|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2025.02.21", |
4 | | - "dateReleased": "2025-02-21T17:07:48.4896Z", |
5 | | - "count": 1276, |
| 3 | + "catalogVersion": "2025.02.24", |
| 4 | + "dateReleased": "2025-02-24T17:55:31.6365Z", |
| 5 | + "count": 1278, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2024-20953", |
| 9 | + "vendorProject": "Oracle", |
| 10 | + "product": "Agile Product Lifecycle Management (PLM)", |
| 11 | + "vulnerabilityName": "Oracle Agile Product Lifecycle Management (PLM) Deserialization Vulnerability", |
| 12 | + "dateAdded": "2025-02-24", |
| 13 | + "shortDescription": "Oracle Agile Product Lifecycle Management (PLM) contains a deserialization vulnerability that allows a low-privileged attacker with network access via HTTP to compromise the system.", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2025-03-17", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "https:\/\/www.oracle.com\/security-alerts\/cpujan2024.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-20953", |
| 18 | + "cwes": [ |
| 19 | + "CWE-502" |
| 20 | + ] |
| 21 | + }, |
| 22 | + { |
| 23 | + "cveID": "CVE-2017-3066", |
| 24 | + "vendorProject": "Adobe", |
| 25 | + "product": "ColdFusion", |
| 26 | + "vulnerabilityName": "Adobe ColdFusion Deserialization Vulnerability", |
| 27 | + "dateAdded": "2025-02-24", |
| 28 | + "shortDescription": "Adobe ColdFusion contains a deserialization vulnerability in the Apache BlazeDS library that allows for arbitrary code execution.", |
| 29 | + "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", |
| 30 | + "dueDate": "2025-03-17", |
| 31 | + "knownRansomwareCampaignUse": "Unknown", |
| 32 | + "notes": "https:\/\/helpx.adobe.com\/security\/products\/coldfusion\/apsb17-14.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-3066", |
| 33 | + "cwes": [ |
| 34 | + "CWE-502" |
| 35 | + ] |
| 36 | + }, |
7 | 37 | { |
8 | 38 | "cveID": "CVE-2025-24989", |
9 | 39 | "vendorProject": "Microsoft", |
|
1348 | 1378 | { |
1349 | 1379 | "cveID": "CVE-2024-45519", |
1350 | 1380 | "vendorProject": "Synacor", |
1351 | | - "product": "Zimbra Collaboration", |
1352 | | - "vulnerabilityName": "Synacor Zimbra Collaboration Command Execution Vulnerability", |
| 1381 | + "product": "Zimbra Collaboration Suite (ZCS)", |
| 1382 | + "vulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Command Execution Vulnerability", |
1353 | 1383 | "dateAdded": "2024-10-03", |
1354 | | - "shortDescription": "Synacor Zimbra Collaboration contains an unspecified vulnerability in the postjournal service that may allow an unauthenticated user to execute commands.", |
| 1384 | + "shortDescription": "Synacor Zimbra Collaboration Suite (ZCS) contains an unspecified vulnerability in the postjournal service that may allow an unauthenticated user to execute commands.", |
1355 | 1385 | "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", |
1356 | 1386 | "dueDate": "2024-10-24", |
1357 | 1387 | "knownRansomwareCampaignUse": "Unknown", |
|
4435 | 4465 | }, |
4436 | 4466 | { |
4437 | 4467 | "cveID": "CVE-2023-37580", |
4438 | | - "vendorProject": "Zimbra", |
4439 | | - "product": "Collaboration (ZCS)", |
4440 | | - "vulnerabilityName": "Zimbra Collaboration (ZCS) Cross-Site Scripting (XSS) Vulnerability", |
| 4468 | + "vendorProject": "Synacor", |
| 4469 | + "product": "Zimbra Collaboration Suite (ZCS)", |
| 4470 | + "vulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability", |
4441 | 4471 | "dateAdded": "2023-07-27", |
4442 | | - "shortDescription": "Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability impacting the confidentiality and integrity of data.", |
| 4472 | + "shortDescription": "Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability impacting the confidentiality and integrity of data.", |
4443 | 4473 | "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", |
4444 | 4474 | "dueDate": "2023-08-17", |
4445 | 4475 | "knownRansomwareCampaignUse": "Unknown", |
|
5530 | 5560 | }, |
5531 | 5561 | { |
5532 | 5562 | "cveID": "CVE-2022-27926", |
5533 | | - "vendorProject": "Zimbra", |
5534 | | - "product": "Collaboration (ZCS)", |
5535 | | - "vulnerabilityName": "Zimbra Collaboration (ZCS) Cross-Site Scripting (XSS) Vulnerability", |
| 5563 | + "vendorProject": "Synacor", |
| 5564 | + "product": "Zimbra Collaboration Suite (ZCS)", |
| 5565 | + "vulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability", |
5536 | 5566 | "dateAdded": "2023-04-03", |
5537 | | - "shortDescription": "Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability by allowing an endpoint URL to accept parameters without sanitizing.", |
| 5567 | + "shortDescription": "Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability by allowing an endpoint URL to accept parameters without sanitizing.", |
5538 | 5568 | "requiredAction": "Apply updates per vendor instructions.", |
5539 | 5569 | "dueDate": "2023-04-24", |
5540 | 5570 | "knownRansomwareCampaignUse": "Unknown", |
|
6505 | 6535 | }, |
6506 | 6536 | { |
6507 | 6537 | "cveID": "CVE-2022-41352", |
6508 | | - "vendorProject": "Zimbra", |
6509 | | - "product": "Collaboration (ZCS)", |
6510 | | - "vulnerabilityName": "Zimbra Collaboration (ZCS) Arbitrary File Upload Vulnerability", |
| 6538 | + "vendorProject": "Synacor", |
| 6539 | + "product": "Zimbra Collaboration Suite (ZCS)", |
| 6540 | + "vulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Arbitrary File Upload Vulnerability", |
6511 | 6541 | "dateAdded": "2022-10-20", |
6512 | | - "shortDescription": "Zimbra Collaboration (ZCS) allows an attacker to upload arbitrary files using cpio package to gain incorrect access to any other user accounts.", |
| 6542 | + "shortDescription": "Synacor Zimbra Collaboration Suite (ZCS) allows an attacker to upload arbitrary files using cpio package to gain incorrect access to any other user accounts.", |
6513 | 6543 | "requiredAction": "Apply updates per vendor instructions.", |
6514 | 6544 | "dueDate": "2022-11-10", |
6515 | 6545 | "knownRansomwareCampaignUse": "Unknown", |
|
7201 | 7231 | }, |
7202 | 7232 | { |
7203 | 7233 | "cveID": "CVE-2022-27925", |
7204 | | - "vendorProject": "Zimbra", |
7205 | | - "product": "Collaboration (ZCS)", |
7206 | | - "vulnerabilityName": "Zimbra Collaboration (ZCS) Arbitrary File Upload Vulnerability", |
| 7234 | + "vendorProject": "Synacor", |
| 7235 | + "product": "Zimbra Collaboration Suite (ZCS)", |
| 7236 | + "vulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Arbitrary File Upload Vulnerability", |
7207 | 7237 | "dateAdded": "2022-08-11", |
7208 | | - "shortDescription": "Zimbra Collaboration (ZCS) contains flaw in the mboximport functionality, allowing an authenticated attacker to upload arbitrary files to perform remote code execution. This vulnerability was chained with CVE-2022-37042 which allows for unauthenticated remote code execution.", |
| 7238 | + "shortDescription": "Synacor Zimbra Collaboration Suite (ZCS) contains flaw in the mboximport functionality, allowing an authenticated attacker to upload arbitrary files to perform remote code execution. This vulnerability was chained with CVE-2022-37042 which allows for unauthenticated remote code execution.", |
7209 | 7239 | "requiredAction": "Apply updates per vendor instructions.", |
7210 | 7240 | "dueDate": "2022-09-01", |
7211 | 7241 | "knownRansomwareCampaignUse": "Unknown", |
|
7216 | 7246 | }, |
7217 | 7247 | { |
7218 | 7248 | "cveID": "CVE-2022-37042", |
7219 | | - "vendorProject": "Zimbra", |
7220 | | - "product": "Collaboration (ZCS)", |
7221 | | - "vulnerabilityName": "Zimbra Collaboration (ZCS) Authentication Bypass Vulnerability", |
| 7249 | + "vendorProject": "Synacor", |
| 7250 | + "product": "Zimbra Collaboration Suite (ZCS)", |
| 7251 | + "vulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Authentication Bypass Vulnerability", |
7222 | 7252 | "dateAdded": "2022-08-11", |
7223 | | - "shortDescription": "Zimbra Collaboration (ZCS) contains an authentication bypass vulnerability in MailboxImportServlet. This vulnerability was chained with CVE-2022-27925 which allows for unauthenticated remote code execution.", |
| 7253 | + "shortDescription": "Synacor Zimbra Collaboration Suite (ZCS) contains an authentication bypass vulnerability in MailboxImportServlet. This vulnerability was chained with CVE-2022-27925 which allows for unauthenticated remote code execution.", |
7224 | 7254 | "requiredAction": "Apply updates per vendor instructions.", |
7225 | 7255 | "dueDate": "2022-09-01", |
7226 | 7256 | "knownRansomwareCampaignUse": "Unknown", |
|
7260 | 7290 | }, |
7261 | 7291 | { |
7262 | 7292 | "cveID": "CVE-2022-27924", |
7263 | | - "vendorProject": "Zimbra", |
7264 | | - "product": "Collaboration (ZCS)", |
7265 | | - "vulnerabilityName": "Zimbra Collaboration (ZCS) Command Injection Vulnerability", |
| 7293 | + "vendorProject": "Synacor", |
| 7294 | + "product": "Zimbra Collaboration Suite (ZCS)", |
| 7295 | + "vulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Command Injection Vulnerability", |
7266 | 7296 | "dateAdded": "2022-08-04", |
7267 | | - "shortDescription": "Zimbra Collaboration (ZCS) allows an attacker to inject memcache commands into a targeted instance which causes an overwrite of arbitrary cached entries.", |
| 7297 | + "shortDescription": "Synacor Zimbra Collaboration Suite (ZCS) allows an attacker to inject memcache commands into a targeted instance which causes an overwrite of arbitrary cached entries.", |
7268 | 7298 | "requiredAction": "Apply updates per vendor instructions.", |
7269 | 7299 | "dueDate": "2022-08-25", |
7270 | 7300 | "knownRansomwareCampaignUse": "Unknown", |
|
9357 | 9387 | }, |
9358 | 9388 | { |
9359 | 9389 | "cveID": "CVE-2018-6882", |
9360 | | - "vendorProject": "Zimbra", |
9361 | | - "product": "Collaboration Suite (ZCS)", |
9362 | | - "vulnerabilityName": "Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability", |
| 9390 | + "vendorProject": "Synacor", |
| 9391 | + "product": "Zimbra Collaboration Suite (ZCS)", |
| 9392 | + "vulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability", |
9363 | 9393 | "dateAdded": "2022-04-19", |
9364 | | - "shortDescription": "Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that might allow remote attackers to inject arbitrary web script or HTML.", |
| 9394 | + "shortDescription": "Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that might allow remote attackers to inject arbitrary web script or HTML.", |
9365 | 9395 | "requiredAction": "Apply updates per vendor instructions.", |
9366 | 9396 | "dueDate": "2022-05-10", |
9367 | 9397 | "knownRansomwareCampaignUse": "Known", |
@@ -13255,11 +13285,11 @@ |
13255 | 13285 | }, |
13256 | 13286 | { |
13257 | 13287 | "cveID": "CVE-2022-24682", |
13258 | | - "vendorProject": "Zimbra", |
13259 | | - "product": "Webmail", |
13260 | | - "vulnerabilityName": "Zimbra Webmail Cross-Site Scripting Vulnerability", |
| 13288 | + "vendorProject": "Synacor", |
| 13289 | + "product": "Zimbra Webmail", |
| 13290 | + "vulnerabilityName": "Synacor Zimbra Webmail Cross-Site Scripting Vulnerability", |
13261 | 13291 | "dateAdded": "2022-02-25", |
13262 | | - "shortDescription": "Zimbra webmail clients running versions 8.8.15 P29 & P30 contain a XSS vulnerability that would allow attackers to steal session cookie files.", |
| 13292 | + "shortDescription": "Synacor Zimbra webmail clients running versions 8.8.15 P29 & P30 contain a XSS vulnerability that would allow attackers to steal session cookie files.", |
13263 | 13293 | "requiredAction": "Apply updates per vendor instructions.", |
13264 | 13294 | "dueDate": "2022-03-11", |
13265 | 13295 | "knownRansomwareCampaignUse": "Known", |
@@ -14195,10 +14225,10 @@ |
14195 | 14225 | { |
14196 | 14226 | "cveID": "CVE-2019-9670", |
14197 | 14227 | "vendorProject": "Synacor", |
14198 | | - "product": "Zimbra Collaboration (ZCS)", |
14199 | | - "vulnerabilityName": "Synacor Zimbra Collaboration (ZCS) Improper Restriction of XML External Entity Reference", |
| 14228 | + "product": "Zimbra Collaboration Suite (ZCS)", |
| 14229 | + "vulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Improper Restriction of XML External Entity Reference", |
14200 | 14230 | "dateAdded": "2022-01-10", |
14201 | | - "shortDescription": "Improper Restriction of XML External Entity Reference vulnerability affecting Synacor Zimbra Collaboration (ZCS).", |
| 14231 | + "shortDescription": "Synacor Zimbra Collaboration Suite (ZCS) contains an improper restriction of XML external entity (XXE) vulnerability in the mailboxd component.", |
14202 | 14232 | "requiredAction": "Apply updates per vendor instructions.", |
14203 | 14233 | "dueDate": "2022-07-10", |
14204 | 14234 | "knownRansomwareCampaignUse": "Unknown", |
|
0 commit comments