|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2025.02.26", |
4 | | - "dateReleased": "2025-02-26T16:04:14.8468Z", |
5 | | - "count": 1280, |
| 3 | + "catalogVersion": "2025.03.03", |
| 4 | + "dateReleased": "2025-03-03T19:46:59.7703Z", |
| 5 | + "count": 1285, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2024-4885", |
| 9 | + "vendorProject": "Progress", |
| 10 | + "product": "WhatsUp Gold", |
| 11 | + "vulnerabilityName": "Progress WhatsUp Gold Path Traversal Vulnerability", |
| 12 | + "dateAdded": "2025-03-03", |
| 13 | + "shortDescription": "Progress WhatsUp Gold contains a path traversal vulnerability that allows an unauthenticated attacker to achieve remote code execution.", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2025-03-24", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "https:\/\/community.progress.com\/s\/article\/WhatsUp-Gold-Security-Bulletin-June-2024 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-4885", |
| 18 | + "cwes": [ |
| 19 | + "CWE-22" |
| 20 | + ] |
| 21 | + }, |
| 22 | + { |
| 23 | + "cveID": "CVE-2018-8639", |
| 24 | + "vendorProject": "Microsoft", |
| 25 | + "product": "Windows", |
| 26 | + "vulnerabilityName": "Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability", |
| 27 | + "dateAdded": "2025-03-03", |
| 28 | + "shortDescription": "Microsoft Windows Win32k contains an improper resource shutdown or release vulnerability that allows for local, authenticated privilege escalation. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.", |
| 29 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 30 | + "dueDate": "2025-03-24", |
| 31 | + "knownRansomwareCampaignUse": "Unknown", |
| 32 | + "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2018-8639 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-8639", |
| 33 | + "cwes": [ |
| 34 | + "CWE-404" |
| 35 | + ] |
| 36 | + }, |
| 37 | + { |
| 38 | + "cveID": "CVE-2022-43769", |
| 39 | + "vendorProject": "Hitachi Vantara", |
| 40 | + "product": "Pentaho Business Analytics (BA) Server", |
| 41 | + "vulnerabilityName": "Hitachi Vantara Pentaho BA Server Special Element Injection Vulnerability", |
| 42 | + "dateAdded": "2025-03-03", |
| 43 | + "shortDescription": "Hitachi Vantara Pentaho BA Server contains a special element injection vulnerability that allows an attacker to inject Spring templates into properties files, allowing for arbitrary command execution.", |
| 44 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 45 | + "dueDate": "2025-03-24", |
| 46 | + "knownRansomwareCampaignUse": "Unknown", |
| 47 | + "notes": "https:\/\/support.pentaho.com\/hc\/en-us\/articles\/14455561548301--Resolved-Pentaho-BA-Server-Failure-to-Sanitize-Special-Elements-into-a-Different-Plane-Special-Element-Injection-Versions-before-9-4-0-1-and-9-3-0-2-including-8-3-x-Impacted-CVE-2022-43769 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43769", |
| 48 | + "cwes": [ |
| 49 | + "CWE-74" |
| 50 | + ] |
| 51 | + }, |
| 52 | + { |
| 53 | + "cveID": "CVE-2022-43939", |
| 54 | + "vendorProject": "Hitachi Vantara", |
| 55 | + "product": "Pentaho Business Analytics (BA) Server", |
| 56 | + "vulnerabilityName": "Hitachi Vantara Pentaho BA Server Authorization Bypass Vulnerability", |
| 57 | + "dateAdded": "2025-03-03", |
| 58 | + "shortDescription": "Hitachi Vantara Pentaho BA Server contains a use of non-canonical URL paths for authorization decisions vulnerability that enables an attacker to bypass authorization.", |
| 59 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 60 | + "dueDate": "2025-03-24", |
| 61 | + "knownRansomwareCampaignUse": "Unknown", |
| 62 | + "notes": "https:\/\/support.pentaho.com\/hc\/en-us\/articles\/14455394120333--Resolved-Pentaho-BA-Server-Use-of-Non-Canonical-URL-Paths-for-Authorization-Decisions-Versions-before-9-4-0-1-and-9-3-0-2-including-8-3-x-Impacted-CVE-2022-43939- ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43939", |
| 63 | + "cwes": [ |
| 64 | + "CWE-647" |
| 65 | + ] |
| 66 | + }, |
| 67 | + { |
| 68 | + "cveID": "CVE-2023-20118", |
| 69 | + "vendorProject": "Cisco", |
| 70 | + "product": "Small Business RV Series Routers", |
| 71 | + "vulnerabilityName": "Cisco Small Business RV Series Routers Command Injection Vulnerability", |
| 72 | + "dateAdded": "2025-03-03", |
| 73 | + "shortDescription": "Multiple Cisco Small Business RV Series Routers contains a command injection vulnerability in the web-based management interface. Successful exploitation could allow an authenticated, remote attacker to gain root-level privileges and access unauthorized data.", |
| 74 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 75 | + "dueDate": "2025-03-24", |
| 76 | + "knownRansomwareCampaignUse": "Unknown", |
| 77 | + "notes": "https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-sbr042-multi-vuln-ej76Pke5 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-20118", |
| 78 | + "cwes": [ |
| 79 | + "CWE-77" |
| 80 | + ] |
| 81 | + }, |
7 | 82 | { |
8 | 83 | "cveID": "CVE-2023-34192", |
9 | 84 | "vendorProject": "Synacor", |
|
344 | 419 | "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", |
345 | 420 | "dueDate": "2025-02-26", |
346 | 421 | "knownRansomwareCampaignUse": "Unknown", |
347 | | - "notes": "https:\/\/lore.kernel.org\/linux-cve-announce\/2024120232-CVE-2024-53104-d781@gregkh\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-53104", |
| 422 | + "notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https:\/\/lore.kernel.org\/linux-cve-announce\/2024120232-CVE-2024-53104-d781@gregkh\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-53104", |
348 | 423 | "cwes": [ |
349 | 424 | "CWE-787" |
350 | 425 | ] |
|
0 commit comments