Skip to content

Commit 2dc48c0

Browse files
Update KEV: Wed Jan 8 00:11:30 UTC 2025
Signed-off-by: AboutCode Automation <[email protected]>
1 parent 7b4d5db commit 2dc48c0

File tree

1 file changed

+46
-3
lines changed

1 file changed

+46
-3
lines changed

known_exploited_vulnerabilities.json

Lines changed: 46 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,52 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2025.01.03",
4-
"dateReleased": "2025-01-03T20:16:50.6689Z",
5-
"count": 1239,
3+
"catalogVersion": "2025.01.07",
4+
"dateReleased": "2025-01-07T15:00:38.3276Z",
5+
"count": 1242,
66
"vulnerabilities": [
7+
{
8+
"cveID": "CVE-2020-2883",
9+
"vendorProject": "Oracle",
10+
"product": "WebLogic Server",
11+
"vulnerabilityName": "Oracle WebLogic Server Unspecified Vulnerability",
12+
"dateAdded": "2025-01-07",
13+
"shortDescription": "Oracle WebLogic Server, a product within the Fusion Middleware suite, contains an unspecified vulnerability exploitable by an unauthenticated attacker with network access via IIOP or T3.",
14+
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
15+
"dueDate": "2025-01-28",
16+
"knownRansomwareCampaignUse": "Unknown",
17+
"notes": "https:\/\/www.oracle.com\/security-alerts\/cpuapr2020.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-2883",
18+
"cwes": []
19+
},
20+
{
21+
"cveID": "CVE-2024-55550",
22+
"vendorProject": "Mitel",
23+
"product": "MiCollab",
24+
"vulnerabilityName": "Mitel MiCollab Path Traversal Vulnerability",
25+
"dateAdded": "2025-01-07",
26+
"shortDescription": "Mitel MiCollab contains a path traversal vulnerability that could allow an authenticated attacker with administrative privileges to read local files within the system due to insufficient input sanitization. This vulnerability can be chained with CVE-2024-41713, which allows an unauthenticated, remote attacker to read arbitrary files on the server.",
27+
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
28+
"dueDate": "2025-01-28",
29+
"knownRansomwareCampaignUse": "Unknown",
30+
"notes": "https:\/\/www.mitel.com\/support\/security-advisories\/mitel-product-security-advisory-misa-2024-0029 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-55550",
31+
"cwes": [
32+
"CWE-22"
33+
]
34+
},
35+
{
36+
"cveID": "CVE-2024-41713",
37+
"vendorProject": "Mitel",
38+
"product": "MiCollab",
39+
"vulnerabilityName": "Mitel MiCollab Path Traversal Vulnerability",
40+
"dateAdded": "2025-01-07",
41+
"shortDescription": "Mitel MiCollab contains a path traversal vulnerability that could allow an attacker to gain unauthorized and unauthenticated access. This vulnerability can be chained with CVE-2024-55550, which allows an unauthenticated, remote attacker to read arbitrary files on the server.",
42+
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
43+
"dueDate": "2025-01-28",
44+
"knownRansomwareCampaignUse": "Unknown",
45+
"notes": "https:\/\/www.mitel.com\/support\/security-advisories\/mitel-product-security-advisory-misa-2024-0029 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-41713 ",
46+
"cwes": [
47+
"CWE-22"
48+
]
49+
},
750
{
851
"cveID": "CVE-2024-3393",
952
"vendorProject": "Palo Alto Networks",

0 commit comments

Comments
 (0)