|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2025.07.02", |
4 | | - "dateReleased": "2025-07-02T17:50:44.3248Z", |
5 | | - "count": 1374, |
| 3 | + "catalogVersion": "2025.07.07", |
| 4 | + "dateReleased": "2025-07-07T17:00:02.8406Z", |
| 5 | + "count": 1378, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2019-9621", |
| 9 | + "vendorProject": "Synacor", |
| 10 | + "product": "Zimbra Collaboration Suite (ZCS)", |
| 11 | + "vulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery (SSRF) Vulnerability", |
| 12 | + "dateAdded": "2025-07-07", |
| 13 | + "shortDescription": "Synacor Zimbra Collaboration Suite (ZCS) contains a server-side request forgery (SSRF) vulnerability via the ProxyServlet component.", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2025-07-28", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "https:\/\/wiki.zimbra.com\/wiki\/Zimbra_Security_Advisories ; https:\/\/wiki.zimbra.com\/wiki\/Security_Center ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-9621", |
| 18 | + "cwes": [ |
| 19 | + "CWE-918", |
| 20 | + "CWE-807" |
| 21 | + ] |
| 22 | + }, |
| 23 | + { |
| 24 | + "cveID": "CVE-2019-5418", |
| 25 | + "vendorProject": "Rails", |
| 26 | + "product": "Ruby on Rails", |
| 27 | + "vulnerabilityName": "Rails Ruby on Rails Path Traversal Vulnerability", |
| 28 | + "dateAdded": "2025-07-07", |
| 29 | + "shortDescription": "Rails Ruby on Rails contains a path traversal vulnerability in Action View. Specially crafted accept headers in combination with calls to `render file:` can cause arbitrary files on the target server to be rendered, disclosing the file contents.", |
| 30 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 31 | + "dueDate": "2025-07-28", |
| 32 | + "knownRansomwareCampaignUse": "Unknown", |
| 33 | + "notes": "https:\/\/web.archive.org\/web\/20190313201629\/https:\/\/weblog.rubyonrails.org\/2019\/3\/13\/Rails-4-2-5-1-5-1-6-2-have-been-released\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-5418", |
| 34 | + "cwes": [ |
| 35 | + "CWE-22" |
| 36 | + ] |
| 37 | + }, |
| 38 | + { |
| 39 | + "cveID": "CVE-2016-10033", |
| 40 | + "vendorProject": "PHP", |
| 41 | + "product": "PHPMailer", |
| 42 | + "vulnerabilityName": "PHPMailer Command Injection Vulnerability", |
| 43 | + "dateAdded": "2025-07-07", |
| 44 | + "shortDescription": "PHPMailer contains a command injection vulnerability because it fails to sanitize user-supplied input. Specifically, this issue affects the 'mail()' function of 'class.phpmailer.php' script. An attacker can exploit this issue to execute arbitrary code within the context of the application. Failed exploit attempts will result in a denial-of-service condition.", |
| 45 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 46 | + "dueDate": "2025-07-28", |
| 47 | + "knownRansomwareCampaignUse": "Unknown", |
| 48 | + "notes": "This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https:\/\/github.com\/PHPMailer\/PHPMailer\/releases\/tag\/v5.2.18 ; https:\/\/github.com\/advisories\/GHSA-5f37-gxvh-23v6 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-10033", |
| 49 | + "cwes": [ |
| 50 | + "CWE-77", |
| 51 | + "CWE-88" |
| 52 | + ] |
| 53 | + }, |
| 54 | + { |
| 55 | + "cveID": "CVE-2014-3931", |
| 56 | + "vendorProject": "Looking Glass", |
| 57 | + "product": "Multi-Router Looking Glass (MRLG)", |
| 58 | + "vulnerabilityName": "Multi-Router Looking Glass (MRLG) Buffer Overflow Vulnerability", |
| 59 | + "dateAdded": "2025-07-07", |
| 60 | + "shortDescription": "Multi-Router Looking Glass (MRLG) contains a buffer overflow vulnerability that could allow remote attackers to cause an arbitrary memory write and memory corruption.", |
| 61 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 62 | + "dueDate": "2025-07-28", |
| 63 | + "knownRansomwareCampaignUse": "Unknown", |
| 64 | + "notes": "https:\/\/mrlg.op-sec.us\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014-3931", |
| 65 | + "cwes": [ |
| 66 | + "CWE-119" |
| 67 | + ] |
| 68 | + }, |
7 | 69 | { |
8 | 70 | "cveID": "CVE-2025-6554", |
9 | 71 | "vendorProject": "Google", |
|
0 commit comments