Skip to content

Commit 5b38bab

Browse files
Update KEV: Fri May 9 00:12:44 UTC 2025
Signed-off-by: AboutCode Automation <[email protected]>
1 parent fae8bae commit 5b38bab

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

known_exploited_vulnerabilities.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2025.05.07",
4-
"dateReleased": "2025-05-07T17:00:03.4992Z",
3+
"catalogVersion": "2025.05.08",
4+
"dateReleased": "2025-05-08T15:49:01.7238Z",
55
"count": 1335,
66
"vulnerabilities": [
77
{
@@ -10,7 +10,7 @@
1010
"product": "Multiple Devices",
1111
"vulnerabilityName": "GeoVision Devices OS Command Injection Vulnerability",
1212
"dateAdded": "2025-05-07",
13-
"shortDescription": "Multiple GeoVision devices contain an OS command injection vulnerability that allows a remote, unauthenticated attacker to inject and execute arbitrary system commands.",
13+
"shortDescription": "Multiple GeoVision devices contain an OS command injection vulnerability that allows a remote, unauthenticated attacker to inject and execute arbitrary system commands. The impacted products could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization.",
1414
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
1515
"dueDate": "2025-05-28",
1616
"knownRansomwareCampaignUse": "Unknown",
@@ -25,7 +25,7 @@
2525
"product": "Multiple Devices",
2626
"vulnerabilityName": "GeoVision Devices OS Command Injection Vulnerability",
2727
"dateAdded": "2025-05-07",
28-
"shortDescription": "Multiple GeoVision devices contain an OS command injection vulnerability that allows a remote, unauthenticated attacker to inject and execute arbitrary system commands.",
28+
"shortDescription": "Multiple GeoVision devices contain an OS command injection vulnerability that allows a remote, unauthenticated attacker to inject and execute arbitrary system commands. The impacted products could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization.",
2929
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
3030
"dueDate": "2025-05-28",
3131
"knownRansomwareCampaignUse": "Unknown",
@@ -44,7 +44,7 @@
4444
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
4545
"dueDate": "2025-05-27",
4646
"knownRansomwareCampaignUse": "Unknown",
47-
"notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see https:\/\/source.android.com\/docs\/security\/bulletin\/2025-05-01 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-27363",
47+
"notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https:\/\/source.android.com\/docs\/security\/bulletin\/2025-05-01 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-27363",
4848
"cwes": [
4949
"CWE-787"
5050
]

0 commit comments

Comments
 (0)