|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2025.08.05", |
4 | | - "dateReleased": "2025-08-05T18:03:16.7522Z", |
5 | | - "count": 1394, |
| 3 | + "catalogVersion": "2025.08.12", |
| 4 | + "dateReleased": "2025-08-12T17:01:51.5879Z", |
| 5 | + "count": 1397, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2025-8088", |
| 9 | + "vendorProject": "RARLAB", |
| 10 | + "product": "WinRAR", |
| 11 | + "vulnerabilityName": "RARLAB WinRAR Path Traversal Vulnerability", |
| 12 | + "dateAdded": "2025-08-12", |
| 13 | + "shortDescription": "RARLAB WinRAR contains a path traversal vulnerability affecting the Windows version of WinRAR. This vulnerability could allow an attacker to execute arbitrary code by crafting malicious archive files.", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2025-09-02", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "https:\/\/www.win-rar.com\/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-8088", |
| 18 | + "cwes": [ |
| 19 | + "CWE-35" |
| 20 | + ] |
| 21 | + }, |
| 22 | + { |
| 23 | + "cveID": "CVE-2007-0671", |
| 24 | + "vendorProject": "Microsoft", |
| 25 | + "product": "Office", |
| 26 | + "vulnerabilityName": "Microsoft Office Excel Remote Code Execution Vulnerability", |
| 27 | + "dateAdded": "2025-08-12", |
| 28 | + "shortDescription": "Microsoft Office Excel contains a remote code execution vulnerability that can be exploited when a specially crafted Excel file is opened. This malicious file could be delivered as an email attachment or hosted on a malicious website. An attacker could leverage this vulnerability by creating a specially crafted Excel file, which, when opened, allowing an attacker to execute remote code on the affected system.", |
| 29 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 30 | + "dueDate": "2025-09-02", |
| 31 | + "knownRansomwareCampaignUse": "Unknown", |
| 32 | + "notes": "https:\/\/learn.microsoft.com\/en-us\/security-updates\/securitybulletins\/2007\/ms07-015 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2007-0671", |
| 33 | + "cwes": [] |
| 34 | + }, |
| 35 | + { |
| 36 | + "cveID": "CVE-2013-3893", |
| 37 | + "vendorProject": "Microsoft", |
| 38 | + "product": "Internet Explorer", |
| 39 | + "vulnerabilityName": "Microsoft Internet Explorer Resource Management Errors Vulnerability", |
| 40 | + "dateAdded": "2025-08-12", |
| 41 | + "shortDescription": "Microsoft Internet Explorer contains a memory corruption vulnerability that allows for remote code execution. The impacted products could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization.", |
| 42 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 43 | + "dueDate": "2025-09-02", |
| 44 | + "knownRansomwareCampaignUse": "Unknown", |
| 45 | + "notes": "https:\/\/learn.microsoft.com\/en-us\/security-updates\/securitybulletins\/2013\/ms13-080 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2013-3893", |
| 46 | + "cwes": [ |
| 47 | + "CWE-399" |
| 48 | + ] |
| 49 | + }, |
7 | 50 | { |
8 | 51 | "cveID": "CVE-2020-25078", |
9 | 52 | "vendorProject": "D-Link", |
|
0 commit comments