Skip to content

Commit 5fe0a17

Browse files
Update KEV: Tue Mar 4 00:11:43 UTC 2025
Signed-off-by: AboutCode Automation <[email protected]>
1 parent 481d628 commit 5fe0a17

File tree

1 file changed

+79
-4
lines changed

1 file changed

+79
-4
lines changed

known_exploited_vulnerabilities.json

Lines changed: 79 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,84 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2025.02.26",
4-
"dateReleased": "2025-02-26T16:04:14.8468Z",
5-
"count": 1280,
3+
"catalogVersion": "2025.03.03",
4+
"dateReleased": "2025-03-03T19:46:59.7703Z",
5+
"count": 1285,
66
"vulnerabilities": [
7+
{
8+
"cveID": "CVE-2024-4885",
9+
"vendorProject": "Progress",
10+
"product": "WhatsUp Gold",
11+
"vulnerabilityName": "Progress WhatsUp Gold Path Traversal Vulnerability",
12+
"dateAdded": "2025-03-03",
13+
"shortDescription": "Progress WhatsUp Gold contains a path traversal vulnerability that allows an unauthenticated attacker to achieve remote code execution.",
14+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15+
"dueDate": "2025-03-24",
16+
"knownRansomwareCampaignUse": "Unknown",
17+
"notes": "https:\/\/community.progress.com\/s\/article\/WhatsUp-Gold-Security-Bulletin-June-2024 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-4885",
18+
"cwes": [
19+
"CWE-22"
20+
]
21+
},
22+
{
23+
"cveID": "CVE-2018-8639",
24+
"vendorProject": "Microsoft",
25+
"product": "Windows",
26+
"vulnerabilityName": "Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability",
27+
"dateAdded": "2025-03-03",
28+
"shortDescription": "Microsoft Windows Win32k contains an improper resource shutdown or release vulnerability that allows for local, authenticated privilege escalation. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.",
29+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
30+
"dueDate": "2025-03-24",
31+
"knownRansomwareCampaignUse": "Unknown",
32+
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2018-8639 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-8639",
33+
"cwes": [
34+
"CWE-404"
35+
]
36+
},
37+
{
38+
"cveID": "CVE-2022-43769",
39+
"vendorProject": "Hitachi Vantara",
40+
"product": "Pentaho Business Analytics (BA) Server",
41+
"vulnerabilityName": "Hitachi Vantara Pentaho BA Server Special Element Injection Vulnerability",
42+
"dateAdded": "2025-03-03",
43+
"shortDescription": "Hitachi Vantara Pentaho BA Server contains a special element injection vulnerability that allows an attacker to inject Spring templates into properties files, allowing for arbitrary command execution.",
44+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
45+
"dueDate": "2025-03-24",
46+
"knownRansomwareCampaignUse": "Unknown",
47+
"notes": "https:\/\/support.pentaho.com\/hc\/en-us\/articles\/14455561548301--Resolved-Pentaho-BA-Server-Failure-to-Sanitize-Special-Elements-into-a-Different-Plane-Special-Element-Injection-Versions-before-9-4-0-1-and-9-3-0-2-including-8-3-x-Impacted-CVE-2022-43769 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43769",
48+
"cwes": [
49+
"CWE-74"
50+
]
51+
},
52+
{
53+
"cveID": "CVE-2022-43939",
54+
"vendorProject": "Hitachi Vantara",
55+
"product": "Pentaho Business Analytics (BA) Server",
56+
"vulnerabilityName": "Hitachi Vantara Pentaho BA Server Authorization Bypass Vulnerability",
57+
"dateAdded": "2025-03-03",
58+
"shortDescription": "Hitachi Vantara Pentaho BA Server contains a use of non-canonical URL paths for authorization decisions vulnerability that enables an attacker to bypass authorization.",
59+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
60+
"dueDate": "2025-03-24",
61+
"knownRansomwareCampaignUse": "Unknown",
62+
"notes": "https:\/\/support.pentaho.com\/hc\/en-us\/articles\/14455394120333--Resolved-Pentaho-BA-Server-Use-of-Non-Canonical-URL-Paths-for-Authorization-Decisions-Versions-before-9-4-0-1-and-9-3-0-2-including-8-3-x-Impacted-CVE-2022-43939- ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43939",
63+
"cwes": [
64+
"CWE-647"
65+
]
66+
},
67+
{
68+
"cveID": "CVE-2023-20118",
69+
"vendorProject": "Cisco",
70+
"product": "Small Business RV Series Routers",
71+
"vulnerabilityName": "Cisco Small Business RV Series Routers Command Injection Vulnerability",
72+
"dateAdded": "2025-03-03",
73+
"shortDescription": "Multiple Cisco Small Business RV Series Routers contains a command injection vulnerability in the web-based management interface. Successful exploitation could allow an authenticated, remote attacker to gain root-level privileges and access unauthorized data.",
74+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
75+
"dueDate": "2025-03-24",
76+
"knownRansomwareCampaignUse": "Unknown",
77+
"notes": "https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-sbr042-multi-vuln-ej76Pke5 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-20118",
78+
"cwes": [
79+
"CWE-77"
80+
]
81+
},
782
{
883
"cveID": "CVE-2023-34192",
984
"vendorProject": "Synacor",
@@ -344,7 +419,7 @@
344419
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
345420
"dueDate": "2025-02-26",
346421
"knownRansomwareCampaignUse": "Unknown",
347-
"notes": "https:\/\/lore.kernel.org\/linux-cve-announce\/2024120232-CVE-2024-53104-d781@gregkh\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-53104",
422+
"notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https:\/\/lore.kernel.org\/linux-cve-announce\/2024120232-CVE-2024-53104-d781@gregkh\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-53104",
348423
"cwes": [
349424
"CWE-787"
350425
]

0 commit comments

Comments
 (0)