Skip to content

Commit 4fe0371

Browse files
Update KEV: Thu Feb 20 00:11:26 UTC 2025
Signed-off-by: AboutCode Automation <[email protected]>
1 parent 1881149 commit 4fe0371

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

known_exploited_vulnerabilities.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2025.02.18",
4-
"dateReleased": "2025-02-18T20:08:26.6543Z",
3+
"catalogVersion": "2025.02.19",
4+
"dateReleased": "2025-02-19T14:08:44.5021Z",
55
"count": 1273,
66
"vulnerabilities": [
77
{
88
"cveID": "CVE-2025-0108",
9-
"vendorProject": "Palo Alto",
9+
"vendorProject": "Palo Alto Networks",
1010
"product": "PAN-OS",
11-
"vulnerabilityName": "Palo Alto PAN-OS Authentication Bypass Vulnerability",
11+
"vulnerabilityName": "Palo Alto Networks PAN-OS Authentication Bypass Vulnerability",
1212
"dateAdded": "2025-02-18",
13-
"shortDescription": "Palo Alto PAN-OS contains an authentication bypass vulnerability in its management web interface. This vulnerability allows an unauthenticated attacker with network access to the management web interface to bypass the authentication normally required and invoke certain PHP scripts.",
13+
"shortDescription": "Palo Alto Networks PAN-OS contains an authentication bypass vulnerability in its management web interface. This vulnerability allows an unauthenticated attacker with network access to the management web interface to bypass the authentication normally required and invoke certain PHP scripts.",
1414
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
1515
"dueDate": "2025-03-11",
1616
"knownRansomwareCampaignUse": "Unknown",

0 commit comments

Comments
 (0)