|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2024.11.21", |
4 | | - "dateReleased": "2024-11-21T14:59:55.5769Z", |
5 | | - "count": 1222, |
| 3 | + "catalogVersion": "2024.11.27", |
| 4 | + "dateReleased": "2024-11-27T16:35:36.744Z", |
| 5 | + "count": 1223, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2023-28461", |
| 9 | + "vendorProject": "Array Networks ", |
| 10 | + "product": "AG\/vxAG ArrayOS", |
| 11 | + "vulnerabilityName": "Array Networks AG and vxAG ArrayOS Missing Authentication for Critical Function Vulnerability", |
| 12 | + "dateAdded": "2024-11-25", |
| 13 | + "shortDescription": "Array Networks AG and vxAG ArrayOS contain a missing authentication for critical function vulnerability that allows an attacker to read local files and execute code on the SSL VPN gateway.", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2024-12-16", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "https:\/\/support.arraynetworks.net\/prx\/001\/http\/supportportal.arraynetworks.net\/documentation\/FieldNotice\/Array_Networks_Security_Advisory_for_Remote_Code_Execution_Vulnerability_AG.pdf ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-28461", |
| 18 | + "cwes": [ |
| 19 | + "CWE-306" |
| 20 | + ] |
| 21 | + }, |
7 | 22 | { |
8 | 23 | "cveID": "CVE-2024-21287", |
9 | 24 | "vendorProject": "Oracle", |
|
0 commit comments