|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2025.05.14", |
4 | | - "dateReleased": "2025-05-14T19:31:57.7431Z", |
5 | | - "count": 1342, |
| 3 | + "catalogVersion": "2025.05.15", |
| 4 | + "dateReleased": "2025-05-15T17:04:05.6633Z", |
| 5 | + "count": 1345, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2025-42999", |
| 9 | + "vendorProject": "SAP", |
| 10 | + "product": "NetWeaver", |
| 11 | + "vulnerabilityName": "SAP NetWeaver Deserialization Vulnerability", |
| 12 | + "dateAdded": "2025-05-15", |
| 13 | + "shortDescription": "SAP NetWeaver Visual Composer Metadata Uploader contains a deserialization vulnerability that allows a privileged attacker to compromise the confidentiality, integrity, and availability of the host system by deserializing untrusted or malicious content.", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2025-06-05", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "SAP users must have an account to log in and access the patch: https:\/\/me.sap.com\/notes\/3604119 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-42999", |
| 18 | + "cwes": [ |
| 19 | + "CWE-502" |
| 20 | + ] |
| 21 | + }, |
| 22 | + { |
| 23 | + "cveID": "CVE-2024-12987", |
| 24 | + "vendorProject": "DrayTek", |
| 25 | + "product": "Vigor Routers", |
| 26 | + "vulnerabilityName": "DrayTek Vigor Routers OS Command Injection Vulnerability", |
| 27 | + "dateAdded": "2025-05-15", |
| 28 | + "shortDescription": "DrayTek Vigor2960, Vigor300B, and Vigor3900 routers contain an OS command injection vulnerability due to an unknown function of the file \/cgi-bin\/mainfunction.cgi\/apmcfgupload of the component web management interface.", |
| 29 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 30 | + "dueDate": "2025-06-05", |
| 31 | + "knownRansomwareCampaignUse": "Unknown", |
| 32 | + "notes": "https:\/\/fw.draytek.com.tw\/Vigor2960\/Firmware\/v1.5.1.5\/DrayTek_Vigor2960_V1.5.1.5_01release-note.pdf ; https:\/\/fw.draytek.com.tw\/Vigor300B\/Firmware\/v1.5.1.5\/DrayTek_Vigor300B_V1.5.1.5_01release-note.pdf ; https:\/\/fw.draytek.com.tw\/Vigor3900\/Firmware\/v1.5.1.5\/DrayTek_Vigor3900_V1.5.1.5_01release-note.pdf ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-12987", |
| 33 | + "cwes": [ |
| 34 | + "CWE-78" |
| 35 | + ] |
| 36 | + }, |
| 37 | + { |
| 38 | + "cveID": "CVE-2025-4664", |
| 39 | + "vendorProject": "Google", |
| 40 | + "product": "Chromium", |
| 41 | + "vulnerabilityName": "Google Chromium Loader Insufficient Policy Enforcement Vulnerability", |
| 42 | + "dateAdded": "2025-05-15", |
| 43 | + "shortDescription": "Google Chromium contains an insufficient policy enforcement vulnerability that allows a remote attacker to leak cross-origin data via a crafted HTML page.", |
| 44 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 45 | + "dueDate": "2025-06-05", |
| 46 | + "knownRansomwareCampaignUse": "Unknown", |
| 47 | + "notes": "https:\/\/chromereleases.googleblog.com\/2025\/05\/stable-channel-update-for-desktop_14.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-4664", |
| 48 | + "cwes": [ |
| 49 | + "CWE-346" |
| 50 | + ] |
| 51 | + }, |
7 | 52 | { |
8 | 53 | "cveID": "CVE-2025-32756", |
9 | 54 | "vendorProject": "Fortinet", |
|
0 commit comments