|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2025.01.03", |
4 | | - "dateReleased": "2025-01-03T20:16:50.6689Z", |
5 | | - "count": 1239, |
| 3 | + "catalogVersion": "2025.01.07", |
| 4 | + "dateReleased": "2025-01-07T15:00:38.3276Z", |
| 5 | + "count": 1242, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2020-2883", |
| 9 | + "vendorProject": "Oracle", |
| 10 | + "product": "WebLogic Server", |
| 11 | + "vulnerabilityName": "Oracle WebLogic Server Unspecified Vulnerability", |
| 12 | + "dateAdded": "2025-01-07", |
| 13 | + "shortDescription": "Oracle WebLogic Server, a product within the Fusion Middleware suite, contains an unspecified vulnerability exploitable by an unauthenticated attacker with network access via IIOP or T3.", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2025-01-28", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "https:\/\/www.oracle.com\/security-alerts\/cpuapr2020.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-2883", |
| 18 | + "cwes": [] |
| 19 | + }, |
| 20 | + { |
| 21 | + "cveID": "CVE-2024-55550", |
| 22 | + "vendorProject": "Mitel", |
| 23 | + "product": "MiCollab", |
| 24 | + "vulnerabilityName": "Mitel MiCollab Path Traversal Vulnerability", |
| 25 | + "dateAdded": "2025-01-07", |
| 26 | + "shortDescription": "Mitel MiCollab contains a path traversal vulnerability that could allow an authenticated attacker with administrative privileges to read local files within the system due to insufficient input sanitization. This vulnerability can be chained with CVE-2024-41713, which allows an unauthenticated, remote attacker to read arbitrary files on the server.", |
| 27 | + "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", |
| 28 | + "dueDate": "2025-01-28", |
| 29 | + "knownRansomwareCampaignUse": "Unknown", |
| 30 | + "notes": "https:\/\/www.mitel.com\/support\/security-advisories\/mitel-product-security-advisory-misa-2024-0029 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-55550", |
| 31 | + "cwes": [ |
| 32 | + "CWE-22" |
| 33 | + ] |
| 34 | + }, |
| 35 | + { |
| 36 | + "cveID": "CVE-2024-41713", |
| 37 | + "vendorProject": "Mitel", |
| 38 | + "product": "MiCollab", |
| 39 | + "vulnerabilityName": "Mitel MiCollab Path Traversal Vulnerability", |
| 40 | + "dateAdded": "2025-01-07", |
| 41 | + "shortDescription": "Mitel MiCollab contains a path traversal vulnerability that could allow an attacker to gain unauthorized and unauthenticated access. This vulnerability can be chained with CVE-2024-55550, which allows an unauthenticated, remote attacker to read arbitrary files on the server.", |
| 42 | + "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", |
| 43 | + "dueDate": "2025-01-28", |
| 44 | + "knownRansomwareCampaignUse": "Unknown", |
| 45 | + "notes": "https:\/\/www.mitel.com\/support\/security-advisories\/mitel-product-security-advisory-misa-2024-0029 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-41713 ", |
| 46 | + "cwes": [ |
| 47 | + "CWE-22" |
| 48 | + ] |
| 49 | + }, |
7 | 50 | { |
8 | 51 | "cveID": "CVE-2024-3393", |
9 | 52 | "vendorProject": "Palo Alto Networks", |
|
0 commit comments