Skip to content

Commit e31c532

Browse files
Update KEV: Wed Jul 2 00:13:21 UTC 2025
Signed-off-by: AboutCode Automation <[email protected]>
1 parent bad8357 commit e31c532

File tree

1 file changed

+33
-3
lines changed

1 file changed

+33
-3
lines changed

known_exploited_vulnerabilities.json

Lines changed: 33 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,39 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2025.06.30",
4-
"dateReleased": "2025-06-30T17:00:32.5907Z",
5-
"count": 1371,
3+
"catalogVersion": "2025.07.01",
4+
"dateReleased": "2025-07-01T17:00:59.134Z",
5+
"count": 1373,
66
"vulnerabilities": [
7+
{
8+
"cveID": "CVE-2025-48928",
9+
"vendorProject": "TeleMessage",
10+
"product": "TM SGNL",
11+
"vulnerabilityName": "TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability",
12+
"dateAdded": "2025-07-01",
13+
"shortDescription": "TeleMessage TM SGNL contains an exposure of core dump file to an unauthorized control sphere Vulnerability. This vulnerability is based on a JSP application in which the heap content is roughly equivalent to a \"core dump\" in which a password previously sent over HTTP would be included in this dump.",
14+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15+
"dueDate": "2025-07-22",
16+
"knownRansomwareCampaignUse": "Unknown",
17+
"notes": "It is recommended that mitigations be applied per vendor instructions if available. If these instructions cannot be located or if mitigations are unavailable, discontinue use of the product. ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-48928",
18+
"cwes": [
19+
"CWE-528"
20+
]
21+
},
22+
{
23+
"cveID": "CVE-2025-48927",
24+
"vendorProject": "TeleMessage",
25+
"product": "TM SGNL",
26+
"vulnerabilityName": "TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability",
27+
"dateAdded": "2025-07-01",
28+
"shortDescription": "TeleMessage TM SGNL contains an initialization of a resource with an insecure default vulnerability. This vulnerability relies on how the Spring Boot Actuator is configured with an exposed heap dump endpoint at a \/heapdump URI.",
29+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
30+
"dueDate": "2025-07-22",
31+
"knownRansomwareCampaignUse": "Unknown",
32+
"notes": "It is recommended that mitigations be applied per vendor instructions if available. If these instructions cannot be located or if mitigations are unavailable, discontinue use of the product. ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-48927",
33+
"cwes": [
34+
"CWE-1188"
35+
]
36+
},
737
{
838
"cveID": "CVE-2025-6543",
939
"vendorProject": "Citrix",

0 commit comments

Comments
 (0)