|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2025.05.01", |
4 | | - "dateReleased": "2025-05-01T17:00:59.3117Z", |
5 | | - "count": 1329, |
| 3 | + "catalogVersion": "2025.05.02", |
| 4 | + "dateReleased": "2025-05-02T16:56:02.4999Z", |
| 5 | + "count": 1331, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2025-34028", |
| 9 | + "vendorProject": "Commvault", |
| 10 | + "product": "Command Center", |
| 11 | + "vulnerabilityName": "Commvault Command Center Path Traversal Vulnerability", |
| 12 | + "dateAdded": "2025-05-02", |
| 13 | + "shortDescription": "Commvault Command Center contains a path traversal vulnerability that allows a remote, unauthenticated attacker to execute arbitrary code.", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2025-05-23", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "https:\/\/documentation.commvault.com\/securityadvisories\/CV_2025_04_1.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-34028", |
| 18 | + "cwes": [ |
| 19 | + "CWE-22" |
| 20 | + ] |
| 21 | + }, |
| 22 | + { |
| 23 | + "cveID": "CVE-2024-58136", |
| 24 | + "vendorProject": "Yiiframework", |
| 25 | + "product": "Yii", |
| 26 | + "vulnerabilityName": "Yiiframework Yii Improper Protection of Alternate Path Vulnerability", |
| 27 | + "dateAdded": "2025-05-02", |
| 28 | + "shortDescription": "Yii Framework contains an improper protection of alternate path vulnerability that may allow a remote attacker to execute arbitrary code. This vulnerability could affect other products that implement Yii, including\u2014but not limited to\u2014Craft CMS, as represented by CVE-2025-32432.", |
| 29 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 30 | + "dueDate": "2025-05-23", |
| 31 | + "knownRansomwareCampaignUse": "Unknown", |
| 32 | + "notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https:\/\/www.yiiframework.com\/news\/709\/please-upgrade-to-yii-2-0-52 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-58136", |
| 33 | + "cwes": [ |
| 34 | + "CWE-424" |
| 35 | + ] |
| 36 | + }, |
7 | 37 | { |
8 | 38 | "cveID": "CVE-2024-38475", |
9 | 39 | "vendorProject": "Apache", |
|
226 | 256 | { |
227 | 257 | "cveID": "CVE-2025-22457", |
228 | 258 | "vendorProject": "Ivanti", |
229 | | - "product": "Connect Secure, Policy Secure and ZTA Gateways", |
230 | | - "vulnerabilityName": "Ivanti Connect Secure, Policy Secure and ZTA Gateways Stack-Based Buffer Overflow Vulnerability", |
| 259 | + "product": "Connect Secure, Policy Secure, and ZTA Gateways", |
| 260 | + "vulnerabilityName": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability", |
231 | 261 | "dateAdded": "2025-04-04", |
232 | | - "shortDescription": "Ivanti Connect Secure, Policy Secure and ZTA Gateways contains a stack-based buffer overflow vulnerability that allows a remote unauthenticated attacker to achieve remote code execution. ", |
| 262 | + "shortDescription": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways contains a stack-based buffer overflow vulnerability that allows a remote unauthenticated attacker to achieve remote code execution. ", |
233 | 263 | "requiredAction": "Apply mitigations as set forth in the CISA instructions linked below.", |
234 | 264 | "dueDate": "2025-04-11", |
235 | 265 | "knownRansomwareCampaignUse": "Unknown", |
236 | | - "notes": "CISA Mitigation Instructions: https:\/\/www.cisa.gov\/cisa-mitigation-instructions-cve-2025-22457 ; Additional References: https:\/\/forums.ivanti.com\/s\/article\/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457) ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-22457", |
| 266 | + "notes": "CISA Mitigation Instructions: https:\/\/www.cisa.gov\/cisa-mitigation-instructions-cve-2025-22457 ; Additional References: https:\/\/forums.ivanti.com\/s\/article\/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-22457", |
237 | 267 | "cwes": [ |
238 | 268 | "CWE-121" |
239 | 269 | ] |
|
0 commit comments