Skip to content

Commit 1881149

Browse files
Update KEV: Wed Feb 19 00:11:26 UTC 2025
Signed-off-by: AboutCode Automation <[email protected]>
1 parent 24af9eb commit 1881149

File tree

1 file changed

+34
-4
lines changed

1 file changed

+34
-4
lines changed

known_exploited_vulnerabilities.json

Lines changed: 34 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,39 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2025.02.15",
4-
"dateReleased": "2025-02-15T19:28:17.8832Z",
5-
"count": 1271,
3+
"catalogVersion": "2025.02.18",
4+
"dateReleased": "2025-02-18T20:08:26.6543Z",
5+
"count": 1273,
66
"vulnerabilities": [
7+
{
8+
"cveID": "CVE-2025-0108",
9+
"vendorProject": "Palo Alto",
10+
"product": "PAN-OS",
11+
"vulnerabilityName": "Palo Alto PAN-OS Authentication Bypass Vulnerability",
12+
"dateAdded": "2025-02-18",
13+
"shortDescription": "Palo Alto PAN-OS contains an authentication bypass vulnerability in its management web interface. This vulnerability allows an unauthenticated attacker with network access to the management web interface to bypass the authentication normally required and invoke certain PHP scripts.",
14+
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
15+
"dueDate": "2025-03-11",
16+
"knownRansomwareCampaignUse": "Unknown",
17+
"notes": "https:\/\/security.paloaltonetworks.com\/CVE-2025-0108 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-0108",
18+
"cwes": [
19+
"CWE-306"
20+
]
21+
},
22+
{
23+
"cveID": "CVE-2024-53704",
24+
"vendorProject": "SonicWall",
25+
"product": "SonicOS",
26+
"vulnerabilityName": "SonicWall SonicOS SSLVPN Improper Authentication Vulnerability",
27+
"dateAdded": "2025-02-18",
28+
"shortDescription": "SonicWall SonicOS contains an improper authentication vulnerability in the SSLVPN authentication mechanism that allows a remote attacker to bypass authentication.",
29+
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
30+
"dueDate": "2025-03-11",
31+
"knownRansomwareCampaignUse": "Unknown",
32+
"notes": "https:\/\/psirt.global.sonicwall.com\/vuln-detail\/SNWLID-2025-0003 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-53704",
33+
"cwes": [
34+
"CWE-287"
35+
]
36+
},
737
{
838
"cveID": "CVE-2024-57727",
939
"vendorProject": "SimpleHelp ",
@@ -217,7 +247,7 @@
217247
{
218248
"cveID": "CVE-2018-19410",
219249
"vendorProject": "Paessler",
220-
"product": "PTRG Network Monitor",
250+
"product": "PRTG Network Monitor",
221251
"vulnerabilityName": "Paessler PRTG Network Monitor Local File Inclusion Vulnerability",
222252
"dateAdded": "2025-02-04",
223253
"shortDescription": "Paessler PRTG Network Monitor contains a local file inclusion vulnerability that allows a remote, unauthenticated attacker to create users with read-write privileges (including administrator).",

0 commit comments

Comments
 (0)