Skip to content

Commit 88323f0

Browse files
Update KEV: Wed Jun 11 00:13:11 UTC 2025
Signed-off-by: AboutCode Automation <[email protected]>
1 parent d37c306 commit 88323f0

File tree

1 file changed

+33
-3
lines changed

1 file changed

+33
-3
lines changed

known_exploited_vulnerabilities.json

Lines changed: 33 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,39 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2025.06.09",
4-
"dateReleased": "2025-06-09T17:02:20.8538Z",
5-
"count": 1362,
3+
"catalogVersion": "2025.06.10",
4+
"dateReleased": "2025-06-10T17:05:43.0382Z",
5+
"count": 1364,
66
"vulnerabilities": [
7+
{
8+
"cveID": "CVE-2025-33053",
9+
"vendorProject": "Web Distributed Authoring and Versioning",
10+
"product": "Web Distributed Authoring and Versioning (WebDAV)",
11+
"vulnerabilityName": "Web Distributed Authoring and Versioning (WebDAV) External Control of File Name or Path Vulnerability",
12+
"dateAdded": "2025-06-10",
13+
"shortDescription": "Web Distributed Authoring and Versioning (WebDAV) contains an external control of file name or path vulnerability. This vulnerability could allow an unauthorized attacker to execute code over a network. This vulnerability could affect various products that implement WebDAV, including but not limited to Microsoft Windows.",
14+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15+
"dueDate": "2025-07-01",
16+
"knownRansomwareCampaignUse": "Unknown",
17+
"notes": "This vulnerability affects a common open-source project, third-party library, or a protocol used by different products. For more information, please see: https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-33053 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-33053",
18+
"cwes": [
19+
"CWE-73"
20+
]
21+
},
22+
{
23+
"cveID": "CVE-2025-24016",
24+
"vendorProject": "Wazuh",
25+
"product": "Wazuh Server",
26+
"vulnerabilityName": "Wazuh Server Deserialization of Untrusted Data Vulnerability",
27+
"dateAdded": "2025-06-10",
28+
"shortDescription": "Wazuh contains a deserialization of untrusted data vulnerability that allows for remote code execution on Wazuh servers.",
29+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
30+
"dueDate": "2025-07-01",
31+
"knownRansomwareCampaignUse": "Unknown",
32+
"notes": "https:\/\/github.com\/wazuh\/wazuh\/security\/advisories\/GHSA-hcrc-79hj-m3qh ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24016",
33+
"cwes": [
34+
"CWE-502"
35+
]
36+
},
737
{
838
"cveID": "CVE-2024-42009",
939
"vendorProject": "Roundcube",

0 commit comments

Comments
 (0)