[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-29180":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-22T16:08:08.064Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":229,"aliases":230,"duplicate_of":9,"upstream":233,"downstream":234,"duplicates":237,"related":238,"reserved_at":9,"published_at":240,"modified_at":241,"state":242,"summary":243,"references_raw":252,"kevs":276,"epss":277,"epss_history":280,"metrics":448,"affected":464},"CVE-2026-29180","Fleet is open source device management software. Prior to 4.81.1, a broken access control vulnerability in Fleet's host transfer API allows a team maintainer to transfer hosts from any team into their own team, bypassing team isolation boundaries. Once transferred, the attacker gains full control over the stolen hosts, including the ability to execute scripts with root privileges. Version 4.81.1 patches the issue.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-862","Missing Authorization","The product does not perform an authorization check when an actor attempts to access a resource or perform an action.","weakness","Incomplete","Class","High",[20],{"id":21,"name":22,"techniques":23},"CAPEC-665","Exploitation of Thunderbolt Protection Flaws",[24,61,101],{"id":25,"name":26,"tactics":27,"countermeasures":34},"T1211","Exploitation for Stealth",[28,31],{"id":29,"name":30},"TA0030","Defense Evasion",{"id":32,"name":33},"TA0005","Stealth",[35,40,44,48,53,57],{"id":36,"name":37,"tactic":38},"D3-MBT","Memory Boundary Tracking",{"name":39},"Detect",{"id":41,"name":42,"tactic":43},"D3-PCSV","Process Code Segment Verification",{"name":39},{"id":45,"name":46,"tactic":47},"D3-SSC","Shadow Stack Comparisons",{"name":39},{"id":49,"name":50,"tactic":51},"D3-PSEP","Process Segment Execution Prevention",{"name":52},"Harden",{"id":54,"name":55,"tactic":56},"D3-SAOR","Segment Address Offset Randomization",{"name":52},{"id":58,"name":59,"tactic":60},"D3-SFCV","Stack Frame Canary Validation",{"name":52},{"id":62,"name":63,"tactics":64,"countermeasures":70},"T1542.002","Component Firmware",[65,66,67],{"id":29,"name":30},{"id":32,"name":33},{"id":68,"name":69},"TA0110","Persistence",[71,76,80,84,88,92,96],{"id":72,"name":73,"tactic":74},"D3-SWI","Software Inventory",{"name":75},"Model",{"id":77,"name":78,"tactic":79},"D3-AVE","Asset Vulnerability Enumeration",{"name":75},{"id":81,"name":82,"tactic":83},"D3-FEMC","Firmware Embedded Monitoring Code",{"name":39},{"id":85,"name":86,"tactic":87},"D3-FV","Firmware Verification",{"name":39},{"id":89,"name":90,"tactic":91},"D3-FBA","Firmware Behavior Analysis",{"name":39},{"id":93,"name":94,"tactic":95},"D3-SU","Software Update",{"name":52},{"id":97,"name":98,"tactic":99},"D3-RS","Restore Software",{"name":100},"Restore",{"id":102,"name":103,"tactics":104,"countermeasures":113},"T1556","Modify Authentication Process",[105,106,109,110],{"id":29,"name":30},{"id":107,"name":108},"TA0112","Defense Impairment",{"id":68,"name":69},{"id":111,"name":112},"TA0031","Credential Access",[114,118,122,126,130,134,138,142,146,150,155,159,163,167,171,176,180,184,188,193,197,201,205,209,213,217,221,225],{"id":115,"name":116,"tactic":117},"D3-CI","Configuration Inventory",{"name":75},{"id":119,"name":120,"tactic":121},"D3-NTPM","Network Traffic Policy Mapping",{"name":75},{"id":123,"name":124,"tactic":125},"D3-AM","Access Modeling",{"name":75},{"id":127,"name":128,"tactic":129},"D3-FA","File Analysis",{"name":39},{"id":131,"name":132,"tactic":133},"D3-FIM","File Integrity Monitoring",{"name":39},{"id":135,"name":136,"tactic":137},"D3-PLA","Process Lineage Analysis",{"name":39},{"id":139,"name":140,"tactic":141},"D3-PSMD","Process Self-Modification Detection",{"name":39},{"id":143,"name":144,"tactic":145},"D3-PSA","Process Spawn Analysis",{"name":39},{"id":147,"name":148,"tactic":149},"D3-SFA","System File Analysis",{"name":39},{"id":151,"name":152,"tactic":153},"D3-FEV","File Eviction",{"name":154},"Evict",{"id":156,"name":157,"tactic":158},"D3-PT","Process Termination",{"name":154},{"id":160,"name":161,"tactic":162},"D3-PS","Process Suspension",{"name":154},{"id":164,"name":165,"tactic":166},"D3-HR","Host Reboot",{"name":154},{"id":168,"name":169,"tactic":170},"D3-HS","Host Shutdown",{"name":154},{"id":172,"name":173,"tactic":174},"D3-DF","Decoy File",{"name":175},"Deceive",{"id":177,"name":178,"tactic":179},"D3-FE","File Encryption",{"name":52},{"id":181,"name":182,"tactic":183},"D3-RF","Restore File",{"name":100},{"id":185,"name":186,"tactic":187},"D3-RC","Restore Configuration",{"name":100},{"id":189,"name":190,"tactic":191},"D3-CF","Content Filtering",{"name":192},"Isolate",{"id":194,"name":195,"tactic":196},"D3-LFP","Local File Permissions",{"name":192},{"id":198,"name":199,"tactic":200},"D3-RFAM","Remote File Access Mediation",{"name":192},{"id":202,"name":203,"tactic":204},"D3-CQ","Content Quarantine",{"name":192},{"id":206,"name":207,"tactic":208},"D3-CM","Content Modification",{"name":192},{"id":210,"name":211,"tactic":212},"D3-KBPI","Kernel-based Process Isolation",{"name":192},{"id":214,"name":215,"tactic":216},"D3-SCF","System Call Filtering",{"name":192},{"id":218,"name":219,"tactic":220},"D3-HBPI","Hardware-based Process Isolation",{"name":192},{"id":222,"name":223,"tactic":224},"D3-ABPI","Application-based Process Isolation",{"name":192},{"id":226,"name":227,"tactic":228},"D3-WSAM","Web Session Access Mediation",{"name":192},[],[231,232],"GHSA-m2h6-4xpq-qw3m","GO-2026-4892",[],[235],{"_key":236},"SUSE-SU-2026:1205-1",[],[239],{"_key":236},"2026-03-27T18:27:15.576Z","2026-03-31T18:54:40.828Z","Analyzed",{"cisa_kev":244,"cisa_ransomware":244,"cisa_vendor":9,"epss_severity":245,"epss_score":246,"severity":247,"severity_score":248,"severity_version":249,"severity_source":250,"severity_vector":251,"severity_status":242},false,"low",0.00019,"high",8.8,"v3.1","nvd","CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",[253,263,268,272],{"url":254,"sources":255,"tags":258},"https://github.com/fleetdm/fleet/security/advisories/GHSA-m2h6-4xpq-qw3m",[256,250,257],"cve.org","osv_go",[259,260,261,262],"X Refsource CONFIRM","WEB","Vendor Advisory","Advisory",{"url":264,"sources":265,"tags":266},"https://github.com/fleetdm/fleet",[257],[267],"PACKAGE",{"url":269,"sources":270,"tags":271},"https://github.com/fleetdm/fleet/releases/tag/fleet-v4.81.1",[257],[260],{"url":273,"sources":274,"tags":275},"https://nvd.nist.gov/vuln/detail/CVE-2026-29180",[257],[262],[],{"date":278,"score":246,"percentile":279},"2026-05-22",0.05635,[281,285,288,291,294,298,302,305,308,311,314,317,320,323,326,329,332,335,338,341,344,347,349,352,355,358,361,364,367,370,373,376,380,383,386,389,392,394,397,400,403,406,409,412,415,418,421,424,427,430,433,436,439,442,445,447],{"date":282,"score":283,"percentile":284},"2026-03-28",0.00038,0.1163,{"date":286,"score":283,"percentile":287},"2026-03-29",0.11596,{"date":289,"score":283,"percentile":290},"2026-03-30",0.11568,{"date":292,"score":283,"percentile":293},"2026-03-31",0.11523,{"date":295,"score":296,"percentile":297},"2026-04-01",0.00041,0.12506,{"date":299,"score":300,"percentile":301},"2026-04-02",0.00046,0.14268,{"date":303,"score":300,"percentile":304},"2026-04-03",0.14298,{"date":306,"score":300,"percentile":307},"2026-04-04",0.14331,{"date":309,"score":300,"percentile":310},"2026-04-05",0.14311,{"date":312,"score":300,"percentile":313},"2026-04-06",0.14155,{"date":315,"score":300,"percentile":316},"2026-04-07",0.14139,{"date":318,"score":300,"percentile":319},"2026-04-08",0.14221,{"date":321,"score":300,"percentile":322},"2026-04-09",0.14274,{"date":324,"score":300,"percentile":325},"2026-04-10",0.14263,{"date":327,"score":300,"percentile":328},"2026-04-11",0.14222,{"date":330,"score":300,"percentile":331},"2026-04-12",0.14182,{"date":333,"score":300,"percentile":334},"2026-04-13",0.14125,{"date":336,"score":300,"percentile":337},"2026-04-14",0.13994,{"date":339,"score":300,"percentile":340},"2026-04-15",0.14024,{"date":342,"score":300,"percentile":343},"2026-04-16",0.14015,{"date":345,"score":300,"percentile":346},"2026-04-17",0.14014,{"date":348,"score":300,"percentile":346},"2026-04-18",{"date":350,"score":300,"percentile":351},"2026-04-19",0.1397,{"date":353,"score":300,"percentile":354},"2026-04-20",0.13948,{"date":356,"score":300,"percentile":357},"2026-04-21",0.14092,{"date":359,"score":300,"percentile":360},"2026-04-22",0.14151,{"date":362,"score":300,"percentile":363},"2026-04-23",0.14166,{"date":365,"score":300,"percentile":366},"2026-04-24",0.14132,{"date":368,"score":300,"percentile":369},"2026-04-25",0.14123,{"date":371,"score":300,"percentile":372},"2026-04-26",0.14108,{"date":374,"score":300,"percentile":375},"2026-04-27",0.14088,{"date":377,"score":378,"percentile":379},"2026-04-28",0.00053,0.1645,{"date":381,"score":378,"percentile":382},"2026-04-29",0.16452,{"date":384,"score":378,"percentile":385},"2026-04-30",0.16422,{"date":387,"score":378,"percentile":388},"2026-05-01",0.16405,{"date":390,"score":378,"percentile":391},"2026-05-02",0.16436,{"date":393,"score":378,"percentile":388},"2026-05-03",{"date":395,"score":378,"percentile":396},"2026-05-04",0.16339,{"date":398,"score":378,"percentile":399},"2026-05-05",0.16321,{"date":401,"score":378,"percentile":402},"2026-05-06",0.16316,{"date":404,"score":378,"percentile":405},"2026-05-07",0.16439,{"date":407,"score":378,"percentile":408},"2026-05-08",0.16475,{"date":410,"score":378,"percentile":411},"2026-05-09",0.16546,{"date":413,"score":378,"percentile":414},"2026-05-10",0.16531,{"date":416,"score":378,"percentile":417},"2026-05-11",0.16511,{"date":419,"score":378,"percentile":420},"2026-05-12",0.16544,{"date":422,"score":378,"percentile":423},"2026-05-13",0.1657,{"date":425,"score":378,"percentile":426},"2026-05-14",0.16615,{"date":428,"score":378,"percentile":429},"2026-05-15",0.16614,{"date":431,"score":378,"percentile":432},"2026-05-16",0.16626,{"date":434,"score":378,"percentile":435},"2026-05-17",0.16604,{"date":437,"score":378,"percentile":438},"2026-05-18",0.16556,{"date":440,"score":378,"percentile":441},"2026-05-19",0.16534,{"date":443,"score":378,"percentile":444},"2026-05-20",0.16545,{"date":446,"score":378,"percentile":441},"2026-05-21",{"date":278,"score":246,"percentile":279},[449,454,461],{"source":256,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":9,"cvss_v4_0":450},{"baseScore":451,"baseSeverity":452,"vectorString":453,"impactScore":9,"exploitabilityScore":9},4.9,"MEDIUM","CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U",{"source":250,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":455,"cvss_v4_0":459},{"baseScore":248,"baseSeverity":456,"vectorString":251,"impactScore":457,"exploitabilityScore":458},"HIGH",9.8,7.2,{"baseScore":451,"baseSeverity":452,"vectorString":460,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",{"source":257,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":9,"cvss_v4_0":462},{"baseScore":463,"baseSeverity":9,"vectorString":453,"impactScore":9,"exploitabilityScore":9},7.1,[465,476],{"ecosystem":9,"name":466,"vendor":467,"product":466,"cpe_part":468,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":469},"fleet","fleetdm","a",[470],{"version":471,"is_range":472,"range_type":473,"version_start":9,"version_start_type":9,"version_end":474,"version_end_type":475,"fixed_in":9},"\u003C 4.81.1",true,"cpe","4.81.1","excluding",{"ecosystem":477,"name":478,"vendor":479,"product":480,"cpe_part":9,"purl_type":481,"purl_namespace":479,"purl_name":480,"source":9,"versions":482},"Go","github.com/fleetdm/fleet/v4","github.com/fleetdm/fleet","v4","golang",[483],{"version":484,"is_range":472,"range_type":485,"version_start":9,"version_start_type":9,"version_end":474,"version_end_type":475,"fixed_in":9},"lt4_81_1","semver"]