\ucde8\uc57d\uc810<\/span><\/p><\/td> | \uc81c\ud488\uba85<\/span><\/p><\/td> | \uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td> | \ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>CVE-2026-1357<\/span><\/p><\/td> | WPvivid Backup & Migration<\/span><\/p><\/td> | 0.9.123 <\/span>\uc774\ud558<\/span><\/p><\/td> | 0.9.124<\/span><\/p><\/td><\/tr><\/tbody><\/table><\/span> \u203b <\/span>\ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 <\/span>[1]<\/span><\/p> \u25a1 <\/span>\ucc38\uace0\uc0ac\uc774\ud2b8<\/span> [1] https:\/\/www.wordfence.com\/threat-intel\/vulnerabilities\/wordpress-plugins\/wpvivid-backuprestore\/migration-backup-staging-09123-unauthenticated-arbitrary-file-upload<\/span><\/p> [2] https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-1357<\/span><\/p> <\/span><\/p>\u25a1 \ubb38\uc758\uc0ac\ud56d<\/span> <\/span>o \ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0 \uc0ac\uc774\ubc84\ubbfc\uc6d0\uc13c\ud130: \uad6d\ubc88\uc5c6\uc774 118<\/span> <\/span> \u25a1 \uc791\uc131: <\/span>\uc704\ud611\ub300\uc751\ub2e8 <\/span>AI<\/span>\ucde8\uc57d\uc810\ub300\uc751\ud300<\/span><\/p><\/td><\/tr><\/tbody><\/table>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2026-02-19 01:04:31","cb_use_flag":"0","cb_admin_id":"kkubear96","cb_admin_name":"\uad6c\uacbd\ubc94","cb_readcount":"5"},{"cb_seq":"4273","cb_code":"2","cb_notice":"0","cb_title":"Ivanti \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"<\/colgroup><\/tr><\/thead> \u25a1 \uac1c\uc694<\/span> o <\/span>Ivanti<\/span>\u793e<\/span>\ub294 \uc790\uc0ac \uc81c\ud488\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c <\/span>[1]<\/span><\/p> o <\/span>\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span><\/p><\/span> \u25a1 \uc124\uba85<\/span> o <\/span>Ivanti Endpoint Manager(EPM)<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 <\/span>SQL Injection <\/span>\ucde8\uc57d\uc810<\/span>(CVE-2026-1602) [1][2]<\/span><\/p><\/span> o <\/span>Ivanti Endpoint Manager(EPM)<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc778\uc99d \uc6b0\ud68c \ucde8\uc57d\uc810<\/span>(CVE-2026-1603) [1][3]<\/span><\/p><\/span> \u25a1 \uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548<\/span><\/p>\ucde8\uc57d\uc810<\/span><\/p><\/td> | \uc81c\ud488\uba85<\/span><\/p><\/td> | \uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td> | \ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>CVE-2026-1602<\/span><\/p><\/td> | Ivanti Endpoint Manager<\/span><\/p><\/td> | 2024 SU4 SR1 <\/span>\uc774\ud558<\/span><\/p><\/td> | 2024 SU5<\/span><\/p><\/td><\/tr>CVE-2026-1603<\/span><\/p><\/td><\/tr><\/tbody><\/table><\/span> \u203b <\/span>\ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 <\/span>[1]<\/span><\/p> \u25a1 <\/span>\ucc38\uace0\uc0ac\uc774\ud2b8<\/span> [1] https:\/\/hub.ivanti.com\/s\/article\/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US<\/span><\/p> [2] https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-1602<\/span><\/p> [3] https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-1603<\/span><\/p> <\/span><\/p>\u25a1 \ubb38\uc758\uc0ac\ud56d<\/span> <\/span>o \ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0 \uc0ac\uc774\ubc84\ubbfc\uc6d0\uc13c\ud130: \uad6d\ubc88\uc5c6\uc774 118<\/span> <\/span> \u25a1 \uc791\uc131: <\/span>\uc704\ud611\ub300\uc751\ub2e8 <\/span>AI<\/span>\ucde8\uc57d\uc810\ub300\uc751\ud300<\/span><\/p><\/td><\/tr><\/tbody><\/table>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2026-02-19 01:04:17","cb_use_flag":"0","cb_admin_id":"kkubear96","cb_admin_name":"\uad6c\uacbd\ubc94","cb_readcount":"0"},{"cb_seq":"4272","cb_code":"2","cb_notice":"0","cb_title":"Apple \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":"\u25a1 \uac1c\uc694<\/span> o <\/span>Apple<\/span>\u793e<\/span>\ub294 \uc790\uc0ac \uc81c\ud488\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c <\/span>[1][2][3][4][5]<\/span><\/p><\/span> o <\/span>\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span><\/p><\/span> \u25a1 \uc124\uba85<\/span> o <\/span>iOS, iPadOS, macOS Tahoe, visionOS, tvOS, watchOS<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc784\uc758 \ucf54\ub4dc \uc2e4\ud589 \ucde8\uc57d\uc810<\/span>(CVE-2026-20700) [1][2][3][4][5][6]<\/span><\/p><\/span> \u25a1 \uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548<\/span><\/p>\ucde8\uc57d\uc810<\/span><\/p><\/td> | \uc81c\ud488\uba85<\/span><\/p><\/td> | \uc601\ud5a5\ubc1b\ub294 \ubc84\uc804<\/span><\/p><\/td> | \ud574\uacb0 \ubc84\uc804<\/span><\/p><\/td><\/tr>CVE-2026-20700<\/span><\/p><\/td> | iOS<\/span><\/p><\/td> | 26.3 <\/span>\ubbf8\ub9cc<\/span><\/p><\/td> | 26.3 <\/span>\uc774\uc0c1<\/span><\/p><\/td><\/tr>iPadOS<\/span><\/p><\/td><\/tr>macOS Tahoe<\/span><\/p><\/td><\/tr>visionOS<\/span><\/p><\/td><\/tr>tvOS<\/span><\/p><\/td><\/tr>watchOS<\/span><\/p><\/td><\/tr><\/tbody><\/table><\/span> \u203b <\/span>\ud558\ub2e8\uc758 \ucc38\uace0\uc0ac\uc774\ud2b8\ub97c \ud655\uc778\ud558\uc5ec \uc5c5\ub370\uc774\ud2b8 \uc218\ud589 <\/span>[1][2][3][4][5]<\/span><\/p> \u25a1 <\/span>\ucc38\uace0\uc0ac\uc774\ud2b8<\/span> <\/span><\/p> [1] https:\/\/support.apple.com\/en-us\/126346<\/span><\/p> [2] https:\/\/support.apple.com\/en-us\/126348<\/span><\/p> [3] https:\/\/support.apple.com\/en-us\/126351<\/span><\/p> [4] https:\/\/support.apple.com\/en-us\/126352<\/span><\/p> [5] https:\/\/support.apple.com\/en-us\/126353<\/span><\/p> [6] https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-20700<\/span><\/p> <\/span><\/p>\u25a1 \ubb38\uc758\uc0ac\ud56d<\/span> <\/span>o \ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0 \uc0ac\uc774\ubc84\ubbfc\uc6d0\uc13c\ud130: \uad6d\ubc88\uc5c6\uc774 118<\/span> <\/span> \u25a1 \uc791\uc131: <\/span>\uc704\ud611\ub300\uc751\ub2e8 <\/span>AI<\/span>\ucde8\uc57d\uc810\ub300\uc751\ud300<\/span><\/p>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2026-02-19 01:04:02","cb_use_flag":"0","cb_admin_id":"kkubear96","cb_admin_name":"\uad6c\uacbd\ubc94","cb_readcount":"0"},{"cb_seq":"4271","cb_code":"2","cb_notice":"0","cb_title":"\u7f8e CISA \ubc1c\ud45c \uc8fc\uc694 Exploit \uc815\ubcf4\uacf5\uc720(Update. 2026-02-12)","cb_contents":"\ud604\uc7ac \uc790\uc8fc \uc545\uc6a9\ub418\uace0 \uc788\ub294 \ucde8\uc57d\uc810 \ubaa9\ub85d\uc73c\ub85c, \ucde8\uc57d\ud55c \ubc84\uc804\uc758 SW\ub97c \uc0ac\uc6a9 \uc911\uc778 \uacbd\uc6b0 \uae34\uae09 \ud328\uce58\ub97c \uad8c\uace0 \ub4dc\ub9bd\ub2c8\ub2e4.<\/span> * \ucc38\uc870 \ub9c1\ud06c : <\/span>https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog<\/a>
<\/p>| cveID<\/th> | vendorProject<\/th> | vulnerabilityName<\/th> | dateAdded<\/th> | shortDescription<\/th> | requiredAction<\/th> | dueDate<\/th><\/tr> |
|---|
| CVE-2025-40536<\/th> | SolarWinds<\/th> | SolarWinds Web Help Desk Security Control Bypass Vulnerability<\/th> | 2026-02-12<\/th> | SolarWinds Web Help Desk contains a security control bypass vulnerability that could allow an unauthenticated attacker to gain access to certain restricted functionality.<\/th> | Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th> | 2026-02-15<\/th><\/tr> |
|---|
| CVE-2025-15556<\/th> | Notepad++<\/th> | Notepad++ Download of Code Without Integrity Check Vulnerability<\/th> | 2026-02-12<\/th> | Notepad++ when using the WinGUp updater, contains a download of code without integrity check vulnerability that could allow an attacker to intercept or redirect update traffic to download and execute an attacker-controlled installer. This could lead to arbitrary code execution with the privileges of the user.<\/th> | Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th> | 2026-03-05<\/th><\/tr> |
|---|
| CVE-2024-43468<\/th> | Microsoft<\/th> | Microsoft Configuration Manager SQL Injection Vulnerability<\/th> | 2026-02-12<\/th> | Microsoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and\/or underlying database.<\/th> | Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th> | 2026-03-05<\/th><\/tr> |
|---|
| CVE-2026-20700<\/th> | Apple<\/th> | Apple Multiple Buffer Overflow Vulnerability<\/th> | 2026-02-12<\/th> | Apple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker with memory write the capability to execute arbitrary code.<\/th> | Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.<\/th> | 2026-03-05<\/th><\/tr><\/tbody><\/table>","cb_filename":"","cb_filepath":"","cb_file_seq":null,"cb_regdate":"2026-02-19 01:03:45","cb_use_flag":"0","cb_admin_id":"kkubear96","cb_admin_name":"\uad6c\uacbd\ubc94","cb_readcount":"0"},{"cb_seq":"4269","cb_code":"2","cb_notice":"0","cb_title":"Microsoft \uc81c\ud488 \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0","cb_contents":" \u25a1 \uac1c\uc694<\/span> o <\/span>Microsoft<\/span>\u793e<\/span>\ub294 <\/span>Windows Notepad<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ucde8\uc57d\uc810\uc744 \ud574\uacb0\ud55c \ubcf4\uc548 \uc5c5\ub370\uc774\ud2b8 \ubc1c\ud45c <\/span>[1]<\/span><\/p> o <\/span>\uc601\ud5a5\ubc1b\ub294 \ubc84\uc804\uc744 \uc0ac\uc6a9 \uc911\uc778 \uc0ac\uc6a9\uc790\ub294 \ud574\uacb0 \ubc29\uc548\uc5d0 \ub530\ub77c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8 \uad8c\uace0<\/span><\/p><\/span> \u25a1 \uc124\uba85<\/span> o <\/span>Windows Notepad<\/span>\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \uc6d0\uaca9 \ucf54\ub4dc \uc2e4\ud589 \ucde8\uc57d\uc810<\/span>(CVE-2026-20841) [1][2]<\/span><\/p><\/span> \u25a1 \uc601\ud5a5\ubc1b\ub294 \uc81c\ud488 \ubc0f \ud574\uacb0 \ubc29\uc548<\/span><\/p> <\/span><\/p> <\/span><\/p>
|
|---|
| | | | | | |
| | |
|
| |