Skip to content

Commit dd19c3c

Browse files
Update KEV: Tue Mar 25 00:12:24 UTC 2025
Signed-off-by: AboutCode Automation <[email protected]>
1 parent d25bd1b commit dd19c3c

File tree

1 file changed

+19
-4
lines changed

1 file changed

+19
-4
lines changed

known_exploited_vulnerabilities.json

Lines changed: 19 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,24 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2025.03.21",
4-
"dateReleased": "2025-03-21T18:00:56.2864Z",
5-
"count": 1307,
3+
"catalogVersion": "2025.03.24",
4+
"dateReleased": "2025-03-24T18:01:34.066Z",
5+
"count": 1308,
66
"vulnerabilities": [
7+
{
8+
"cveID": "CVE-2025-30154",
9+
"vendorProject": "reviewdog",
10+
"product": "action-setup GitHub Action",
11+
"vulnerabilityName": "reviewdog\/action-setup GitHub Action Embedded Malicious Code Vulnerability",
12+
"dateAdded": "2025-03-24",
13+
"shortDescription": "reviewdog action-setup GitHub Action contains an embedded malicious code vulnerability that dumps exposed secrets to Github Actions Workflow Logs.",
14+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15+
"dueDate": "2025-04-14",
16+
"knownRansomwareCampaignUse": "Unknown",
17+
"notes": "This vulnerability affects a common open-source project, third-party library, or a protocol used by different products. For more information, please see: https:\/\/github.com\/reviewdog\/reviewdog\/security\/advisories\/GHSA-qmg3-hpqr-gqvc ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-30154",
18+
"cwes": [
19+
"CWE-506"
20+
]
21+
},
722
{
823
"cveID": "CVE-2017-12637",
924
"vendorProject": "SAP",
@@ -55,7 +70,7 @@
5570
"product": "changed-files GitHub Action",
5671
"vulnerabilityName": "tj-actions\/changed-files GitHub Action Embedded Malicious Code Vulnerability",
5772
"dateAdded": "2025-03-18",
58-
"shortDescription": "The tj-actions\/changed-files GitHub Action contains an embedded malicious code vulnerability that allows a remote attacker to discover secrets by reading Github Actions Workflow Logs. These secrets may include, but are not limited to, valid AWS access keys, GitHub personal access tokens (PATs), npm tokens, and private RSA keys.",
73+
"shortDescription": "tj-actions\/changed-files GitHub Action contains an embedded malicious code vulnerability that allows a remote attacker to discover secrets by reading Github Actions Workflow Logs. These secrets may include, but are not limited to, valid AWS access keys, GitHub personal access tokens (PATs), npm tokens, and private RSA keys.",
5974
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
6075
"dueDate": "2025-04-08",
6176
"knownRansomwareCampaignUse": "Unknown",

0 commit comments

Comments
 (0)