Skip to content

Commit b96d9dd

Browse files
Update KEV: Sat Nov 29 00:12:40 UTC 2025
Signed-off-by: AboutCode Automation <[email protected]>
1 parent cb27961 commit b96d9dd

File tree

1 file changed

+18
-3
lines changed

1 file changed

+18
-3
lines changed

known_exploited_vulnerabilities.json

Lines changed: 18 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,24 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2025.11.21",
4-
"dateReleased": "2025-11-21T20:48:10.4148Z",
5-
"count": 1463,
3+
"catalogVersion": "2025.11.28",
4+
"dateReleased": "2025-11-28T17:48:26.2003Z",
5+
"count": 1464,
66
"vulnerabilities": [
7+
{
8+
"cveID": "CVE-2021-26829",
9+
"vendorProject": "OpenPLC",
10+
"product": "ScadaBR",
11+
"vulnerabilityName": "OpenPLC ScadaBR Cross-site Scripting Vulnerability",
12+
"dateAdded": "2025-11-28",
13+
"shortDescription": "OpenPLC ScadaBR contains a cross-site scripting vulnerability via system_settings.shtm.",
14+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15+
"dueDate": "2025-12-19",
16+
"knownRansomwareCampaignUse": "Unknown",
17+
"notes": "This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https:\/\/github.com\/SCADA-LTS\/Scada-LTS\/pull\/3211 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-26829",
18+
"cwes": [
19+
"CWE-79"
20+
]
21+
},
722
{
823
"cveID": "CVE-2025-61757",
924
"vendorProject": "Oracle",

0 commit comments

Comments
 (0)