Skip to content

Commit dce67df

Browse files
Update KEV: Wed Aug 6 00:14:22 UTC 2025
Signed-off-by: AboutCode Automation <[email protected]>
1 parent ae3065d commit dce67df

File tree

1 file changed

+46
-3
lines changed

1 file changed

+46
-3
lines changed

known_exploited_vulnerabilities.json

Lines changed: 46 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,52 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2025.08.04",
4-
"dateReleased": "2025-08-04T11:49:18.1053Z",
5-
"count": 1391,
3+
"catalogVersion": "2025.08.05",
4+
"dateReleased": "2025-08-05T18:03:16.7522Z",
5+
"count": 1394,
66
"vulnerabilities": [
7+
{
8+
"cveID": "CVE-2020-25078",
9+
"vendorProject": "D-Link",
10+
"product": "DCS-2530L and DCS-2670L Devices",
11+
"vulnerabilityName": "D-Link DCS-2530L and DCS-2670L Devices Unspecified Vulnerability",
12+
"dateAdded": "2025-08-05",
13+
"shortDescription": "D-Link DCS-2530L and DCS-2670L devices contains an unspecified vulnerability that could allow for remote administrator password disclosure. The impacted products could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization.",
14+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15+
"dueDate": "2025-08-26",
16+
"knownRansomwareCampaignUse": "Unknown",
17+
"notes": "https:\/\/support.dlink.com\/productinfo.aspx?m=DCS-2530L ; https:\/\/supportannouncement.us.dlink.com\/announcement\/publication.aspx?name=SAP10180 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-25078",
18+
"cwes": []
19+
},
20+
{
21+
"cveID": "CVE-2020-25079",
22+
"vendorProject": "D-Link",
23+
"product": "DCS-2530L and DCS-2670L Devices",
24+
"vulnerabilityName": "D-Link DCS-2530L and DCS-2670L Command Injection Vulnerability",
25+
"dateAdded": "2025-08-05",
26+
"shortDescription": "D-Link DCS-2530L and DCS-2670L devices contains a command injection vulnerability in the cgi-bin\/ddns_enc.cgi. The impacted products could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization.",
27+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
28+
"dueDate": "2025-08-26",
29+
"knownRansomwareCampaignUse": "Unknown",
30+
"notes": "https:\/\/support.dlink.com\/productinfo.aspx?m=DCS-2530L ; https:\/\/supportannouncement.us.dlink.com\/announcement\/publication.aspx?name=SAP10180 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-25079",
31+
"cwes": [
32+
"CWE-77"
33+
]
34+
},
35+
{
36+
"cveID": "CVE-2022-40799",
37+
"vendorProject": "D-Link",
38+
"product": "DNR-322L",
39+
"vulnerabilityName": "D-Link DNR-322L Download of Code Without Integrity Check Vulnerability",
40+
"dateAdded": "2025-08-05",
41+
"shortDescription": "D-Link DNR-322L contains a download of code without integrity check vulnerability that could allow an authenticated attacker to execute OS level commands on the device. The impacted products could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization.",
42+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
43+
"dueDate": "2025-08-26",
44+
"knownRansomwareCampaignUse": "Unknown",
45+
"notes": "https:\/\/www.dlink.com\/uk\/en\/products\/dnr-322l-cloud-network-video-recorder ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-40799",
46+
"cwes": [
47+
"CWE-494"
48+
]
49+
},
750
{
851
"cveID": "CVE-2023-2533",
952
"vendorProject": "PaperCut",

0 commit comments

Comments
 (0)