/span><\/p>


\u25a1 <\/span>\ucc38\uace0\uc0ac\uc774\ud2b8<\/span>
 [1] https:\/\/www.wordfence.com\/threat-intel\/vulnerabilities\/wordpress-plugins\/wpvivid-backuprestore\/migration-backup-staging-09123-unauthenticated-arbitrary-file-upload<\/span><\/p>

 [2] https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-1357<\/span><\/p>


<\/span><\/p>

\u25a1 \ubb38\uc758\uc0ac\ud56d<\/span>
 <\/span>o \ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0 \uc0ac\uc774\ubc84\ubbfc\uc6d0\uc13c\ud130: \uad6d\ubc88\uc5c6\uc774 118<\/span>
<\/span>
\u25a1 \uc791\uc131: <\/span>\uc704\ud611\ub300\uc751\ub2e8 <\/span>AI<\/span>\ucde8\uc57d\uc810\ub300\uc751\ud300<\/span><\/p><\/td><\/tr><\/tbody><\/table>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2026-02-19 01:04:31","cb_use_flag":"0","cb_admin_id":"kkubear96","cb_admin_name":"\uad6c\uacbd\ubc94","cb_readcount":"5"},{"cb_seq":"4273","cb_code":"2","cb_notice":"0","cb_title":"Ivanti \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"<\/colgroup><\/tr><\/thead>

\u25a1 \uac1c\uc694<\/span>
 o <\/span>Ivanti<\/span>\u793e<\/span>\ub294 \uc790\uc0ac \uc81c\ud488\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c <\/span>[1]<\/span><\/p>

 o <\/span>\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span><\/p>

<\/span>
\u25a1 \uc124\uba85<\/span>
 o <\/span>Ivanti Endpoint Manager(EPM)<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 <\/span>SQL Injection <\/span>\ucde8\uc57d\uc810<\/span>(CVE-2026-1602) [1][2]<\/span><\/p>

<\/span> o <\/span>Ivanti Endpoint Manager(EPM)<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc778\uc99d \uc6b0\ud68c \ucde8\uc57d\uc810<\/span>(CVE-2026-1603) [1][3]<\/span><\/p>

<\/span>
\u25a1 \uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548<\/span><\/p>

\ucde8\uc57d\uc810<\/span><\/p><\/td>

\uc81c\ud488\uba85<\/span><\/p><\/td>

\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td>

\ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>

CVE-2026-1602<\/span><\/p><\/td>

Ivanti Endpoint Manager<\/span><\/p><\/td>

2024 SU4 SR1 <\/span>\uc774\ud558<\/span><\/p><\/td>

2024 SU5<\/span><\/p><\/td><\/tr>

CVE-2026-1603<\/span><\/p><\/td><\/tr><\/tbody><\/table>

<\/span> \u203b <\/span>\ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 <\/span>[1]<\/span><\/p>


\u25a1 <\/span>\ucc38\uace0\uc0ac\uc774\ud2b8<\/span>
 [1] https:\/\/hub.ivanti.com\/s\/article\/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US<\/span><\/p>

 [2] https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-1602<\/span><\/p>

 [3] https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-1603<\/span><\/p>


<\/span><\/p>

\u25a1 \ubb38\uc758\uc0ac\ud56d<\/span>
 <\/span>o \ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0 \uc0ac\uc774\ubc84\ubbfc\uc6d0\uc13c\ud130: \uad6d\ubc88\uc5c6\uc774 118<\/span>
<\/span>
\u25a1 \uc791\uc131: <\/span>\uc704\ud611\ub300\uc751\ub2e8 <\/span>AI<\/span>\ucde8\uc57d\uc810\ub300\uc751\ud300<\/span><\/p><\/td><\/tr><\/tbody><\/table>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2026-02-19 01:04:17","cb_use_flag":"0","cb_admin_id":"kkubear96","cb_admin_name":"\uad6c\uacbd\ubc94","cb_readcount":"0"},{"cb_seq":"4272","cb_code":"2","cb_notice":"0","cb_title":"Apple \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"

\u25a1 \uac1c\uc694<\/span>
 o <\/span>Apple<\/span>\u793e<\/span>\ub294 \uc790\uc0ac \uc81c\ud488\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c <\/span>[1][2][3][4][5]<\/span><\/p>

<\/span> o <\/span>\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span><\/p>

<\/span>
\u25a1 \uc124\uba85<\/span>
 o <\/span>iOS, iPadOS, macOS Tahoe, visionOS, tvOS, watchOS<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc784\uc758 \ucf54\ub4dc \uc2e4\ud589 \ucde8\uc57d\uc810<\/span>(CVE-2026-20700) [1][2][3][4][5][6]<\/span><\/p>

<\/span>
\u25a1 \uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548<\/span><\/p>

\ucde8\uc57d\uc810<\/span><\/p><\/td>

\uc81c\ud488\uba85<\/span><\/p><\/td>

\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td>

\ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>

CVE-2026-20700<\/span><\/p><\/td>

iOS<\/span><\/p><\/td>

26.3 <\/span>\ubbf8\ub9cc<\/span><\/p><\/td>

26.3 <\/span>\uc774\uc0c1<\/span><\/p><\/td><\/tr>

iPadOS<\/span><\/p><\/td><\/tr>

macOS Tahoe<\/span><\/p><\/td><\/tr>

visionOS<\/span><\/p><\/td><\/tr>

tvOS<\/span><\/p><\/td><\/tr>

watchOS<\/span><\/p><\/td><\/tr><\/tbody><\/table>

<\/span> \u203b <\/span>\ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 <\/span>[1][2][3][4][5]<\/span><\/p>


\u25a1 <\/span>\ucc38\uace0\uc0ac\uc774\ud2b8<\/span>
<\/span><\/p>

 [1] https:\/\/support.apple.com\/en-us\/126346<\/span><\/p>

 [2] https:\/\/support.apple.com\/en-us\/126348<\/span><\/p>

 [3] https:\/\/support.apple.com\/en-us\/126351<\/span><\/p>

 [4] https:\/\/support.apple.com\/en-us\/126352<\/span><\/p>

 [5] https:\/\/support.apple.com\/en-us\/126353<\/span><\/p>

 [6] https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-20700<\/span><\/p>


<\/span><\/p>

\u25a1 \ubb38\uc758\uc0ac\ud56d<\/span>
 <\/span>o \ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0 \uc0ac\uc774\ubc84\ubbfc\uc6d0\uc13c\ud130: \uad6d\ubc88\uc5c6\uc774 118<\/span>
<\/span>
\u25a1 \uc791\uc131: <\/span>\uc704\ud611\ub300\uc751\ub2e8 <\/span>AI<\/span>\ucde8\uc57d\uc810\ub300\uc751\ud300<\/span><\/p>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2026-02-19 01:04:02","cb_use_flag":"0","cb_admin_id":"kkubear96","cb_admin_name":"\uad6c\uacbd\ubc94","cb_readcount":"0"},{"cb_seq":"4271","cb_code":"2","cb_notice":"0","cb_title":"\u7f8e CISA \ubc1c\ud45c \uc8fc\uc694 Exploit \uc815\ubcf4\uacf5\uc720(Update. 2026-02-12)","cb_contents":"

\ud604\uc7ac \uc790\uc8fc \uc545\uc6a9\ub418\uace0 \uc788\ub294 \ucde8\uc57d\uc810 \ubaa9\ub85d\uc73c\ub85c, \ucde8\uc57d\ud55c \ubc84\uc804\uc758 SW\ub97c \uc0ac\uc6a9 \uc911\uc778 \uacbd\uc6b0 \uae34\uae09 \ud328\uce58\ub97c \uad8c\uace0 \ub4dc\ub9bd\ub2c8\ub2e4.<\/span>
* \ucc38\uc870 \ub9c1\ud06c : <\/span>https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog<\/a>

<\/p>
cveID<\/th>vendorProject<\/th>vulnerabilityName<\/th>dateAdded<\/th>shortDescription<\/th>requiredAction<\/th>dueDate<\/th><\/tr>
CVE-2025-40536<\/th>SolarWinds<\/th>SolarWinds Web Help Desk Security Control Bypass Vulnerability<\/th>2026-02-12<\/th>SolarWinds Web Help Desk contains a security control bypass vulnerability that could allow an unauthenticated attacker to gain access to certain restricted functionality.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2026-02-15<\/th><\/tr>
CVE-2025-15556<\/th>Notepad++<\/th>Notepad++ Download of Code Without Integrity Check Vulnerability<\/th>2026-02-12<\/th>Notepad++ when using the WinGUp updater, contains a download of code without integrity check vulnerability that could allow an attacker to intercept or redirect update traffic to download and execute an attacker-controlled installer. This could lead to arbitrary code execution with the privileges of the user.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2026-03-05<\/th><\/tr>
CVE-2024-43468<\/th>Microsoft<\/th>Microsoft Configuration Manager SQL Injection Vulnerability<\/th>2026-02-12<\/th>Microsoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and\/or underlying database.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2026-03-05<\/th><\/tr>
CVE-2026-20700<\/th>Apple<\/th>Apple Multiple Buffer Overflow Vulnerability<\/th>2026-02-12<\/th>Apple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker with memory write the capability to execute arbitrary code.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2026-03-05<\/th><\/tr><\/tbody><\/table>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2026-02-19 01:03:45","cb_use_flag":"0","cb_admin_id":"kkubear96","cb_admin_name":"\uad6c\uacbd\ubc94","cb_readcount":"0"},{"cb_seq":"4269","cb_code":"2","cb_notice":"0","cb_title":"Microsoft \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"

\u25a1 \uac1c\uc694<\/span>
 o <\/span>Microsoft<\/span>\u793e<\/span>\ub294 <\/span>Windows Notepad<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c <\/span>[1]<\/span><\/p>

 o <\/span>\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span><\/p>

<\/span>
\u25a1 \uc124\uba85<\/span>
 o <\/span>Windows Notepad<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc6d0\uaca9 \ucf54\ub4dc \uc2e4\ud589 \ucde8\uc57d\uc810<\/span>(CVE-2026-20841) [1][2]<\/span><\/p>

<\/span>
\u25a1 \uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548<\/span><\/p>


<\/span><\/p>


<\/span><\/p>

<\/span><\/p>

\ucde8\uc57d\uc810<\/span><\/p><\/td>

\uc81c\ud488\uba85<\/span><\/p><\/td>

\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td>

\ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>

CVE-2026-20841<\/span><\/p><\/td>

Windows Notepad<\/span><\/p><\/td>

11.2510 <\/span>\ubbf8\ub9cc<\/span><\/p><\/td>

11.2510 <\/span>\uc774\uc0c1<\/span><\/p><\/td><\/tr><\/tbody><\/table>


<\/span><\/p>

\u203b <\/span>\ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 <\/span>[1]<\/span><\/p>


\u25a1 <\/span>\ucc38\uace0\uc0ac\uc774\ud2b8<\/span>
<\/span><\/p>

 [1] https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20841<\/span><\/p>

 [2] https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-20841<\/span><\/p>


<\/span><\/p>

<\/span><\/p>

\u25a1 \ubb38\uc758\uc0ac\ud56d<\/span>
<\/span> <\/span>o \ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0 \uc0ac\uc774\ubc84\ubbfc\uc6d0\uc13c\ud130: \uad6d\ubc88\uc5c6\uc774 118<\/span>
<\/span>
\u25a1 \uc791\uc131: <\/span>\uc704\ud611\ub300\uc751\ub2e8 AI\ucde8\uc57d\uc810\ub300\uc751\ud300<\/span><\/p>


<\/p>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2026-02-13 05:08:08","cb_use_flag":"0","cb_admin_id":"cjh123","cb_admin_name":"\uc870\uc7ac\ud6c8","cb_readcount":"9"},{"cb_seq":"4267","cb_code":"2","cb_notice":"0","cb_title":"Fortinet \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"

\u25a1 \uac1c\uc694<\/span>
 o <\/span>Fortinet<\/span>\u793e<\/span>\ub294 \uc790\uc0ac \uc81c\ud488\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c <\/span>[1]<\/span><\/p>

<\/span> o <\/span>\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span><\/p>


\u25a1 \uc124\uba85<\/span>
 o <\/span>FortiClientEMS<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 <\/span>SQL Injection <\/span>\ucde8\uc57d\uc810<\/span>(CVE-2026-21643) [1][2]<\/span><\/p>

<\/span>
\u25a1 \uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548<\/span><\/p>

\ucde8\uc57d\uc810<\/span><\/p><\/td>

\uc81c\ud488\uba85<\/span><\/p><\/td>

\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td>

\ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>

CVE-2026-21643<\/span><\/p><\/td>

FortiClientEMS<\/span><\/p><\/td>

7.4.4<\/span><\/p><\/td>

7.4.5 <\/span>\uc774\uc0c1<\/span><\/p><\/td><\/tr><\/tbody><\/table>

 \u203b <\/span>\ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 <\/span>[1]<\/span><\/p>


\u25a1 <\/span>\ucc38\uace0\uc0ac\uc774\ud2b8<\/span>
 [1] https:\/\/fortiguard.fortinet.com\/psirt\/FG-IR-25-1142<\/span><\/p>

 [2] https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-21643<\/span><\/p>

 <\/span><\/p>


<\/span><\/p>

\u25a1 \ubb38\uc758\uc0ac\ud56d<\/span>
 <\/span>o \ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0 \uc0ac\uc774\ubc84\ubbfc\uc6d0\uc13c\ud130: \uad6d\ubc88\uc5c6\uc774 118<\/span>
<\/span>
\u25a1 \uc791\uc131: <\/span>\uc704\ud611\ubd84\uc11d\ub2e8 \ucde8\uc57d\uc810\ubd84\uc11d\ud300<\/span><\/p>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2026-02-11 02:11:25","cb_use_flag":"0","cb_admin_id":"kkubear96","cb_admin_name":"\uad6c\uacbd\ubc94","cb_readcount":"15"},{"cb_seq":"4263","cb_code":"2","cb_notice":"0","cb_title":"\u7f8e CISA \ubc1c\ud45c \uc8fc\uc694 Exploit \uc815\ubcf4\uacf5\uc720(Update. 2026-02-05)","cb_contents":"<\/colgroup>

\ud604\uc7ac \uc790\uc8fc \uc545\uc6a9\ub418\uace0 \uc788\ub294 \ucde8\uc57d\uc810 \ubaa9\ub85d\uc73c\ub85c, \ucde8\uc57d\ud55c \ubc84\uc804\uc758 SW\ub97c \uc0ac\uc6a9 \uc911\uc778 \uacbd\uc6b0 \uae34\uae09 \ud328\uce58\ub97c \uad8c\uace0 \ub4dc\ub9bd\ub2c8\ub2e4.
* \ucc38\uc870 \ub9c1\ud06c : https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog<\/a><\/p>
cveID<\/th>vendorProject<\/th>vulnerabilityName<\/th>dateAdded<\/th>shortDescription<\/th>requiredAction<\/th>dueDate<\/th><\/tr>
CVE-2026-24423<\/th>SmarterTools<\/th>SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability<\/th>2026-02-05<\/th>SmarterTools SmarterMail contains a missing authentication for critical function vulnerability in the ConnectToHub API method. This could allow the attacker to point the SmarterMail instance to a malicious HTTP server which serves the malicious OS command and could lead to command execution.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2026-02-26<\/th><\/tr>
CVE-2025-11953<\/th>React Native Community<\/th>React Native Community CLI OS Command Injection Vulnerability<\/th>2026-02-05<\/th>React Native Community CLI contains an OS command injection vulnerability which could allow unauthenticated network attackers to send POST requests to the Metro Development Server and run arbitrary executables via a vulnerable endpoint exposed by the server. On Windows, attackers can also execute arbitrary shell commands with fully controlled arguments.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2026-02-26<\/th><\/tr><\/tbody><\/table><\/td><\/tr><\/tbody><\/table>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2026-02-09 04:18:38","cb_use_flag":"0","cb_admin_id":"cjh123","cb_admin_name":"\uc870\uc7ac\ud6c8","cb_readcount":"13"},{"cb_seq":"4261","cb_code":"2","cb_notice":"0","cb_title":"Xiaomi \uc81c\ud488 \uc0ac\uc6a9 \uc8fc\uc758 \uad8c\uace0","cb_contents":"

\u25a1 \uac1c\uc694<\/span>
 o <\/span>Xiaomi\u793e\uc758 Redmi Buds Pro \uc81c\ud488\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc5d0 \ub300\ud55c \uc8fc\uc758 \uad8c\uace0<\/span>
<\/span>
\u25a1 \uc124\uba85<\/span>
 o <\/span>Xiaomi\uc758 Redmi Buds Pro\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc815\ubcf4 \ub178\ucd9c \ucde8\uc57d\uc810(CVE-2025-13834)<\/span><\/p>

<\/span> o <\/span>Xiaomi\uc758 Redmi Buds Pro\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc11c\ube44\uc2a4 \uac70\ubd80 \ucde8\uc57d\uc810(CVE-2025-13328)<\/span>
<\/span>
\u25a1 \uc601\ud5a5\ubc1b\ub294 \uc81c\ud488<\/span><\/p>

\ucde8\uc57d\uc810<\/span><\/p><\/td>

\uc81c\ud488\uba85<\/span><\/p><\/td><\/tr>

CVE-2025-13834<\/span><\/p>

CVE-2025-13328<\/span><\/p><\/td>

Redmi Buds 3 Pro<\/span><\/p><\/td><\/tr>

Redmi Buds 4 Pro<\/span><\/p><\/td><\/tr>

Redmi Buds 5 Pro<\/span><\/p><\/td><\/tr>

Redmi Buds 6 Pro<\/span><\/p><\/td><\/tr><\/tbody><\/table>


<\/span><\/p>

<\/span>\u25a1 \ud574\uacb0 \ubc29\uc548<\/span>
<\/span><\/span> o <\/span>\ud574\ub2f9 \uc81c\ud488\uc740 \ubcf4\uc548 \ud328\uce58\uac00 \uc81c\uacf5\ub418\uc9c0 \uc54a\uc73c\ubbc0\ub85c, \uacf5\uacf5\uc7a5\uc18c(\uc778\ud30c \ubc00\uc9d1 \uc9c0\uc5ed)\uc5d0\uc11c \uc774\uc5b4\ud3f0\uc744 \uc0ac\uc6a9\ud558\uc9c0 \uc54a\uc744 \ub54c\ub294 \ube14\ub8e8\ud22c\uc2a4 \uae30\ub2a5 \ube44\ud65c\uc131\ud654 [1]<\/span>

\u25a1 <\/span>\ucc38\uace0\uc0ac\uc774\ud2b8<\/span>
 [1] <\/span>https:\/\/www.kb.cert.org\/vuls\/id\/472136<\/span><\/p>

<\/span>
\u25a1 \uc791\uc131: <\/span>\uc704\ud611\ubd84\uc11d\ub2e8 \ucde8\uc57d\uc810\ubd84\uc11d\ud300<\/span><\/p>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2026-02-06 01:36:36","cb_use_flag":"0","cb_admin_id":"khstation","cb_admin_name":"\ucd5c\uae30\ud64d","cb_readcount":"13"},{"cb_seq":"4260","cb_code":"2","cb_notice":"0","cb_title":"n8n \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"

\u25a1 \uac1c\uc694<\/span>
 o <\/span>n8n<\/span>\u793e<\/span>\ub294 \uc790\uc0ac \uc81c\ud488\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c <\/span>[1]<\/span><\/p>

<\/span> o <\/span>\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span><\/p>


\u25a1 \uc124\uba85<\/span>
 o <\/span>n8n<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc6d0\uaca9 \ucf54\ub4dc \uc2e4\ud589 \ucde8\uc57d\uc810<\/span>(CVE-2026-25049) [1][2]<\/span><\/p>

<\/span>
\u25a1 \uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548<\/span><\/p>

\ucde8\uc57d\uc810<\/span><\/p><\/td>

\uc81c\ud488\uba85<\/span><\/p><\/td>

\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td>

\ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>

CVE-2026-25049<\/span><\/p><\/td>

n8n<\/span><\/p><\/td>

1.123.17 <\/span>\ubbf8\ub9cc<\/span><\/p><\/td>

1.123.17<\/span><\/p><\/td><\/tr>

2.5.2 <\/span>\ubbf8\ub9cc<\/span><\/p><\/td>

2.5.2<\/span><\/p><\/td><\/tr><\/tbody><\/table>

<\/span> \u203b <\/span>\ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 <\/span>[1]<\/span><\/p>


\u25a1 <\/span>\ucc38\uace0\uc0ac\uc774\ud2b8<\/span>
<\/span><\/p>

 [1] https:\/\/github.com\/n8n-io\/n8n\/security\/advisories\/GHSA-6cqr-8cfr-67f8<\/span><\/p>

 [2] https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-25049<\/span><\/p>


<\/span><\/p>

\u25a1 \ubb38\uc758\uc0ac\ud56d<\/span>
 <\/span>o \ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0 \uc0ac\uc774\ubc84\ubbfc\uc6d0\uc13c\ud130: \uad6d\ubc88\uc5c6\uc774 118<\/span>
<\/span>
\u25a1 \uc791\uc131: <\/span>\uc704\ud611\ubd84\uc11d\ub2e8 \ucde8\uc57d\uc810\ubd84\uc11d\ud300<\/span><\/p>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2026-02-06 01:36:19","cb_use_flag":"0","cb_admin_id":"khstation","cb_admin_name":"\ucd5c\uae30\ud64d","cb_readcount":"8"},{"cb_seq":"4248","cb_code":"2","cb_notice":"0","cb_title":"\u7f8e CISA \ubc1c\ud45c \uc8fc\uc694 Exploit \uc815\ubcf4\uacf5\uc720(Update. 2026-02-03)","cb_contents":"<\/colgroup>
\ud604\uc7ac \uc790\uc8fc \uc545\uc6a9\ub418\uace0 \uc788\ub294 \ucde8\uc57d\uc810 \ubaa9\ub85d\uc73c\ub85c, \ucde8\uc57d\ud55c \ubc84\uc804\uc758 SW\ub97c \uc0ac\uc6a9 \uc911\uc778 \uacbd\uc6b0 \uae34\uae09 \ud328\uce58\ub97c \uad8c\uace0 \ub4dc\ub9bd\ub2c8\ub2e4.
* \ucc38\uc870 \ub9c1\ud06c : https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog<\/a>

cveID<\/th>vendorProject<\/th>vulnerabilityName<\/th>dateAdded<\/th>shortDescription<\/th>requiredAction<\/th>dueDate<\/th><\/tr>
CVE-2025-40551<\/th>SolarWinds<\/th>SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability<\/th>2026-02-03<\/th>SolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2026-02-06<\/th><\/tr>
CVE-2019-19006<\/th>Sangoma<\/th>Sangoma FreePBX Improper Authentication Vulnerability<\/th>2026-02-03<\/th>Sangoma FreePBX contains an improper authentication vulnerability that potentially allows unauthorized users to bypass password authentication and access services provided by the FreePBX admin.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2026-02-24<\/th><\/tr>
CVE-2025-64328<\/th>Sangoma<\/th>Sangoma FreePBX OS Command Injection Vulnerability<\/th>2026-02-03<\/th>Sangoma FreePBX Endpoint Manager contains an OS command injection vulnerability that could allow for a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function. An attacker can leverage this vulnerability to potentially obtain remote access to the system as an asterisk user.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2026-02-24<\/th><\/tr>
CVE-2021-39935<\/th>GitLab<\/th>GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability<\/th>2026-02-03<\/th>GitLab Community and Enterprise Editions contain a server-side request forgery vulnerability which could allow unauthorized external users to perform Server Side Requests via the CI Lint API.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2026-02-24<\/th><\/tr><\/tbody><\/table><\/td><\/tr><\/tbody><\/table>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2026-02-05 04:48:11","cb_use_flag":"0","cb_admin_id":"cjh123","cb_admin_name":"\uc870\uc7ac\ud6c8","cb_readcount":"5"},{"cb_seq":"4245","cb_code":"2","cb_notice":"0","cb_title":"Ivanti \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"<\/colgroup><\/tr><\/thead>

\u25a1 \uac1c\uc694<\/span>
 o <\/span>Ivanti<\/span>\u793e<\/span>\ub294 \uc790\uc0ac \uc81c\ud488\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c <\/span>[1]<\/span><\/p>

<\/span> o \uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span><\/p>

<\/span>
\u25a1 \uc124\uba85<\/span>
 o <\/span>Ivanti Endpoint Manager Mobile<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uad00\ub9ac \uae30\ub2a5 \ucc98\ub9ac \uacfc\uc815\uc758 \ucf54\ub4dc \uc778\uc81d\uc158 \ucde8\uc57d\uc810<\/span>(CVE-2026-1281) [1][2]<\/span><\/p>

<\/span> o Ivanti Endpoint Manager Mobile<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 <\/span>API <\/span>\uc694\uccad \ucc98\ub9ac \uacfc\uc815\uc758 \ucf54\ub4dc \uc778\uc81d\uc158 \ucde8\uc57d\uc810<\/span>(CVE-2026-1340) [1][3]<\/span><\/p>

<\/span>
\u25a1 \uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548<\/span><\/p>

\ucde8\uc57d\uc810<\/span><\/p><\/td>

\uc81c\ud488\uba85<\/span><\/p><\/td>

\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td>

\ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>

CVE-2026-1281<\/span><\/p>

CVE-2026-1340<\/span><\/p><\/td>

Ivanti Endpoint Manager Mobile<\/span><\/p><\/td>

EPMM 12.5.0.0 <\/span>\uc774\ud558<\/span><\/p><\/td>

RPM 12.x.0.x.<\/span><\/p>

(ivanti-security-update-1761642-1.0.0S-5)<\/span><\/p><\/td><\/tr>

EPMM 12.6.0.0 <\/span>\uc774\ud558<\/span><\/p><\/td><\/tr>

EPMM 12.7.0.0 <\/span>\uc774\ud558<\/span><\/p><\/td><\/tr>

EPMM 12.5.1.0 <\/span>\uc774\ud558<\/span><\/p><\/td>

RPM 12.x.1.x<\/span><\/p>

(ivanti-security-update-1761642-1.0.0L-5)<\/span><\/p><\/td><\/tr>

EPMM 12.6.1.0 <\/span>\uc774\ud558<\/span><\/p><\/td><\/tr><\/tbody><\/table>

<\/span> \u203b <\/span>\ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 <\/span>[1]<\/span><\/p>

<\/span>  - <\/span>\uc815\uc2dd \ub9b4\ub9ac\uc988 \ubc84\uc804\uc778 <\/span>12.8.0.0 <\/span>\uc5c5\ub370\uc774\ud2b8 \ucd9c\uc2dc \uc804\uc5d0\ub294 <\/span>RPM <\/span>\uc2a4\ud06c\ub9bd\ud2b8<\/span>(<\/span>\uc784\uc2dc \uc870\uce58<\/span>) <\/span>\uc801\uc6a9 \ud544\uc694<\/span><\/p>


\u25a1 <\/span>\ucc38\uace0\uc0ac\uc774\ud2b8<\/span>
 [1] https:\/\/forums.ivanti.com\/s\/article\/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US<\/span><\/p>

 [2] https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-1281<\/span><\/p>

 [3] https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-1340<\/span><\/p>


<\/span><\/p>

\u25a1 \ubb38\uc758\uc0ac\ud56d<\/span>
 <\/span>o \ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0 \uc0ac\uc774\ubc84\ubbfc\uc6d0\uc13c\ud130: \uad6d\ubc88\uc5c6\uc774 118<\/span>
<\/span>
\u25a1 \uc791\uc131: <\/span>\uc704\ud611\ubd84\uc11d\ub2e8 \ucde8\uc57d\uc810\ubd84\uc11d\ud300<\/span><\/p><\/td><\/tr><\/tbody><\/table>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2026-02-03 01:45:33","cb_use_flag":"0","cb_admin_id":"kkubear96","cb_admin_name":"\uad6c\uacbd\ubc94","cb_readcount":"5"},{"cb_seq":"4244","cb_code":"2","cb_notice":"0","cb_title":"OpenSSL \ucde8\uc57d\uc810 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"

\u25a1 \uac1c\uc694<\/span>
 o <\/span>OpenSSL <\/span>\ud504\ub85c\uc81d\ud2b8\ub294 <\/span>OpenSSL<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c <\/span>[1]<\/span><\/p>

 o <\/span>\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span><\/p>

<\/span>
\u25a1 \uc124\uba85<\/span>
 o <\/span>OpenSSL<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc2a4\ud0dd \uae30\ubc18 \ubc84\ud37c \uc624\ubc84\ud50c\ub85c\uc6b0 \ucde8\uc57d\uc810<\/span>(CVE-2025-11187) [1][3]<\/span><\/p>

<\/span> o OpenSSL<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc2a4\ud0dd \uae30\ubc18 \ubc84\ud37c \uc624\ubc84\ud50c\ub85c\uc6b0 \ucde8\uc57d\uc810<\/span>(CVE-2025-15467) [1][4]<\/span><\/p>

<\/span>
\u25a1 \uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548<\/span><\/p>

\ucde8\uc57d\uc810<\/span><\/p><\/td>

\uc81c\ud488\uba85<\/span><\/p><\/td>

\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td>

\ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>

CVE-2025-11187<\/span><\/p><\/td>

OpenSSL<\/span><\/p><\/td>

3.4.x<\/span><\/p><\/td>

3.4.4<\/span><\/p><\/td><\/tr>

3.5.x<\/span><\/p><\/td>

3.5.5<\/span><\/p><\/td><\/tr>

3.6.x<\/span><\/p><\/td>

3.6.1<\/span><\/p><\/td><\/tr>

CVE-2025-15467<\/span><\/p><\/td>

OpenSSL<\/span><\/p><\/td>

3.0.x<\/span><\/p><\/td>

3.0.19<\/span><\/p><\/td><\/tr>

3.3.x<\/span><\/p><\/td>

3.3.6<\/span><\/p><\/td><\/tr>

3.4.x<\/span><\/p><\/td>

3.4.4<\/span><\/p><\/td><\/tr>

3.5.x<\/span><\/p><\/td>

3.5.5<\/span><\/p><\/td><\/tr>

3.6.x<\/span><\/p><\/td>

3.6.1<\/span><\/p><\/td><\/tr><\/tbody><\/table>

<\/span> \u203b <\/span>\ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 <\/span>[1][2]<\/span><\/p>


\u25a1 <\/span>\ucc38\uace0\uc0ac\uc774\ud2b8<\/span>
<\/span><\/p>

 [1] https:\/\/openssl-library.org\/news\/secadv\/20260127.txt<\/span><\/p>

 [2] https:\/\/github.com\/openssl\/openssl\/<\/span><\/p>

 [3] https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-11187<\/span><\/p>

 [4] https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-15467<\/span><\/p>


<\/span><\/p>

\u25a1 \ubb38\uc758\uc0ac\ud56d<\/span>
 <\/span>o \ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0 \uc0ac\uc774\ubc84\ubbfc\uc6d0\uc13c\ud130: \uad6d\ubc88\uc5c6\uc774 118<\/span>
<\/span>
\u25a1 \uc791\uc131: <\/span>\uc704\ud611\ubd84\uc11d\ub2e8 \ucde8\uc57d\uc810\ubd84\uc11d\ud300<\/span><\/p>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2026-02-03 01:45:12","cb_use_flag":"0","cb_admin_id":"kkubear96","cb_admin_name":"\uad6c\uacbd\ubc94","cb_readcount":"5"},{"cb_seq":"4243","cb_code":"2","cb_notice":"0","cb_title":"\u7f8e CISA \ubc1c\ud45c \uc8fc\uc694 Exploit \uc815\ubcf4\uacf5\uc720(Update. 2026-01-29)","cb_contents":"
<\/colgroup>
\ud604\uc7ac \uc790\uc8fc \uc545\uc6a9\ub418\uace0 \uc788\ub294 \ucde8\uc57d\uc810 \ubaa9\ub85d\uc73c\ub85c, \ucde8\uc57d\ud55c \ubc84\uc804\uc758 SW\ub97c \uc0ac\uc6a9 \uc911\uc778 \uacbd\uc6b0 \uae34\uae09 \ud328\uce58\ub97c \uad8c\uace0 \ub4dc\ub9bd\ub2c8\ub2e4.
* \ucc38\uc870 \ub9c1\ud06c : https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog<\/a>

cveID<\/th>vendorProject<\/th>vulnerabilityName<\/th>dateAdded<\/th>shortDescription<\/th>requiredAction<\/th>dueDate<\/th><\/tr>
CVE-2026-1281<\/th>Ivanti<\/th>Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability<\/th>2026-01-29<\/th>Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2026-02-01<\/th><\/tr><\/tbody><\/table><\/td><\/tr><\/tbody><\/table><\/td><\/tr><\/tbody><\/table>
\ucd9c\ucc98 \uc0ac\uc774\ud2b8 : https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog<\/a><\/h6>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2026-02-03 01:44:51","cb_use_flag":"0","cb_admin_id":"kkubear96","cb_admin_name":"\uad6c\uacbd\ubc94","cb_readcount":"5"},{"cb_seq":"4235","cb_code":"2","cb_notice":"0","cb_title":"n8n \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"

\u25a1 \uac1c\uc694<\/span>
 o <\/span>n8n<\/span>\u793e<\/span>\ub294 \uc790\uc0ac \uc81c\ud488\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c <\/span>[1][2]<\/span><\/p>

 o <\/span>\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span><\/p>

<\/span>
\u25a1 \uc124\uba85<\/span>
 o <\/span>n8n<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc6d0\uaca9 \ucf54\ub4dc \uc2e4\ud589 \ucde8\uc57d\uc810<\/span>(CVE-2026-0863) [1][3]<\/span><\/p>

<\/span> o n8n<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc784\uc758 \ucf54\ub4dc \uc2e4\ud589 \ucde8\uc57d\uc810<\/span>(CVE-2026-1470) [2][4]<\/span><\/p>

<\/span>
\u25a1 \uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548<\/span><\/p>

\ucde8\uc57d\uc810<\/span><\/p><\/td>

\uc81c\ud488\uba85<\/span><\/p><\/td>

\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td>

\ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>

CVE-2026-0863<\/span><\/p><\/td>

n8n<\/span><\/p><\/td>

1.123.14 <\/span>\ubbf8\ub9cc<\/span><\/p><\/td>

\ucd5c\uc2e0 \uc18c\uc2a4\ucf54\ub4dc \ud328\uce58 \uc801\uc6a9<\/span>[1]<\/span><\/p><\/td><\/tr>

2.0.0 <\/span>\uc774\uc0c1 <\/span>~ 2.3.5 <\/span>\ubbf8\ub9cc<\/span><\/p><\/td><\/tr>

2.4.0 <\/span>\uc774\uc0c1 <\/span>~ 2.4.2 <\/span>\ubbf8\ub9cc<\/span><\/p><\/td><\/tr>

CVE-2026-1470<\/span><\/p><\/td>

n8n<\/span><\/p><\/td>

1.123.17 <\/span>\ubbf8\ub9cc<\/span><\/p><\/td>

\ucd5c\uc2e0 \uc18c\uc2a4\ucf54\ub4dc \ud328\uce58 \uc801\uc6a9<\/span>[2]<\/span><\/p><\/td><\/tr>

2.0.0 <\/span>\uc774\uc0c1 <\/span>~ 2.4.5 <\/span>\ubbf8\ub9cc<\/span><\/p><\/td><\/tr>

2.5.0 <\/span>\uc774\uc0c1 <\/span>~ 2.5.1 <\/span>\ubbf8\ub9cc<\/span><\/p><\/td><\/tr><\/tbody><\/table>

<\/span> \u203b <\/span>\ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 <\/span>[1][2]<\/span><\/p>


\u25a1 <\/span>\ucc38\uace0\uc0ac\uc774\ud2b8<\/span>
 [1] https:\/\/github.com\/n8n-io\/n8n\/commit\/b73a4283cb14e0f27ce19692326f362c7bf3da02<\/span><\/p>

 [2] https:\/\/github.com\/n8n-io\/n8n\/commit\/aa4d1e5825829182afa0ad5b81f602638f55fa04<\/span><\/p>

 [3] https:\/\/www.cve.org\/CVERecord?id=CVE-2026-0863<\/span><\/p>

 [4] https:\/\/www.cve.org\/CVERecord?id=CVE-2026-1470<\/span><\/p>


<\/span><\/p>

\u25a1 \ubb38\uc758\uc0ac\ud56d<\/span>
 <\/span>o \ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0 \uc0ac\uc774\ubc84\ubbfc\uc6d0\uc13c\ud130: \uad6d\ubc88\uc5c6\uc774 118<\/span>
<\/span>
\u25a1 \uc791\uc131: <\/span>\uc704\ud611\ubd84\uc11d\ub2e8 \ucde8\uc57d\uc810\ubd84\uc11d\ud300<\/span><\/p>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2026-01-30 01:26:04","cb_use_flag":"0","cb_admin_id":"ikmet147","cb_admin_name":"\uc774\ucc3d\uc218","cb_readcount":"6"},{"cb_seq":"4224","cb_code":"2","cb_notice":"0","cb_title":" \u7f8e CISA \ubc1c\ud45c \uc8fc\uc694 Exploit \uc815\ubcf4\uacf5\uc720(Update. 2026-01-26)","cb_contents":"

\ud604\uc7ac \uc790\uc8fc \uc545\uc6a9\ub418\uace0 \uc788\ub294 \ucde8\uc57d\uc810 \ubaa9\ub85d\uc73c\ub85c, \ucde8\uc57d\ud55c \ubc84\uc804\uc758 SW\ub97c \uc0ac\uc6a9 \uc911\uc778 \uacbd\uc6b0 \uae34\uae09 \ud328\uce58\ub97c \uad8c\uace0 \ub4dc\ub9bd\ub2c8\ub2e4.<\/span>
* \ucc38\uc870 \ub9c1\ud06c : <\/span>https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog<\/a>

<\/p>
cveID<\/th>vendorProject<\/th>vulnerabilityName<\/th>dateAdded<\/th>shortDescription<\/th>requiredAction<\/th>dueDate<\/th><\/tr>
CVE-2026-24061<\/th>GNU<\/th>GNU InetUtils Argument Injection Vulnerability<\/th>2026-01-26<\/th>GNU InetUtils contains an argument injection vulnerability in telnetd that could allow for remote authentication bypass via a \"-f root\" value for the USER environment variable.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2026-02-16<\/th><\/tr>
CVE-2026-23760<\/th>SmarterTools<\/th>SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability<\/th>2026-01-26<\/th>SmarterTools SmarterMail contains an authentication bypass using an alternate path or channel vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. This could allow an unauthenticated attacker to supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2026-02-16<\/th><\/tr>
CVE-2025-52691<\/th>SmarterTools<\/th>SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability<\/th>2026-01-26<\/th>SmarterTools SmarterMail contains an unrestricted upload of file with dangerous type vulnerability that could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2026-02-16<\/th><\/tr>
CVE-2018-14634<\/th>Linux<\/th>Linux Kernel Integer Overflow Vulnerability<\/th>2026-01-26<\/th>Linux Kernel contains an integer overflow vulnerability in the create_elf_tables() function which could allow an unprivileged local user with access to SUID (or otherwise privileged) binary to escalate their privileges on the system.<\/th>Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th>2026-02-16<\/th><\/tr><\/tbody><\/table>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2026-01-28 06:29:56","cb_use_flag":"0","cb_admin_id":"kimbada310","cb_admin_name":"\uae40\ubc14\ub2e4","cb_readcount":"6"}],"number":1465,"pagination":"<\/a><\/span>1<\/a>2<\/a>3<\/a>4<\/strong>5<\/a>6<\/a>7<\/a>8<\/a>9<\/a>10<\/a><\/a><\/span>","total":1525,"html":"
  • 1480<\/p>

    WordPress \ud50c\ub7ec\uadf8\uc778 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/p>

    [\uad00\ub9ac\uc790]<\/p>

    2026-02-19 01:04:31<\/p><\/div><\/li>

  • 1479<\/p>

    Ivanti \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/p>

    [\uad00\ub9ac\uc790]<\/p>

    2026-02-19 01:04:17<\/p><\/div><\/li>

  • 1478<\/p>

    Apple \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/p>

    [\uad00\ub9ac\uc790]<\/p>

    2026-02-19 01:04:02<\/p><\/div><\/li>

  • 1477<\/p>

    \u7f8e CISA \ubc1c\ud45c \uc8fc\uc694 Exploit \uc815\ubcf4\uacf5\uc720(Update. 2026-02-12)<\/p>

    [\uad00\ub9ac\uc790]<\/p>

    2026-02-19 01:03:45<\/p><\/div><\/li>

  • 1476<\/p>

    Microsoft \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/p>

    [\uad00\ub9ac\uc790]<\/p>

    2026-02-13 05:08:08<\/p><\/div><\/li>

  • 1475<\/p>

    Fortinet \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/p>

    [\uad00\ub9ac\uc790]<\/p>

    2026-02-11 02:11:25<\/p><\/div><\/li>

  • 1474<\/p>

    \u7f8e CISA \ubc1c\ud45c \uc8fc\uc694 Exploit \uc815\ubcf4\uacf5\uc720(Update. 2026-02-05)<\/p>

    [\uad00\ub9ac\uc790]<\/p>

    2026-02-09 04:18:38<\/p><\/div><\/li>

  • 1473<\/p>

    Xiaomi \uc81c\ud488 \uc0ac\uc6a9 \uc8fc\uc758 \uad8c\uace0<\/p>

    [\uad00\ub9ac\uc790]<\/p>

    2026-02-06 01:36:36<\/p><\/div><\/li>

  • 1472<\/p>

    n8n \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/p>

    [\uad00\ub9ac\uc790]<\/p>

    2026-02-06 01:36:19<\/p><\/div><\/li>

  • 1471<\/p>

    \u7f8e CISA \ubc1c\ud45c \uc8fc\uc694 Exploit \uc815\ubcf4\uacf5\uc720(Update. 2026-02-03)<\/p>

    [\uad00\ub9ac\uc790]<\/p>

    2026-02-05 04:48:11<\/p><\/div><\/li>

  • 1470<\/p>

    Ivanti \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/p>

    [\uad00\ub9ac\uc790]<\/p>

    2026-02-03 01:45:33<\/p><\/div><\/li>

  • 1469<\/p>

    OpenSSL \ucde8\uc57d\uc810 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/p>

    [\uad00\ub9ac\uc790]<\/p>

    2026-02-03 01:45:12<\/p><\/div><\/li>

  • 1468<\/p>

    \u7f8e CISA \ubc1c\ud45c \uc8fc\uc694 Exploit \uc815\ubcf4\uacf5\uc720(Update. 2026-01-29)<\/p>

    [\uad00\ub9ac\uc790]<\/p>

    2026-02-03 01:44:51<\/p><\/div><\/li>

  • 1467<\/p>

    n8n \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/p>

    [\uad00\ub9ac\uc790]<\/p>

    2026-01-30 01:26:04<\/p><\/div><\/li>

  • 1466<\/p>

    \u7f8e CISA \ubc1c\ud45c \uc8fc\uc694 Exploit \uc815\ubcf4\uacf5\uc720(Update. 2026-01-26)<\/p>

    [\uad00\ub9ac\uc790]<\/p>

    2026-01-28 06:29:56<\/p><\/div><\/li>"}