|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2025.06.09", |
4 | | - "dateReleased": "2025-06-09T17:02:20.8538Z", |
5 | | - "count": 1362, |
| 3 | + "catalogVersion": "2025.06.10", |
| 4 | + "dateReleased": "2025-06-10T17:05:43.0382Z", |
| 5 | + "count": 1364, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2025-33053", |
| 9 | + "vendorProject": "Web Distributed Authoring and Versioning", |
| 10 | + "product": "Web Distributed Authoring and Versioning (WebDAV)", |
| 11 | + "vulnerabilityName": "Web Distributed Authoring and Versioning (WebDAV) External Control of File Name or Path Vulnerability", |
| 12 | + "dateAdded": "2025-06-10", |
| 13 | + "shortDescription": "Web Distributed Authoring and Versioning (WebDAV) contains an external control of file name or path vulnerability. This vulnerability could allow an unauthorized attacker to execute code over a network. This vulnerability could affect various products that implement WebDAV, including but not limited to Microsoft Windows.", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2025-07-01", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "This vulnerability affects a common open-source project, third-party library, or a protocol used by different products. For more information, please see: https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-33053 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-33053", |
| 18 | + "cwes": [ |
| 19 | + "CWE-73" |
| 20 | + ] |
| 21 | + }, |
| 22 | + { |
| 23 | + "cveID": "CVE-2025-24016", |
| 24 | + "vendorProject": "Wazuh", |
| 25 | + "product": "Wazuh Server", |
| 26 | + "vulnerabilityName": "Wazuh Server Deserialization of Untrusted Data Vulnerability", |
| 27 | + "dateAdded": "2025-06-10", |
| 28 | + "shortDescription": "Wazuh contains a deserialization of untrusted data vulnerability that allows for remote code execution on Wazuh servers.", |
| 29 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 30 | + "dueDate": "2025-07-01", |
| 31 | + "knownRansomwareCampaignUse": "Unknown", |
| 32 | + "notes": "https:\/\/github.com\/wazuh\/wazuh\/security\/advisories\/GHSA-hcrc-79hj-m3qh ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24016", |
| 33 | + "cwes": [ |
| 34 | + "CWE-502" |
| 35 | + ] |
| 36 | + }, |
7 | 37 | { |
8 | 38 | "cveID": "CVE-2024-42009", |
9 | 39 | "vendorProject": "Roundcube", |
|
0 commit comments