Skip to content

Commit

Permalink
CISA KEV Updates
Browse files Browse the repository at this point in the history
  • Loading branch information
rxerium committed Sep 20, 2024
1 parent 3e64311 commit b90f64b
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 3 deletions.
4 changes: 2 additions & 2 deletions cisa-kev.csv
Original file line number Diff line number Diff line change
Expand Up @@ -1176,7 +1176,7 @@ CVE-2013-0648,Adobe,"Flash Player","Adobe Flash Player Code Execution Vulnerabil
CVE-2013-0643,Adobe,"Flash Player","Adobe Flash Player Incorrect Default Permissions Vulnerability",2024-09-17,"Adobe Flash Player contains an incorrect default permissions vulnerability in the Firefox sandbox that allows a remote attacker to execute arbitrary code via crafted SWF content. ","The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.",2024-10-08,Unknown,"https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2013-0643",CWE-264
CVE-2014-0497,Adobe,"Flash Player","Adobe Flash Player Integer Underflow Vulnerablity",2024-09-17,"Adobe Flash Player contains an integer underflow vulnerability that allows a remote attacker to execute arbitrary code.","The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.",2024-10-08,Unknown,"https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2014-0497",CWE-191
CVE-2020-14644,Oracle,"WebLogic Server","Oracle WebLogic Server Remote Code Execution Vulnerability",2024-09-18,"Oracle WebLogic Server, a product within the Fusion Middleware suite, contains a deserialization vulnerability. Unauthenticated attackers with network access via T3 or IIOP can exploit this vulnerability to achieve remote code execution.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-10-09,Unknown,"https://www.oracle.com/security-alerts/cpujul2020.html ; https://nvd.nist.gov/vuln/detail/CVE-2020-14644",
CVE-2022-21445,Oracle,JDeveloper,"Oracle JDeveloper Remote Code Execution Vulnerability",2024-09-18,"Oracle JDeveloper, a product within the Fusion Middleware suite, contains an deserialization vulnerability the ADF Faces component, leading to unauthenticated remote code execution.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-10-09,Unknown,"https://www.oracle.com/security-alerts/cpuapr2022.html ; https://nvd.nist.gov/vuln/detail/CVE-2022-21445",
CVE-2019-1069,Microsoft,Windows,"Microsoft Windows Task Scheduler Privilege Escalation Vulnerability",2024-09-18,"Microsoft Windows Task Scheduler contains a privilege escalation vulnerability in the way that the SetJobFileSecurityByName() function is used that can allow an authenticated attacker to gain SYSTEM privileges on an affected system.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-10-09,Unknown,"https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2019-1069 ; https://nvd.nist.gov/vuln/detail/CVE-2019-1069",
CVE-2022-21445,Oracle,"ADF Faces","Oracle ADF Faces Deserialization of Untrusted Data Vulnerability",2024-09-18,"Oracle ADF Faces library, included with Oracle JDeveloper Distribution, contains a deserialization of untrusted data vulnerability leading to unauthenticated remote code execution.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-10-09,Unknown,"https://www.oracle.com/security-alerts/cpuapr2022.html ; https://nvd.nist.gov/vuln/detail/CVE-2022-21445",
CVE-2020-0618,Microsoft,"SQL Server","Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability",2024-09-18,"Microsoft SQL Server Reporting Services contains a deserialization vulnerability when handling page requests incorrectly. An authenticated attacker can exploit this vulnerability to execute code in the context of the Report Server service account.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-10-09,Unknown,"https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2020-0618 ; https://nvd.nist.gov/vuln/detail/CVE-2020-0618",
CVE-2024-27348,Apache,HugeGraph-Server,"Apache HugeGraph-Server Improper Access Control Vulnerability",2024-09-18,"Apache HugeGraph-Server contains an improper access control vulnerability that could allow a remote attacker to execute arbitrary code.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-10-09,Unknown,"This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://lists.apache.org/thread/nx6g6htyhpgtzsocybm242781o8w5kq9 ; https://nvd.nist.gov/vuln/detail/CVE-2024-27348",CWE-284
CVE-2024-8963,Ivanti,"Cloud Services Appliance (CSA)","Ivanti Cloud Services Appliance (CSA) Path Traversal Vulnerability",2024-09-19,"Ivanti Cloud Services Appliance (CSA) contains a path traversal vulnerability that could allow a remote, unauthenticated attacker to access restricted functionality. If CVE-2024-8963 is used in conjunction with CVE-2024-8190, an attacker could bypass admin authentication and execute arbitrary commands on the appliance.","As Ivanti CSA has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line of supported solutions, as future vulnerabilities on the 4.6.x version of CSA are unlikely to receive security updates.",2024-10-10,Unknown,"https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963 ; https://nvd.nist.gov/vuln/detail/CVE-2024-8963",CWE-22
2 changes: 1 addition & 1 deletion nuclei-templates
Submodule nuclei-templates updated from d38008 to afaf82

0 comments on commit b90f64b

Please sign in to comment.