Skip to content

Commit

Permalink
CISA KEV Updates
Browse files Browse the repository at this point in the history
  • Loading branch information
rxerium committed Feb 7, 2025
1 parent e4add2f commit c1f1ff9
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 1 deletion.
5 changes: 5 additions & 0 deletions cisa-kev.csv
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
cveID,vendorProject,product,vulnerabilityName,dateAdded,shortDescription,requiredAction,dueDate,knownRansomwareCampaignUse,notes,cwes
CVE-2020-15069,Sophos,"XG Firewall","Sophos XG Firewall Buffer Overflow Vulnerability",2025-02-06,"Sophos XG Firewall contains a buffer overflow vulnerability that allows for remote code execution via the ""HTTP/S bookmark"" feature.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-27,Unknown,"https://community.sophos.com/b/security-blog/posts/advisory-buffer-overflow-vulnerability-in-user-portal ; https://nvd.nist.gov/vuln/detail/CVE-2020-15069",CWE-120
CVE-2020-29574,Sophos,CyberoamOS,"CyberoamOS (CROS) SQL Injection Vulnerability",2025-02-06,"CyberoamOS (CROS) contains a SQL injection vulnerability in the WebAdmin that allows an unauthenticated attacker to execute arbitrary SQL statements remotely.","The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.",2025-02-27,Unknown,"https://support.sophos.com/support/s/article/KBA-000007526 ; https://nvd.nist.gov/vuln/detail/CVE-2020-29574",CWE-89
CVE-2024-21413,Microsoft,"Office Outlook","Microsoft Outlook Improper Input Validation Vulnerability",2025-02-06,"Microsoft Outlook contains an improper input validation vulnerability that allows for remote code execution. Successful exploitation of this vulnerability would allow an attacker to bypass the Office Protected View and open in editing mode rather than protected mode.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-27,Unknown,"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21413 ; https://nvd.nist.gov/vuln/detail/CVE-2024-21413",CWE-20
CVE-2022-23748,Audinate,"Dante Discovery","Dante Discovery Process Control Vulnerability",2025-02-06,"Dante Discovery contains a process control vulnerability in mDNSResponder.exe that all allows for a DLL sideloading attack. A local attacker can leverage this vulnerability in the Dante Application Library to execute arbitrary code.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-27,Unknown,"https://www.getdante.com/support/faq/audinate-response-to-dante-discovery-mdnsresponder-exe-security-issue-cve-2022-23748/ ; https://nvd.nist.gov/vuln/detail/CVE-2022-23748",CWE-114
CVE-2025-0411,7-Zip,7-Zip,"7-Zip Mark of the Web Bypass Vulnerability",2025-02-06,"7-Zip contains a protection mechanism failure vulnerability that allows remote attackers to bypass the Mark-of-the-Web security feature to execute arbitrary code in the context of the current user.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-27,Unknown,"https://www.7-zip.org/history.txt ; https://nvd.nist.gov/vuln/detail/CVE-2025-0411",CWE-693
CVE-2024-53104,Linux,Kernel,"Linux Kernel Out-of-Bounds Write Vulnerability",2025-02-05,"Linux kernel contains an out-of-bounds write vulnerability in the uvc_parse_streaming component of the USB Video Class (UVC) driver that could allow for physical escalation of privilege.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-26,Unknown,"https://lore.kernel.org/linux-cve-announce/2024120232-CVE-2024-53104-d781@gregkh/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-53104",CWE-787
CVE-2018-19410,Paessler,"PTRG Network Monitor","Paessler PRTG Network Monitor Local File Inclusion Vulnerability",2025-02-04,"Paessler PRTG Network Monitor contains a local file inclusion vulnerability that allows a remote, unauthenticated attacker to create users with read-write privileges (including administrator).","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-25,Unknown,"https://www.paessler.com/prtg/history/prtg-18#18.2.41.1652 ; https://nvd.nist.gov/vuln/detail/CVE-2018-19410",
CVE-2018-9276,Paessler,"PRTG Network Monitor","Paessler PRTG Network Monitor OS Command Injection Vulnerability",2025-02-04,"Paessler PRTG Network Monitor contains an OS command injection vulnerability that allows an attacker with administrative privileges to execute commands via the PRTG System Administrator web console.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-25,Unknown,"https://www.paessler.com/prtg/history/prtg-18#18.2.39 ; https://nvd.nist.gov/vuln/detail/CVE-2018-9276",CWE-78
Expand Down
2 changes: 1 addition & 1 deletion nuclei-templates
Submodule nuclei-templates updated from c8017d to 2390fd

0 comments on commit c1f1ff9

Please sign in to comment.