Skip to content

Commit ad84c2f

Browse files
Update KEV: Tue Jun 17 00:13:15 UTC 2025
Signed-off-by: AboutCode Automation <[email protected]>
1 parent a7de08b commit ad84c2f

File tree

1 file changed

+32
-4
lines changed

1 file changed

+32
-4
lines changed

known_exploited_vulnerabilities.json

Lines changed: 32 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,37 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2025.06.13",
4-
"dateReleased": "2025-06-13T16:08:40.4237Z",
5-
"count": 1364,
3+
"catalogVersion": "2025.06.16",
4+
"dateReleased": "2025-06-16T17:34:23.4151Z",
5+
"count": 1366,
66
"vulnerabilities": [
7+
{
8+
"cveID": "CVE-2023-33538",
9+
"vendorProject": "TP-Link",
10+
"product": "Multiple Routers",
11+
"vulnerabilityName": "TP-Link Multiple Routers Command Injection Vulnerability",
12+
"dateAdded": "2025-06-16",
13+
"shortDescription": "TP-Link TL-WR940N V2\/V4, TL-WR841N V8\/V10, and TL-WR740N V1\/V2 contain a command injection vulnerability via the component \/userRpm\/WlanNetworkRpm. The impacted products could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization.",
14+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15+
"dueDate": "2025-07-07",
16+
"knownRansomwareCampaignUse": "Unknown",
17+
"notes": "https:\/\/www.tp-link.com\/nordic\/support\/faq\/3562\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-33538",
18+
"cwes": [
19+
"CWE-77"
20+
]
21+
},
22+
{
23+
"cveID": "CVE-2025-43200",
24+
"vendorProject": "Apple",
25+
"product": "Multiple Products",
26+
"vulnerabilityName": "Apple Multiple Products Unspecified Vulnerability",
27+
"dateAdded": "2025-06-16",
28+
"shortDescription": "Apple iOS, iPadOS, macOS, watchOS, and visionOS, contain an unspecified vulnerability when processing a maliciously crafted photo or video shared via an iCloud Link.",
29+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
30+
"dueDate": "2025-07-07",
31+
"knownRansomwareCampaignUse": "Unknown",
32+
"notes": "https:\/\/support.apple.com\/en-us\/122174 ; https:\/\/support.apple.com\/en-us\/122173 ; https:\/\/support.apple.com\/en-us\/122900 ; https:\/\/support.apple.com\/en-us\/122901 ; https:\/\/support.apple.com\/en-us\/122902 ; https:\/\/support.apple.com\/en-us\/122903 ; https:\/\/support.apple.com\/en-us\/122904 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-43200",
33+
"cwes": []
34+
},
735
{
836
"cveID": "CVE-2025-33053",
937
"vendorProject": "Web Distributed Authoring and Versioning",
@@ -29,7 +57,7 @@
2957
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
3058
"dueDate": "2025-07-01",
3159
"knownRansomwareCampaignUse": "Unknown",
32-
"notes": "https:\/\/github.com\/wazuh\/wazuh\/security\/advisories\/GHSA-hcrc-79hj-m3qh ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24016",
60+
"notes": "https:\/\/wazuh.com\/blog\/addressing-the-cve-2025-24016-vulnerability\/ ; https:\/\/github.com\/wazuh\/wazuh\/security\/advisories\/GHSA-hcrc-79hj-m3qh ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24016",
3361
"cwes": [
3462
"CWE-502"
3563
]

0 commit comments

Comments
 (0)