Skip to content

Commit 1993bf4

Browse files
Update KEV: Fri Feb 7 00:11:15 UTC 2025
Signed-off-by: AboutCode Automation <[email protected]>
1 parent 275ec0b commit 1993bf4

File tree

1 file changed

+78
-3
lines changed

1 file changed

+78
-3
lines changed

known_exploited_vulnerabilities.json

Lines changed: 78 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,84 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2025.02.05",
4-
"dateReleased": "2025-02-05T18:21:14.6764Z",
5-
"count": 1258,
3+
"catalogVersion": "2025.02.06",
4+
"dateReleased": "2025-02-06T16:38:38.9778Z",
5+
"count": 1263,
66
"vulnerabilities": [
7+
{
8+
"cveID": "CVE-2020-15069",
9+
"vendorProject": "Sophos",
10+
"product": "XG Firewall",
11+
"vulnerabilityName": "Sophos XG Firewall Buffer Overflow Vulnerability",
12+
"dateAdded": "2025-02-06",
13+
"shortDescription": "Sophos XG Firewall contains a buffer overflow vulnerability that allows for remote code execution via the \"HTTP\/S bookmark\" feature.",
14+
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
15+
"dueDate": "2025-02-27",
16+
"knownRansomwareCampaignUse": "Unknown",
17+
"notes": "https:\/\/community.sophos.com\/b\/security-blog\/posts\/advisory-buffer-overflow-vulnerability-in-user-portal ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-15069",
18+
"cwes": [
19+
"CWE-120"
20+
]
21+
},
22+
{
23+
"cveID": "CVE-2020-29574",
24+
"vendorProject": "Sophos",
25+
"product": "CyberoamOS",
26+
"vulnerabilityName": "CyberoamOS (CROS) SQL Injection Vulnerability",
27+
"dateAdded": "2025-02-06",
28+
"shortDescription": "CyberoamOS (CROS) contains a SQL injection vulnerability in the WebAdmin that allows an unauthenticated attacker to execute arbitrary SQL statements remotely.",
29+
"requiredAction": "The impacted product is end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue utilization of the product.",
30+
"dueDate": "2025-02-27",
31+
"knownRansomwareCampaignUse": "Unknown",
32+
"notes": "https:\/\/support.sophos.com\/support\/s\/article\/KBA-000007526 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-29574",
33+
"cwes": [
34+
"CWE-89"
35+
]
36+
},
37+
{
38+
"cveID": "CVE-2024-21413",
39+
"vendorProject": "Microsoft",
40+
"product": "Office Outlook",
41+
"vulnerabilityName": "Microsoft Outlook Improper Input Validation Vulnerability",
42+
"dateAdded": "2025-02-06",
43+
"shortDescription": "Microsoft Outlook contains an improper input validation vulnerability that allows for remote code execution. Successful exploitation of this vulnerability would allow an attacker to bypass the Office Protected View and open in editing mode rather than protected mode.",
44+
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
45+
"dueDate": "2025-02-27",
46+
"knownRansomwareCampaignUse": "Unknown",
47+
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21413 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21413",
48+
"cwes": [
49+
"CWE-20"
50+
]
51+
},
52+
{
53+
"cveID": "CVE-2022-23748",
54+
"vendorProject": "Audinate",
55+
"product": "Dante Discovery",
56+
"vulnerabilityName": "Dante Discovery Process Control Vulnerability",
57+
"dateAdded": "2025-02-06",
58+
"shortDescription": "Dante Discovery contains a process control vulnerability in mDNSResponder.exe that all allows for a DLL sideloading attack. A local attacker can leverage this vulnerability in the Dante Application Library to execute arbitrary code.",
59+
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
60+
"dueDate": "2025-02-27",
61+
"knownRansomwareCampaignUse": "Unknown",
62+
"notes": "https:\/\/www.getdante.com\/support\/faq\/audinate-response-to-dante-discovery-mdnsresponder-exe-security-issue-cve-2022-23748\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-23748",
63+
"cwes": [
64+
"CWE-114"
65+
]
66+
},
67+
{
68+
"cveID": "CVE-2025-0411",
69+
"vendorProject": "7-Zip",
70+
"product": "7-Zip",
71+
"vulnerabilityName": "7-Zip Mark of the Web Bypass Vulnerability",
72+
"dateAdded": "2025-02-06",
73+
"shortDescription": "7-Zip contains a protection mechanism failure vulnerability that allows remote attackers to bypass the Mark-of-the-Web security feature to execute arbitrary code in the context of the current user.",
74+
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
75+
"dueDate": "2025-02-27",
76+
"knownRansomwareCampaignUse": "Unknown",
77+
"notes": "https:\/\/www.7-zip.org\/history.txt ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-0411",
78+
"cwes": [
79+
"CWE-693"
80+
]
81+
},
782
{
883
"cveID": "CVE-2024-53104",
984
"vendorProject": "Linux",

0 commit comments

Comments
 (0)