Skip to content

Commit bad8357

Browse files
Update KEV: Tue Jul 1 00:15:23 UTC 2025
Signed-off-by: AboutCode Automation <[email protected]>
1 parent 9f1c539 commit bad8357

File tree

1 file changed

+18
-3
lines changed

1 file changed

+18
-3
lines changed

known_exploited_vulnerabilities.json

Lines changed: 18 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,24 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2025.06.25",
4-
"dateReleased": "2025-06-25T16:52:26.9744Z",
5-
"count": 1370,
3+
"catalogVersion": "2025.06.30",
4+
"dateReleased": "2025-06-30T17:00:32.5907Z",
5+
"count": 1371,
66
"vulnerabilities": [
7+
{
8+
"cveID": "CVE-2025-6543",
9+
"vendorProject": "Citrix",
10+
"product": "NetScaler ADC and Gateway",
11+
"vulnerabilityName": "Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability",
12+
"dateAdded": "2025-06-30",
13+
"shortDescription": "Citrix NetScaler ADC and Gateway contain a buffer overflow vulnerability leading to unintended control flow and Denial of Service. NetScaler must be configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server.",
14+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15+
"dueDate": "2025-07-21",
16+
"knownRansomwareCampaignUse": "Unknown",
17+
"notes": "https:\/\/support.citrix.com\/support-home\/kbsearch\/article?articleNumber=CTX694788 ; https:\/\/www.netscaler.com\/blog\/news\/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-6543",
18+
"cwes": [
19+
"CWE-119"
20+
]
21+
},
722
{
823
"cveID": "CVE-2019-6693",
924
"vendorProject": "Fortinet",

0 commit comments

Comments
 (0)