Skip to content

Commit 00dcd57

Browse files
Update KEV: Thu Nov 28 00:12:17 UTC 2024
Signed-off-by: AboutCode Automation <[email protected]>
1 parent 4de838e commit 00dcd57

File tree

1 file changed

+18
-3
lines changed

1 file changed

+18
-3
lines changed

known_exploited_vulnerabilities.json

Lines changed: 18 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,24 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2024.11.21",
4-
"dateReleased": "2024-11-21T14:59:55.5769Z",
5-
"count": 1222,
3+
"catalogVersion": "2024.11.27",
4+
"dateReleased": "2024-11-27T16:35:36.744Z",
5+
"count": 1223,
66
"vulnerabilities": [
7+
{
8+
"cveID": "CVE-2023-28461",
9+
"vendorProject": "Array Networks ",
10+
"product": "AG\/vxAG ArrayOS",
11+
"vulnerabilityName": "Array Networks AG and vxAG ArrayOS Missing Authentication for Critical Function Vulnerability",
12+
"dateAdded": "2024-11-25",
13+
"shortDescription": "Array Networks AG and vxAG ArrayOS contain a missing authentication for critical function vulnerability that allows an attacker to read local files and execute code on the SSL VPN gateway.",
14+
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
15+
"dueDate": "2024-12-16",
16+
"knownRansomwareCampaignUse": "Unknown",
17+
"notes": "https:\/\/support.arraynetworks.net\/prx\/001\/http\/supportportal.arraynetworks.net\/documentation\/FieldNotice\/Array_Networks_Security_Advisory_for_Remote_Code_Execution_Vulnerability_AG.pdf ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-28461",
18+
"cwes": [
19+
"CWE-306"
20+
]
21+
},
722
{
823
"cveID": "CVE-2024-21287",
924
"vendorProject": "Oracle",

0 commit comments

Comments
 (0)