Skip to content

Commit 0fa5bfc

Browse files
Update KEV: Sat May 3 00:12:24 UTC 2025
Signed-off-by: AboutCode Automation <[email protected]>
1 parent 9bb88b9 commit 0fa5bfc

File tree

1 file changed

+37
-7
lines changed

1 file changed

+37
-7
lines changed

known_exploited_vulnerabilities.json

Lines changed: 37 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,39 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2025.05.01",
4-
"dateReleased": "2025-05-01T17:00:59.3117Z",
5-
"count": 1329,
3+
"catalogVersion": "2025.05.02",
4+
"dateReleased": "2025-05-02T16:56:02.4999Z",
5+
"count": 1331,
66
"vulnerabilities": [
7+
{
8+
"cveID": "CVE-2025-34028",
9+
"vendorProject": "Commvault",
10+
"product": "Command Center",
11+
"vulnerabilityName": "Commvault Command Center Path Traversal Vulnerability",
12+
"dateAdded": "2025-05-02",
13+
"shortDescription": "Commvault Command Center contains a path traversal vulnerability that allows a remote, unauthenticated attacker to execute arbitrary code.",
14+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15+
"dueDate": "2025-05-23",
16+
"knownRansomwareCampaignUse": "Unknown",
17+
"notes": "https:\/\/documentation.commvault.com\/securityadvisories\/CV_2025_04_1.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-34028",
18+
"cwes": [
19+
"CWE-22"
20+
]
21+
},
22+
{
23+
"cveID": "CVE-2024-58136",
24+
"vendorProject": "Yiiframework",
25+
"product": "Yii",
26+
"vulnerabilityName": "Yiiframework Yii Improper Protection of Alternate Path Vulnerability",
27+
"dateAdded": "2025-05-02",
28+
"shortDescription": "Yii Framework contains an improper protection of alternate path vulnerability that may allow a remote attacker to execute arbitrary code. This vulnerability could affect other products that implement Yii, including\u2014but not limited to\u2014Craft CMS, as represented by CVE-2025-32432.",
29+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
30+
"dueDate": "2025-05-23",
31+
"knownRansomwareCampaignUse": "Unknown",
32+
"notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https:\/\/www.yiiframework.com\/news\/709\/please-upgrade-to-yii-2-0-52 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-58136",
33+
"cwes": [
34+
"CWE-424"
35+
]
36+
},
737
{
838
"cveID": "CVE-2024-38475",
939
"vendorProject": "Apache",
@@ -226,14 +256,14 @@
226256
{
227257
"cveID": "CVE-2025-22457",
228258
"vendorProject": "Ivanti",
229-
"product": "Connect Secure, Policy Secure and ZTA Gateways",
230-
"vulnerabilityName": "Ivanti Connect Secure, Policy Secure and ZTA Gateways Stack-Based Buffer Overflow Vulnerability",
259+
"product": "Connect Secure, Policy Secure, and ZTA Gateways",
260+
"vulnerabilityName": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability",
231261
"dateAdded": "2025-04-04",
232-
"shortDescription": "Ivanti Connect Secure, Policy Secure and ZTA Gateways contains a stack-based buffer overflow vulnerability that allows a remote unauthenticated attacker to achieve remote code execution. ",
262+
"shortDescription": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways contains a stack-based buffer overflow vulnerability that allows a remote unauthenticated attacker to achieve remote code execution. ",
233263
"requiredAction": "Apply mitigations as set forth in the CISA instructions linked below.",
234264
"dueDate": "2025-04-11",
235265
"knownRansomwareCampaignUse": "Unknown",
236-
"notes": "CISA Mitigation Instructions: https:\/\/www.cisa.gov\/cisa-mitigation-instructions-cve-2025-22457 ; Additional References: https:\/\/forums.ivanti.com\/s\/article\/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457) ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-22457",
266+
"notes": "CISA Mitigation Instructions: https:\/\/www.cisa.gov\/cisa-mitigation-instructions-cve-2025-22457 ; Additional References: https:\/\/forums.ivanti.com\/s\/article\/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-22457",
237267
"cwes": [
238268
"CWE-121"
239269
]

0 commit comments

Comments
 (0)