|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2025.02.15", |
4 | | - "dateReleased": "2025-02-15T19:28:17.8832Z", |
5 | | - "count": 1271, |
| 3 | + "catalogVersion": "2025.02.18", |
| 4 | + "dateReleased": "2025-02-18T20:08:26.6543Z", |
| 5 | + "count": 1273, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2025-0108", |
| 9 | + "vendorProject": "Palo Alto", |
| 10 | + "product": "PAN-OS", |
| 11 | + "vulnerabilityName": "Palo Alto PAN-OS Authentication Bypass Vulnerability", |
| 12 | + "dateAdded": "2025-02-18", |
| 13 | + "shortDescription": "Palo Alto PAN-OS contains an authentication bypass vulnerability in its management web interface. This vulnerability allows an unauthenticated attacker with network access to the management web interface to bypass the authentication normally required and invoke certain PHP scripts.", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2025-03-11", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "https:\/\/security.paloaltonetworks.com\/CVE-2025-0108 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-0108", |
| 18 | + "cwes": [ |
| 19 | + "CWE-306" |
| 20 | + ] |
| 21 | + }, |
| 22 | + { |
| 23 | + "cveID": "CVE-2024-53704", |
| 24 | + "vendorProject": "SonicWall", |
| 25 | + "product": "SonicOS", |
| 26 | + "vulnerabilityName": "SonicWall SonicOS SSLVPN Improper Authentication Vulnerability", |
| 27 | + "dateAdded": "2025-02-18", |
| 28 | + "shortDescription": "SonicWall SonicOS contains an improper authentication vulnerability in the SSLVPN authentication mechanism that allows a remote attacker to bypass authentication.", |
| 29 | + "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", |
| 30 | + "dueDate": "2025-03-11", |
| 31 | + "knownRansomwareCampaignUse": "Unknown", |
| 32 | + "notes": "https:\/\/psirt.global.sonicwall.com\/vuln-detail\/SNWLID-2025-0003 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-53704", |
| 33 | + "cwes": [ |
| 34 | + "CWE-287" |
| 35 | + ] |
| 36 | + }, |
7 | 37 | { |
8 | 38 | "cveID": "CVE-2024-57727", |
9 | 39 | "vendorProject": "SimpleHelp ", |
|
217 | 247 | { |
218 | 248 | "cveID": "CVE-2018-19410", |
219 | 249 | "vendorProject": "Paessler", |
220 | | - "product": "PTRG Network Monitor", |
| 250 | + "product": "PRTG Network Monitor", |
221 | 251 | "vulnerabilityName": "Paessler PRTG Network Monitor Local File Inclusion Vulnerability", |
222 | 252 | "dateAdded": "2025-02-04", |
223 | 253 | "shortDescription": "Paessler PRTG Network Monitor contains a local file inclusion vulnerability that allows a remote, unauthenticated attacker to create users with read-write privileges (including administrator).", |
|
0 commit comments