diff --git "a/benchmark/task2_cve_linkage/test.jsonl" "b/benchmark/task2_cve_linkage/test.jsonl" deleted file mode 100644--- "a/benchmark/task2_cve_linkage/test.jsonl" +++ /dev/null @@ -1,550 +0,0 @@ -{"id": "CVE-2025-24472", "text": "Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability\n\nAffected: Fortinet FortiOS and FortiProxy\n\n Fortinet FortiOS and FortiProxy contain an authentication bypass vulnerability that allows a remote attacker to gain super-admin privileges via crafted CSF proxy requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE", "cve_id": "CVE-2025-24472", "title": "Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-18", "split": "test"} -{"id": "CVE-2026-20805", "text": "Microsoft Windows Information Disclosure Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Desktop Windows Manager contains an information disclosure vulnerability that allows an authorized attacker to disclose information locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-200\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2026-20805", "title": "Microsoft Windows Information Disclosure Vulnerability", "source": "cisa_kev", "timestamp": "2026-01-13", "split": "test"} -{"id": "CVE-2023-36424", "text": "Microsoft Windows Out-of-Bounds Read Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System Driver contains an out-of-bounds read vulnerability that could allow a threat actor for privileges escalation\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-125\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-36424", "title": "Microsoft Windows Out-of-Bounds Read Vulnerability", "source": "cisa_kev", "timestamp": "2026-04-13", "split": "test"} -{"id": "a88f257857671243ebfe", "text": "[Cross-Site Request Forgery (CSRF)] CVE-2023-49920: Apache Airflow: Missing CSRF protection on DAG/trigger\n\nDuring my testing, I've found that there is no CSRF protection in dag/trigger. If a user is logged in to his airflow account & has the permission to trigger a dag then an attacker can trick the user to run a dag unintentionally by the user.\n\nApache Airflow, version 2.7.0 through 2.7.3, has a vulnerability that allows an attacker to trigger a DAG in a GET request without CSRF validation. As", "cve_id": "CVE-2023-49920", "title": "CVE-2023-49920: Apache Airflow: Missing CSRF protection on DAG/trigger (Cross-Site Request Forgery (CSRF))", "source": "hackerone", "timestamp": "2024-01-09", "split": "test"} -{"id": "d45999b65ad9b54ac397", "text": "[Cryptographic Issues - Generic] CVE-2019-1551: rsaz_512_sqr overflow bug on x86_64\n\nThere is an overflow bug in the x64_64 Montgomery squaring procedure used in\nexponentiation with 512-bit moduli. No EC algorithms are affected. Analysis\nsuggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a\nresult of this defect would be very difficult to perform and are not believed\nlikely. Attacks against DH512 are considered just feasible. However, for an\nattack the target would hav", "cve_id": "CVE-2019-1551", "title": "CVE-2019-1551: rsaz_512_sqr overflow bug on x86_64 (Cryptographic Issues - Generic)", "source": "hackerone", "timestamp": "2024-05-09", "split": "test"} -{"id": "CVE-2024-43451", "text": "Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows contains an NTLMv2 hash spoofing vulnerability that could result in disclosing a user's NTLMv2 hash to an attacker via a file open operation. The attacker could then leverage this hash to impersonate that user.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-73\n\n[Source: CISA Known Exploited Vuln", "cve_id": "CVE-2024-43451", "title": "Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-12", "split": "test"} -{"id": "CVE-2025-43200", "text": "Apple Multiple Products Unspecified Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, watchOS, and visionOS, contain an unspecified vulnerability when processing a maliciously crafted photo or video shared via an iCloud Link.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-43200", "title": "Apple Multiple Products Unspecified Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-16", "split": "test"} -{"id": "CVE-2026-1731", "text": "BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection Vulnerability\n\nAffected: BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)\n\nBeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)contain an OS command injection vulnerability. Successful exploitation could allow an unauthenticated remote attacker to execute operating system commands in the context of the site user. Successful exploitation requires no authentication or user intera", "cve_id": "CVE-2026-1731", "title": "BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-13", "split": "test"} -{"id": "CVE-2025-53770", "text": "Microsoft SharePoint Deserialization of Untrusted Data Vulnerability\n\nAffected: Microsoft SharePoint\n\nMicrosoft SharePoint Server on-premises contains a deserialization of untrusted data vulnerability that could allow an unauthorized attacker to execute code over a network. This vulnerability could be chained with CVE-2025-53771. CVE-2025-53770 is a patch bypass for CVE-2025-49704, and the updates for CVE-2025-53770 include more robust protection than those for CVE-2025-49704.\n\nRequired Action:", "cve_id": "CVE-2025-53770", "title": "Microsoft SharePoint Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-20", "split": "test"} -{"id": "CVE-2014-0497", "text": "Adobe Flash Player Integer Underflow Vulnerablity\n\nAffected: Adobe Flash Player\n\nAdobe Flash Player contains an integer underflow vulnerability that allows a remote attacker to execute arbitrary code.\n\nRequired Action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.\n\nCWE(s): CWE-191\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2014-0497", "title": "Adobe Flash Player Integer Underflow Vulnerablity", "source": "cisa_kev", "timestamp": "2024-09-17", "split": "test"} -{"id": "a54f9d09c6c145bd1c1d", "text": "[Type Confusion] Incorrect Type Conversion in interpreting IPv4-mapped IPv6 addresses and below `curl` results in indeterminate SSRF vulnerabilities.\n\n## Summary:\nOctal Type Handling of Errors in IPv4 Mapped IPv6 Addresses in curl allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many programs that rely on curl. \n\n[RFC 4291](https://datatracker.ietf.org/doc/html/rfc4291#section-2-5-5) defines ways to embed an IPv4 address into IPv6 addresses. One of", "cve_id": "CVE-2023-24329", "title": "Incorrect Type Conversion in interpreting IPv4-mapped IPv6 addresses and below `curl` results in indeterminate SSRF vulnerabilities. (Type Confusion)", "source": "hackerone", "timestamp": "2024-05-08", "split": "test"} -{"id": "3f2b969c47844fb95e3e", "text": "[Unknown] CVE-2018-6389 exploitation - using scripts loader\n\nHi Team !\n\n\nUnauthenticated attackers can cause a denial of service (resource consumption) by using the large list of registered .js files (from wp-includes/script-loader.php) to construct a series of requests to load every file many times.\nThe vulnerability is registered as CVE-2018-6389.\nWordPress allows users to load multiple JS files and CSS files through load-scripts.php files at once. However, the number and size of files are no", "cve_id": "CVE-2018-6389", "title": "CVE-2018-6389 exploitation - using scripts loader (Unknown)", "source": "hackerone", "timestamp": "2024-02-13", "split": "test"} -{"id": "CVE-2025-26399", "text": "SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability\n\nAffected: SolarWinds Web Help Desk\n\nSolarWinds Web Help Desk contain a deserialization of untrusted data vulnerability in AjaxProxy that could allow an attacker to run commands on the host machine.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploi", "cve_id": "CVE-2025-26399", "title": "SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-09", "split": "test"} -{"id": "CVE-2025-27038", "text": "Qualcomm Multiple Chipsets Use-After-Free Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain a use-after-free vulnerability. This vulnerability allows for memory corruption while rendering graphics using Adreno GPU drivers in Chrome.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2025-27038", "title": "Qualcomm Multiple Chipsets Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-03", "split": "test"} -{"id": "CVE-2024-30051", "text": "Microsoft DWM Core Library Privilege Escalation Vulnerability\n\nAffected: Microsoft DWM Core Library\n\nMicrosoft DWM Core Library contains a privilege escalation vulnerability that allows an attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-30051", "title": " Microsoft DWM Core Library Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2024-05-14", "split": "test"} -{"id": "CVE-2024-40890", "text": "Zyxel DSL CPE OS Command Injection Vulnerability\n\nAffected: Zyxel DSL CPE Devices\n\nMultiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the CGI program that could allow an authenticated attacker to execute OS commands via a crafted HTTP request.\n\nRequired Action: The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA", "cve_id": "CVE-2024-40890", "title": "Zyxel DSL CPE OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-11", "split": "test"} -{"id": "367342c5bf29bfa20af3", "text": "[Deserialization of Untrusted Data] CVE-2023-46132\n\n# Long summary\n\n\n\nIn order to create a signature on a big chunk of data such as a block, the data needs to be \"compressed\" first to the input size of the signature algorithm.\n\nIn Fabric's case, we use a hash function which compressed a Fabric block from arbitrary size to a 32 byte string.\n\n \n\nIn order to understand the problem we need to be more specific: The block structure has three parts to it: (1) Header, (2) Transactions, and (3) Metadata", "cve_id": "CVE-2023-46132", "title": "CVE-2023-46132 (Deserialization of Untrusted Data)", "source": "hackerone", "timestamp": "2024-01-08", "split": "test"} -{"id": "CVE-2020-11023", "text": "JQuery Cross-Site Scripting (XSS) Vulnerability\n\nAffected: JQuery JQuery\n\nJQuery contains a persistent cross-site scripting (XSS) vulnerability. When passing maliciously formed, untrusted input enclosed in HTML tags, JQuery's DOM manipulators can execute untrusted code in the context of the user's browser.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Cat", "cve_id": "CVE-2020-11023", "title": "JQuery Cross-Site Scripting (XSS) Vulnerability", "source": "cisa_kev", "timestamp": "2025-01-23", "split": "test"} -{"id": "2e6181fb6ae75227eb67", "text": "[Unknown] CVE-2024-0853: OCSP verification bypass with TLS session reuse\n\nOriginal Report:https://hackerone.com/reports/2298922\n\n## Impact\n\nCWE-299: Improper Check for Certificate Revocation", "cve_id": "CVE-2024-0853", "title": "CVE-2024-0853: OCSP verification bypass with TLS session reuse (Unknown)", "source": "hackerone", "timestamp": "2024-03-27", "split": "test"} -{"id": "CVE-2024-28986", "text": "SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability\n\nAffected: SolarWinds Web Help Desk\n\nSolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that could allow for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-28986", "title": "SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2024-08-15", "split": "test"} -{"id": "CVE-2025-61882", "text": "Oracle E-Business Suite Unspecified Vulnerability\n\nAffected: Oracle E-Business Suite\n\nOracle E-Business Suite contains an unspecified vulnerability in the BI Publisher Integration component. The vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks can result in takeover of Oracle Concurrent Processing.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud ser", "cve_id": "CVE-2025-61882", "title": "Oracle E-Business Suite Unspecified Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-06", "split": "test"} -{"id": "CVE-2025-54313", "text": "Prettier eslint-config-prettier Embedded Malicious Code Vulnerability\n\nAffected: Prettier eslint-config-prettier\n\nPrettier eslint-config-prettier contains an embedded malicious code vulnerability. Installing an affected package executes an install.js file that launches the node-gyp.dll malware on Windows.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s):", "cve_id": "CVE-2025-54313", "title": "Prettier eslint-config-prettier Embedded Malicious Code Vulnerability", "source": "cisa_kev", "timestamp": "2026-01-22", "split": "test"} -{"id": "CVE-2024-44308", "text": "Apple Multiple Products Code Execution Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, macOS, and other Apple products contain an unspecified vulnerability when processing maliciously crafted web content that may lead to arbitrary code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-44308", "title": "Apple Multiple Products Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-21", "split": "test"} -{"id": "CVE-2022-43769", "text": "Hitachi Vantara Pentaho BA Server Special Element Injection Vulnerability\n\nAffected: Hitachi Vantara Pentaho Business Analytics (BA) Server\n\nHitachi Vantara Pentaho BA Server contains a special element injection vulnerability that allows an attacker to inject Spring templates into properties files, allowing for arbitrary command execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mit", "cve_id": "CVE-2022-43769", "title": "Hitachi Vantara Pentaho BA Server Special Element Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-03", "split": "test"} -{"id": "CVE-2026-1603", "text": "Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability\n\nAffected: Ivanti Endpoint Manager (EPM)\n\nIvanti Endpoint Manager (EPM) contains an authentication bypass using an alternate path or channel vulnerability that could allow a remote unauthenticated attacker to leak specific stored credential data.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nC", "cve_id": "CVE-2026-1603", "title": "Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-09", "split": "test"} -{"id": "CVE-2025-6558", "text": "Google Chromium ANGLE and GPU Improper Input Validation Vulnerability\n\nAffected: Google Chromium\n\nGoogle Chromium contains an improper input validation vulnerability in ANGLE and GPU. This vulnerability could allow a remote attacker to potentially perform a sandbox escape via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instr", "cve_id": "CVE-2025-6558", "title": "Google Chromium ANGLE and GPU Improper Input Validation Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-22", "split": "test"} -{"id": "CVE-2024-9380", "text": "Ivanti Cloud Services Appliance (CSA) OS Command Injection Vulnerability\n\nAffected: Ivanti Cloud Services Appliance (CSA)\n\nIvanti Cloud Services Appliance (CSA) contains an OS command injection vulnerability in the administrative console which can allow an authenticated attacker with application admin privileges to pass commands to the underlying OS.\n\nRequired Action: As Ivanti CSA 4.6.x has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line", "cve_id": "CVE-2024-9380", "title": "Ivanti Cloud Services Appliance (CSA) OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-10-09", "split": "test"} -{"id": "CVE-2007-0671", "text": "Microsoft Office Excel Remote Code Execution Vulnerability\n\nAffected: Microsoft Office\n\nMicrosoft Office Excel contains a remote code execution vulnerability that can be exploited when a specially crafted Excel file is opened. This malicious file could be delivered as an email attachment or hosted on a malicious website. An attacker could leverage this vulnerability by creating a specially crafted Excel file, which, when opened, allowing an attacker to execute remote code on the affected system.", "cve_id": "CVE-2007-0671", "title": "Microsoft Office Excel Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2025-08-12", "split": "test"} -{"id": "CVE-2024-29059", "text": "Microsoft .NET Framework Information Disclosure Vulnerability\n\nAffected: Microsoft .NET Framework\n\nMicrosoft .NET Framework contains an information disclosure vulnerability that exposes the ObjRef URI to an attacker, ultimately enabling remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-209\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-29059", "title": "Microsoft .NET Framework Information Disclosure Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-04", "split": "test"} -{"id": "CVE-2021-20123", "text": "Draytek VigorConnect Path Traversal Vulnerability \n\nAffected: DrayTek VigorConnect\n\nDraytek VigorConnect contains a path traversal vulnerability in the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Explo", "cve_id": "CVE-2021-20123", "title": "Draytek VigorConnect Path Traversal Vulnerability ", "source": "cisa_kev", "timestamp": "2024-09-03", "split": "test"} -{"id": "CVE-2025-64446", "text": "Fortinet FortiWeb Path Traversal Vulnerability\n\nAffected: Fortinet FortiWeb\n\nFortinet FortiWeb contains a relative path traversal vulnerability that may allow an unauthenticated attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-23\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2025-64446", "title": "Fortinet FortiWeb Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-11-14", "split": "test"} -{"id": "CVE-2025-27920", "text": "Srimax Output Messenger Directory Traversal Vulnerability\n\nAffected: Srimax Output Messenger\n\nSrimax Output Messenger contains a directory traversal vulnerability that allows an attacker to access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", "cve_id": "CVE-2025-27920", "title": "Srimax Output Messenger Directory Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-19", "split": "test"} -{"id": "CVE-2023-2533", "text": "PaperCut NG/MF Cross-Site Request Forgery (CSRF) Vulnerability\n\nAffected: PaperCut NG/MF\n\nPaperCut NG/MF contains a cross-site request forgery (CSRF) vulnerability, which, under specific conditions, could potentially enable an attacker to alter security settings or execute arbitrary code. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-352\n\n[Source", "cve_id": "CVE-2023-2533", "title": "PaperCut NG/MF Cross-Site Request Forgery (CSRF) Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-28", "split": "test"} -{"id": "CVE-2024-34102", "text": "Adobe Commerce and Magento Open Source Improper Restriction of XML External Entity Reference (XXE) Vulnerability\n\nAffected: Adobe Commerce and Magento Open Source\n\nAdobe Commerce and Magento Open Source contain an improper restriction of XML external entity reference (XXE) vulnerability that allows for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-611\n\n[Source: CISA Known Exploited", "cve_id": "CVE-2024-34102", "title": "Adobe Commerce and Magento Open Source Improper Restriction of XML External Entity Reference (XXE) Vulnerability", "source": "cisa_kev", "timestamp": "2024-07-17", "split": "test"} -{"id": "CVE-2024-3393", "text": "Palo Alto Networks PAN-OS Malicious DNS Packet Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nPalo Alto Networks PAN-OS contains a vulnerability in parsing and logging malicious DNS packets in the DNS Security feature that, when exploited, allows an unauthenticated attacker to remotely reboot the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the produc", "cve_id": "CVE-2024-3393", "title": "Palo Alto Networks PAN-OS Malicious DNS Packet Vulnerability", "source": "cisa_kev", "timestamp": "2024-12-30", "split": "test"} -{"id": "CVE-2025-59718", "text": "Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability\n\nAffected: Fortinet Multiple Products\n\nFortinet FortiOS, FortiSwitchMaster, FortiProxy, and FortiWeb contain an improper verification of cryptographic signature vulnerability that may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML message. Please be aware that CVE-2025-59719 pertains to the same problem and is mentioned in the same vendor advisory. Ens", "cve_id": "CVE-2025-59718", "title": "Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-16", "split": "test"} -{"id": "CVE-2025-41244", "text": "Broadcom VMware Aria Operations and VMware Tools Privilege Defined with Unsafe Actions Vulnerability\n\nAffected: Broadcom VMware Aria Operations and VMware Tools\n\nBroadcom VMware Aria Operations and VMware Tools contain a privilege defined with unsafe actions vulnerability. A malicious local actor with non-administrative privileges having access to a VM with VMware Tools installed and managed by Aria Operations with SDMP enabled may exploit this vulnerability to escalate privileges to root on the", "cve_id": "CVE-2025-41244", "title": "Broadcom VMware Aria Operations and VMware Tools Privilege Defined with Unsafe Actions Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-30", "split": "test"} -{"id": "CVE-2013-0643", "text": "Adobe Flash Player Incorrect Default Permissions Vulnerability\n\nAffected: Adobe Flash Player\n\nAdobe Flash Player contains an incorrect default permissions vulnerability in the Firefox sandbox that allows a remote attacker to execute arbitrary code via crafted SWF content. \n\nRequired Action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.\n\nCWE(s): CWE-264\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2013-0643", "title": "Adobe Flash Player Incorrect Default Permissions Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-17", "split": "test"} -{"id": "CVE-2013-0648", "text": "Adobe Flash Player Code Execution Vulnerability\n\nAffected: Adobe Flash Player\n\nAdobe Flash Player contains an unspecified vulnerability in the ExternalInterface ActionScript functionality that allows a remote attacker to execute arbitrary code via crafted SWF content.\n\nRequired Action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2013-0648", "title": "Adobe Flash Player Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-17", "split": "test"} -{"id": "CVE-2024-1086", "text": "Linux Kernel Use-After-Free Vulnerability\n\nAffected: Linux Kernel\n\nLinux kernel contains a use-after-free vulnerability in the netfilter: nf_tables component that allows an attacker to achieve local privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-1086", "title": "Linux Kernel Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2024-05-30", "split": "test"} -{"id": "CVE-2024-20481", "text": "Cisco ASA and FTD Denial-of-Service Vulnerability\n\nAffected: Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)\n\nCisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain a missing release of resource after effective lifetime vulnerability that could allow an unauthenticated, remote attacker to cause a denial-of-service (DoS) of the RAVPN service.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if miti", "cve_id": "CVE-2024-20481", "title": "Cisco ASA and FTD Denial-of-Service Vulnerability", "source": "cisa_kev", "timestamp": "2024-10-24", "split": "test"} -{"id": "CVE-2025-26633", "text": "Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Management Console (MMC) contains an improper neutralization vulnerability that allows an unauthorized attacker to bypass a security feature locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-707", "cve_id": "CVE-2025-26633", "title": "Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-11", "split": "test"} -{"id": "CVE-2024-27348", "text": "Apache HugeGraph-Server Improper Access Control Vulnerability\n\nAffected: Apache HugeGraph-Server\n\nApache HugeGraph-Server contains an improper access control vulnerability that could allow a remote attacker to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-27348", "title": "Apache HugeGraph-Server Improper Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-18", "split": "test"} -{"id": "CVE-2025-5419", "text": "Google Chromium V8 Out-of-Bounds Read and Write Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains an out-of-bounds read and write vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 2", "cve_id": "CVE-2025-5419", "title": "Google Chromium V8 Out-of-Bounds Read and Write Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-05", "split": "test"} -{"id": "CVE-2024-20953", "text": "Oracle Agile Product Lifecycle Management (PLM) Deserialization Vulnerability\n\nAffected: Oracle Agile Product Lifecycle Management (PLM)\n\nOracle Agile Product Lifecycle Management (PLM) contains a deserialization vulnerability that allows a low-privileged attacker with network access via HTTP to compromise the system.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulner", "cve_id": "CVE-2024-20953", "title": "Oracle Agile Product Lifecycle Management (PLM) Deserialization Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-24", "split": "test"} -{"id": "decdf246858ca8823e8d", "text": "[Uncontrolled Resource Consumption] CVE-2024-2398: HTTP/2 push headers memory-leak\n\n## Summary:\nFor each incoming `PUSH_PROMISE` header a new `name:value` string is allocated \nand the pointer to that string is stored in the `stream->push_headers` array.\n\n```\nh = aprintf(\"%s:%s\", name, value);\n if(h)\n stream->push_headers[stream->push_headers_used++] = h;\n```\n\nLibcurl will reject `PUSH_PROMISE` frames with too many headers.\nWhen the number of headers exceeds some threshold, `on_header` re", "cve_id": "CVE-2024-2398", "title": "CVE-2024-2398: HTTP/2 push headers memory-leak (Uncontrolled Resource Consumption)", "source": "hackerone", "timestamp": "2024-03-27", "split": "test"} -{"id": "CVE-2024-38106", "text": "Microsoft Windows Kernel Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Kernel contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges. Successful exploitation of this vulnerability requires an attacker to win a race condition.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-591\n\n[Source: CISA Known", "cve_id": "CVE-2024-38106", "title": "Microsoft Windows Kernel Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2024-08-13", "split": "test"} -{"id": "CVE-2023-29360", "text": "Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability\n\nAffected: Microsoft Streaming Service\n\nMicrosoft Streaming Service contains an untrusted pointer dereference vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-822\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-29360", "title": "Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability", "source": "cisa_kev", "timestamp": "2024-02-29", "split": "test"} -{"id": "CVE-2024-21887", "text": "Ivanti Connect Secure and Policy Secure Command Injection Vulnerability\n\nAffected: Ivanti Connect Secure and Policy Secure\n\nIvanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure contain a command injection vulnerability in the web components of these products, which can allow an authenticated administrator to send crafted requests to execute code on affected appliances. This vulnerability can be leveraged in conjunction with CVE-2023-46805, an authenticated", "cve_id": "CVE-2024-21887", "title": "Ivanti Connect Secure and Policy Secure Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-10", "split": "test"} -{"id": "CVE-2024-53150", "text": "Linux Kernel Out-of-Bounds Read Vulnerability\n\nAffected: Linux Kernel\n\nLinux Kernel contains an out-of-bounds read vulnerability in the USB-audio driver that allows a local, privileged attacker to obtain potentially sensitive information.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-125\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-53150", "title": "Linux Kernel Out-of-Bounds Read Vulnerability", "source": "cisa_kev", "timestamp": "2025-04-09", "split": "test"} -{"id": "CVE-2025-2776", "text": "SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability\n\nAffected: SysAid SysAid On-Prem\n\nSysAid On-Prem contains an improper restriction of XML external entity reference vulnerability in the Server URL processing functionality, allowing for administrator account takeover and file read primitives.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are una", "cve_id": "CVE-2025-2776", "title": "SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-22", "split": "test"} -{"id": "CVE-2024-4947", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-4947", "title": "Google Chromium V8 Type Confusion Vulnerability", "source": "cisa_kev", "timestamp": "2024-05-20", "split": "test"} -{"id": "CVE-2024-9465", "text": "Palo Alto Networks Expedition SQL Injection Vulnerability\n\nAffected: Palo Alto Networks Expedition\n\nPalo Alto Networks Expedition contains a SQL injection vulnerability that allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of t", "cve_id": "CVE-2024-9465", "title": "Palo Alto Networks Expedition SQL Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-14", "split": "test"} -{"id": "CVE-2025-4632", "text": "Samsung MagicINFO 9 Server Path Traversal Vulnerability\n\nAffected: Samsung MagicINFO 9 Server\n\nSamsung MagicINFO 9 Server contains a path traversal vulnerability that allows an attacker to write arbitrary file as system authority.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-4632", "title": "Samsung MagicINFO 9 Server Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-22", "split": "test"} -{"id": "CVE-2025-11953", "text": "React Native Community CLI OS Command Injection Vulnerability\n\nAffected: React Native Community CLI\n\nReact Native Community CLI contains an OS command injection vulnerability which could allow unauthenticated network attackers to send POST requests to the Metro Development Server and run arbitrary executables via a vulnerable endpoint exposed by the server. On Windows, attackers can also execute arbitrary shell commands with fully controlled arguments.\n\nRequired Action: Apply mitigations per ven", "cve_id": "CVE-2025-11953", "title": "React Native Community CLI OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-05", "split": "test"} -{"id": "CVE-2025-34028", "text": "Commvault Command Center Path Traversal Vulnerability\n\nAffected: Commvault Command Center\n\nCommvault Command Center contains a path traversal vulnerability that allows a remote, unauthenticated attacker to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-34028", "title": "Commvault Command Center Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-02", "split": "test"} -{"id": "CVE-2023-6549", "text": "Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability\n\nAffected: Citrix NetScaler ADC and NetScaler Gateway\n\nCitrix NetScaler ADC and NetScaler Gateway contain a buffer overflow vulnerability that allows for a denial-of-service when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-119\n\n[Source:", "cve_id": "CVE-2023-6549", "title": "Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-17", "split": "test"} -{"id": "CVE-2023-20118", "text": "Cisco Small Business RV Series Routers Command Injection Vulnerability\n\nAffected: Cisco Small Business RV Series Routers\n\nMultiple Cisco Small Business RV Series Routers contains a command injection vulnerability in the web-based management interface. Successful exploitation could allow an authenticated, remote attacker to gain root-level privileges and access unauthorized data.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services,", "cve_id": "CVE-2023-20118", "title": "Cisco Small Business RV Series Routers Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-03", "split": "test"} -{"id": "CVE-2026-1281", "text": "Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability\n\nAffected: Ivanti Endpoint Manager Mobile (EPMM)\n\nIvanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2026-1281", "title": "Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2026-01-29", "split": "test"} -{"id": "CVE-2025-21480", "text": "Qualcomm Multiple Chipsets Incorrect Authorization Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain an incorrect authorization vulnerability. This vulnerability allows for memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations ar", "cve_id": "CVE-2025-21480", "title": "Qualcomm Multiple Chipsets Incorrect Authorization Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-03", "split": "test"} -{"id": "d67b67fb54248cf71d6f", "text": "[Improper Certificate Validation] CVE-2024-2379: QUIC certificate check bypass with wolfSSL\n\nSee https://hackerone.com/reports/2410774 or https://curl.se/docs/CVE-2024-2379.html\n\n## Impact\n\nSee https://hackerone.com/reports/2410774 or https://curl.se/docs/CVE-2024-2379.html", "cve_id": "CVE-2024-2379", "title": "CVE-2024-2379: QUIC certificate check bypass with wolfSSL (Improper Certificate Validation)", "source": "hackerone", "timestamp": "2024-03-29", "split": "test"} -{"id": "CVE-2017-7921", "text": "Hikvision Multiple Products Improper Authentication Vulnerability\n\nAffected: Hikvision Multiple Products\n\nMultiple Hikvision products contain an improper authentication vulnerability that could allow a malicious user to escalate privileges on the system and gain access to sensitive information.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-287\n\n[S", "cve_id": "CVE-2017-7921", "title": "Hikvision Multiple Products Improper Authentication Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-05", "split": "test"} -{"id": "CVE-2024-43572", "text": "Microsoft Windows Management Console Remote Code Execution Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Management Console contains unspecified vulnerability that allows for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-707\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-43572", "title": "Microsoft Windows Management Console Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2024-10-08", "split": "test"} -{"id": "CVE-2024-37085", "text": "VMware ESXi Authentication Bypass Vulnerability\n\nAffected: VMware ESXi\n\nVMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigati", "cve_id": "CVE-2024-37085", "title": "VMware ESXi Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2024-07-30", "split": "test"} -{"id": "CVE-2025-31201", "text": "Apple Multiple Products Arbitrary Read and Write Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and other Apple products contain an arbitrary read and write vulnerability that allows an attacker to bypass Pointer Authentication.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-31201", "title": "Apple Multiple Products Arbitrary Read and Write Vulnerability", "source": "cisa_kev", "timestamp": "2025-04-17", "split": "test"} -{"id": "CVE-2023-38950", "text": "ZKTeco BioTime Path Traversal Vulnerability\n\nAffected: ZKTeco BioTime\n\nZKTeco BioTime contains a path traversal vulnerability in the iclock API that allows an unauthenticated attacker to read arbitrary files via supplying a crafted payload.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-38950", "title": "ZKTeco BioTime Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-19", "split": "test"} -{"id": "CVE-2025-6543", "text": "Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability\n\nAffected: Citrix NetScaler ADC and Gateway\n\nCitrix NetScaler ADC and Gateway contain a buffer overflow vulnerability leading to unintended control flow and Denial of Service. NetScaler must be configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the produ", "cve_id": "CVE-2025-6543", "title": "Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-30", "split": "test"} -{"id": "CVE-2025-52691", "text": "SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability\n\nAffected: SmarterTools SmarterMail\n\nSmarterTools SmarterMail contains an unrestricted upload of file with dangerous type vulnerability that could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or disco", "cve_id": "CVE-2025-52691", "title": "SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability", "source": "cisa_kev", "timestamp": "2026-01-26", "split": "test"} -{"id": "62f7c44fb53195b57fbf", "text": "[Unknown] CVE-2024-2398: HTTP/2 push headers memory-leak\n\nA memory leak was found in libcurl in handling HTTP/2 push headers, which could lead to a denial of service due to memory exhaustion.\nOriginal report: https://hackerone.com/reports/2402845\n\n## Impact\n\ndenial of service", "cve_id": "CVE-2024-2398", "title": "CVE-2024-2398: HTTP/2 push headers memory-leak (Unknown)", "source": "hackerone", "timestamp": "2024-04-22", "split": "test"} -{"id": "CVE-2025-47729", "text": "TeleMessage TM SGNL Hidden Functionality Vulnerability\n\nAffected: TeleMessage TM SGNL\n\nTeleMessage TM SGNL contains a hidden functionality vulnerability in which the archiving backend holds cleartext copies of messages from TM SGNL application users.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-912\n\n[Source: CISA Known Exploited Vulnerabilities C", "cve_id": "CVE-2025-47729", "title": "TeleMessage TM SGNL Hidden Functionality Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-12", "split": "test"} -{"id": "CVE-2023-7028", "text": "GitLab Community and Enterprise Editions Improper Access Control Vulnerability\n\nAffected: GitLab GitLab CE/EE\n\nGitLab Community and Enterprise Editions contain an improper access control vulnerability. This allows an attacker to trigger password reset emails to be sent to an unverified email address to ultimately facilitate an account takeover.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source:", "cve_id": "CVE-2023-7028", "title": "GitLab Community and Enterprise Editions Improper Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2024-05-01", "split": "test"} -{"id": "4b57a5274b5031076b91", "text": "[Improper Authentication - Generic] CVE-2024-25128: Apache Airflow: Authentication Bypass when Legacy OpenID(2.0) is in use as AUTH_TYPE\n\nWhen OpenID(2.0) is in use as Authentication Type, it is possible for an attacker to forge authentication to any existing account in the Target Airflow installation. This was possible via deceiving the backend of app to trust arbitrary OpenID 2.0 Identity Provider(even if the provider is not in the trusted IDP list in config). In conclusion, an attacker could", "cve_id": "CVE-2024-25128", "title": "CVE-2024-25128: Apache Airflow: Authentication Bypass when Legacy OpenID(2.0) is in use as AUTH_TYPE (Improper Authentication - Generic)", "source": "hackerone", "timestamp": "2024-04-28", "split": "test"} -{"id": "CVE-2023-34048", "text": "VMware vCenter Server Out-of-Bounds Write Vulnerability\n\nAffected: VMware vCenter Server\n\nVMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol that allows an attacker to conduct remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-34048", "title": "VMware vCenter Server Out-of-Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-22", "split": "test"} -{"id": "5e6ccf1ed3b2db15dcbb", "text": "[Uncontrolled Resource Consumption] http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks\n\nI'd like to report Node.js vulnerability (CVE-2024-22019) that was recently fixed:\n- HackerOne report: https://hackerone.com/reports/2233486\n- Release notes: https://nodejs.org/en/blog/vulnerability/february-2024-security-releases\n\n## Impact\n\nThis is a major issue because it allows unbounded resource (CPU, network bandwidth) consumption of the standard Node.js http server", "cve_id": "CVE-2024-22019", "title": "http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (Uncontrolled Resource Consumption)", "source": "hackerone", "timestamp": "2024-03-05", "split": "test"} -{"id": "CVE-2023-0386", "text": "Linux Kernel Improper Ownership Management Vulnerability\n\nAffected: Linux Kernel\n\nLinux Kernel contains an improper ownership management vulnerability, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.\n\nRequired Action: Apply mitigations per vendor instruct", "cve_id": "CVE-2023-0386", "title": "Linux Kernel Improper Ownership Management Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-17", "split": "test"} -{"id": "CVE-2025-61932", "text": "Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability\n\nAffected: Motex LANSCOPE Endpoint Manager\n\nMotex LANSCOPE Endpoint Manager contains an improper verification of source of a communication channel vulnerability allowing an attacker to execute arbitrary code by sending specially crafted packets.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the produ", "cve_id": "CVE-2025-61932", "title": "Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-22", "split": "test"} -{"id": "CVE-2016-20017", "text": "D-Link DSL-2750B Devices Command Injection Vulnerability\n\nAffected: D-Link DSL-2750B Devices\n\nD-Link DSL-2750B devices contain a command injection vulnerability that allows remote, unauthenticated command injection via the login.cgi cli parameter.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-77\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2016-20017", "title": "D-Link DSL-2750B Devices Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-08", "split": "test"} -{"id": "CVE-2025-38352", "text": "Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability\n\nAffected: Linux Kernel\n\nLinux kernel contains a time-of-check time-of-use (TOCTOU) race condition vulnerability that has a high impact on confidentiality, integrity, and availability.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-367\n\n[Source: CISA Known Exploited Vulner", "cve_id": "CVE-2025-38352", "title": "Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability", "source": "cisa_kev", "timestamp": "2025-09-04", "split": "test"} -{"id": "CVE-2025-66644", "text": "Array Networks ArrayOS AG OS Command Injection Vulnerability\n\nAffected: Array Networks ArrayOS AG\n\nArray Networks ArrayOS AG contains an OS command injection vulnerability that could allow an attacker to execute arbitrary commands.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-66644", "title": "Array Networks ArrayOS AG OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-08", "split": "test"} -{"id": "CVE-2021-40407", "text": "Reolink RLC-410W IP Camera OS Command Injection Vulnerability \n\nAffected: Reolink RLC-410W IP Camera\n\nReolink RLC-410W IP cameras contain an authenticated OS command injection vulnerability in the device network settings functionality.\n\nRequired Action: The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2021-40407", "title": "Reolink RLC-410W IP Camera OS Command Injection Vulnerability ", "source": "cisa_kev", "timestamp": "2024-12-18", "split": "test"} -{"id": "CVE-2024-7694", "text": "TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability\n\nAffected: TeamT5 ThreatSonar Anti-Ransomware\n\nTeamT5 ThreatSonar Anti-Ransomware contains an unrestricted upload of file with dangerous type vulnerability. ThreatSonar Anti-Ransomware does not properly validate the content of uploaded files. Remote attackers with administrator privileges on the product platform can upload malicious files, which can be used to execute arbitrary system commands on the", "cve_id": "CVE-2024-7694", "title": "TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-17", "split": "test"} -{"id": "CVE-2024-12686", "text": "BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) OS Command Injection Vulnerability\n\nAffected: BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS)\n\nBeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) contain an OS command injection vulnerability that can be exploited by an attacker with existing administrative privileges to upload a malicious file. Successful exploitation of this vulnerability can allow a remote attacker to execute underlying opera", "cve_id": "CVE-2024-12686", "title": "BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-01-13", "split": "test"} -{"id": "CVE-2025-5086", "text": "Dassault Systèmes DELMIA Apriso Deserialization of Untrusted Data Vulnerability\n\nAffected: Dassault Systèmes DELMIA Apriso\n\nDassault Systèmes DELMIA Apriso contains a deserialization of untrusted data vulnerability that could lead to a remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabi", "cve_id": "CVE-2025-5086", "title": "Dassault Systèmes DELMIA Apriso Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2025-09-11", "split": "test"} -{"id": "CVE-2025-20281", "text": "Cisco Identity Services Engine Injection Vulnerability\n\nAffected: Cisco Identity Services Engine\n\nCisco Identity Services Engine contains an injection vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC due to insufficient validation of user-supplied input allowing an attacker to exploit this vulnerability by submitting a crafted API request. Successful exploitation could allow an attacker to perform remote code execution and obtaining root privileges on an affected device.\n\nRequired", "cve_id": "CVE-2025-20281", "title": "Cisco Identity Services Engine Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-28", "split": "test"} -{"id": "190aa7d39e5adebaf7dc", "text": "[Improper Check for Certificate Revocation] CVE-2024-0853: OCSP verification bypass with TLS session reuse\n\n## Summary:\nIn version 8.5.0, cURL has inadvertently established a pathway for accepting revoked certificates.\nAs a result of [this correction](https://github.com/curl/curl/pull/12418/commits/7cf0391bbc3b5b2e4402ce675124cd73dbe0187e), during TLS session reuse, OCSP stapling verification will be skipped. \nHowever, the TLS session will be preserved regardless of OCSP verification results. \nA", "cve_id": "CVE-2024-0853", "title": "CVE-2024-0853: OCSP verification bypass with TLS session reuse (Improper Check for Certificate Revocation)", "source": "hackerone", "timestamp": "2024-01-31", "split": "test"} -{"id": "CVE-2026-23760", "text": "SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability\n\nAffected: SmarterTools SmarterMail\n\nSmarterTools SmarterMail contains an authentication bypass using an alternate path or channel vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. This could allow an unauthenticated attacker to supply a target ad", "cve_id": "CVE-2026-23760", "title": "SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability", "source": "cisa_kev", "timestamp": "2026-01-26", "split": "test"} -{"id": "CVE-2024-38475", "text": "Apache HTTP Server Improper Escaping of Output Vulnerability\n\nAffected: Apache HTTP Server\n\nApache HTTP Server contains an improper escaping of output vulnerability in mod_rewrite that allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for", "cve_id": "CVE-2024-38475", "title": "Apache HTTP Server Improper Escaping of Output Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-01", "split": "test"} -{"id": "CVE-2024-5910", "text": "Palo Alto Networks Expedition Missing Authentication Vulnerability\n\nAffected: Palo Alto Networks Expedition\n\nPalo Alto Networks Expedition contains a missing authentication vulnerability that allows an attacker with network access to takeover an Expedition admin account and potentially access configuration secrets, credentials, and other data.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-306\n\n[Source: C", "cve_id": "CVE-2024-5910", "title": "Palo Alto Networks Expedition Missing Authentication Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-07", "split": "test"} -{"id": "CVE-2024-21287", "text": "Oracle Agile Product Lifecycle Management (PLM) Incorrect Authorization Vulnerability\n\nAffected: Oracle Agile Product Lifecycle Management (PLM)\n\nOracle Agile Product Lifecycle Management (PLM) contains an incorrect authorization vulnerability in the Process Extension component of the Software Development Kit. Successful exploitation of this vulnerability may result in unauthenticated file disclosure.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product i", "cve_id": "CVE-2024-21287", "title": "Oracle Agile Product Lifecycle Management (PLM) Incorrect Authorization Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-21", "split": "test"} -{"id": "CVE-2024-53197", "text": "Linux Kernel Out-of-Bounds Access Vulnerability\n\nAffected: Linux Kernel\n\nLinux Kernel contains an out-of-bounds access vulnerability in the USB-audio driver that allows an attacker with physical access to the system to use a malicious USB device to potentially manipulate system memory, escalate privileges, or execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigation", "cve_id": "CVE-2024-53197", "title": "Linux Kernel Out-of-Bounds Access Vulnerability", "source": "cisa_kev", "timestamp": "2025-04-09", "split": "test"} -{"id": "CVE-2023-24955", "text": "Microsoft SharePoint Server Code Injection Vulnerability\n\nAffected: Microsoft SharePoint Server\n\nMicrosoft SharePoint Server contains a code injection vulnerability that allows an authenticated attacker with Site Owner privileges to execute code remotely.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-24955", "title": "Microsoft SharePoint Server Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-03-26", "split": "test"} -{"id": "CVE-2023-43000", "text": "Apple Multiple products Use-After-Free Vulnerability\n\nAffected: Apple Multiple Products\n\nApple macOS, iOS, iPadOS, and Safari 16.6 contain a use-after-free vulnerability due to the processing of maliciously crafted web content that may lead to memory corruption.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulne", "cve_id": "CVE-2023-43000", "title": "Apple Multiple products Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-05", "split": "test"} -{"id": "CVE-2024-38107", "text": "Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Power Dependency Coordinator contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to obtain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38107", "title": "Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2024-08-13", "split": "test"} -{"id": "CVE-2024-11120", "text": "GeoVision Devices OS Command Injection Vulnerability\n\nAffected: GeoVision Multiple Devices\n\nMultiple GeoVision devices contain an OS command injection vulnerability that allows a remote, unauthenticated attacker to inject and execute arbitrary system commands. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud service", "cve_id": "CVE-2024-11120", "title": "GeoVision Devices OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-07", "split": "test"} -{"id": "CVE-2025-9377", "text": "TP-Link Archer C7(EU) and TL-WR841N/ND(MS) OS Command Injection Vulnerability\n\nAffected: TP-Link Multiple Routers\n\nTP-Link Archer C7(EU) and TL-WR841N/ND(MS) contain an OS command injection vulnerability that exists in the Parental Control page. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontin", "cve_id": "CVE-2025-9377", "title": "TP-Link Archer C7(EU) and TL-WR841N/ND(MS) OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-09-03", "split": "test"} -{"id": "CVE-2024-38112", "text": "Microsoft Windows MSHTML Platform Spoofing Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows MSHTML Platform contains a spoofing vulnerability that has a high impact to confidentiality, integrity, and availability.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-451\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38112", "title": "Microsoft Windows MSHTML Platform Spoofing Vulnerability", "source": "cisa_kev", "timestamp": "2024-07-09", "split": "test"} -{"id": "CVE-2024-38812", "text": "VMware vCenter Server Heap-Based Buffer Overflow Vulnerability\n\nAffected: VMware vCenter Server\n\nVMware vCenter Server contains a heap-based buffer overflow vulnerability in the implementation of the DCERPC protocol. This vulnerability could allow an attacker with network access to the vCenter Server to execute remote code by sending a specially crafted packet.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): C", "cve_id": "CVE-2024-38812", "title": "VMware vCenter Server Heap-Based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-20", "split": "test"} -{"id": "CVE-2025-7775", "text": "Citrix NetScaler Memory Overflow Vulnerability\n\nAffected: Citrix NetScaler\n\nCitrix NetScaler ADC and NetScaler Gateway contain a memory overflow vulnerability that could allow for remote code execution and/or denial of service.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-119\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-7775", "title": "Citrix NetScaler Memory Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2025-08-26", "split": "test"} -{"id": "CVE-2025-3248", "text": "Langflow Missing Authentication Vulnerability\n\nAffected: Langflow Langflow\n\nLangflow contains a missing authentication vulnerability in the /api/v1/validate/code endpoint that allows a remote, unauthenticated attacker to execute arbitrary code via crafted HTTP requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-306\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2025-3248", "title": "Langflow Missing Authentication Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-05", "split": "test"} -{"id": "CVE-2025-6554", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains a type confusion vulnerability that could allow a remote attacker to perform arbitrary read/write via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or", "cve_id": "CVE-2025-6554", "title": "Google Chromium V8 Type Confusion Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-02", "split": "test"} -{"id": "CVE-2020-2883", "text": "Oracle WebLogic Server Unspecified Vulnerability\n\nAffected: Oracle WebLogic Server\n\nOracle WebLogic Server, a product within the Fusion Middleware suite, contains an unspecified vulnerability exploitable by an unauthenticated attacker with network access via IIOP or T3.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2020-2883", "title": "Oracle WebLogic Server Unspecified Vulnerability", "source": "cisa_kev", "timestamp": "2025-01-07", "split": "test"} -{"id": "CVE-2026-1340", "text": "Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability\n\nAffected: Ivanti Endpoint Manager Mobile (EPMM)\n\nIvanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2026-1340", "title": "Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2026-04-08", "split": "test"} -{"id": "CVE-2023-29357", "text": "Microsoft SharePoint Server Privilege Escalation Vulnerability\n\nAffected: Microsoft SharePoint Server\n\nMicrosoft SharePoint Server contains an unspecified vulnerability that allows an unauthenticated attacker, who has gained access to spoofed JWT authentication tokens, to use them for executing a network attack. This attack bypasses authentication, enabling the attacker to gain administrator privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product", "cve_id": "CVE-2023-29357", "title": "Microsoft SharePoint Server Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-10", "split": "test"} -{"id": "CVE-2024-32113", "text": "Apache OFBiz Path Traversal Vulnerability\n\nAffected: Apache OFBiz\n\nApache OFBiz contains a path traversal vulnerability that could allow for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-32113", "title": "Apache OFBiz Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2024-08-07", "split": "test"} -{"id": "CVE-2026-33017", "text": "Langflow Code Injection Vulnerability\n\nAffected: Langflow Langflow\n\nLangflow contains a code injection vulnerability that could allow building public flows without requiring authentication.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94, CWE-95, CWE-306\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2026-33017", "title": "Langflow Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-25", "split": "test"} -{"id": "CVE-2019-9621", "text": "Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery (SSRF) Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a server-side request forgery (SSRF) vulnerability via the ProxyServlet component.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-918, CWE-807\n\n[Source: CISA", "cve_id": "CVE-2019-9621", "title": "Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery (SSRF) Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-07", "split": "test"} -{"id": "CVE-2026-24061", "text": "GNU InetUtils Argument Injection Vulnerability\n\nAffected: GNU InetUtils\n\nGNU InetUtils contains an argument injection vulnerability in telnetd that could allow for remote authentication bypass via a \"-f root\" value for the USER environment variable.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-88\n\n[Source: CISA Known Exploited Vulnerabilities Cat", "cve_id": "CVE-2026-24061", "title": "GNU InetUtils Argument Injection Vulnerability", "source": "cisa_kev", "timestamp": "2026-01-26", "split": "test"} -{"id": "CVE-2025-21418", "text": "Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Ancillary Function Driver for WinSock contains a heap-based buffer overflow vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited", "cve_id": "CVE-2025-21418", "title": "Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-11", "split": "test"} -{"id": "CVE-2021-40655", "text": "D-Link DIR-605 Router Information Disclosure Vulnerability\n\nAffected: D-Link DIR-605 Router\n\nD-Link DIR-605 routers contain an information disclosure vulnerability that allows attackers to obtain a username and password by forging a post request to the /getcfg.php page. \n\nRequired Action: This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instruc", "cve_id": "CVE-2021-40655", "title": "D-Link DIR-605 Router Information Disclosure Vulnerability", "source": "cisa_kev", "timestamp": "2024-05-16", "split": "test"} -{"id": "CVE-2024-6670", "text": "Progress WhatsUp Gold SQL Injection Vulnerability\n\nAffected: Progress WhatsUp Gold\n\nProgress WhatsUp Gold contains a SQL injection vulnerability that allows an unauthenticated attacker to retrieve the user's encrypted password if the application is configured with only a single user.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-89\n\n[Source: CISA Known Exploited Vulnerabilities Catalog", "cve_id": "CVE-2024-6670", "title": "Progress WhatsUp Gold SQL Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-16", "split": "test"} -{"id": "CVE-2026-32201", "text": "Microsoft SharePoint Server Improper Input Validation Vulnerability\n\nAffected: Microsoft SharePoint Server\n\nMicrosoft SharePoint Server contains an improper input validation vulnerability that allows an unauthorized attacker to perform spoofing over a network.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-20\n\n[Source: CISA Known Exploited Vulnerab", "cve_id": "CVE-2026-32201", "title": "Microsoft SharePoint Server Improper Input Validation Vulnerability", "source": "cisa_kev", "timestamp": "2026-04-14", "split": "test"} -{"id": "CVE-2024-4610", "text": "Arm Mali GPU Kernel Driver Use-After-Free Vulnerability\n\nAffected: Arm Mali GPU Kernel Driver\n\nArm Bifrost and Valhall GPU kernel drivers contain a use-after-free vulnerability that allows a local, non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Ca", "cve_id": "CVE-2024-4610", "title": "Arm Mali GPU Kernel Driver Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2024-06-12", "split": "test"} -{"id": "CVE-2021-20124", "text": "Draytek VigorConnect Path Traversal Vulnerability \n\nAffected: DrayTek VigorConnect\n\nDraytek VigorConnect contains a path traversal vulnerability in the file download functionality of the WebServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22", "cve_id": "CVE-2021-20124", "title": "Draytek VigorConnect Path Traversal Vulnerability ", "source": "cisa_kev", "timestamp": "2024-09-03", "split": "test"} -{"id": "CVE-2025-64328", "text": "Sangoma FreePBX OS Command Injection Vulnerability\n\nAffected: Sangoma FreePBX\n\nSangoma FreePBX Endpoint Manager contains an OS command injection vulnerability that could allow for a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function. An attacker can leverage this vulnerability to potentially obtain remote access to the system as an asterisk user. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicabl", "cve_id": "CVE-2025-64328", "title": "Sangoma FreePBX OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-03", "split": "test"} -{"id": "CVE-2014-3931", "text": "Multi-Router Looking Glass (MRLG) Buffer Overflow Vulnerability\n\nAffected: Looking Glass Multi-Router Looking Glass (MRLG)\n\nMulti-Router Looking Glass (MRLG) contains a buffer overflow vulnerability that could allow remote attackers to cause an arbitrary memory write and memory corruption.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-119\n\n[Source", "cve_id": "CVE-2014-3931", "title": "Multi-Router Looking Glass (MRLG) Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-07", "split": "test"} -{"id": "CVE-2024-12987", "text": "DrayTek Vigor Routers OS Command Injection Vulnerability\n\nAffected: DrayTek Vigor Routers\n\nDrayTek Vigor2960, Vigor300B, and Vigor3900 routers contain an OS command injection vulnerability due to an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component web management interface.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s", "cve_id": "CVE-2024-12987", "title": "DrayTek Vigor Routers OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-15", "split": "test"} -{"id": "CVE-2026-21510", "text": "Microsoft Windows Shell Protection Mechanism Failure Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploited Vulne", "cve_id": "CVE-2026-21510", "title": "Microsoft Windows Shell Protection Mechanism Failure Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-10", "split": "test"} -{"id": "CVE-2021-32030", "text": "ASUS Routers Improper Authentication Vulnerability\n\nAffected: ASUS Routers\n\nASUS Lyra Mini and ASUS GT-AC2900 devices contain an improper authentication vulnerability that allows an attacker to gain unauthorized access to the administrative interface. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or dis", "cve_id": "CVE-2021-32030", "title": "ASUS Routers Improper Authentication Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-02", "split": "test"} -{"id": "CVE-2025-55182", "text": "Meta React Server Components Remote Code Execution Vulnerability\n\nAffected: Meta React Server Components\n\nMeta React Server Components contains a remote code execution vulnerability that could allow unauthenticated remote code execution by exploiting a flaw in how React decodes payloads sent to React Server Function endpoints. Please note CVE-2025-66478 has been rejected, but it is associated with CVE-2025- 55182.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD", "cve_id": "CVE-2025-55182", "title": "Meta React Server Components Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-05", "split": "test"} -{"id": "CVE-2025-8875", "text": "N-able N-Central Insecure Deserialization Vulnerability\n\nAffected: N-able N-Central\n\nN-able N-Central contains an insecure deserialization vulnerability that could lead to command execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-8875", "title": "N-able N-Central Insecure Deserialization Vulnerability", "source": "cisa_kev", "timestamp": "2025-08-13", "split": "test"} -{"id": "CVE-2025-6218", "text": "RARLAB WinRAR Path Traversal Vulnerability\n\nAffected: RARLAB WinRAR\n\nRARLAB WinRAR contains a path traversal vulnerability allowing an attacker to execute code in the context of the current user.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-6218", "title": "RARLAB WinRAR Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-09", "split": "test"} -{"id": "CVE-2020-14644", "text": "Oracle WebLogic Server Remote Code Execution Vulnerability\n\nAffected: Oracle WebLogic Server\n\nOracle WebLogic Server, a product within the Fusion Middleware suite, contains a deserialization vulnerability. Unauthenticated attackers with network access via T3 or IIOP can exploit this vulnerability to achieve remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabili", "cve_id": "CVE-2020-14644", "title": "Oracle WebLogic Server Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-18", "split": "test"} -{"id": "CVE-2024-41710", "text": "Mitel SIP Phones Argument Injection Vulnerability\n\nAffected: Mitel SIP Phones\n\nMitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, contain an argument injection vulnerability due to insufficient parameter sanitization during the boot process. Successful exploitation may allow an attacker to execute arbitrary commands within the context of the system.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitig", "cve_id": "CVE-2024-41710", "title": "Mitel SIP Phones Argument Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-12", "split": "test"} -{"id": "CVE-2024-49039", "text": "Microsoft Windows Task Scheduler Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Task Scheduler contains a privilege escalation vulnerability that can allow an attacker-provided, local application to escalate privileges outside of its AppContainer, and access privileged RPC functions.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-287\n\n[Source: CISA Kn", "cve_id": "CVE-2024-49039", "title": "Microsoft Windows Task Scheduler Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-12", "split": "test"} -{"id": "CVE-2024-40766", "text": "SonicWall SonicOS Improper Access Control Vulnerability\n\nAffected: SonicWall SonicOS\n\nSonicWall SonicOS contains an improper access control vulnerability that could lead to unauthorized resource access and, under certain conditions, may cause the firewall to crash.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-40766", "title": "SonicWall SonicOS Improper Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-09", "split": "test"} -{"id": "CVE-2018-14634", "text": "Linux Kernel Integer Overflow Vulnerability\n\nAffected: Linux Kernel\n\nLinux Kernel contains an integer overflow vulnerability in the create_elf_tables() function which could allow an unprivileged local user with access to SUID (or otherwise privileged) binary to escalate their privileges on the system.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-", "cve_id": "CVE-2018-14634", "title": "Linux Kernel Integer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2026-01-26", "split": "test"} -{"id": "CVE-2024-8190", "text": "Ivanti Cloud Services Appliance OS Command Injection Vulnerability\n\nAffected: Ivanti Cloud Services Appliance\n\nIvanti Cloud Services Appliance (CSA) contains an OS command injection vulnerability in the administrative console which can allow an authenticated attacker with application admin privileges to pass commands to the underlying OS.\n\nRequired Action: As Ivanti CSA has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line of supported solu", "cve_id": "CVE-2024-8190", "title": "Ivanti Cloud Services Appliance OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-13", "split": "test"} -{"id": "CVE-2024-47575", "text": "Fortinet FortiManager Missing Authentication Vulnerability\n\nAffected: Fortinet FortiManager\n\nFortinet FortiManager contains a missing authentication vulnerability in the fgfmd daemon that allows a remote, unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-306\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-47575", "title": "Fortinet FortiManager Missing Authentication Vulnerability", "source": "cisa_kev", "timestamp": "2024-10-23", "split": "test"} -{"id": "f7c8eefd2d1d0a976a0a", "text": "[Path Traversal] Path traversal through path stored in Uint8Array in Node.js 20\n\nVarious `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In Node.js environments, the `Buffer` class extends the `Uint8Array` class. Node.js prevents path traversal through strings (see CVE-2023-30584) and `Buffer` objects (see CVE-2023-32004), but not through non-`Buffer` `Uint8Array` objects.\n\nThis is distinct from CVE-2023-32004 ([report 2038134](https://hackerone.com/reports/", "cve_id": "CVE-2023-30584", "title": "Path traversal through path stored in Uint8Array in Node.js 20 (Path Traversal)", "source": "hackerone", "timestamp": "2024-01-20", "split": "test"} -{"id": "CVE-2025-14847", "text": "MongoDB and MongoDB Server Improper Handling of Length Parameter Inconsistency Vulnerability\n\nAffected: MongoDB MongoDB and MongoDB Server\n\nMongoDB Server contains an improper handling of length parameter inconsistency vulnerability in Zlib compressed protocol headers. This vulnerability may allow a read of uninitialized heap memory by an unauthenticated client.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue us", "cve_id": "CVE-2025-14847", "title": "MongoDB and MongoDB Server Improper Handling of Length Parameter Inconsistency Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-29", "split": "test"} -{"id": "CVE-2024-8956", "text": "PTZOptics PT30X-SDI/NDI Cameras Authentication Bypass Vulnerability\n\nAffected: PTZOptics PT30X-SDI/NDI Cameras\n\nPTZOptics PT30X-SDI/NDI cameras contain an insecure direct object reference (IDOR) vulnerability that allows a remote, attacker to bypass authentication for the /cgi-bin/param.cgi CGI script. If combined with CVE-2024-8957, this can lead to remote code execution as root.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are una", "cve_id": "CVE-2024-8956", "title": "PTZOptics PT30X-SDI/NDI Cameras Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-04", "split": "test"} -{"id": "CVE-2017-12637", "text": "SAP NetWeaver Directory Traversal Vulnerability\n\nAffected: SAP NetWeaver\n\nSAP NetWeaver Application Server (AS) Java contains a directory traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS that allows a remote attacker to read arbitrary files via a .. (dot dot) in the query string.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(", "cve_id": "CVE-2017-12637", "title": "SAP NetWeaver Directory Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-19", "split": "test"} -{"id": "CVE-2024-51378", "text": "CyberPanel Incorrect Default Permissions Vulnerability\n\nAffected: CyberPersons CyberPanel\n\nCyberPanel contains an incorrect default permissions vulnerability that allows for authentication bypass and the execution of arbitrary commands using shell metacharacters in the statusfile property.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-276\n\n[Source: CISA Known Exploited Vulnerabilities", "cve_id": "CVE-2024-51378", "title": "CyberPanel Incorrect Default Permissions Vulnerability", "source": "cisa_kev", "timestamp": "2024-12-04", "split": "test"} -{"id": "CVE-2023-45249", "text": "Acronis Cyber Infrastructure (ACI) Insecure Default Password Vulnerability\n\nAffected: Acronis Cyber Infrastructure (ACI)\n\nAcronis Cyber Infrastructure (ACI) allows an unauthenticated user to execute commands remotely due to the use of default passwords.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-1393\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-45249", "title": "Acronis Cyber Infrastructure (ACI) Insecure Default Password Vulnerability", "source": "cisa_kev", "timestamp": "2024-07-29", "split": "test"} -{"id": "CVE-2025-48927", "text": "TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability\n\nAffected: TeleMessage TM SGNL\n\nTeleMessage TM SGNL contains an initialization of a resource with an insecure default vulnerability. This vulnerability relies on how the Spring Boot Actuator is configured with an exposed heap dump endpoint at a /heapdump URI.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product", "cve_id": "CVE-2025-48927", "title": "TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-01", "split": "test"} -{"id": "CVE-2025-24201", "text": "Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and other Apple products contain an out-of-bounds write vulnerability in WebKit that may allow maliciously crafted web content to break out of Web Content sandbox. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply mitigations per", "cve_id": "CVE-2025-24201", "title": "Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-13", "split": "test"} -{"id": "CVE-2020-24363", "text": "TP-link TL-WA855RE Missing Authentication for Critical Function Vulnerability\n\nAffected: TP-Link TL-WA855RE\n\nTP-link TL-WA855RE contains a missing authentication for critical function vulnerability. This vulnerability could allow an unauthenticated attacker (on the same network) to submit a TDDP_RESET POST request for a factory reset and reboot. The attacker can then obtain incorrect access control by setting a new administrative password. The impacted products could be end-of-life (EoL) and/or", "cve_id": "CVE-2020-24363", "title": "TP-link TL-WA855RE Missing Authentication for Critical Function Vulnerability", "source": "cisa_kev", "timestamp": "2025-09-02", "split": "test"} -{"id": "CVE-2024-21338", "text": "Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Kernel contains an exposed IOCTL with insufficient access control vulnerability within the IOCTL (input and output control) dispatcher in appid.sys that allows a local attacker to achieve privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CW", "cve_id": "CVE-2024-21338", "title": "Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2024-03-04", "split": "test"} -{"id": "CVE-2017-3066", "text": "Adobe ColdFusion Deserialization Vulnerability\n\nAffected: Adobe ColdFusion\n\nAdobe ColdFusion contains a deserialization vulnerability in the Apache BlazeDS library that allows for arbitrary code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2017-3066", "title": "Adobe ColdFusion Deserialization Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-24", "split": "test"} -{"id": "CVE-2025-47813", "text": "Wing FTP Server Information Disclosure Vulnerability\n\nAffected: Wing FTP Server Wing FTP Server\n\nWing FTP Server contains a generation of error message containing sensitive information vulnerability when using a long value in the UID cookie.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-209\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-47813", "title": "Wing FTP Server Information Disclosure Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-16", "split": "test"} -{"id": "CVE-2024-4671", "text": "Google Chromium Visuals Use-After-Free Vulnerability\n\nAffected: Google Chromium\n\nGoogle Chromium Visuals contains a use-after-free vulnerability that allows a remote attacker to exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailabl", "cve_id": "CVE-2024-4671", "title": "Google Chromium Visuals Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2024-05-13", "split": "test"} -{"id": "CVE-2022-37055", "text": "D-Link Routers Buffer Overflow Vulnerability\n\nAffected: D-Link Routers\n\nD-Link Routers contains a buffer overflow vulnerability that has a high impact on confidentiality, integrity, and availability. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unava", "cve_id": "CVE-2022-37055", "title": "D-Link Routers Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-08", "split": "test"} -{"id": "52654b96472fa952d287", "text": "[Cross-site Scripting (XSS) - Reflected] Reflected XSS via Moodle on ███ [CVE-2022-35653]\n\nHi Security Team\nI found an xss vulnerability on your website [CVE-2022-35653]\nRefrence : https://vulners.com/nuclei/NUCLEI:CVE-2022-35653\nif you wanna test this :\n```\nid: CVE-2022-35653\n\ninfo:\n name: Moodle LTI module Reflected - Cross-Site Scripting\n author: iamnoooob,pdresearch\n severity: medium\n description: |\n A reflected XSS issue was identified in the LTI module of Moodle. The vulnerability", "cve_id": "CVE-2022-35653", "title": "Reflected XSS via Moodle on ███ [CVE-2022-35653] (Cross-site Scripting (XSS) - Reflected)", "source": "hackerone", "timestamp": "2024-05-03", "split": "test"} -{"id": "CVE-2025-9242", "text": "WatchGuard Firebox Out-of-Bounds Write Vulnerability\n\nAffected: WatchGuard Firebox\n\nWatchGuard Firebox contains an out-of-bounds write vulnerability in the OS iked process that may allow a remote unauthenticated attacker to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Cata", "cve_id": "CVE-2025-9242", "title": "WatchGuard Firebox Out-of-Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2025-11-12", "split": "test"} -{"id": "CVE-2023-41990", "text": "Apple Multiple Products Code Execution Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, and watchOS contain an unspecified vulnerability that allows for code execution when processing a font file.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-41990", "title": "Apple Multiple Products Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-08", "split": "test"} -{"id": "CVE-2024-49138", "text": "Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System (CLFS) driver contains a heap-based buffer overflow vulnerability that allows a local attacker to escalate privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-49138", "title": "Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2024-12-10", "split": "test"} -{"id": "CVE-2017-1000353", "text": "Jenkins Remote Code Execution Vulnerability\n\nAffected: Jenkins Jenkins\n\nJenkins contains a remote code execution vulnerability. This vulnerability that could allowed attackers to transfer a serialized Java SignedObject object to the remoting-based Jenkins CLI, that would be deserialized using a new ObjectInputStream, bypassing the existing blocklist-based protection mechanism.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or", "cve_id": "CVE-2017-1000353", "title": "Jenkins Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-02", "split": "test"} -{"id": "CVE-2025-22225", "text": "VMware ESXi Arbitrary Write Vulnerability\n\nAffected: VMware ESXi\n\nVMware ESXi contains an arbitrary write vulnerability. Successful exploitation allows an attacker with privileges within the VMX process to trigger an arbitrary kernel write leading to an escape of the sandbox.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-123\n\n[S", "cve_id": "CVE-2025-22225", "title": "VMware ESXi Arbitrary Write Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-04", "split": "test"} -{"id": "CVE-2025-33053", "text": "Microsoft Windows External Control of File Name or Path Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows contains an external control of file name or path vulnerability that could allow an attacker to execute code from a remote WebDAV location specified by the WorkingDirectory attribute of Internet Shortcut files.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are", "cve_id": "CVE-2025-33053", "title": " Microsoft Windows External Control of File Name or Path Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-10", "split": "test"} -{"id": "CVE-2023-7101", "text": "Spreadsheet::ParseExcel Remote Code Execution Vulnerability\n\nAffected: Spreadsheet::ParseExcel Spreadsheet::ParseExcel\n\nSpreadsheet::ParseExcel contains a remote code execution vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings within the Excel parsing logic.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE", "cve_id": "CVE-2023-7101", "title": "Spreadsheet::ParseExcel Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-02", "split": "test"} -{"id": "CVE-2025-59374", "text": "ASUS Live Update Embedded Malicious Code Vulnerability\n\nAffected: ASUS Live Update\n\nASUS Live Update contains an embedded malicious code vulnerability client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Actio", "cve_id": "CVE-2025-59374", "title": "ASUS Live Update Embedded Malicious Code Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-17", "split": "test"} -{"id": "CVE-2025-3928", "text": "Commvault Web Server Unspecified Vulnerability\n\nAffected: Commvault Web Server\n\nCommvault Web Server contains an unspecified vulnerability that allows a remote, authenticated attacker to create and execute webshells.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-3928", "title": "Commvault Web Server Unspecified Vulnerability", "source": "cisa_kev", "timestamp": "2025-04-28", "split": "test"} -{"id": "CVE-2024-7262", "text": "Kingsoft WPS Office Path Traversal Vulnerability\n\nAffected: Kingsoft WPS Office\n\nKingsoft WPS Office contains a path traversal vulnerability in promecefpluginhost.exe on Windows that allows an attacker to load an arbitrary Windows library.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-7262", "title": "Kingsoft WPS Office Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-03", "split": "test"} -{"id": "CVE-2024-4577", "text": "PHP-CGI OS Command Injection Vulnerability\n\nAffected: PHP Group PHP\n\nPHP, specifically Windows-based PHP used in CGI mode, contains an OS command injection vulnerability that allows for arbitrary code execution. This vulnerability is a patch bypass for CVE-2012-1823.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-4577", "title": "PHP-CGI OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-06-12", "split": "test"} -{"id": "CVE-2025-61757", "text": "Oracle Fusion Middleware Missing Authentication for Critical Function Vulnerability\n\nAffected: Oracle Fusion Middleware\n\nOracle Fusion Middleware contains a missing authentication for critical function vulnerability, allowing unauthenticated remote attackers to take over Identity Manager.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-306\n\n[Source:", "cve_id": "CVE-2025-61757", "title": "Oracle Fusion Middleware Missing Authentication for Critical Function Vulnerability", "source": "cisa_kev", "timestamp": "2025-11-21", "split": "test"} -{"id": "CVE-2022-24816", "text": "OSGeo GeoServer JAI-EXT Code Injection Vulnerability\n\nAffected: OSGeo JAI-EXT\n\nOSGeo GeoServer JAI-EXT contains a code injection vulnerability that, when programs use jt-jiffle and allow Jiffle script to be provided via network request, could allow remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-24816", "title": "OSGeo GeoServer JAI-EXT Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-06-26", "split": "test"} -{"id": "CVE-2017-3506", "text": "Oracle WebLogic Server OS Command Injection Vulnerability\n\nAffected: Oracle WebLogic Server\n\nOracle WebLogic Server, a product within the Fusion Middleware suite, contains an OS command injection vulnerability that allows an attacker to execute arbitrary code via a specially crafted HTTP request that includes a malicious XML document.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known", "cve_id": "CVE-2017-3506", "title": "Oracle WebLogic Server OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-06-03", "split": "test"} -{"id": "CVE-2025-53521", "text": "F5 BIG-IP Stack-Based Buffer Overflow Vulnerability\n\nAffected: F5 BIG-IP\n\nF5 BIG-IP APM contains a stack-based buffer overflow vulnerability that could allow a threat actor to achieve remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-121\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-53521", "title": "F5 BIG-IP Stack-Based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-27", "split": "test"} -{"id": "CVE-2025-30406", "text": "Gladinet CentreStack and Triofox Use of Hard-coded Cryptographic Key Vulnerability\n\nAffected: Gladinet CentreStack\n\nGladinet CentreStack and Triofox contains a use of hard-coded cryptographic key vulnerability in the way that the application manages keys used for ViewState integrity verification. Successful exploitation allows an attacker to forge ViewState payloads for server-side deserialization, allowing for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, f", "cve_id": "CVE-2025-30406", "title": "Gladinet CentreStack and Triofox Use of Hard-coded Cryptographic Key Vulnerability", "source": "cisa_kev", "timestamp": "2025-04-08", "split": "test"} -{"id": "CVE-2023-45727", "text": "North Grid Proself Improper Restriction of XML External Entity (XXE) Reference Vulnerability\n\nAffected: North Grid Proself\n\nNorth Grid Proself Enterprise/Standard, Gateway, and Mail Sanitize contain an improper restriction of XML External Entity (XXE) reference vulnerability, which could allow a remote, unauthenticated attacker to conduct an XXE attack.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-611", "cve_id": "CVE-2023-45727", "title": "North Grid Proself Improper Restriction of XML External Entity (XXE) Reference Vulnerability", "source": "cisa_kev", "timestamp": "2024-12-03", "split": "test"} -{"id": "CVE-2025-21042", "text": "Samsung Mobile Devices Out-of-Bounds Write Vulnerability\n\nAffected: Samsung Mobile Devices\n\nSamsung mobile devices contain an out-of-bounds write vulnerability in libimagecodec.quram.so. This vulnerability could allow remote attackers to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulner", "cve_id": "CVE-2025-21042", "title": "Samsung Mobile Devices Out-of-Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2025-11-10", "split": "test"} -{"id": "CVE-2025-58360", "text": "OSGeo GeoServer Improper Restriction of XML External Entity Reference Vulnerability\n\nAffected: OSGeo GeoServer\n\nOSGeo GeoServer contains an improper restriction of XML external entity reference vulnerability that occurs when the application accepts XML input through a specific endpoint /geoserver/wms operation GetMap and could allow an attacker to define external entities within the XML request.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for", "cve_id": "CVE-2025-58360", "title": "OSGeo GeoServer Improper Restriction of XML External Entity Reference Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-11", "split": "test"} -{"id": "CVE-2024-12356", "text": "BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability \n\nAffected: BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS)\n\nBeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) contain a command injection vulnerability, which can allow an unauthenticated attacker to inject commands that are run as a site user. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unava", "cve_id": "CVE-2024-12356", "title": "BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability ", "source": "cisa_kev", "timestamp": "2024-12-19", "split": "test"} -{"id": "CVE-2024-20767", "text": "Adobe ColdFusion Improper Access Control Vulnerability\n\nAffected: Adobe ColdFusion\n\nAdobe ColdFusion contains an improper access control vulnerability that could allow an attacker to access or modify restricted files via an internet-exposed admin panel.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-20767", "title": "Adobe ColdFusion Improper Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2024-12-16", "split": "test"} -{"id": "CVE-2025-24989", "text": "Microsoft Power Pages Improper Access Control Vulnerability\n\nAffected: Microsoft Power Pages\n\nMicrosoft Power Pages contains an improper access control vulnerability that allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control.\n\nRequired Action: Apply mitigations per vendor instructions, follow BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Kn", "cve_id": "CVE-2025-24989", "title": "Microsoft Power Pages Improper Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-21", "split": "test"} -{"id": "CVE-2025-58034", "text": "Fortinet FortiWeb OS Command Injection Vulnerability\n\nAffected: Fortinet FortiWeb\n\nFortinet FortiWeb contains an OS command Injection vulnerability that may allow an authenticated attacker to execute unauthorized code on the underlying system via crafted HTTP requests or CLI commands.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA", "cve_id": "CVE-2025-58034", "title": "Fortinet FortiWeb OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-11-18", "split": "test"} -{"id": "CVE-2025-21335", "text": "Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Hyper-V NT Kernel Integration VSP contains a use-after-free vulnerability that allows a local attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-21335", "title": "Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2025-01-14", "split": "test"} -{"id": "CVE-2026-5281", "text": "Google Dawn Use-After-Free Vulnerability\n\nAffected: Google Dawn\n\nGoogle Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. This vulnerability could affect multiple Chromium-based products including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services,", "cve_id": "CVE-2026-5281", "title": "Google Dawn Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2026-04-01", "split": "test"} -{"id": "CVE-2024-11182", "text": "MDaemon Email Server Cross-Site Scripting (XSS) Vulnerability\n\nAffected: MDaemon Email Server\n\nMDaemon Email Server contains a cross-site scripting (XSS) vulnerability that allows a remote attacker to load arbitrary JavaScript code via an HTML e-mail message.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabi", "cve_id": "CVE-2024-11182", "title": "MDaemon Email Server Cross-Site Scripting (XSS) Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-19", "split": "test"} -{"id": "CVE-2022-2586", "text": "Linux Kernel Use-After-Free Vulnerability\n\nAffected: Linux Kernel\n\nLinux Kernel contains a use-after-free vulnerability in the nft_object, allowing local attackers to escalate privileges. \n\nRequired Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-2586", "title": "Linux Kernel Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2024-06-26", "split": "test"} -{"id": "CVE-2023-44221", "text": "SonicWall SMA100 Appliances OS Command Injection Vulnerability\n\nAffected: SonicWall SMA100 Appliances\n\nSonicWall SMA100 appliances contain an OS command injection vulnerability in the SSL-VPN management interface that allows a remote, authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigati", "cve_id": "CVE-2023-44221", "title": "SonicWall SMA100 Appliances OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-01", "split": "test"} -{"id": "CVE-2019-11001", "text": "Reolink Multiple IP Cameras OS Command Injection Vulnerability\n\nAffected: Reolink Multiple IP Cameras\n\nReolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W IP cameras contain an authenticated OS command injection vulnerability. This vulnerability allows an authenticated admin to use the \"TestEmail\" functionality to inject and run OS commands as root.\n\nRequired Action: The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if", "cve_id": "CVE-2019-11001", "title": "Reolink Multiple IP Cameras OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-12-18", "split": "test"} -{"id": "CVE-2021-33044", "text": "Dahua IP Camera Authentication Bypass Vulnerability\n\nAffected: Dahua IP Camera Firmware\n\nDahua IP cameras and related products contain an authentication bypass vulnerability when the NetKeyboard type argument is specified by the client during authentication.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-287\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2021-33044", "title": "Dahua IP Camera Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2024-08-21", "split": "test"} -{"id": "CVE-2025-54309", "text": "CrushFTP Unprotected Alternate Channel Vulnerability\n\nAffected: CrushFTP CrushFTP\n\nCrushFTP contains an unprotected alternate channel vulnerability. When the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-420\n\n[Source", "cve_id": "CVE-2025-54309", "title": " CrushFTP Unprotected Alternate Channel Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-22", "split": "test"} -{"id": "CVE-2024-4761", "text": "Google Chromium V8 Out-of-Bounds Memory Write Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 Engine contains an unspecified out-of-bounds memory write vulnerability via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787", "cve_id": "CVE-2024-4761", "title": "Google Chromium V8 Out-of-Bounds Memory Write Vulnerability", "source": "cisa_kev", "timestamp": "2024-05-16", "split": "test"} -{"id": "CVE-2020-25079", "text": "D-Link DCS-2530L and DCS-2670L Command Injection Vulnerability\n\nAffected: D-Link DCS-2530L and DCS-2670L Devices\n\nD-Link DCS-2530L and DCS-2670L devices contains a command injection vulnerability in the cgi-bin/ddns_enc.cgi. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product", "cve_id": "CVE-2020-25079", "title": "D-Link DCS-2530L and DCS-2670L Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-08-05", "split": "test"} -{"id": "CVE-2025-54068", "text": "Laravel Livewire Code Injection Vulnerability\n\nAffected: Laravel Livewire\n\nLaravel Livewire contain a code injection vulnerability that could allow unauthenticated attackers to achieve remote command execution in specific scenarios.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-54068", "title": "Laravel Livewire Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-20", "split": "test"} -{"id": "CVE-2024-23113", "text": "Fortinet Multiple Products Format String Vulnerability\n\nAffected: Fortinet Multiple Products\n\nFortinet FortiOS, FortiPAM, FortiProxy, and FortiWeb contain a format string vulnerability that allows a remote, unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-134\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-23113", "title": "Fortinet Multiple Products Format String Vulnerability", "source": "cisa_kev", "timestamp": "2024-10-09", "split": "test"} -{"id": "CVE-2019-6693", "text": "Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability\n\nAffected: Fortinet FortiOS\n\nFortinet FortiOS contains a use of hard-coded credentials vulnerability that could allow an attacker to cipher sensitive data in FortiOS configuration backup file via knowledge of the hard-coded key. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s", "cve_id": "CVE-2019-6693", "title": "Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-25", "split": "test"} -{"id": "CVE-2021-26828", "text": "OpenPLC ScadaBR Unrestricted Upload of File with Dangerous Type Vulnerability\n\nAffected: OpenPLC ScadaBR\n\nOpenPLC ScadaBR contains an unrestricted upload of file with dangerous type vulnerability that allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-434\n\n[", "cve_id": "CVE-2021-26828", "title": "OpenPLC ScadaBR Unrestricted Upload of File with Dangerous Type Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-03", "split": "test"} -{"id": "CVE-2010-3962", "text": "Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability\n\nAffected: Microsoft Internet Explorer\n\nMicrosoft Internet Explorer contains an uninitialized memory corruption vulnerability that could allow for remote code execution. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue", "cve_id": "CVE-2010-3962", "title": "Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-06", "split": "test"} -{"id": "CVE-2021-26086", "text": "Atlassian Jira Server and Data Center Path Traversal Vulnerability\n\nAffected: Atlassian Jira Server and Data Center\n\nAtlassian Jira Server and Data Center contain a path traversal vulnerability that allows a remote attacker to read particular files in the /WEB-INF/web.xml endpoint.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2021-26086", "title": "Atlassian Jira Server and Data Center Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-12", "split": "test"} -{"id": "d8707bd364b8f4483d11", "text": "[Cross-site Scripting (XSS) - Reflected] Reflected XSS via Keycloak on ███ [CVE-2021-20323]\n\nKeycloak 8.0 and prior contains a cross-site scripting vulnerability. An attacker can execute arbitrary script and thus steal cookie-based authentication credentials and launch other attacks. A lack of proper input validation made it possible for an attacker to execute malicious JavaScript code on https://██████████/auth/realms/master/clients-registrations/openid-connect This reflected XSS would execute", "cve_id": "CVE-2021-20323", "title": "Reflected XSS via Keycloak on ███ [CVE-2021-20323] (Cross-site Scripting (XSS) - Reflected)", "source": "hackerone", "timestamp": "2024-05-03", "split": "test"} -{"id": "CVE-2020-25078", "text": "D-Link DCS-2530L and DCS-2670L Devices Unspecified Vulnerability\n\nAffected: D-Link DCS-2530L and DCS-2670L Devices\n\nD-Link DCS-2530L and DCS-2670L devices contains an unspecified vulnerability that could allow for remote administrator password disclosure. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or", "cve_id": "CVE-2020-25078", "title": "D-Link DCS-2530L and DCS-2670L Devices Unspecified Vulnerability", "source": "cisa_kev", "timestamp": "2025-08-05", "split": "test"} -{"id": "CVE-2025-10585", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium contains a type confusion vulnerability in the V8 JavaScript and WebAssembly engine.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-10585", "title": "Google Chromium V8 Type Confusion Vulnerability", "source": "cisa_kev", "timestamp": "2025-09-23", "split": "test"} -{"id": "CVE-2024-29745", "text": "Android Pixel Information Disclosure Vulnerability\n\nAffected: Android Pixel\n\nAndroid Pixel contains an information disclosure vulnerability in the fastboot firmware used to support unlocking, flashing, and locking affected devices.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-908\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-29745", "title": "Android Pixel Information Disclosure Vulnerability", "source": "cisa_kev", "timestamp": "2024-04-04", "split": "test"} -{"id": "CVE-2026-3502", "text": "TrueConf Client Download of Code Without Integrity Check Vulnerability\n\nAffected: TrueConf Client\n\nTrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.\n\nRequired Action: Apply mitigations per vendor instructions, follo", "cve_id": "CVE-2026-3502", "title": "TrueConf Client Download of Code Without Integrity Check Vulnerability", "source": "cisa_kev", "timestamp": "2026-04-02", "split": "test"} -{"id": "CVE-2021-20035", "text": "SonicWall SMA100 Appliances OS Command Injection Vulnerability\n\nAffected: SonicWall SMA100 Appliances\n\nSonicWall SMA100 appliances contain an OS command injection vulnerability in the management interface that allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user, which could potentially lead to code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if", "cve_id": "CVE-2021-20035", "title": "SonicWall SMA100 Appliances OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-04-16", "split": "test"} -{"id": "CVE-2025-15556", "text": "Notepad++ Download of Code Without Integrity Check Vulnerability\n\nAffected: Notepad++ Notepad++\n\nNotepad++ when using the WinGUp updater, contains a download of code without integrity check vulnerability that could allow an attacker to intercept or redirect update traffic to download and execute an attacker-controlled installer. This could lead to arbitrary code execution with the privileges of the user.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 gui", "cve_id": "CVE-2025-15556", "title": "Notepad++ Download of Code Without Integrity Check Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-12", "split": "test"} -{"id": "CVE-2009-0238", "text": "Microsoft Office Remote Code Execution\n\nAffected: Microsoft Office\n\nMicrosoft Office Excel contains a remote code execution vulnerability that could allow an attacker to take complete control of an affected system if a user opens a specially crafted Excel file that includes a malformed object.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Sou", "cve_id": "CVE-2009-0238", "title": "Microsoft Office Remote Code Execution", "source": "cisa_kev", "timestamp": "2026-04-14", "split": "test"} -{"id": "CVE-2022-38028", "text": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability \n\nAffected: Microsoft Windows\n\nMicrosoft Windows Print Spooler service contains a privilege escalation vulnerability. An attacker may modify a JavaScript constraints file and execute it with SYSTEM-level permissions.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. \n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-38028", "title": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability ", "source": "cisa_kev", "timestamp": "2024-04-23", "split": "test"} -{"id": "CVE-2023-38203", "text": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability\n\nAffected: Adobe ColdFusion\n\nAdobe ColdFusion contains a deserialization of untrusted data vulnerability that allows for code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-38203", "title": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-08", "split": "test"} -{"id": "CVE-2024-57968", "text": "Advantive VeraCore Unrestricted File Upload Vulnerability\n\nAffected: Advantive VeraCore\n\nAdvantive VeraCore contains an unrestricted file upload vulnerability that allows a remote unauthenticated attacker to upload files to unintended folders via upload.apsx.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-434\n\n[Source: CISA Known Exploited Vulnerab", "cve_id": "CVE-2024-57968", "title": "Advantive VeraCore Unrestricted File Upload Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-10", "split": "test"} -{"id": "CVE-2021-36380", "text": "Sunhillo SureLine OS Command Injection Vulnerablity\n\nAffected: Sunhillo SureLine\n\nSunhillo SureLine contains an OS command injection vulnerability that allows an attacker to cause a denial-of-service or utilize the device for persistence on the network via shell metacharacters in ipAddr or dnsAddr in /cgi/networkDiag.cgi.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vul", "cve_id": "CVE-2021-36380", "title": "Sunhillo SureLine OS Command Injection Vulnerablity", "source": "cisa_kev", "timestamp": "2024-03-05", "split": "test"} -{"id": "CVE-2025-59689", "text": "Libraesva Email Security Gateway Command Injection Vulnerability\n\nAffected: Libraesva Email Security Gateway\n\nLibraesva Email Security Gateway (ESG) contains a command injection vulnerability which allows command injection via a compressed e-mail attachment.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-77\n\n[Source: CISA Known Exploited Vulnerabil", "cve_id": "CVE-2025-59689", "title": "Libraesva Email Security Gateway Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-09-29", "split": "test"} -{"id": "CVE-2025-6205", "text": "Dassault Systèmes DELMIA Apriso Missing Authorization Vulnerability\n\nAffected: Dassault Systèmes DELMIA Apriso\n\nDassault Systèmes DELMIA Apriso contains a missing authorization vulnerability that could allow an attacker to gain privileged access to the application.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-862\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2025-6205", "title": "Dassault Systèmes DELMIA Apriso Missing Authorization Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-28", "split": "test"} -{"id": "CVE-2023-4762", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-84", "cve_id": "CVE-2023-4762", "title": "Google Chromium V8 Type Confusion Vulnerability", "source": "cisa_kev", "timestamp": "2024-02-06", "split": "test"} -{"id": "CVE-2020-15415", "text": "DrayTek Multiple Vigor Routers OS Command Injection Vulnerability\n\nAffected: DrayTek Multiple Vigor Routers\n\nDrayTek Vigor3900, Vigor2960, and Vigor300B devices contain an OS command injection vulnerability in cgi-bin/mainfunction.cgi/cvmcfgupload that allows for remote code execution via shell metacharacters in a filename when the text/x-python-script content type is used.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailabl", "cve_id": "CVE-2020-15415", "title": "DrayTek Multiple Vigor Routers OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-30", "split": "test"} -{"id": "CVE-2024-24919", "text": "Check Point Quantum Security Gateways Information Disclosure Vulnerability\n\nAffected: Check Point Quantum Security Gateways\n\nCheck Point Quantum Security Gateways contain an unspecified information disclosure vulnerability. The vulnerability potentially allows an attacker to access information on Gateways connected to the internet, with IPSec VPN, Remote Access VPN or Mobile Access enabled. This issue affects several product lines from Check Point, including CloudGuard Network, Quantum Scalable", "cve_id": "CVE-2024-24919", "title": "Check Point Quantum Security Gateways Information Disclosure Vulnerability", "source": "cisa_kev", "timestamp": "2024-05-30", "split": "test"} -{"id": "d7c7c2e5b1bd535257e1", "text": "[Uncontrolled Resource Consumption] CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words()\n\n# TL;DR\n\n**CVE-2024-27351**: Potential regular expression denial-of-service in `django.utils.text.Truncator.words()`\n\n# Details:\n\n`django.utils.text.Truncator.words()` method (with `html=True`) and `truncatewords_html` template filter were subject to a potential regular expression denial-of-service attack using a suitably crafted string (follow up to CVE-2019", "cve_id": "CVE-2019-14232", "title": "CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words() (Uncontrolled Resource Consumption)", "source": "hackerone", "timestamp": "2024-04-28", "split": "test"} -{"id": "2acb8466d4eeaa888855", "text": "[Improper Certificate Validation] CVE-2024-2466: TLS certificate check bypass with mbedTLS (reward request)\n\nFor reward request.\n\nPlease refer to this report issue from curl:\nhttps://hackerone.com/reports/2416725\n\nAnd already published at here:\nhttps://curl.se/docs/CVE-2024-2466.html\n\n## Impact\n\nReference from above.", "cve_id": "CVE-2024-2466", "title": "CVE-2024-2466: TLS certificate check bypass with mbedTLS (reward request) (Improper Certificate Validation)", "source": "hackerone", "timestamp": "2024-03-29", "split": "test"} -{"id": "CVE-2020-3259", "text": "Cisco ASA and FTD Information Disclosure Vulnerability\n\nAffected: Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)\n\nCisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain an information disclosure vulnerability. An attacker could retrieve memory contents on an affected device, which could lead to the disclosure of confidential information due to a buffer tracking issue when the software parses invalid URLs that are requested from the web serv", "cve_id": "CVE-2020-3259", "title": "Cisco ASA and FTD Information Disclosure Vulnerability", "source": "cisa_kev", "timestamp": "2024-02-15", "split": "test"} -{"id": "faec348c23a134a5924c", "text": "[Cross-site Scripting (XSS) - Reflected] reflected xss [CVE-2020-3580]\n\nHey Security Team\nIt was observed that the application is vulnerable to cross-site scripting (XSS). XSS is a type of attack that involves running a malicious scripts on a victim’s browser.\nwebsite: ███████ attached\nWhen the user clicks submit, his information will be stolen\n\n## Impact\n\nCookie Stealing - A malicious user can steal cookies and use them to gain access to the application.\nArbitrary requests - An attacker can use", "cve_id": "CVE-2020-3580", "title": "reflected xss [CVE-2020-3580] (Cross-site Scripting (XSS) - Reflected)", "source": "hackerone", "timestamp": "2024-05-03", "split": "test"} -{"id": "CVE-2015-7755", "text": "Juniper ScreenOS Improper Authentication Vulnerability\n\nAffected: Juniper ScreenOS\n\nJuniper ScreenOS contains an improper authentication vulnerability that could allow unauthorized remote administrative access to the device.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-287\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2015-7755", "title": "Juniper ScreenOS Improper Authentication Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-02", "split": "test"} -{"id": "CVE-2023-22527", "text": "Atlassian Confluence Data Center and Server Template Injection Vulnerability\n\nAffected: Atlassian Confluence Data Center and Server\n\nAtlassian Confluence Data Center and Server contain an unauthenticated OGNL template injection vulnerability that can lead to remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-74\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-22527", "title": "Atlassian Confluence Data Center and Server Template Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-24", "split": "test"} -{"id": "CVE-2024-40891", "text": "Zyxel DSL CPE OS Command Injection Vulnerability\n\nAffected: Zyxel DSL CPE Devices\n\nMultiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the management commands that could allow an authenticated attacker to execute OS commands via Telnet.\n\nRequired Action: The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Ex", "cve_id": "CVE-2024-40891", "title": "Zyxel DSL CPE OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-11", "split": "test"} -{"id": "CVE-2025-32756", "text": "Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability\n\nAffected: Fortinet Multiple Products\n\nFortinet FortiFone, FortiVoice, FortiNDR and FortiMail contain a stack-based overflow vulnerability that may allow a remote unauthenticated attacker to execute arbitrary code or commands via crafted HTTP requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavail", "cve_id": "CVE-2025-32756", "title": "Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-14", "split": "test"} -{"id": "CVE-2024-29988", "text": "Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability\n\nAffected: Microsoft SmartScreen Prompt\n\nMicrosoft SmartScreen Prompt contains a security feature bypass vulnerability that allows an attacker to bypass the Mark of the Web (MotW) feature. This vulnerability can be chained with CVE-2023-38831 and CVE-2024-21412 to execute a malicious file.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693", "cve_id": "CVE-2024-29988", "title": "Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2024-04-30", "split": "test"} -{"id": "CVE-2014-6278", "text": "GNU Bash OS Command Injection Vulnerability\n\nAffected: GNU GNU Bash\n\nGNU Bash contains an OS command injection vulnerability which allows remote attackers to execute arbitrary commands via a crafted environment.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. \n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2014-6278", "title": "GNU Bash OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-02", "split": "test"} -{"id": "CVE-2022-20775", "text": "Cisco SD-WAN Path Traversal Vulnerability\n\nAffected: Cisco SD-WAN\n\nCisco SD-WAN CLI contains a path traversal vulnerability that could allow an authenticated local attacker to gain elevated privileges via improper access controls on commands within the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.\n\nRequired Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outli", "cve_id": "CVE-2022-20775", "title": "Cisco SD-WAN Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-25", "split": "test"} -{"id": "CVE-2018-9276", "text": "Paessler PRTG Network Monitor OS Command Injection Vulnerability\n\nAffected: Paessler PRTG Network Monitor\n\nPaessler PRTG Network Monitor contains an OS command injection vulnerability that allows an attacker with administrative privileges to execute commands via the PRTG System Administrator web console.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catal", "cve_id": "CVE-2018-9276", "title": "Paessler PRTG Network Monitor OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-04", "split": "test"} -{"id": "CVE-2026-35616", "text": "Fortinet FortiClient EMS Improper Access Control Vulnerability\n\nAffected: Fortinet FortiClient EMS\n\nFortinet FortiClient EMS contains an improper access control vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Kno", "cve_id": "CVE-2026-35616", "title": "Fortinet FortiClient EMS Improper Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2026-04-06", "split": "test"} -{"id": "CVE-2024-45519", "text": "Synacor Zimbra Collaboration Suite (ZCS) Command Execution Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains an unspecified vulnerability in the postjournal service that may allow an unauthenticated user to execute commands.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-45519", "title": "Synacor Zimbra Collaboration Suite (ZCS) Command Execution Vulnerability", "source": "cisa_kev", "timestamp": "2024-10-03", "split": "test"} -{"id": "CVE-2024-23296", "text": "Apple Multiple Products Memory Corruption Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, and watchOS RTKit contain a memory corruption vulnerability that allows an attacker with arbitrary kernel read and write capability to bypass kernel memory protections.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-23296", "title": "Apple Multiple Products Memory Corruption Vulnerability", "source": "cisa_kev", "timestamp": "2024-03-06", "split": "test"} -{"id": "CVE-2025-3935", "text": "ConnectWise ScreenConnect Improper Authentication Vulnerability\n\nAffected: ConnectWise ScreenConnect\n\nConnectWise ScreenConnect contains an improper authentication vulnerability. This vulnerability could allow a ViewState code injection attack, which could allow remote code execution if machine keys are compromised.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable", "cve_id": "CVE-2025-3935", "title": "ConnectWise ScreenConnect Improper Authentication Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-02", "split": "test"} -{"id": "CVE-2024-4978", "text": "Justice AV Solutions (JAVS) Viewer Installer Embedded Malicious Code Vulnerability\n\nAffected: Justice AV Solutions Viewer\n\nJustice AV Solutions (JAVS) Viewer installer contains a malicious version of ffmpeg.exe, named fffmpeg.exe (SHA256: 421a4ad2615941b177b6ec4ab5e239c14e62af2ab07c6df1741e2a62223223c4). When run, this creates a backdoor connection to a malicious C2 server.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailabl", "cve_id": "CVE-2024-4978", "title": "Justice AV Solutions (JAVS) Viewer Installer Embedded Malicious Code Vulnerability", "source": "cisa_kev", "timestamp": "2024-05-29", "split": "test"} -{"id": "b5e8590e45ae2c0ad66c", "text": "[Code Injection] Command Injection using malicious hostname in expanded proxycommand\n\nUsing the ProxyCommand or the ProxyJump feature enables users to exploit\nunchecked hostname syntax on the client, which enables to inject malicious code\ninto the command of the above-mentioned features through the hostname parameter.\n\nUser interaction is required to exploit this issue.\n\nAdvisory from libssh: https://www.libssh.org/security/advisories/CVE-2023-6004.txt\n\nAdvisory from OpenSSH which also suffered", "cve_id": "CVE-2023-6004", "title": "Command Injection using malicious hostname in expanded proxycommand (Code Injection)", "source": "hackerone", "timestamp": "2024-02-28", "split": "test"} -{"id": "CVE-2024-44309", "text": "Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, macOS, and other Apple products contain an unspecified vulnerability when processing maliciously crafted web content that may lead to a cross-site scripting (XSS) attack.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-44309", "title": "Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-21", "split": "test"} -{"id": "CVE-2024-8963", "text": "Ivanti Cloud Services Appliance (CSA) Path Traversal Vulnerability\n\nAffected: Ivanti Cloud Services Appliance (CSA)\n\nIvanti Cloud Services Appliance (CSA) contains a path traversal vulnerability that could allow a remote, unauthenticated attacker to access restricted functionality. If CVE-2024-8963 is used in conjunction with CVE-2024-8190, an attacker could bypass admin authentication and execute arbitrary commands on the appliance.\n\nRequired Action: As Ivanti CSA has reached End-of-Life status", "cve_id": "CVE-2024-8963", "title": "Ivanti Cloud Services Appliance (CSA) Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-19", "split": "test"} -{"id": "CVE-2024-38213", "text": "Microsoft Windows SmartScreen Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience via a malicious file.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38213", "title": "Microsoft Windows SmartScreen Security Feature Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2024-08-13", "split": "test"} -{"id": "CVE-2025-21043", "text": "Samsung Mobile Devices Out-of-Bounds Write Vulnerability\n\nAffected: Samsung Mobile Devices\n\nSamsung mobile devices contain an out-of-bounds write vulnerability in libimagecodec.quram.so which allows remote attackers to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-21043", "title": "Samsung Mobile Devices Out-of-Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-02", "split": "test"} -{"id": "CVE-2023-48365", "text": "Qlik Sense HTTP Tunneling Vulnerability\n\nAffected: Qlik Sense\n\nQlik Sense contains an HTTP tunneling vulnerability that allows an attacker to escalate privileges and execute HTTP requests on the backend server hosting the software.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-444\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-48365", "title": "Qlik Sense HTTP Tunneling Vulnerability", "source": "cisa_kev", "timestamp": "2025-01-13", "split": "test"} -{"id": "CVE-2023-48788", "text": "Fortinet FortiClient EMS SQL Injection Vulnerability\n\nAffected: Fortinet FortiClient EMS\n\nFortinet FortiClient EMS contains a SQL injection vulnerability that allows an unauthenticated attacker to execute commands as SYSTEM via specifically crafted requests.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-89\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-48788", "title": "Fortinet FortiClient EMS SQL Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-03-25", "split": "test"} -{"id": "CVE-2018-15133", "text": "Laravel Deserialization of Untrusted Data Vulnerability\n\nAffected: Laravel Laravel Framework\n\nLaravel Framework contains a deserialization of untrusted data vulnerability, allowing for remote command execution. This vulnerability may only be exploited if a malicious user has accessed the application encryption key (APP_KEY environment variable).\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source:", "cve_id": "CVE-2018-15133", "title": "Laravel Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-16", "split": "test"} -{"id": "CVE-2025-31324", "text": "SAP NetWeaver Unrestricted File Upload Vulnerability\n\nAffected: SAP NetWeaver\n\nSAP NetWeaver Visual Composer Metadata Uploader contains an unrestricted file upload vulnerability that allows an unauthenticated agent to upload potentially malicious executable binaries.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-434\n\n[Source: CI", "cve_id": "CVE-2025-31324", "title": "SAP NetWeaver Unrestricted File Upload Vulnerability", "source": "cisa_kev", "timestamp": "2025-04-29", "split": "test"} -{"id": "CVE-2025-40551", "text": "SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability\n\nAffected: SolarWinds Web Help Desk\n\nSolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the produ", "cve_id": "CVE-2025-40551", "title": "SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-03", "split": "test"} -{"id": "CVE-2025-32463", "text": "Sudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability\n\nAffected: Sudo Sudo\n\nSudo contains an inclusion of functionality from untrusted control sphere vulnerability. This vulnerability could allow local attacker to leverage sudo’s -R (--chroot) option to run arbitrary commands as root, even if they are not listed in the sudoers file.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the", "cve_id": "CVE-2025-32463", "title": "Sudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability", "source": "cisa_kev", "timestamp": "2025-09-29", "split": "test"} -{"id": "CVE-2023-7024", "text": "Google Chromium WebRTC Heap Buffer Overflow Vulnerability\n\nAffected: Google Chromium WebRTC\n\nGoogle Chromium WebRTC, an open-source project providing web browsers with real-time communication, contains a heap buffer overflow vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could impact web browsers using WebRTC, including but not limited to Google Chrome.\n\nRequired Action: Apply mitigations per vendor instructions or d", "cve_id": "CVE-2023-7024", "title": "Google Chromium WebRTC Heap Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-02", "split": "test"} -{"id": "CVE-2025-4008", "text": "Smartbedded Meteobridge Command Injection Vulnerability\n\nAffected: Smartbedded Meteobridge\n\nSmartbedded Meteobridge contains a command injection vulnerability that could allow remote unauthenticated attackers to gain arbitrary command execution with elevated privileges (root) on affected devices.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-306,", "cve_id": "CVE-2025-4008", "title": "Smartbedded Meteobridge Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-02", "split": "test"} -{"id": "CVE-2014-2120", "text": "Cisco Adaptive Security Appliance (ASA) Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Cisco Adaptive Security Appliance (ASA)\n\nCisco Adaptive Security Appliance (ASA) contains a cross-site scripting (XSS) vulnerability in the WebVPN login page. This vulnerability allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CW", "cve_id": "CVE-2014-2120", "title": "Cisco Adaptive Security Appliance (ASA) Cross-Site Scripting (XSS) Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-12", "split": "test"} -{"id": "CVE-2025-4427", "text": "Ivanti Endpoint Manager Mobile (EPMM) Authentication Bypass Vulnerability\n\nAffected: Ivanti Endpoint Manager Mobile (EPMM)\n\nIvanti Endpoint Manager Mobile (EPMM) contains an authentication bypass vulnerability in the API component that allows an attacker to access protected resources without proper credentials via crafted API requests. This vulnerability results from an insecure implementation of the Spring Framework open-source library.\n\nRequired Action: Apply mitigations per vendor instruction", "cve_id": "CVE-2025-4427", "title": "Ivanti Endpoint Manager Mobile (EPMM) Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-19", "split": "test"} -{"id": "CVE-2024-27443", "text": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nZimbra Collaboration contains a cross-site scripting (XSS) vulnerability in the CalendarInvite feature of the Zimbra webmail classic user interface. An attacker can exploit this vulnerability via an email message containing a crafted calendar header, leading to the execution of arbitrary JavaScript code.\n\nRequired Action: Apply mitigations per vendor instructions", "cve_id": "CVE-2024-27443", "title": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-19", "split": "test"} -{"id": "CVE-2025-53690", "text": "Sitecore Multiple Products Deserialization of Untrusted Data Vulnerability\n\nAffected: Sitecore Multiple Products\n\nSitecore Experience Manager (XM), Experience Platform (XP), Experience Commerce (XC), and Managed Cloud contain a deserialization of untrusted data vulnerability involving the use of default machine keys. This flaw allows attackers to exploit exposed ASP.NET machine keys to achieve remote code execution. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable", "cve_id": "CVE-2025-53690", "title": "Sitecore Multiple Products Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2025-09-04", "split": "test"} -{"id": "CVE-2024-4358", "text": "Progress Telerik Report Server Authentication Bypass by Spoofing Vulnerability\n\nAffected: Progress Telerik Report Server\n\nProgress Telerik Report Server contains an authorization bypass by spoofing vulnerability that allows an attacker to obtain unauthorized access.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-290\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-4358", "title": "Progress Telerik Report Server Authentication Bypass by Spoofing Vulnerability", "source": "cisa_kev", "timestamp": "2024-06-13", "split": "test"} -{"id": "CVE-2025-24016", "text": "Wazuh Server Deserialization of Untrusted Data Vulnerability\n\nAffected: Wazuh Wazuh Server\n\nWazuh contains a deserialization of untrusted data vulnerability that allows for remote code execution on Wazuh servers.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-24016", "title": "Wazuh Server Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-10", "split": "test"} -{"id": "CVE-2021-22555", "text": "Linux Kernel Heap Out-of-Bounds Write Vulnerability\n\nAffected: Linux Kernel\n\nLinux Kernel contains a heap out-of-bounds write vulnerability that could allow an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabili", "cve_id": "CVE-2021-22555", "title": "Linux Kernel Heap Out-of-Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-06", "split": "test"} -{"id": "CVE-2025-54253", "text": "Adobe Experience Manager Forms Code Execution Vulnerability\n\nAffected: Adobe Experience Manager (AEM) Forms\n\nAdobe Experience Manager Forms in JEE contains an unspecified vulnerability that allows for arbitrary code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-54253", "title": "Adobe Experience Manager Forms Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-15", "split": "test"} -{"id": "CVE-2024-21893", "text": "Ivanti Connect Secure, Policy Secure, and Neurons Server-Side Request Forgery (SSRF) Vulnerability\n\nAffected: Ivanti Connect Secure, Policy Secure, and Neurons\n\nIvanti Connect Secure (ICS, formerly known as Pulse Connect Secure), Ivanti Policy Secure, and Ivanti Neurons contain a server-side request forgery (SSRF) vulnerability in the SAML component that allows an attacker to access certain restricted resources without authentication.\n\nRequired Action: Apply mitigations per vendor instructions o", "cve_id": "CVE-2024-21893", "title": "Ivanti Connect Secure, Policy Secure, and Neurons Server-Side Request Forgery (SSRF) Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-31", "split": "test"} -{"id": "CVE-2025-31161", "text": "CrushFTP Authentication Bypass Vulnerability\n\nAffected: CrushFTP CrushFTP\n\nCrushFTP contains an authentication bypass vulnerability in the HTTP authorization header that allows a remote unauthenticated attacker to authenticate to any known or guessable user account (e.g., crushadmin), potentially leading to a full compromise. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are", "cve_id": "CVE-2025-31161", "title": "CrushFTP Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2025-04-07", "split": "test"} -{"id": "CVE-2025-20333", "text": "Cisco Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) Buffer Overflow Vulnerability\n\nAffected: Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense\n\nCisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Software VPN Web Server contain a buffer overflow vulnerability that allows for remote code execution. This vulnerability could be chained with CVE-2025-20362.\n\nRequired Action: T", "cve_id": "CVE-2025-20333", "title": "Cisco Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2025-09-25", "split": "test"} -{"id": "CVE-2024-54085", "text": "AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability\n\nAffected: AMI MegaRAC SPx\n\nAMI MegaRAC SPx contains an authentication bypass by spoofing vulnerability in the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable", "cve_id": "CVE-2024-54085", "title": "AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-25", "split": "test"} -{"id": "CVE-2025-2746", "text": "Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability\n\nAffected: Kentico Xperience CMS\n\nKentico Xperience CMS contains an authentication bypass using an alternate path or channel vulnerability that could allow an attacker to control administrative objects.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-288\n\n[S", "cve_id": "CVE-2025-2746", "title": "Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-20", "split": "test"} -{"id": "CVE-2024-51567", "text": "CyberPanel Incorrect Default Permissions Vulnerability\n\nAffected: CyberPersons CyberPanel\n\nCyberPanel contains an incorrect default permissions vulnerability that allows a remote, unauthenticated attacker to execute commands as root.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-276\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-51567", "title": "CyberPanel Incorrect Default Permissions Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-07", "split": "test"} -{"id": "CVE-2025-24991", "text": "Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows New Technology File System (NTFS) contains an out-of-bounds read vulnerability that allows an authorized attacker to disclose information locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-125\n\n[Source: CISA Known Exploited Vulnerabilities C", "cve_id": "CVE-2025-24991", "title": "Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-11", "split": "test"} -{"id": "CVE-2023-35082", "text": "Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core Authentication Bypass Vulnerability\n\nAffected: Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core\n\nIvanti Endpoint Manager Mobile (EPMM) and MobileIron Core contain an authentication bypass vulnerability that allows unauthorized users to access restricted functionality or resources of the application.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRanso", "cve_id": "CVE-2023-35082", "title": "Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-18", "split": "test"} -{"id": "e107debfb519d59f7593", "text": "[Server-Side Request Forgery (SSRF)] Libuv: Improper Domain Lookup that potentially leads to SSRF attacks\n\nI recently encountered a challenge in a CTF competition that led me to discover a vulnerability within Node.js, present in all versions after v10. Upon further investigation and code debugging, it became apparent that the vulnerability originated from its direct dependency, `libuv`.\n\nI submitted a report to the Node.js team via HackerOne, and they subsequently connected me with the libuv te", "cve_id": "CVE-2024-24806", "title": "Libuv: Improper Domain Lookup that potentially leads to SSRF attacks (Server-Side Request Forgery (SSRF))", "source": "hackerone", "timestamp": "2024-03-29", "split": "test"} -{"id": "CVE-2024-36401", "text": "OSGeo GeoServer GeoTools Eval Injection Vulnerability\n\nAffected: OSGeo GeoServer\n\nOSGeo GeoServer GeoTools contains an improper neutralization of directives in dynamically evaluated code vulnerability due to unsafely evaluating property names as XPath expressions. This allows unauthenticated attackers to conduct remote code execution via specially crafted input.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s):", "cve_id": "CVE-2024-36401", "title": "OSGeo GeoServer GeoTools Eval Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-07-15", "split": "test"} -{"id": "CVE-2025-14733", "text": "WatchGuard Firebox Out of Bounds Write Vulnerability\n\nAffected: WatchGuard Firebox\n\nWatchGuard Fireware OS iked process contains an out of bounds write vulnerability in the OS iked process. This vulnerability may allow a remote unauthenticated attacker to execute arbitrary code and affects both the mobile user VPN with IKEv2 and the branch office VPN using IKEv2 when configured with a dynamic gateway peer.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 g", "cve_id": "CVE-2025-14733", "title": "WatchGuard Firebox Out of Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-19", "split": "test"} -{"id": "CVE-2026-20045", "text": "Cisco Unified Communications Products Code Injection Vulnerability\n\nAffected: Cisco Unified Communications Manager\n\nCisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance contain a code injection vulnerability that could allow the attacker to obtain user-level access to the un", "cve_id": "CVE-2026-20045", "title": "Cisco Unified Communications Products Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2026-01-21", "split": "test"} -{"id": "CVE-2013-3893", "text": "Microsoft Internet Explorer Resource Management Errors Vulnerability\n\nAffected: Microsoft Internet Explorer\n\nMicrosoft Internet Explorer contains a memory corruption vulnerability that allows for remote code execution. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mi", "cve_id": "CVE-2013-3893", "title": "Microsoft Internet Explorer Resource Management Errors Vulnerability", "source": "cisa_kev", "timestamp": "2025-08-12", "split": "test"} -{"id": "7339750960aaa08fe863", "text": "[Improper Certificate Validation] CVE-2024-2379: QUIC certificate check bypass with wolfSSL\n\n## Summary:\nIn `vquic-tls.c` `curl_wssl_init_ctx` errors are handled by `goto out` and having `result` be set to an error code to be returned. At the beginning of the function `result` is correctly set to `CURLE_FAILED_INIT` which allows for `goto out` to work correctly without having to set `result` however, `result`'s value is overridden at a certain point if `ctx_setup` is passed to the function. If", "cve_id": "CVE-2024-2379", "title": "CVE-2024-2379: QUIC certificate check bypass with wolfSSL (Improper Certificate Validation)", "source": "hackerone", "timestamp": "2024-03-27", "split": "test"} -{"id": "CVE-2023-43770", "text": "Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Roundcube Webmail\n\nRoundcube Webmail contains a persistent cross-site scripting (XSS) vulnerability that can lead to information disclosure via malicious link references in plain/text messages.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-43770", "title": "Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability", "source": "cisa_kev", "timestamp": "2024-02-12", "split": "test"} -{"id": "CVE-2025-31125", "text": "Vite Vitejs Improper Access Control Vulnerability\n\nAffected: Vite Vitejs\n\nVite Vitejs contains an improper access control vulnerability that exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigat", "cve_id": "CVE-2025-31125", "title": "Vite Vitejs Improper Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2026-01-22", "split": "test"} -{"id": "CVE-2026-21509", "text": "Microsoft Office Security Feature Bypass Vulnerability\n\nAffected: Microsoft Office\n\nMicrosoft Office contains a security feature bypass vulnerability in which reliance on untrusted inputs in a security decision in Microsoft Office could allow an unauthorized attacker to bypass a security feature locally. Some of the impacted product(s) could be end-of-life (EoL) and/or end-of-service (EoS). Users are advised to discontinue use and/or transition to a supported version.\n\nRequired Action: Apply mit", "cve_id": "CVE-2026-21509", "title": "Microsoft Office Security Feature Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2026-01-26", "split": "test"} -{"id": "CVE-2025-48633", "text": "Android Framework Information Disclosure Vulnerability\n\nAffected: Android Framework\n\nAndroid Framework contains an unspecified vulnerability that allows for information disclosure.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-48633", "title": "Android Framework Information Disclosure Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-02", "split": "test"} -{"id": "CVE-2025-40602", "text": "SonicWall SMA1000 Missing Authorization Vulnerability\n\nAffected: SonicWall SMA1000 appliance\n\nSonicWall SMA1000 contains a missing authorization vulnerability that could allow for privilege escalation appliance management console (AMC) of affected devices.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable\n\nCWE(s): CWE-862, CWE-250\n\n[Source: CISA Known Exploited Vul", "cve_id": "CVE-2025-40602", "title": "SonicWall SMA1000 Missing Authorization Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-17", "split": "test"} -{"id": "CVE-2024-55550", "text": "Mitel MiCollab Path Traversal Vulnerability\n\nAffected: Mitel MiCollab\n\nMitel MiCollab contains a path traversal vulnerability that could allow an authenticated attacker with administrative privileges to read local files within the system due to insufficient input sanitization. This vulnerability can be chained with CVE-2024-41713, which allows an unauthenticated, remote attacker to read arbitrary files on the server.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use", "cve_id": "CVE-2024-55550", "title": "Mitel MiCollab Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-01-07", "split": "test"} -{"id": "CVE-2024-29824", "text": "Ivanti Endpoint Manager (EPM) SQL Injection Vulnerability\n\nAffected: Ivanti Endpoint Manager (EPM)\n\nIvanti Endpoint Manager (EPM) contains a SQL injection vulnerability in Core server that allows an unauthenticated attacker within the same network to execute arbitrary code. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-89\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-29824", "title": "Ivanti Endpoint Manager (EPM) SQL Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-10-02", "split": "test"} -{"id": "CVE-2024-43093", "text": "Android Framework Privilege Escalation Vulnerability\n\nAffected: Android Framework\n\nAndroid Framework contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-43093", "title": "Android Framework Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-07", "split": "test"} -{"id": "CVE-2022-23748", "text": "Dante Discovery Process Control Vulnerability\n\nAffected: Audinate Dante Discovery\n\nDante Discovery contains a process control vulnerability in mDNSResponder.exe that all allows for a DLL sideloading attack. A local attacker can leverage this vulnerability in the Dante Application Library to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-114\n\n[Source: CISA Known Exploited Vulnerabil", "cve_id": "CVE-2022-23748", "title": "Dante Discovery Process Control Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-06", "split": "test"} -{"id": "CVE-2024-8957", "text": "PTZOptics PT30X-SDI/NDI Cameras OS Command Injection Vulnerability\n\nAffected: PTZOptics PT30X-SDI/NDI Cameras\n\nPTZOptics PT30X-SDI/NDI cameras contain an OS command injection vulnerability that allows a remote, authenticated attacker to escalate privileges to root via a crafted payload with the ntp_addr parameter of the /cgi-bin/param.cgi CGI script. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[So", "cve_id": "CVE-2024-8957", "title": "PTZOptics PT30X-SDI/NDI Cameras OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-04", "split": "test"} -{"id": "d7c7c2e5b1bd535257e1", "text": "[Uncontrolled Resource Consumption] CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words()\n\n# TL;DR\n\n**CVE-2024-27351**: Potential regular expression denial-of-service in `django.utils.text.Truncator.words()`\n\n# Details:\n\n`django.utils.text.Truncator.words()` method (with `html=True`) and `truncatewords_html` template filter were subject to a potential regular expression denial-of-service attack using a suitably crafted string (follow up to CVE-2019", "cve_id": "CVE-2023-43665", "title": "CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words() (Uncontrolled Resource Consumption)", "source": "hackerone", "timestamp": "2024-04-28", "split": "test"} -{"id": "CVE-2026-22769", "text": "Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability\n\nAffected: Dell RecoverPoint for Virtual Machines (RP4VMs)\n\nDell RecoverPoint for Virtual Machines (RP4VMs) contains an use of hard-coded credentials vulnerability that could allow an unauthenticated remote attacker to gain unauthorized access to the underlying operating system and root-level persistence.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for", "cve_id": "CVE-2026-22769", "title": "Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-18", "split": "test"} -{"id": "CVE-2025-20393", "text": "Cisco Multiple Products Improper Input Validation Vulnerability\n\nAffected: Cisco Multiple Products\n\nCisco Secure Email Gateway, Secure Email, AsyncOS Software, and Web Manager appliances contains an improper input validation vulnerability that allows threat actors to execute arbitrary commands with root privileges on the underlying operating system of an affected appliance.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or di", "cve_id": "CVE-2025-20393", "title": "Cisco Multiple Products Improper Input Validation Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-17", "split": "test"} -{"id": "CVE-2020-9715", "text": "Adobe Acrobat Use-After-Free Vulnerability\n\nAffected: Adobe Acrobat\n\nAdobe Acrobat contains a use-after-free vulnerability that allows for code execution\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2020-9715", "title": "Adobe Acrobat Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2026-04-13", "split": "test"} -{"id": "CVE-2025-21479", "text": "Qualcomm Multiple Chipsets Incorrect Authorization Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain an incorrect authorization vulnerability. This vulnerability allows for memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations ar", "cve_id": "CVE-2025-21479", "title": "Qualcomm Multiple Chipsets Incorrect Authorization Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-03", "split": "test"} -{"id": "CVE-2024-8069", "text": "Citrix Session Recording Deserialization of Untrusted Data Vulnerability\n\nAffected: Citrix Session Recording\n\nCitrix Session Recording contains a deserialization of untrusted data vulnerability that allows limited remote code execution with privilege of a NetworkService Account access. Attacker must be an authenticated user on the same intranet as the session recording server.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or", "cve_id": "CVE-2024-8069", "title": "Citrix Session Recording Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2025-08-25", "split": "test"} -{"id": "CVE-2025-40536", "text": "SolarWinds Web Help Desk Security Control Bypass Vulnerability\n\nAffected: SolarWinds Web Help Desk\n\nSolarWinds Web Help Desk contains a security control bypass vulnerability that could allow an unauthenticated attacker to gain access to certain restricted functionality.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2025-40536", "title": "SolarWinds Web Help Desk Security Control Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-12", "split": "test"} -{"id": "CVE-2025-43300", "text": "Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability\n\nAffected: Apple iOS, iPadOS, and macOS\n\nApple iOS, iPadOS, and macOS contain an out-of-bounds write vulnerability in the Image I/O framework.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-43300", "title": "Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2025-08-21", "split": "test"} -{"id": "CVE-2024-0012", "text": "Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nPalo Alto Networks PAN-OS contains an authentication bypass vulnerability in the web-based management interface for several PAN-OS products, including firewalls and VPN concentrators.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, management interface for affected devices should not be", "cve_id": "CVE-2024-0012", "title": "Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-18", "split": "test"} -{"id": "CVE-2024-1709", "text": "ConnectWise ScreenConnect Authentication Bypass Vulnerability\n\nAffected: ConnectWise ScreenConnect\n\nConnectWise ScreenConnect contains an authentication bypass vulnerability that allows an attacker with network access to the management interface to create a new, administrator-level account on affected devices.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-288\n\n[Source: CISA Known Explo", "cve_id": "CVE-2024-1709", "title": "ConnectWise ScreenConnect Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2024-02-22", "split": "test"} -{"id": "CVE-2021-22054", "text": "Omnissa Workspace ONE Server-Side Request Forgery\n\nAffected: Omnissa Workspace One UEM\n\nOmnissa Workspace One UEM formerly known as VMware Workspace One UEM contains a server-side request forgery (SSRF) vulnerability that could allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontin", "cve_id": "CVE-2021-22054", "title": "Omnissa Workspace ONE Server-Side Request Forgery", "source": "cisa_kev", "timestamp": "2026-03-09", "split": "test"} -{"id": "CVE-2024-37383", "text": "RoundCube Webmail Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Roundcube Webmail\n\nRoundCube Webmail contains a cross-site scripting (XSS) vulnerability in the handling of SVG animate attributes that allows a remote attacker to run malicious JavaScript code.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-37383", "title": "RoundCube Webmail Cross-Site Scripting (XSS) Vulnerability", "source": "cisa_kev", "timestamp": "2024-10-24", "split": "test"} -{"id": "CVE-2024-4040", "text": "CrushFTP VFS Sandbox Escape Vulnerability\n\nAffected: CrushFTP CrushFTP\n\nCrushFTP contains an unspecified sandbox escape vulnerability that allows a remote attacker to escape the CrushFTP virtual file system (VFS).\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-1336\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-4040", "title": "CrushFTP VFS Sandbox Escape Vulnerability", "source": "cisa_kev", "timestamp": "2024-04-24", "split": "test"} -{"id": "CVE-2026-21533", "text": "Microsoft Windows Improper Privilege Management Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-269\n\n[Source: CISA Known Exploited Vulnera", "cve_id": "CVE-2026-21533", "title": "Microsoft Windows Improper Privilege Management Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-10", "split": "test"} -{"id": "CVE-2025-21334", "text": "Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Hyper-V NT Kernel Integration VSP contains a use-after-free vulnerability that allows a local attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-21334", "title": "Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2025-01-14", "split": "test"} -{"id": "CVE-2023-52163", "text": "Digiever DS-2105 Pro Missing Authorization Vulnerability\n\nAffected: Digiever DS-2105 Pro\n\nDigiever DS-2105 Pro contains a missing authorization vulnerability which could allow for command injection via time_tzsetup.cgi.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-862\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-52163", "title": "Digiever DS-2105 Pro Missing Authorization Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-22", "split": "test"} -{"id": "CVE-2024-55956", "text": "Cleo Multiple Products Unauthenticated File Upload Vulnerability\n\nAffected: Cleo Multiple Products\n\nCleo Harmony, VLTrader, and LexiCom, which are managed file transfer products, contain an unrestricted file upload vulnerability that could allow an unauthenticated user to import and execute arbitrary bash or PowerShell commands on the host system by leveraging the default settings of the Autorun directory.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the prod", "cve_id": "CVE-2024-55956", "title": "Cleo Multiple Products Unauthenticated File Upload Vulnerability", "source": "cisa_kev", "timestamp": "2024-12-17", "split": "test"} -{"id": "CVE-2024-58136", "text": "Yiiframework Yii Improper Protection of Alternate Path Vulnerability\n\nAffected: Yiiframework Yii\n\nYii Framework contains an improper protection of alternate path vulnerability that may allow a remote attacker to execute arbitrary code. This vulnerability could affect other products that implement Yii, including—but not limited to—Craft CMS, as represented by CVE-2025-32432.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or di", "cve_id": "CVE-2024-58136", "title": "Yiiframework Yii Improper Protection of Alternate Path Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-02", "split": "test"} -{"id": "CVE-2022-43939", "text": "Hitachi Vantara Pentaho BA Server Authorization Bypass Vulnerability\n\nAffected: Hitachi Vantara Pentaho Business Analytics (BA) Server\n\nHitachi Vantara Pentaho BA Server contains a use of non-canonical URL paths for authorization decisions vulnerability that enables an attacker to bypass authorization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE", "cve_id": "CVE-2022-43939", "title": "Hitachi Vantara Pentaho BA Server Authorization Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-03", "split": "test"} -{"id": "CVE-2021-31196", "text": "Microsoft Exchange Server Information Disclosure Vulnerability\n\nAffected: Microsoft Exchange Server\n\nMicrosoft Exchange Server contains an information disclosure vulnerability that allows for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2021-31196", "title": "Microsoft Exchange Server Information Disclosure Vulnerability", "source": "cisa_kev", "timestamp": "2024-08-21", "split": "test"} -{"id": "CVE-2025-21590", "text": "Juniper Junos OS Improper Isolation or Compartmentalization Vulnerability\n\nAffected: Juniper Junos OS\n\nJuniper Junos OS contains an improper isolation or compartmentalization vulnerability. This vulnerability could allows a local attacker with high privileges to inject arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-653\n\n[Source: CIS", "cve_id": "CVE-2025-21590", "title": "Juniper Junos OS Improper Isolation or Compartmentalization Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-13", "split": "test"} -{"id": "CVE-2024-9680", "text": "Mozilla Firefox Use-After-Free Vulnerability\n\nAffected: Mozilla Firefox\n\nMozilla Firefox and Firefox ESR contain a use-after-free vulnerability in Animation timelines that allows for code execution in the content process.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-9680", "title": "Mozilla Firefox Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2024-10-15", "split": "test"} -{"id": "CVE-2021-30952", "text": "Apple Multiple Products Integer Overflow or Wraparound Vulnerability\n\nAffected: Apple Multiple Products\n\nApple tvOS, macOS, Safari, iPadOS and watchOS contain an integer overflow or wraparound vulnerability due to the processing of maliciously crafted web content that may lead to arbitrary code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s):", "cve_id": "CVE-2021-30952", "title": "Apple Multiple Products Integer Overflow or Wraparound Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-05", "split": "test"} -{"id": "CVE-2025-61884", "text": "Oracle E-Business Suite Server-Side Request Forgery (SSRF) Vulnerability\n\nAffected: Oracle E-Business Suite\n\nOracle E-Business Suite contains a server-side request forgery (SSRF) vulnerability in the Runtime component of Oracle Configurator. This vulnerability is remotely exploitable without authentication.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nRansom", "cve_id": "CVE-2025-61884", "title": "Oracle E-Business Suite Server-Side Request Forgery (SSRF) Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-20", "split": "test"} -{"id": "CVE-2025-32706", "text": "Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System (CLFS) Driver contains a heap-based buffer overflow vulnerability that allows an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-122", "cve_id": "CVE-2025-32706", "title": "Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-13", "split": "test"} -{"id": "CVE-2024-38080", "text": "Microsoft Windows Hyper-V Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Hyper-V contains a privilege escalation vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-190\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38080", "title": "Microsoft Windows Hyper-V Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2024-07-09", "split": "test"} -{"id": "CVE-2019-9874", "text": "Sitecore CMS and Experience Platform (XP) Deserialization Vulnerability\n\nAffected: Sitecore CMS and Experience Platform (XP)\n\nSitecore CMS and Experience Platform (XP) contain a deserialization vulnerability in the Sitecore.Security.AntiCSRF module that allows an unauthenticated attacker to execute arbitrary code by sending a serialized .NET object in the HTTP POST parameter __CSRFTOKEN.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud s", "cve_id": "CVE-2019-9874", "title": "Sitecore CMS and Experience Platform (XP) Deserialization Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-26", "split": "test"} -{"id": "CVE-2024-9474", "text": "Palo Alto Networks PAN-OS Management Interface OS Command Injection Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nPalo Alto Networks PAN-OS contains an OS command injection vulnerability that allows for privilege escalation through the web-based management interface for several PAN products, including firewalls and VPN concentrators.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, the management int", "cve_id": "CVE-2024-9474", "title": "Palo Alto Networks PAN-OS Management Interface OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-18", "split": "test"} -{"id": "CVE-2026-3055", "text": "Citrix NetScaler Out-of-Bounds Read Vulnerability\n\nAffected: Citrix NetScaler\n\nCitrix NetScaler ADC (formerly Citrix ADC), NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC FIPS and NDcPP contain an out-of-bounds reads vulnerability when configured as a SAML IDP leading to memory overread.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-", "cve_id": "CVE-2026-3055", "title": "Citrix NetScaler Out-of-Bounds Read Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-30", "split": "test"} -{"id": "cc09d250ad620f30bf7d", "text": "[Uncontrolled Resource Consumption] Apache HTTP Server: HTTP/2 DoS by memory exhaustion on endless continuation frames\n\nI'd like to report Apache httpd vulnerability (CVE-2024-27316) that was recently fixed.\n* Advisory: https://httpd.apache.org/security/vulnerabilities_24.html\n\n## Impact\n\nHTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.", "cve_id": "CVE-2024-27316", "title": "Apache HTTP Server: HTTP/2 DoS by memory exhaustion on endless continuation frames (Uncontrolled Resource Consumption)", "source": "hackerone", "timestamp": "2024-04-24", "split": "test"} -{"id": "CVE-2025-29824", "text": "Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System (CLFS) Driver contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-416\n\n[Sou", "cve_id": "CVE-2025-29824", "title": "Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2025-04-08", "split": "test"} -{"id": "CVE-2025-66376", "text": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability in the Classic UI where attackers could abuse Cascading Style Sheets (CSS) @import directives in email HTML.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unav", "cve_id": "CVE-2025-66376", "title": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-18", "split": "test"} -{"id": "CVE-2026-25108", "text": "Soliton Systems K.K FileZen OS Command Injection Vulnerability\n\nAffected: Soliton Systems K.K FileZen\n\nSoliton Systems K.K FileZen contains an OS command injection vulnerability when an user logs-in to the affected product and sends a specially crafted HTTP request.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2026-25108", "title": "Soliton Systems K.K FileZen OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-24", "split": "test"} -{"id": "CVE-2025-0411", "text": "7-Zip Mark of the Web Bypass Vulnerability\n\nAffected: 7-Zip 7-Zip\n\n7-Zip contains a protection mechanism failure vulnerability that allows remote attackers to bypass the Mark-of-the-Web security feature to execute arbitrary code in the context of the current user.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-0411", "title": "7-Zip Mark of the Web Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-06", "split": "test"} -{"id": "CVE-2025-33073", "text": "Microsoft Windows SMB Client Improper Access Control Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows SMB Client contains an improper access control vulnerability that could allow for privilege escalation. An attacker could execute a specially crafted malicious script to coerce the victim machine to connect back to the attack system using SMB and authenticate.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or dis", "cve_id": "CVE-2025-33073", "title": "Microsoft Windows SMB Client Improper Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-20", "split": "test"} -{"id": "CVE-2024-21762", "text": "Fortinet FortiOS Out-of-Bound Write Vulnerability\n\nAffected: Fortinet FortiOS\n\nFortinet FortiOS contains an out-of-bound write vulnerability that allows a remote unauthenticated attacker to execute code or commands via specially crafted HTTP requests.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-21762", "title": "Fortinet FortiOS Out-of-Bound Write Vulnerability", "source": "cisa_kev", "timestamp": "2024-02-09", "split": "test"} -{"id": "CVE-2018-19410", "text": "Paessler PRTG Network Monitor Local File Inclusion Vulnerability\n\nAffected: Paessler PRTG Network Monitor\n\nPaessler PRTG Network Monitor contains a local file inclusion vulnerability that allows a remote, unauthenticated attacker to create users with read-write privileges (including administrator).\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2018-19410", "title": "Paessler PRTG Network Monitor Local File Inclusion Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-04", "split": "test"} -{"id": "CVE-2021-26829", "text": "OpenPLC ScadaBR Cross-site Scripting Vulnerability\n\nAffected: OpenPLC ScadaBR\n\nOpenPLC ScadaBR contains a cross-site scripting vulnerability via system_settings.shtm.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2021-26829", "title": "OpenPLC ScadaBR Cross-site Scripting Vulnerability", "source": "cisa_kev", "timestamp": "2025-11-28", "split": "test"} -{"id": "CVE-2023-23752", "text": "Joomla! Improper Access Control Vulnerability\n\nAffected: Joomla! Joomla!\n\nJoomla! contains an improper access control vulnerability that allows unauthorized access to webservice endpoints.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-23752", "title": "Joomla! Improper Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-08", "split": "test"} -{"id": "CVE-2024-36971", "text": "Android Kernel Remote Code Execution Vulnerability\n\nAffected: Android Kernel\n\nAndroid contains an unspecified vulnerability in the kernel that allows for remote code execution. This vulnerability resides in Linux Kernel and could impact other products, including but not limited to Android OS.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-36971", "title": "Android Kernel Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2024-08-07", "split": "test"} -{"id": "CVE-2021-44207", "text": "Acclaim Systems USAHERDS Use of Hard-Coded Credentials Vulnerability \n\nAffected: Acclaim Systems USAHERDS\n\nAcclaim Systems USAHERDS contains a hard-coded credentials vulnerability that could allow an attacker to achieve remote code execution on the system that runs the application. The MachineKey must be obtained via a separate vulnerability or other channel.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Please conta", "cve_id": "CVE-2021-44207", "title": "Acclaim Systems USAHERDS Use of Hard-Coded Credentials Vulnerability ", "source": "cisa_kev", "timestamp": "2024-12-23", "split": "test"} -{"id": "CVE-2021-43798", "text": "Grafana Path Traversal Vulnerability\n\nAffected: Grafana Labs Grafana\n\nGrafana contains a path traversal vulnerability that could allow access to local files.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2021-43798", "title": "Grafana Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-09", "split": "test"} -{"id": "CVE-2024-0769", "text": "D-Link DIR-859 Router Path Traversal Vulnerability\n\nAffected: D-Link DIR-859 Router\n\nD-Link DIR-859 routers contain a path traversal vulnerability in the file /hedwig.cgi of the component HTTP POST Request Handler. Manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml allows for the leakage of session data potentially enabling privilege escalation and unauthorized control of the device. This vulnerability affects legacy D-Link products. All ass", "cve_id": "CVE-2024-0769", "title": " D-Link DIR-859 Router Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-25", "split": "test"} -{"id": "CVE-2020-13965", "text": "Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Roundcube Webmail\n\nRoundcube Webmail contains a cross-site scripting (XSS) vulnerability that allows a remote attacker to manipulate data via a malicious XML attachment.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-80\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2020-13965", "title": "Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability", "source": "cisa_kev", "timestamp": "2024-06-26", "split": "test"} -{"id": "CVE-2024-32896", "text": "Android Pixel Privilege Escalation Vulnerability\n\nAffected: Android Pixel\n\nAndroid Pixel contains an unspecified vulnerability in the firmware that allows for privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-783\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-32896", "title": "Android Pixel Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2024-06-13", "split": "test"} -{"id": "CVE-2024-3273", "text": "D-Link Multiple NAS Devices Command Injection Vulnerability\n\nAffected: D-Link Multiple NAS Devices\n\nD-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L contain a command injection vulnerability. When combined with CVE-2024-3272, this can lead to remote, unauthorized code execution.\n\nRequired Action: This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor", "cve_id": "CVE-2024-3273", "title": "D-Link Multiple NAS Devices Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-04-11", "split": "test"} -{"id": "CVE-2025-24983", "text": "Microsoft Windows Win32k Use-After-Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Win32 Kernel Subsystem contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-24983", "title": "Microsoft Windows Win32k Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-11", "split": "test"} -{"id": "CVE-2026-21514", "text": "Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability\n\nAffected: Microsoft Office\n\nMicrosoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-807\n\n[Source: CI", "cve_id": "CVE-2026-21514", "title": "Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-10", "split": "test"} -{"id": "CVE-2023-33538", "text": "TP-Link Multiple Routers Command Injection Vulnerability\n\nAffected: TP-Link Multiple Routers\n\nTP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue u", "cve_id": "CVE-2023-33538", "title": "TP-Link Multiple Routers Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-16", "split": "test"} -{"id": "CVE-2026-20127", "text": "Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability\n\nAffected: Cisco Catalyst SD-WAN Controller and Manager\n\nCisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, contain an authentication bypass vulnerability could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mec", "cve_id": "CVE-2026-20127", "title": "Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-25", "split": "test"} -{"id": "CVE-2025-1976", "text": "Broadcom Brocade Fabric OS Code Injection Vulnerability\n\nAffected: Broadcom Brocade Fabric OS\n\nBroadcom Brocade Fabric OS contains a code injection vulnerability that allows a local user with administrative privileges to execute arbitrary code with full root privileges.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploite", "cve_id": "CVE-2025-1976", "title": "Broadcom Brocade Fabric OS Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-04-28", "split": "test"} -{"id": "CVE-2012-1854", "text": "Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability\n\nAffected: Microsoft Visual Basic for Applications (VBA)\n\nMicrosoft Visual Basic for Applications (VBA) contains an insecure library loading vulnerability that could allow for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-426\n\n[Source: CISA Known", "cve_id": "CVE-2012-1854", "title": "Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability", "source": "cisa_kev", "timestamp": "2026-04-13", "split": "test"} -{"id": "CVE-2025-42599", "text": "Qualitia Active! Mail Stack-Based Buffer Overflow Vulnerability\n\nAffected: Qualitia Active! Mail\n\nQualitia Active! Mail contains a stack-based buffer overflow vulnerability that allows a remote, unauthenticated attacker to execute arbitrary or trigger a denial-of-service via a specially crafted request.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CW", "cve_id": "CVE-2025-42599", "title": "Qualitia Active! Mail Stack-Based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2025-04-28", "split": "test"} -{"id": "CVE-2025-6204", "text": "Dassault Systèmes DELMIA Apriso Code Injection Vulnerability\n\nAffected: Dassault Systèmes DELMIA Apriso\n\nDassault Systèmes DELMIA Apriso contains a code injection vulnerability that could allow an attacker to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-6204", "title": "Dassault Systèmes DELMIA Apriso Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-28", "split": "test"} -{"id": "CVE-2025-20362", "text": "Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Missing Authorization Vulnerability\n\nAffected: Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense\n\nCisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Software VPN Web Server contain a missing authorization vulnerability. This vulnerability could be chained with CVE-2025-20333.\n\nRequired Action: The KEV due date refers to", "cve_id": "CVE-2025-20362", "title": "Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Missing Authorization Vulnerability", "source": "cisa_kev", "timestamp": "2025-09-25", "split": "test"} -{"id": "CVE-2025-8088", "text": "RARLAB WinRAR Path Traversal Vulnerability\n\nAffected: RARLAB WinRAR\n\nRARLAB WinRAR contains a path traversal vulnerability affecting the Windows version of WinRAR. This vulnerability could allow an attacker to execute arbitrary code by crafting malicious archive files.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-35\n\n[Source: CISA Known Exploited", "cve_id": "CVE-2025-8088", "title": "RARLAB WinRAR Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-08-12", "split": "test"} -{"id": "CVE-2024-38178", "text": "Microsoft Windows Scripting Engine Memory Corruption Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Scripting Engine contains a memory corruption vulnerability that allows unauthenticated attacker to initiate remote code execution via a specially crafted URL.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38178", "title": "Microsoft Windows Scripting Engine Memory Corruption Vulnerability", "source": "cisa_kev", "timestamp": "2024-08-13", "split": "test"} -{"id": "CVE-2025-30400", "text": "Microsoft Windows DWM Core Library Use-After-Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows DWM Core Library contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-30400", "title": "Microsoft Windows DWM Core Library Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-13", "split": "test"} -{"id": "CVE-2024-45195", "text": "Apache OFBiz Forced Browsing Vulnerability\n\nAffected: Apache OFBiz\n\nApache OFBiz contains a forced browsing vulnerability that allows a remote attacker to obtain unauthorized access.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-425\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-45195", "title": "Apache OFBiz Forced Browsing Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-04", "split": "test"} -{"id": "CVE-2024-55591", "text": "Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability\n\nAffected: Fortinet FortiOS and FortiProxy\n\nFortinet FortiOS and FortiProxy contain an authentication bypass vulnerability that may allow an unauthenticated, remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-288\n\n[Source: CISA", "cve_id": "CVE-2024-55591", "title": "Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2025-01-14", "split": "test"} -{"id": "CVE-2025-22224", "text": "VMware ESXi and Workstation TOCTOU Race Condition Vulnerability\n\nAffected: VMware ESXi and Workstation\n\nVMware ESXi and Workstation contain a time-of-check time-of-use (TOCTOU) race condition vulnerability that leads to an out-of-bounds write. Successful exploitation enables an attacker with local administrative privileges on a virtual machine to execute code as the virtual machine's VMX process running on the host.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable B", "cve_id": "CVE-2025-22224", "title": "VMware ESXi and Workstation TOCTOU Race Condition Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-04", "split": "test"} -{"id": "CVE-2019-0344", "text": "SAP Commerce Cloud Deserialization of Untrusted Data Vulnerability\n\nAffected: SAP Commerce Cloud\n\nSAP Commerce Cloud (formerly known as Hybris) contains a deserialization of untrusted data vulnerability within the mediaconversion and virtualjdbc extension that allows for code injection.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2019-0344", "title": "SAP Commerce Cloud Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-30", "split": "test"} -{"id": "CVE-2022-48503", "text": "Apple Multiple Products Unspecified Vulnerability\n\nAffected: Apple Multiple Products\n\nApple macOS, iOS, tvOS, Safari, and watchOS contain an unspecified vulnerability in JavaScriptCore that when processing web content may lead to arbitrary code execution. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or", "cve_id": "CVE-2022-48503", "title": "Apple Multiple Products Unspecified Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-20", "split": "test"} -{"id": "CVE-2025-0108", "text": "Palo Alto Networks PAN-OS Authentication Bypass Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nPalo Alto Networks PAN-OS contains an authentication bypass vulnerability in its management web interface. This vulnerability allows an unauthenticated attacker with network access to the management web interface to bypass the authentication normally required and invoke certain PHP scripts.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations", "cve_id": "CVE-2025-0108", "title": "Palo Alto Networks PAN-OS Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-18", "split": "test"} -{"id": "CVE-2025-42999", "text": "SAP NetWeaver Deserialization Vulnerability\n\nAffected: SAP NetWeaver\n\nSAP NetWeaver Visual Composer Metadata Uploader contains a deserialization vulnerability that allows a privileged attacker to compromise the confidentiality, integrity, and availability of the host system by deserializing untrusted or malicious content.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unava", "cve_id": "CVE-2025-42999", "title": "SAP NetWeaver Deserialization Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-15", "split": "test"} -{"id": "CVE-2024-50302", "text": "Linux Kernel Use of Uninitialized Resource Vulnerability\n\nAffected: Linux Kernel\n\nThe Linux kernel contains a use of uninitialized resource vulnerability that allows an attacker to leak kernel memory via a specially crafted HID report.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-908\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-50302", "title": "Linux Kernel Use of Uninitialized Resource Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-04", "split": "test"} -{"id": "CVE-2024-23897", "text": "Jenkins Command Line Interface (CLI) Path Traversal Vulnerability\n\nAffected: Jenkins Jenkins Command Line Interface (CLI)\n\nJenkins Command Line Interface (CLI) contains a path traversal vulnerability that allows attackers limited read access to certain files, which can lead to code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-27\n\n[Source: CISA Known Exploited Vulnerabilitie", "cve_id": "CVE-2024-23897", "title": "Jenkins Command Line Interface (CLI) Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2024-08-19", "split": "test"} -{"id": "CVE-2025-49113", "text": "RoundCube Webmail Deserialization of Untrusted Data Vulnerability\n\nAffected: Roundcube Webmail\n\nRoundCube Webmail contains a deserialization of untrusted data vulnerability that allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unava", "cve_id": "CVE-2025-49113", "title": "RoundCube Webmail Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-20", "split": "test"} -{"id": "CVE-2024-7593", "text": "Ivanti Virtual Traffic Manager Authentication Bypass Vulnerability\n\nAffected: Ivanti Virtual Traffic Manager\n\nIvanti Virtual Traffic Manager contains an authentication bypass vulnerability that allows a remote, unauthenticated attacker to create a chosen administrator account.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-287, CWE-303\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-7593", "title": "Ivanti Virtual Traffic Manager Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-24", "split": "test"} -{"id": "CVE-2025-54236", "text": "Adobe Commerce and Magento Improper Input Validation Vulnerability\n\nAffected: Adobe Commerce and Magento\n\nAdobe Commerce and Magento Open Source contain an improper input validation vulnerability that could allow an attacker to take over customer accounts through the Commerce REST API.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-20\n\n[Source: CIS", "cve_id": "CVE-2025-54236", "title": "Adobe Commerce and Magento Improper Input Validation Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-24", "split": "test"} -{"id": "CVE-2025-48928", "text": "TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability\n\nAffected: TeleMessage TM SGNL\n\nTeleMessage TM SGNL contains an exposure of core dump file to an unauthorized control sphere Vulnerability. This vulnerability is based on a JSP application in which the heap content is roughly equivalent to a \"core dump\" in which a password previously sent over HTTP would be included in this dump.\n\nRequired Action: Apply mitigations per vendor instructions, follow appli", "cve_id": "CVE-2025-48928", "title": "TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-01", "split": "test"} -{"id": "CVE-2024-39717", "text": "Versa Director Dangerous File Type Upload Vulnerability\n\nAffected: Versa Director\n\nThe Versa Director GUI contains an unrestricted upload of file with dangerous type vulnerability that allows administrators with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin privileges to customize the user interface. The “Change Favicon” (Favorite Icon) enables the upload of a .png file, which can be exploited to upload a malicious file with a .png extension disguised as an image.\n\nRequired Act", "cve_id": "CVE-2024-39717", "title": "Versa Director Dangerous File Type Upload Vulnerability", "source": "cisa_kev", "timestamp": "2024-08-23", "split": "test"} -{"id": "f7c8eefd2d1d0a976a0a", "text": "[Path Traversal] Path traversal through path stored in Uint8Array in Node.js 20\n\nVarious `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In Node.js environments, the `Buffer` class extends the `Uint8Array` class. Node.js prevents path traversal through strings (see CVE-2023-30584) and `Buffer` objects (see CVE-2023-32004), but not through non-`Buffer` `Uint8Array` objects.\n\nThis is distinct from CVE-2023-32004 ([report 2038134](https://hackerone.com/reports/", "cve_id": "CVE-2023-32004", "title": "Path traversal through path stored in Uint8Array in Node.js 20 (Path Traversal)", "source": "hackerone", "timestamp": "2024-01-20", "split": "test"} -{"id": "CVE-2008-0015", "text": "Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Video ActiveX Control contains a remote code execution vulnerability. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.\n\nRequired Action:", "cve_id": "CVE-2008-0015", "title": " Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-17", "split": "test"} -{"id": "CVE-2024-23225", "text": "Apple Multiple Products Memory Corruption Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, watchOS, and visionOS kernel contain a memory corruption vulnerability that allows an attacker with arbitrary kernel read and write capability to bypass kernel memory protections.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalo", "cve_id": "CVE-2024-23225", "title": "Apple Multiple Products Memory Corruption Vulnerability", "source": "cisa_kev", "timestamp": "2024-03-06", "split": "test"} -{"id": "CVE-2024-5274", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-84", "cve_id": "CVE-2024-5274", "title": "Google Chromium V8 Type Confusion Vulnerability", "source": "cisa_kev", "timestamp": "2024-05-28", "split": "test"} -{"id": "CVE-2025-68461", "text": "RoundCube Webmail Cross-site Scripting Vulnerability\n\nAffected: Roundcube Webmail\n\nRoundCube Webmail contains a cross-site scripting vulnerability via the animate tag in an SVG document.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-68461", "title": "RoundCube Webmail Cross-site Scripting Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-20", "split": "test"} -{"id": "CVE-2025-24990", "text": "Microsoft Windows Untrusted Pointer Dereference Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Agere Modem Driver contains an untrusted pointer dereference vulnerability that allows for privilege escalation. An attacker who successfully exploited this vulnerability could gain administrator privileges.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable", "cve_id": "CVE-2025-24990", "title": "Microsoft Windows Untrusted Pointer Dereference Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-14", "split": "test"} -{"id": "CVE-2022-40799", "text": "D-Link DNR-322L Download of Code Without Integrity Check Vulnerability\n\nAffected: D-Link DNR-322L\n\nD-Link DNR-322L contains a download of code without integrity check vulnerability that could allow an authenticated attacker to execute OS level commands on the device. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud", "cve_id": "CVE-2022-40799", "title": "D-Link DNR-322L Download of Code Without Integrity Check Vulnerability", "source": "cisa_kev", "timestamp": "2025-08-05", "split": "test"} -{"id": "CVE-2014-100005", "text": "D-Link DIR-600 Router Cross-Site Request Forgery (CSRF) Vulnerability\n\nAffected: D-Link DIR-600 Router\n\nD-Link DIR-600 routers contain a cross-site request forgery (CSRF) vulnerability that allows an attacker to change router configurations by hijacking an existing administrator session.\n\nRequired Action: This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced p", "cve_id": "CVE-2014-100005", "title": "D-Link DIR-600 Router Cross-Site Request Forgery (CSRF) Vulnerability", "source": "cisa_kev", "timestamp": "2024-05-16", "split": "test"} -{"id": "CVE-2024-50603", "text": "Aviatrix Controllers OS Command Injection Vulnerability\n\nAffected: Aviatrix Controllers\n\nAviatrix Controllers contain an OS command injection vulnerability that could allow an unauthenticated attacker to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavaila", "cve_id": "CVE-2024-50603", "title": "Aviatrix Controllers OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-01-16", "split": "test"} -{"id": "CVE-2026-3910", "text": "Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and O", "cve_id": "CVE-2026-3910", "title": "Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-13", "split": "test"} -{"id": "CVE-2024-28987", "text": "SolarWinds Web Help Desk Hardcoded Credential Vulnerability\n\nAffected: SolarWinds Web Help Desk\n\nSolarWinds Web Help Desk contains a hardcoded credential vulnerability that could allow a remote, unauthenticated user to access internal functionality and modify data.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-798\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-28987", "title": "SolarWinds Web Help Desk Hardcoded Credential Vulnerability", "source": "cisa_kev", "timestamp": "2024-10-15", "split": "test"} -{"id": "CVE-2024-38856", "text": "Apache OFBiz Incorrect Authorization Vulnerability\n\nAffected: Apache OFBiz\n\nApache OFBiz contains an incorrect authorization vulnerability that could allow remote code execution via a Groovy payload in the context of the OFBiz user process by an unauthenticated attacker.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-863\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38856", "title": "Apache OFBiz Incorrect Authorization Vulnerability", "source": "cisa_kev", "timestamp": "2024-08-27", "split": "test"} -{"id": "CVE-2024-48248", "text": "NAKIVO Backup and Replication Absolute Path Traversal Vulnerability\n\nAffected: NAKIVO Backup and Replication\n\nNAKIVO Backup and Replication contains an absolute path traversal vulnerability that enables an attacker to read arbitrary files.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-36\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-48248", "title": "NAKIVO Backup and Replication Absolute Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-19", "split": "test"} -{"id": "CVE-2021-33045", "text": "Dahua IP Camera Authentication Bypass Vulnerability\n\nAffected: Dahua IP Camera Firmware\n\nDahua IP cameras and related products contain an authentication bypass vulnerability when the loopback device is specified by the client during authentication.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-287\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2021-33045", "title": "Dahua IP Camera Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2024-08-21", "split": "test"} -{"id": "CVE-2025-54948", "text": "Trend Micro Apex One OS Command Injection Vulnerability\n\nAffected: Trend Micro Apex One\n\nTrend Micro Apex One Management Console (on-premise) contains an OS command injection vulnerability that could allow a pre-authenticated remote attacker to upload malicious code and execute commands on affected installations.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", "cve_id": "CVE-2025-54948", "title": "Trend Micro Apex One OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-08-18", "split": "test"} -{"id": "CVE-2021-21311", "text": "Adminer Server-Side Request Forgery Vulnerability\n\nAffected: Adminer Adminer\n\nAdminer contains a server-side request forgery vulnerability that, when exploited, allows a remote attacker to obtain potentially sensitive information.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-918\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2021-21311", "title": "Adminer Server-Side Request Forgery Vulnerability", "source": "cisa_kev", "timestamp": "2025-09-29", "split": "test"} -{"id": "CVE-2025-32709", "text": "Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Ancillary Function Driver for WinSock contains a use-after-free vulnerability that allows an authorized attacker to escalate privileges to administrator.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CI", "cve_id": "CVE-2025-32709", "title": "Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-13", "split": "test"} -{"id": "CVE-2025-68645", "text": "Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a PHP remote file inclusion vulnerability that could allow for remote attackers to craft requests to the /h/rest endpoint to influence internal request dispatching, allowing inclusion of arbitrary files from the WebRoot directory.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 2", "cve_id": "CVE-2025-68645", "title": "Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability", "source": "cisa_kev", "timestamp": "2026-01-22", "split": "test"} -{"id": "CVE-2018-14933", "text": "NUUO NVRmini Devices OS Command Injection Vulnerability \n\nAffected: NUUO NVRmini Devices\n\nNUUO NVRmini devices contain an OS command injection vulnerability. This vulnerability allows remote command execution via shell metacharacters in the uploaddir parameter for a writeuploaddir command.\n\nRequired Action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Cata", "cve_id": "CVE-2018-14933", "title": "NUUO NVRmini Devices OS Command Injection Vulnerability ", "source": "cisa_kev", "timestamp": "2024-12-18", "split": "test"} -{"id": "d7c7c2e5b1bd535257e1", "text": "[Uncontrolled Resource Consumption] CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words()\n\n# TL;DR\n\n**CVE-2024-27351**: Potential regular expression denial-of-service in `django.utils.text.Truncator.words()`\n\n# Details:\n\n`django.utils.text.Truncator.words()` method (with `html=True`) and `truncatewords_html` template filter were subject to a potential regular expression denial-of-service attack using a suitably crafted string (follow up to CVE-2019", "cve_id": "CVE-2024-27351", "title": "CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words() (Uncontrolled Resource Consumption)", "source": "hackerone", "timestamp": "2024-04-28", "split": "test"} -{"id": "CVE-2020-17519", "text": "Apache Flink Improper Access Control Vulnerability\n\nAffected: Apache Flink\n\nApache Flink contains an improper access control vulnerability that allows an attacker to read any file on the local filesystem of the JobManager through its REST interface.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-552\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2020-17519", "title": "Apache Flink Improper Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2024-05-23", "split": "test"} -{"id": "CVE-2025-31277", "text": "Apple Multiple Products Buffer Overflow Vulnerability\n\nAffected: Apple Multiple Products\n\nApple Safari, iOS, watchOS, visionOS, iPadOS, macOS, and tvOS contain a buffer overflow vulnerability that could allow the processing of maliciously crafted web content which may lead to memory corruption.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-119\n\n[S", "cve_id": "CVE-2025-31277", "title": "Apple Multiple Products Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-20", "split": "test"} -{"id": "CVE-2025-48703", "text": "CWP Control Web Panel OS Command Injection Vulnerability\n\nAffected: CWP Control Web Panel\n\nCWP Control Web Panel (formerly CentOS Web Panel) contains an OS command Injection vulnerability that allows unauthenticated remote code execution via shell metacharacters in the t_total parameter in a filemanager changePerm request. A valid non-root username must be known.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue u", "cve_id": "CVE-2025-48703", "title": "CWP Control Web Panel OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-11-04", "split": "test"} -{"id": "CVE-2026-20131", "text": "Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability\n\nAffected: Cisco Secure Firewall Management Center (FMC)\n\nCisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management contain a deserialization of untrusted data vulnerability in the web-based management interface that could allow an unauthenticated, remote attacker to execute arbitr", "cve_id": "CVE-2026-20131", "title": "Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-19", "split": "test"} -{"id": "CVE-2025-4428", "text": "Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability\n\nAffected: Ivanti Endpoint Manager Mobile (EPMM)\n\nIvanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability in the API component that allows an authenticated attacker to remotely execute arbitrary code via crafted API requests. This vulnerability results from an insecure implementation of the Hibernate Validator open-source library, as represented by CVE-2025-35036.\n\nRequired Action: Apply mitigations per vend", "cve_id": "CVE-2025-4428", "title": "Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-19", "split": "test"} -{"id": "CVE-2024-9379", "text": "Ivanti Cloud Services Appliance (CSA) SQL Injection Vulnerability\n\nAffected: Ivanti Cloud Services Appliance (CSA)\n\nIvanti Cloud Services Appliance (CSA) contains a SQL injection vulnerability in the admin web console in versions prior to 5.0.2, which can allow a remote attacker authenticated as administrator to run arbitrary SQL statements.\n\nRequired Action: As Ivanti CSA 4.6.x has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line, or late", "cve_id": "CVE-2024-9379", "title": "Ivanti Cloud Services Appliance (CSA) SQL Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-10-09", "split": "test"} -{"id": "CVE-2024-13159", "text": "Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability\n\nAffected: Ivanti Endpoint Manager (EPM)\n\nIvanti Endpoint Manager (EPM) contains an absolute path traversal vulnerability that allows a remote unauthenticated attacker to leak sensitive information.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-36\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2024-13159", "title": "Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-10", "split": "test"} -{"id": "CVE-2025-1316", "text": "Edimax IC-7100 IP Camera OS Command Injection Vulnerability\n\nAffected: Edimax IC-7100 IP Camera\n\nEdimax IC-7100 IP camera contains an OS command injection vulnerability due to improper input sanitization that allows an attacker to achieve remote code execution via specially crafted requests. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 2", "cve_id": "CVE-2025-1316", "title": "Edimax IC-7100 IP Camera OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-19", "split": "test"} -{"id": "CVE-2024-38193", "text": "Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Ancillary Function Driver for WinSock contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Cata", "cve_id": "CVE-2024-38193", "title": "Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2024-08-13", "split": "test"} -{"id": "CVE-2020-7796", "text": "Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a server-side request forgery vulnerability if WebEx zimlet installed and zimlet JSP is enabled.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-918\n\n[Source: CISA Known E", "cve_id": "CVE-2020-7796", "title": "Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-17", "split": "test"} -{"id": "CVE-2025-12480", "text": "Gladinet Triofox Improper Access Control Vulnerability\n\nAffected: Gladinet Triofox\n\nGladinet Triofox contains an improper access control vulnerability that allows access to initial setup pages even after setup is complete.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-12480", "title": "Gladinet Triofox Improper Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2025-11-12", "split": "test"} -{"id": "CVE-2025-24200", "text": "Apple iOS and iPadOS Incorrect Authorization Vulnerability\n\nAffected: Apple iOS and iPadOS\n\nApple iOS and iPadOS contains an incorrect authorization vulnerability that allows a physical attacker to disable USB Restricted Mode on a locked device.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-863\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-24200", "title": "Apple iOS and iPadOS Incorrect Authorization Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-12", "split": "test"} -{"id": "CVE-2025-32432", "text": "Craft CMS Code Injection Vulnerability\n\nAffected: Craft CMS Craft CMS\n\nCraft CMS contains a code injection vulnerability that allows a remote attacker to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-32432", "title": "Craft CMS Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-20", "split": "test"} -{"id": "CVE-2025-23006", "text": "SonicWall SMA1000 Appliances Deserialization Vulnerability\n\nAffected: SonicWall SMA1000 Appliances\n\nSonicWall SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC) contain a deserialization of untrusted data vulnerability, which can enable a remote, unauthenticated attacker to execute arbitrary OS commands.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[S", "cve_id": "CVE-2025-23006", "title": "SonicWall SMA1000 Appliances Deserialization Vulnerability", "source": "cisa_kev", "timestamp": "2025-01-24", "split": "test"} -{"id": "CVE-2025-23209", "text": "Craft CMS Code Injection Vulnerability\n\nAffected: Craft CMS Craft CMS\n\nCraft CMS contains a code injection vulnerability caused by improper validation of the database backup path, ultimately enabling remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-23209", "title": "Craft CMS Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-20", "split": "test"} -{"id": "CVE-2017-1000253", "text": "Linux Kernel PIE Stack Buffer Corruption Vulnerability \n\nAffected: Linux Kernel\n\nLinux kernel contains a position-independent executable (PIE) stack buffer corruption vulnerability in load_elf_ binary() that allows a local attacker to escalate privileges. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-119\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2017-1000253", "title": "Linux Kernel PIE Stack Buffer Corruption Vulnerability ", "source": "cisa_kev", "timestamp": "2024-09-09", "split": "test"} -{"id": "CVE-2025-30066", "text": "tj-actions/changed-files GitHub Action Embedded Malicious Code Vulnerability\n\nAffected: tj-actions changed-files GitHub Action\n\ntj-actions/changed-files GitHub Action contains an embedded malicious code vulnerability that allows a remote attacker to discover secrets by reading Github Actions Workflow Logs. These secrets may include, but are not limited to, valid AWS access keys, GitHub personal access tokens (PATs), npm tokens, and private RSA keys.\n\nRequired Action: Apply mitigations as set for", "cve_id": "CVE-2025-30066", "title": "tj-actions/changed-files GitHub Action Embedded Malicious Code Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-18", "split": "test"} -{"id": "CVE-2024-43047", "text": "Qualcomm Multiple Chipsets Use-After-Free Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain a use-after-free vulnerability due to memory corruption in DSP Services while maintaining memory maps of HLOS memory. \n\nRequired Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-43047", "title": "Qualcomm Multiple Chipsets Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2024-10-08", "split": "test"} -{"id": "CVE-2023-28461", "text": "Array Networks AG and vxAG ArrayOS Missing Authentication for Critical Function Vulnerability\n\nAffected: Array Networks AG/vxAG ArrayOS\n\nArray Networks AG and vxAG ArrayOS contain a missing authentication for critical function vulnerability that allows an attacker to read local files and execute code on the SSL VPN gateway.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-306\n\n[Source: C", "cve_id": "CVE-2023-28461", "title": "Array Networks AG and vxAG ArrayOS Missing Authentication for Critical Function Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-25", "split": "test"} -{"id": "CVE-2024-29748", "text": "Android Pixel Privilege Escalation Vulnerability\n\nAffected: Android Pixel\n\nAndroid Pixel contains a privilege escalation vulnerability that allows an attacker to interrupt a factory reset triggered by a device admin app.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-280\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-29748", "title": "Android Pixel Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2024-04-04", "split": "test"} -{"id": "CVE-2025-24993", "text": "Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows New Technology File System (NTFS) contains a heap-based buffer overflow vulnerability that allows an unauthorized attacker to execute code locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerab", "cve_id": "CVE-2025-24993", "title": "Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-11", "split": "test"} -{"id": "CVE-2025-59287", "text": "Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Server Update Service (WSUS) contains a deserialization of untrusted data vulnerability that allows for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploite", "cve_id": "CVE-2025-59287", "title": "Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-24", "split": "test"} -{"id": "CVE-2024-38217", "text": "Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Mark of the Web (MOTW) contains a protection mechanism failure vulnerability that allows an attacker to bypass MOTW-based defenses. This can result in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use", "cve_id": "CVE-2024-38217", "title": "Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-10", "split": "test"} -{"id": "CVE-2022-0185", "text": "Linux Kernel Heap-Based Buffer Overflow Vulnerability\n\nAffected: Linux Kernel\n\nLinux kernel contains a heap-based buffer overflow vulnerability in the legacy_parse_param function in the Filesystem Context functionality. This allows an attacker to open a filesystem that does not support the Filesystem Context API and ultimately escalate privileges.\n\nRequired Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.\n\nCWE(s): CWE-190\n\n[Source: CISA", "cve_id": "CVE-2022-0185", "title": "Linux Kernel Heap-Based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2024-08-21", "split": "test"} -{"id": "CVE-2025-0282", "text": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability\n\nAffected: Ivanti Connect Secure, Policy Secure, and ZTA Gateways\n\nIvanti Connect Secure, Policy Secure, and ZTA Gateways contain a stack-based buffer overflow which can lead to unauthenticated remote code execution.\n\nRequired Action: Apply mitigations as set forth in the CISA instructions linked below to include conducting hunt activities, taking remediation actions if applicable, and applying updat", "cve_id": "CVE-2025-0282", "title": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2025-01-08", "split": "test"} -{"id": "567a955e0a06435b07ce", "text": "[Cross-site Scripting (XSS) - Reflected] Reflective Cross Site Scripting (XSS) on ███████/Pages\n\n## Reflective Cross-Site Scripting (XSS)\nAn elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. \nThe attacker to read content that the attacker is not aut", "cve_id": "CVE-2017-0255", "title": "Reflective Cross Site Scripting (XSS) on ███████/Pages (Cross-site Scripting (XSS) - Reflected)", "source": "hackerone", "timestamp": "2024-03-22", "split": "test"} -{"id": "CVE-2025-22457", "text": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability\n\nAffected: Ivanti Connect Secure, Policy Secure, and ZTA Gateways\n\nIvanti Connect Secure, Policy Secure, and ZTA Gateways contains a stack-based buffer overflow vulnerability that allows a remote unauthenticated attacker to achieve remote code execution. \n\nRequired Action: Apply mitigations as set forth in the CISA instructions linked below.\n\nRansomware: Known\n\nCWE(s): CWE-121\n\n[Source: CISA Known Ex", "cve_id": "CVE-2025-22457", "title": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2025-04-04", "split": "test"} -{"id": "CVE-2024-43461", "text": "Microsoft Windows MSHTML Platform Spoofing Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows MSHTML Platform contains a user interface (UI) misrepresentation of critical information vulnerability that allows an attacker to spoof a web page. This vulnerability was exploited in conjunction with CVE-2024-38112.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-451\n\n[Source: CISA Known Exploited Vuln", "cve_id": "CVE-2024-43461", "title": "Microsoft Windows MSHTML Platform Spoofing Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-16", "split": "test"} -{"id": "CVE-2025-24054", "text": "Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows NTLM contains an external control of file name or path vulnerability that allows an unauthorized attacker to perform spoofing over a network.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-73\n\n[Source: CISA Known Exploited Vulnerabilities C", "cve_id": "CVE-2025-24054", "title": "Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability", "source": "cisa_kev", "timestamp": "2025-04-17", "split": "test"} -{"id": "CVE-2025-32433", "text": "Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability\n\nAffected: Erlang Erlang/OTP\n\nErlang Erlang/OTP SSH server contains a missing authentication for critical function vulnerability. This could allow an attacker to execute arbitrary commands without valid credentials, potentially leading to unauthenticated remote code execution (RCE). By exploiting a flaw in how SSH protocol messages are handled, a malicious actor could gain unauthorized access to affected syst", "cve_id": "CVE-2025-32433", "title": "Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-09", "split": "test"} -{"id": "CVE-2024-35250", "text": "Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability \n\nAffected: Microsoft Windows\n\nMicrosoft Windows Kernel-Mode Driver contains an untrusted pointer dereference vulnerability that allows a local attacker to escalate privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-822\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-35250", "title": "Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability ", "source": "cisa_kev", "timestamp": "2024-12-16", "split": "test"} -{"id": "CVE-2023-29300", "text": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability\n\nAffected: Adobe ColdFusion\n\nAdobe ColdFusion contains a deserialization of untrusted data vulnerability that allows for code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-29300", "title": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-08", "split": "test"} -{"id": "CVE-2024-26169", "text": "Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Error Reporting Service contains an improper privilege management vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges.\n\nRequired Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-269\n\n[Source: CISA Known Exploited Vulnerabilities Catalog", "cve_id": "CVE-2024-26169", "title": "Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability", "source": "cisa_kev", "timestamp": "2024-06-13", "split": "test"} -{"id": "CVE-2026-33634", "text": "Aquasecurity Trivy Embedded Malicious Code Vulnerability\n\nAffected: Aquasecurity Trivy\n\nAquasecurity Trivy contains an embedded malicious code vulnerability that could allow an attacker to gain access to everything in the CI/CD environment, including all tokens, SSH keys, cloud credentials, database passwords, and any sensitive configuration in memory.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the p", "cve_id": "CVE-2026-33634", "title": "Aquasecurity Trivy Embedded Malicious Code Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-26", "split": "test"} -{"id": "CVE-2025-25181", "text": "Advantive VeraCore SQL Injection Vulnerability\n\nAffected: Advantive VeraCore\n\nAdvantive VeraCore contains a SQL injection vulnerability in timeoutWarning.asp that allows a remote attacker to execute arbitrary SQL commands via the PmSess1 parameter.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-89\n\n[Source: CISA Known Exploited Vulnerabilities Cat", "cve_id": "CVE-2025-25181", "title": " Advantive VeraCore SQL Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-10", "split": "test"} -{"id": "CVE-2024-0519", "text": "Google Chromium V8 Out-of-Bounds Memory Access Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 Engine contains an out-of-bounds memory access vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of th", "cve_id": "CVE-2024-0519", "title": "Google Chromium V8 Out-of-Bounds Memory Access Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-17", "split": "test"} -{"id": "CVE-2025-5777", "text": "Citrix NetScaler ADC and Gateway Out-of-Bounds Read Vulnerability\n\nAffected: Citrix NetScaler ADC and Gateway\n\nCitrix NetScaler ADC and Gateway contain an out-of-bounds read vulnerability due to insufficient input validation. This vulnerability can lead to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud s", "cve_id": "CVE-2025-5777", "title": "Citrix NetScaler ADC and Gateway Out-of-Bounds Read Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-10", "split": "test"} -{"id": "CVE-2026-20963", "text": "Microsoft SharePoint Deserialization of Untrusted Data Vulnerability\n\nAffected: Microsoft SharePoint\n\nMicrosoft SharePoint contains a deserialization of untrusted data vulnerability that allows an unauthorized attacker to execute code over a network.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities C", "cve_id": "CVE-2026-20963", "title": "Microsoft SharePoint Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-18", "split": "test"} -{"id": "CVE-2025-31200", "text": "Apple Multiple Products Memory Corruption Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and other Apple products contain a memory corruption vulnerability that allows for code execution when processing an audio stream in a maliciously crafted media file.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited", "cve_id": "CVE-2025-31200", "title": "Apple Multiple Products Memory Corruption Vulnerability", "source": "cisa_kev", "timestamp": "2025-04-17", "split": "test"} -{"id": "CVE-2025-47827", "text": "IGEL OS Use of a Key Past its Expiration Date Vulnerability\n\nAffected: IGEL IGEL OS\n\nIGEL OS contains a use of a key past its expiration date vulnerability that allows for Secure Boot bypass. The igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the", "cve_id": "CVE-2025-47827", "title": "IGEL OS Use of a Key Past its Expiration Date Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-14", "split": "test"} -{"id": "CVE-2024-1212", "text": "Progress Kemp LoadMaster OS Command Injection Vulnerability\n\nAffected: Progress Kemp LoadMaster\n\nProgress Kemp LoadMaster contains an OS command injection vulnerability that allows an unauthenticated, remote attacker to access the system through the LoadMaster management interface, enabling arbitrary system command execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited", "cve_id": "CVE-2024-1212", "title": "Progress Kemp LoadMaster OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-18", "split": "test"} -{"id": "CVE-2024-30040", "text": "Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows MSHTML Platform contains an unspecified vulnerability that allows for a security feature bypass.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-20\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-30040", "title": "Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2024-05-14", "split": "test"} -{"id": "CVE-2025-49706", "text": "Microsoft SharePoint Improper Authentication Vulnerability\n\nAffected: Microsoft SharePoint\n\nMicrosoft SharePoint contains an improper authentication vulnerability that allows an authorized attacker to perform spoofing over a network. Successfully exploitation could allow an attacker to view sensitive information and make some changes to disclosed information. This vulnerability could be chained with CVE-2025-49704. CVE-2025-53771 is a patch bypass for CVE-2025-49706, and the updates for CVE-2025", "cve_id": "CVE-2025-49706", "title": "Microsoft SharePoint Improper Authentication Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-22", "split": "test"} -{"id": "CVE-2025-27915", "text": "Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a tag. This allows an attacker to run arbitrary Jav", "cve_id": "CVE-2025-27915", "title": "Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-07", "split": "test"} -{"id": "CVE-2024-3400", "text": "Palo Alto Networks PAN-OS Command Injection Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nPalo Alto Networks PAN-OS GlobalProtect feature contains a command injection vulnerability that allows an unauthenticated attacker to execute commands with root privileges on the firewall.\n\nRequired Action: Apply mitigations per vendor instructions as they become available. Otherwise, users with vulnerable versions of affected devices should enable Threat Prevention IDs available from the vendor. See", "cve_id": "CVE-2024-3400", "title": "Palo Alto Networks PAN-OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-04-12", "split": "test"} -{"id": "CVE-2025-24985", "text": "Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Fast FAT File System Driver contains an integer overflow or wraparound vulnerability that allows an unauthorized attacker to execute code locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-190, CWE-122\n\n[Source: CISA Kno", "cve_id": "CVE-2025-24985", "title": "Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-11", "split": "test"} -{"id": "CVE-2024-23692", "text": "Rejetto HTTP File Server Improper Neutralization of Special Elements Used in a Template Engine Vulnerability\n\nAffected: Rejetto HTTP File Server\n\nRejetto HTTP File Server contains an improper neutralization of special elements used in a template engine vulnerability. This allows a remote, unauthenticated attacker to execute commands on the affected system by sending a specially crafted HTTP request.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if", "cve_id": "CVE-2024-23692", "title": "Rejetto HTTP File Server Improper Neutralization of Special Elements Used in a Template Engine Vulnerability", "source": "cisa_kev", "timestamp": "2024-07-09", "split": "test"} -{"id": "CVE-2025-32701", "text": "Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System (CLFS) Driver contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exp", "cve_id": "CVE-2025-32701", "title": "Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-13", "split": "test"} -{"id": "CVE-2023-41974", "text": "Apple iOS and iPadOS Use-After-Free Vulnerability\n\nAffected: Apple iOS and iPadOS\n\nApple iOS and iPadOS contain a use-after-free vulnerability. An app may be able to execute arbitrary code with kernel privileges.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-41974", "title": "Apple iOS and iPadOS Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-05", "split": "test"} -{"id": "90d4c6a7367937da9fbd", "text": "[Misinterpretation of Input] CVE-2024-2004: Usage of disabled protocol\n\n## Summary:\n` --proto` in some circumstances ENABLES all protocols after being given `-all`, potentially leading to sending sensitive data over an unencrypted channel.\n\n## Steps To Reproduce:\n`curl -Ivs --proto -all,-http http://curl.se`\nThis command should result in `curl: (1) Protocol \"http\" disabled` but it actually succeeds.\n\n## Supporting Material/References:\nThe example command above performs a request to curl.se over", "cve_id": "CVE-2024-2004", "title": "CVE-2024-2004: Usage of disabled protocol (Misinterpretation of Input)", "source": "hackerone", "timestamp": "2024-03-27", "split": "test"} -{"id": "CVE-2024-43573", "text": "Microsoft Windows MSHTML Platform Spoofing Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows MSHTML Platform contains an unspecified spoofing vulnerability which can lead to a loss of confidentiality.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-43573", "title": "Microsoft Windows MSHTML Platform Spoofing Vulnerability", "source": "cisa_kev", "timestamp": "2024-10-08", "split": "test"} -{"id": "CVE-2025-20352", "text": "Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability\n\nAffected: Cisco IOS and IOS XE\n\nCisco IOS and IOS XE contains a stack-based buffer overflow vulnerability in the Simple Network Management Protocol (SNMP) subsystem that could allow for denial of service or remote code execution. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute", "cve_id": "CVE-2025-20352", "title": "Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2025-09-29", "split": "test"} -{"id": "CVE-2024-7971", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains a type confusion vulnerability that allows a remote attacker to exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE", "cve_id": "CVE-2024-7971", "title": "Google Chromium V8 Type Confusion Vulnerability", "source": "cisa_kev", "timestamp": "2024-08-26", "split": "test"} -{"id": "CVE-2025-25257", "text": "Fortinet FortiWeb SQL Injection Vulnerability\n\nAffected: Fortinet FortiWeb\n\nFortinet FortiWeb contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-89\n\n[Source: CISA Known Exploited Vulnerabilit", "cve_id": "CVE-2025-25257", "title": "Fortinet FortiWeb SQL Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-18", "split": "test"} -{"id": "CVE-2019-19006", "text": "Sangoma FreePBX Improper Authentication Vulnerability\n\nAffected: Sangoma FreePBX\n\nSangoma FreePBX contains an improper authentication vulnerability that potentially allows unauthorized users to bypass password authentication and access services provided by the FreePBX admin.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-287\n\n[Source: CISA Known E", "cve_id": "CVE-2019-19006", "title": " Sangoma FreePBX Improper Authentication Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-03", "split": "test"} -{"id": "CVE-2024-53104", "text": "Linux Kernel Out-of-Bounds Write Vulnerability\n\nAffected: Linux Kernel\n\nLinux kernel contains an out-of-bounds write vulnerability in the uvc_parse_streaming component of the USB Video Class (UVC) driver that could allow for physical escalation of privilege.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-53104", "title": "Linux Kernel Out-of-Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-05", "split": "test"} -{"id": "CVE-2025-34026", "text": "Versa Concerto Improper Authentication Vulnerability\n\nAffected: Versa Concerto\n\nVersa Concerto SD-WAN orchestration platform contains an improper authentication vulnerability in the Traefik reverse proxy configuration, allowing at attacker to access administrative endpoints. The internal Actuator endpoint can be leveraged for access to heap dumps and trace logs.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue us", "cve_id": "CVE-2025-34026", "title": "Versa Concerto Improper Authentication Vulnerability", "source": "cisa_kev", "timestamp": "2026-01-22", "split": "test"} -{"id": "CVE-2021-39935", "text": "GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability\n\nAffected: GitLab Community and Enterprise Editions\n\nGitLab Community and Enterprise Editions contain a server-side request forgery vulnerability which could allow unauthorized external users to perform Server Side Requests via the CI Lint API. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigatio", "cve_id": "CVE-2021-39935", "title": "GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-03", "split": "test"} -{"id": "CVE-2026-3909", "text": "Google Skia Out-of-Bounds Write Vulnerability\n\nAffected: Google Skia\n\nGoogle Skia contains an out-of-bounds write vulnerability that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are", "cve_id": "CVE-2026-3909", "title": "Google Skia Out-of-Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-13", "split": "test"} -{"id": "CVE-2025-48572", "text": "Android Framework Privilege Escalation Vulnerability\n\nAffected: Android Framework\n\nAndroid Framework contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-48572", "title": "Android Framework Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-02", "split": "test"} -{"id": "CVE-2021-43226", "text": "Microsoft Windows Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System Driver contains a privilege escalation vulnerability that could allow a local, privileged attacker to bypass certain security mechanisms.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog", "cve_id": "CVE-2021-43226", "title": "Microsoft Windows Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-06", "split": "test"} -{"id": "CVE-2024-50623", "text": "Cleo Multiple Products Unrestricted File Upload Vulnerability\n\nAffected: Cleo Multiple Products\n\nCleo Harmony, VLTrader, and LexiCom, which are managed file transfer products, contain an unrestricted file upload and download vulnerability that can lead to remote code execution with elevated privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-434\n\n[Source: CISA Known Exploited Vul", "cve_id": "CVE-2024-50623", "title": "Cleo Multiple Products Unrestricted File Upload Vulnerability", "source": "cisa_kev", "timestamp": "2024-12-13", "split": "test"} -{"id": "CVE-2025-27363", "text": "FreeType Out-of-Bounds Write Vulnerability\n\nAffected: FreeType FreeType\n\nFreeType contains an out-of-bounds write vulnerability when attempting to parse font subglyph structures related to TrueType GX and variable font files that may allow for arbitrary code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploite", "cve_id": "CVE-2025-27363", "title": "FreeType Out-of-Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-06", "split": "test"} -{"id": "CVE-2024-38226", "text": "Microsoft Publisher Protection Mechanism Failure Vulnerability\n\nAffected: Microsoft Publisher\n\nMicrosoft Publisher contains a protection mechanism failure vulnerability that allows attacker to bypass Office macro policies used to block untrusted or malicious files.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38226", "title": "Microsoft Publisher Protection Mechanism Failure Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-10", "split": "test"} -{"id": "CVE-2020-15069", "text": "Sophos XG Firewall Buffer Overflow Vulnerability\n\nAffected: Sophos XG Firewall\n\nSophos XG Firewall contains a buffer overflow vulnerability that allows for remote code execution via the \"HTTP/S bookmark\" feature.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-120\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2020-15069", "title": "Sophos XG Firewall Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-06", "split": "test"} -{"id": "CVE-2025-14174", "text": "Google Chromium Out of Bounds Memory Access Vulnerability\n\nAffected: Google Chromium\n\nGoogle Chromium contains an out of bounds memory access vulnerability in ANGLE that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-", "cve_id": "CVE-2025-14174", "title": "Google Chromium Out of Bounds Memory Access Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-12", "split": "test"} -{"id": "CVE-2025-47812", "text": "Wing FTP Server Improper Neutralization of Null Byte or NUL Character Vulnerability\n\nAffected: Wing FTP Server Wing FTP Server\n\nWing FTP Server contains an improper neutralization of null byte or NUL character vulnerability that can allow injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default).\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD", "cve_id": "CVE-2025-47812", "title": "Wing FTP Server Improper Neutralization of Null Byte or NUL Character Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-14", "split": "test"} -{"id": "CVE-2024-7965", "text": "Google Chromium V8 Inappropriate Implementation Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains an inappropriate implementation vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the pro", "cve_id": "CVE-2024-7965", "title": "Google Chromium V8 Inappropriate Implementation Vulnerability", "source": "cisa_kev", "timestamp": "2024-08-28", "split": "test"} -{"id": "CVE-2024-13160", "text": "Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability\n\nAffected: Ivanti Endpoint Manager (EPM)\n\nIvanti Endpoint Manager (EPM) contains an absolute path traversal vulnerability that allows a remote unauthenticated attacker to leak sensitive information.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-36\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2024-13160", "title": "Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-10", "split": "test"} -{"id": "62cdf33db833869f709b", "text": "[Cryptographic Issues - Generic] Secure Client-Initiated Renegotiation\n\nRenegotiation can open the door to attacks. There are two primary worries:\n\nCVE-2009-3555: This vulnerability allows a “man-in-the-middle” attacker to inject data into an HTTPS session and execute requests on behalf of the victim. Refer to CVE-2009-3555 for more details.\n\nDenial of Service (DoS): Establishing a secure SSL connection requires more processing power on the server, around 15 times, than on the client. An attacke", "cve_id": "CVE-2009-3555", "title": "Secure Client-Initiated Renegotiation (Cryptographic Issues - Generic)", "source": "hackerone", "timestamp": "2024-02-16", "split": "test"} -{"id": "CVE-2025-30397", "text": "Microsoft Windows Scripting Engine Type Confusion Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Scripting Engine contains a type confusion vulnerability that allows an unauthorized attacker to execute code over a network via a specially crafted URL.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2025-30397", "title": "Microsoft Windows Scripting Engine Type Confusion Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-13", "split": "test"} -{"id": "CVE-2024-20399", "text": "Cisco NX-OS Command Injection Vulnerability\n\nAffected: Cisco NX-OS\n\nCisco NX-OS contains a command injection vulnerability in the command line interface (CLI) that could allow an authenticated, local attacker to execute commands as root on the underlying operating system of an affected device.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-20399", "title": "Cisco NX-OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-07-02", "split": "test"} -{"id": "a54f9d09c6c145bd1c1d", "text": "[Type Confusion] Incorrect Type Conversion in interpreting IPv4-mapped IPv6 addresses and below `curl` results in indeterminate SSRF vulnerabilities.\n\n## Summary:\nOctal Type Handling of Errors in IPv4 Mapped IPv6 Addresses in curl allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many programs that rely on curl. \n\n[RFC 4291](https://datatracker.ietf.org/doc/html/rfc4291#section-2-5-5) defines ways to embed an IPv4 address into IPv6 addresses. One of", "cve_id": "CVE-2024-22243", "title": "Incorrect Type Conversion in interpreting IPv4-mapped IPv6 addresses and below `curl` results in indeterminate SSRF vulnerabilities. (Type Confusion)", "source": "hackerone", "timestamp": "2024-05-08", "split": "test"} -{"id": "CVE-2025-8876", "text": "N-able N-Central Command Injection Vulnerability\n\nAffected: N-able N-Central\n\nN-able N-Central contains a command injection vulnerability via improper sanitization of user input.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-8876", "title": "N-able N-Central Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-08-13", "split": "test"} -{"id": "CVE-2011-3402", "text": "Microsoft Windows Remote Code Execution Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Kernel contains an unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers that allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations", "cve_id": "CVE-2011-3402", "title": "Microsoft Windows Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-06", "split": "test"} -{"id": "CVE-2025-35939", "text": "Craft CMS External Control of Assumed-Immutable Web Parameter Vulnerability\n\nAffected: Craft CMS Craft CMS\n\nCraft CMS contains an external control of assumed-immutable web parameter vulnerability. This vulnerability could allow an unauthenticated client to introduce arbitrary values, such as PHP code, to a known local file location on the server. This vulnerability could be chained with CVE-2024-58136 as represented by CVE-2025-32432.\n\nRequired Action: Apply mitigations per vendor instructions,", "cve_id": "CVE-2025-35939", "title": "Craft CMS External Control of Assumed-Immutable Web Parameter Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-02", "split": "test"} -{"id": "CVE-2024-21410", "text": "Microsoft Exchange Server Privilege Escalation Vulnerability\n\nAffected: Microsoft Exchange Server\n\nMicrosoft Exchange Server contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-287\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-21410", "title": "Microsoft Exchange Server Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2024-02-15", "split": "test"} -{"id": "CVE-2024-49035", "text": "Microsoft Partner Center Improper Access Control Vulnerability\n\nAffected: Microsoft Partner Center\n\nMicrosoft Partner Center contains an improper access control vulnerability that allows an attacker to escalate privileges.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-269\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-49035", "title": "Microsoft Partner Center Improper Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-25", "split": "test"} -{"id": "CVE-2025-11371", "text": "Gladinet CentreStack and Triofox Files or Directories Accessible to External Parties Vulnerability\n\nAffected: Gladinet CentreStack and Triofox\n\nGladinet CentreStack and Triofox contains a files or directories accessible to external parties vulnerability that allows unintended disclosure of system files.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CW", "cve_id": "CVE-2025-11371", "title": "Gladinet CentreStack and Triofox Files or Directories Accessible to External Parties Vulnerability", "source": "cisa_kev", "timestamp": "2025-11-04", "split": "test"} -{"id": "CVE-2026-2441", "text": "Google Chromium CSS Use-After-Free Vulnerability\n\nAffected: Google Chromium\n\nGoogle Chromium CSS contains a use-after-free vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud servic", "cve_id": "CVE-2026-2441", "title": "Google Chromium CSS Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-17", "split": "test"} -{"id": "CVE-2024-43468", "text": "Microsoft Configuration Manager SQL Injection Vulnerability\n\nAffected: Microsoft Configuration Manager\n\nMicrosoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and/or underlying database.\n\nRequired Action: Apply mitigations per vendor instructions, follow applic", "cve_id": "CVE-2024-43468", "title": "Microsoft Configuration Manager SQL Injection Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-12", "split": "test"} -{"id": "3a8496a889cad5acb61d", "text": "[HTTP Request Smuggling] CVE-2024-21733 Apache Tomcat HTTP Request Smuggling (Client- Side Desync) (CWE: 444)\n\nApache Tomcat from 8.5.7 through 8.5.63, from 9.0.0-M11 through 9.0.43 are vulnerable to client-side de-sync attacks. \n\nClient-side de-sync (CSD) vulnerabilities occur when a web server fails to correctly process the Content-Length of POST requests. By exploiting this behavior, an attacker can force a victim's browser to de-synchronize its connection with the website, causing sensitive", "cve_id": "CVE-2024-21733", "title": "CVE-2024-21733 Apache Tomcat HTTP Request Smuggling (Client- Side Desync) (CWE: 444) (HTTP Request Smuggling)", "source": "hackerone", "timestamp": "2024-01-29", "split": "test"} -{"id": "CVE-2026-21513", "text": "Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft MSHTML Framework contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploited", "cve_id": "CVE-2026-21513", "title": "Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-10", "split": "test"} -{"id": "CVE-2024-21351", "text": "Microsoft Windows SmartScreen Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience and inject code to potentially gain code execution, which could lead to some data exposure, lack of system availability, or both.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cve_id": "CVE-2024-21351", "title": "Microsoft Windows SmartScreen Security Feature Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2024-02-13", "split": "test"} -{"id": "CVE-2026-34621", "text": "Adobe Acrobat and Reader Prototype Pollution Vulnerability\n\nAffected: Adobe Acrobat and Reader\n\nAdobe Acrobat and Reader contain a prototype pollution vulnerability that allows for arbitrary code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-1321\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2026-34621", "title": "Adobe Acrobat and Reader Prototype Pollution Vulnerability", "source": "cisa_kev", "timestamp": "2026-04-13", "split": "test"} -{"id": "CVE-2024-11667", "text": "Zyxel Multiple Firewalls Path Traversal Vulnerability\n\nAffected: Zyxel Multiple Firewalls\n\nMultiple Zyxel firewalls contain a path traversal vulnerability in the web management interface that could allow an attacker to download or upload files via a crafted URL.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-11667", "title": "Zyxel Multiple Firewalls Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2024-12-03", "split": "test"} -{"id": "CVE-2024-9463", "text": "Palo Alto Networks Expedition OS Command Injection Vulnerability\n\nAffected: Palo Alto Networks Expedition\n\nPalo Alto Networks Expedition contains an OS command injection vulnerability that allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if miti", "cve_id": "CVE-2024-9463", "title": "Palo Alto Networks Expedition OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-14", "split": "test"} -{"id": "CVE-2023-34192", "text": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting (XSS) vulnerability that allows a remote authenticated attacker to execute arbitrary code via a crafted script to the /h/autoSaveDraft function.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the pro", "cve_id": "CVE-2023-34192", "title": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-25", "split": "test"} -{"id": "CVE-2012-4792", "text": "Microsoft Internet Explorer Use-After-Free Vulnerability\n\nAffected: Microsoft Internet Explorer\n\nMicrosoft Internet Explorer contains a use-after-free vulnerability that allows a remote attacker to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object.\n\nRequired Action: The impacted product is end-of-life and should be disconnected if still in use.\n\nCWE(s): CWE-416\n\n[Source:", "cve_id": "CVE-2012-4792", "title": "Microsoft Internet Explorer Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2024-07-23", "split": "test"} -{"id": "CVE-2022-48618", "text": "Apple Multiple Products Memory Corruption Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, and watchOS contain a time-of-check/time-of-use (TOCTOU) memory corruption vulnerability that allows an attacker with read and write capabilities to bypass Pointer Authentication.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-367\n\n[Source: CISA Known Exploited Vulnerabilities Catalo", "cve_id": "CVE-2022-48618", "title": "Apple Multiple Products Memory Corruption Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-31", "split": "test"} -{"id": "CVE-2021-22681", "text": "Rockwell Multiple Products Insufficient Protected Credentials Vulnerability\n\nAffected: Rockwell Multiple Products\n\nMultiple Rockwell products contain an insufficient protected credentials vulnerability. Studio 5000 Logix Designer software may allow a key to be discovered. This key is used to verify Logix controllers are communicating with Rockwell Automation design software. If successfully exploited, this vulnerability could allow an unauthorized application to connect with Logix controllers. T", "cve_id": "CVE-2021-22681", "title": "Rockwell Multiple Products Insufficient Protected Credentials Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-05", "split": "test"} -{"id": "CVE-2013-3918", "text": "Microsoft Windows Out-of-Bounds Write Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows contains an out-of-bounds write vulnerability in the InformationCardSigninHelper Class ActiveX control, icardie.dll. An attacker could exploit the vulnerability by constructing a specially crafted webpage. When a user views the webpage, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user.", "cve_id": "CVE-2013-3918", "title": "Microsoft Windows Out-of-Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-06", "split": "test"} -{"id": "CVE-2026-24423", "text": "SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability\n\nAffected: SmarterTools SmarterMail\n\nSmarterTools SmarterMail contains a missing authentication for critical function vulnerability in the ConnectToHub API method. This could allow the attacker to point the SmarterMail instance to a malicious HTTP server which serves the malicious OS command and could lead to command execution. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22", "cve_id": "CVE-2026-24423", "title": "SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-05", "split": "test"} -{"id": "CVE-2024-8068", "text": "Citrix Session Recording Improper Privilege Management Vulnerability\n\nAffected: Citrix Session Recording\n\nCitrix Session Recording contains an improper privilege management vulnerability that could allow for privilege escalation to NetworkService Account access. An attacker must be an authenticated user in the same Windows Active Directory domain as the session recording server domain.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud ser", "cve_id": "CVE-2024-8068", "title": "Citrix Session Recording Improper Privilege Management Vulnerability", "source": "cisa_kev", "timestamp": "2025-08-25", "split": "test"} -{"id": "CVE-2025-43520", "text": "Apple Multiple Products Classic Buffer Overflow Vulnerability\n\nAffected: Apple Multiple Products\n\nApple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain a classic buffer overflow vulnerability which could allow a malicious application to cause unexpected system termination or write kernel memory.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CW", "cve_id": "CVE-2025-43520", "title": "Apple Multiple Products Classic Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-20", "split": "test"} -{"id": "CVE-2025-10035", "text": "Fortra GoAnywhere MFT Deserialization of Untrusted Data Vulnerability\n\nAffected: Fortra GoAnywhere MFT\n\nFortra GoAnywhere MFT contains a deserialization of untrusted data vulnerability allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mit", "cve_id": "CVE-2025-10035", "title": "Fortra GoAnywhere MFT Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2025-09-29", "split": "test"} -{"id": "CVE-2019-16278", "text": "Nostromo nhttpd Directory Traversal Vulnerability\n\nAffected: Nostromo nhttpd\n\nNostromo nhttpd contains a directory traversal vulnerability in the http_verify() function in a non-chrooted nhttpd server allowing for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2019-16278", "title": "Nostromo nhttpd Directory Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-07", "split": "test"} -{"id": "CVE-2025-30154", "text": "reviewdog/action-setup GitHub Action Embedded Malicious Code Vulnerability\n\nAffected: reviewdog action-setup GitHub Action\n\nreviewdog action-setup GitHub Action contains an embedded malicious code vulnerability that dumps exposed secrets to Github Actions Workflow Logs.\n\nRequired Action: Apply mitigations as set forth in the CISA instructions linked below. Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if miti", "cve_id": "CVE-2025-30154", "title": "reviewdog/action-setup GitHub Action Embedded Malicious Code Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-24", "split": "test"} -{"id": "CVE-2019-5418", "text": "Rails Ruby on Rails Path Traversal Vulnerability\n\nAffected: Rails Ruby on Rails\n\nRails Ruby on Rails contains a path traversal vulnerability in Action View. Specially crafted accept headers in combination with calls to `render file:` can cause arbitrary files on the target server to be rendered, disclosing the file contents.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are un", "cve_id": "CVE-2019-5418", "title": "Rails Ruby on Rails Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-07", "split": "test"} -{"id": "232a66bbdb0c41c4fac7", "text": "[Improper Validation of Certificate with Host Mismatch] CVE-2024-2466: TLS certificate check bypass with mbedTLS\n\n## Summary:\n\nCurl library has a security vulnerability where the certificate name check is bypassed when connecting to a host via its IP address. This could potentially introduce spoofing attacks or unauthorized access due to unverified server certificate.\n\nThis issue only affects the Curl with MbedTLS.\n\n- Affected versions: from libcurl 8.5.0 to and including 8.6.0 (current master v", "cve_id": "CVE-2016-3739", "title": "CVE-2024-2466: TLS certificate check bypass with mbedTLS (Improper Validation of Certificate with Host Mismatch)", "source": "hackerone", "timestamp": "2024-03-27", "split": "test"} -{"id": "CVE-2023-21529", "text": "Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability\n\nAffected: Microsoft Exchange Server\n\nMicrosoft Exchange Server contains a deserialization of untrusted data that allows an authenticated attacker to achieve remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabiliti", "cve_id": "CVE-2023-21529", "title": "Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2026-04-13", "split": "test"} -{"id": "CVE-2024-38014", "text": "Microsoft Windows Installer Improper Privilege Management Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Installer contains an improper privilege management vulnerability that could allow an attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-269\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38014", "title": "Microsoft Windows Installer Improper Privilege Management Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-10", "split": "test"} -{"id": "CVE-2024-6047", "text": "GeoVision Devices OS Command Injection Vulnerability\n\nAffected: GeoVision Multiple Devices\n\nMultiple GeoVision devices contain an OS command injection vulnerability that allows a remote, unauthenticated attacker to inject and execute arbitrary system commands. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud service", "cve_id": "CVE-2024-6047", "title": "GeoVision Devices OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-07", "split": "test"} -{"id": "CVE-2025-2783", "text": "Google Chromium Mojo Sandbox Escape Vulnerability\n\nAffected: Google Chromium Mojo\n\nGoogle Chromium Mojo on Windows contains a sandbox escape vulnerability caused by a logic error, which results from an incorrect handle being provided in unspecified circumstances. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-", "cve_id": "CVE-2025-2783", "title": "Google Chromium Mojo Sandbox Escape Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-27", "split": "test"} -{"id": "CVE-2024-3272", "text": "D-Link Multiple NAS Devices Use of Hard-Coded Credentials Vulnerability\n\nAffected: D-Link Multiple NAS Devices\n\nD-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L contains a hard-coded credential that allows an attacker to conduct authenticated command injection, leading to remote, unauthorized code execution.\n\nRequired Action: This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be r", "cve_id": "CVE-2024-3272", "title": "D-Link Multiple NAS Devices Use of Hard-Coded Credentials Vulnerability", "source": "cisa_kev", "timestamp": "2024-04-11", "split": "test"} -{"id": "CVE-2024-21412", "text": "Microsoft Windows Internet Shortcut Files Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Internet Shortcut Files contains an unspecified vulnerability that allows for a security feature bypass.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-693\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-21412", "title": "Microsoft Windows Internet Shortcut Files Security Feature Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2024-02-13", "split": "test"} -{"id": "CVE-2024-40711", "text": "Veeam Backup and Replication Deserialization Vulnerability\n\nAffected: Veeam Backup & Replication\n\nVeeam Backup and Replication contains a deserialization vulnerability allowing an unauthenticated user to perform remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-40711", "title": "Veeam Backup and Replication Deserialization Vulnerability", "source": "cisa_kev", "timestamp": "2024-10-17", "split": "test"} -{"id": "CVE-2018-0824", "text": "Microsoft COM for Windows Deserialization of Untrusted Data Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft COM for Windows contains a deserialization of untrusted data vulnerability that allows for privilege escalation and remote code execution via a specially crafted file or script.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2018-0824", "title": "Microsoft COM for Windows Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2024-08-05", "split": "test"} -{"id": "CVE-2025-20337", "text": "Cisco Identity Services Engine Injection Vulnerability\n\nAffected: Cisco Identity Services Engine\n\nCisco Identity Services Engine contains an injection vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC due to insufficient validation of user-supplied input allowing an attacker to exploit this vulnerability by submitting a crafted API request. Successful exploitation could allow an attacker to perform remote code execution and obtaining root privileges on an affected device.\n\nRequired", "cve_id": "CVE-2025-20337", "title": "Cisco Identity Services Engine Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-28", "split": "test"} -{"id": "CVE-2024-5217", "text": "ServiceNow Incomplete List of Disallowed Inputs Vulnerability\n\nAffected: ServiceNow Utah, Vancouver, and Washington DC Now Platform\n\nServiceNow Washington DC, Vancouver, and earlier Now Platform releases contain an incomplete list of disallowed inputs vulnerability in the GlideExpression script. An unauthenticated user could exploit this vulnerability to execute code remotely.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavail", "cve_id": "CVE-2024-5217", "title": "ServiceNow Incomplete List of Disallowed Inputs Vulnerability", "source": "cisa_kev", "timestamp": "2024-07-29", "split": "test"} -{"id": "CVE-2025-21391", "text": "Microsoft Windows Storage Link Following Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Storage contains a link following vulnerability that could allow for privilege escalation. This vulnerability could allow an attacker to delete data including data that results in the service being unavailable.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-59\n\n[Source: CISA Known Exploited Vulnerabiliti", "cve_id": "CVE-2025-21391", "title": "Microsoft Windows Storage Link Following Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-11", "split": "test"} -{"id": "CVE-2022-23227", "text": "NUUO NVRmini2 Devices Missing Authentication Vulnerability \n\nAffected: NUUO NVRmini2 Devices\n\nNUUO NVRmini2 devices contain a missing authentication vulnerability that allows an unauthenticated attacker to upload an encrypted TAR archive, which can be abused to add arbitrary users. \n\nRequired Action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.\n\nCWE(s): CWE-306\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-23227", "title": "NUUO NVRmini2 Devices Missing Authentication Vulnerability ", "source": "cisa_kev", "timestamp": "2024-12-18", "split": "test"} -{"id": "232a66bbdb0c41c4fac7", "text": "[Improper Validation of Certificate with Host Mismatch] CVE-2024-2466: TLS certificate check bypass with mbedTLS\n\n## Summary:\n\nCurl library has a security vulnerability where the certificate name check is bypassed when connecting to a host via its IP address. This could potentially introduce spoofing attacks or unauthorized access due to unverified server certificate.\n\nThis issue only affects the Curl with MbedTLS.\n\n- Affected versions: from libcurl 8.5.0 to and including 8.6.0 (current master v", "cve_id": "CVE-2024-2466", "title": "CVE-2024-2466: TLS certificate check bypass with mbedTLS (Improper Validation of Certificate with Host Mismatch)", "source": "hackerone", "timestamp": "2024-03-27", "split": "test"} -{"id": "CVE-2025-24085", "text": "Apple Multiple Products Use-After-Free Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, macOS, and other Apple products contain a user-after-free vulnerability that could allow a malicious application to elevate privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-24085", "title": "Apple Multiple Products Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2025-01-29", "split": "test"} -{"id": "CVE-2024-42009", "text": "RoundCube Webmail Cross-Site Scripting Vulnerability\n\nAffected: Roundcube Webmail\n\nRoundCube Webmail contains a cross-site scripting vulnerability. This vulnerability could allow a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the produc", "cve_id": "CVE-2024-42009", "title": "RoundCube Webmail Cross-Site Scripting Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-09", "split": "test"} -{"id": "CVE-2025-62221", "text": "Microsoft Windows Use After Free Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Cloud Files Mini Filter Driver contains a use after free vulnerability that can allow an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-62221", "title": "Microsoft Windows Use After Free Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-09", "split": "test"} -{"id": "CVE-2021-44529", "text": "Ivanti Endpoint Manager Cloud Service Appliance (EPM CSA) Code Injection Vulnerability \n\nAffected: Ivanti Endpoint Manager Cloud Service Appliance (EPM CSA)\n\nIvanti Endpoint Manager Cloud Service Appliance (EPM CSA) contains a code injection vulnerability that allows an unauthenticated user to execute malicious code with limited permissions (nobody).\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nC", "cve_id": "CVE-2021-44529", "title": "Ivanti Endpoint Manager Cloud Service Appliance (EPM CSA) Code Injection Vulnerability ", "source": "cisa_kev", "timestamp": "2024-03-25", "split": "test"} -{"id": "CVE-2024-20353", "text": "Cisco ASA and FTD Denial of Service Vulnerability\n\nAffected: Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)\n\nCisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain an infinite loop vulnerability that can lead to remote denial of service condition.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-835\n\n[Source: CISA Known Exploited Vulnerabilities Catalo", "cve_id": "CVE-2024-20353", "title": "Cisco ASA and FTD Denial of Service Vulnerability", "source": "cisa_kev", "timestamp": "2024-04-24", "split": "test"} -{"id": "CVE-2018-8639", "text": "Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Win32k contains an improper resource shutdown or release vulnerability that allows for local, authenticated privilege escalation. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the pr", "cve_id": "CVE-2018-8639", "title": "Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-03", "split": "test"} -{"id": "CVE-2024-30088", "text": "Microsoft Windows Kernel TOCTOU Race Condition Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Kernel contains a time-of-check to time-of-use (TOCTOU) race condition vulnerability that could allow for privilege escalation. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-367\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-30088", "title": "Microsoft Windows Kernel TOCTOU Race Condition Vulnerability", "source": "cisa_kev", "timestamp": "2024-10-15", "split": "test"} -{"id": "CVE-2024-28995", "text": "SolarWinds Serv-U Path Traversal Vulnerability \n\nAffected: SolarWinds Serv-U\n\nSolarWinds Serv-U contains a path traversal vulnerability that allows an attacker access to read sensitive files on the host machine.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-28995", "title": "SolarWinds Serv-U Path Traversal Vulnerability ", "source": "cisa_kev", "timestamp": "2024-07-17", "split": "test"} -{"id": "27a3ebf6390bdf36b2ff", "text": "[Unknown] CVE-2024-27281: RCE vulnerability with .rdoc_options in RDoc\n\nI made a report at https://hackerone.com/reports/1187477\n\nhttps://www.ruby-lang.org/en/news/2024/03/21/rce-rdoc-cve-2024-27281/\n\n> An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0.\n> When parsing .rdoc_options (used for configuration in RDoc) as a YAML file, object injection and resultant remote code execution are possible because there are no restrictions on the classes that can", "cve_id": "CVE-2024-27281", "title": "CVE-2024-27281: RCE vulnerability with .rdoc_options in RDoc (Unknown)", "source": "hackerone", "timestamp": "2024-03-29", "split": "test"} -{"id": "CVE-2024-39891", "text": "Twilio Authy Information Disclosure Vulnerability\n\nAffected: Twilio Authy\n\nTwilio Authy contains an information disclosure vulnerability in its API that allows an unauthenticated endpoint to accept a request containing a phone number and respond with information about whether the phone number was registered with Authy.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-203\n\n[Source: CISA Known Exploited Vulne", "cve_id": "CVE-2024-39891", "title": "Twilio Authy Information Disclosure Vulnerability", "source": "cisa_kev", "timestamp": "2024-07-23", "split": "test"} -{"id": "CVE-2025-55177", "text": "Meta Platforms WhatsApp Incorrect Authorization Vulnerability\n\nAffected: Meta Platforms WhatsApp\n\nMeta Platforms WhatsApp contains an incorrect authorization vulnerability due to an incomplete authorization of linked device synchronization messages. This vulnerability could allow an unrelated user to trigger processing of content from an arbitrary URL on a target’s device.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or dis", "cve_id": "CVE-2025-55177", "title": "Meta Platforms WhatsApp Incorrect Authorization Vulnerability", "source": "cisa_kev", "timestamp": "2025-09-02", "split": "test"} -{"id": "CVE-2025-57819", "text": "Sangoma FreePBX Authentication Bypass Vulnerability\n\nAffected: Sangoma FreePBX\n\nSangoma FreePBX contains an authentication bypass vulnerability due to insufficiently sanitized user-supplied data allows unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailab", "cve_id": "CVE-2025-57819", "title": "Sangoma FreePBX Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2025-08-29", "split": "test"} -{"id": "CVE-2025-13223", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains a type confusion vulnerability that allows for heap corruption.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-13223", "title": "Google Chromium V8 Type Confusion Vulnerability", "source": "cisa_kev", "timestamp": "2025-11-19", "split": "test"} -{"id": "CVE-2009-0556", "text": "Microsoft Office PowerPoint Code Injection Vulnerability\n\nAffected: Microsoft Office\n\nMicrosoft Office PowerPoint contains a code injection vulnerability that allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAtom containing an invalid index value that triggers memory corruption.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unav", "cve_id": "CVE-2009-0556", "title": "Microsoft Office PowerPoint Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2026-01-07", "split": "test"} -{"id": "CVE-2025-24893", "text": "XWiki Platform Eval Injection Vulnerability\n\nAffected: XWiki Platform\n\nXWiki Platform contains an eval injection vulnerability that could allow any guest to perform arbitrary remote code execution through a request to SolrSearch.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-95\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-24893", "title": "XWiki Platform Eval Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-30", "split": "test"} -{"id": "CVE-2020-29574", "text": "CyberoamOS (CROS) SQL Injection Vulnerability\n\nAffected: Sophos CyberoamOS\n\nCyberoamOS (CROS) contains a SQL injection vulnerability in the WebAdmin that allows an unauthenticated attacker to execute arbitrary SQL statements remotely.\n\nRequired Action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.\n\nCWE(s): CWE-89\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2020-29574", "title": "CyberoamOS (CROS) SQL Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-06", "split": "test"} -{"id": "CVE-2025-14611", "text": "Gladinet CentreStack and Triofox Hard Coded Cryptographic Vulnerability\n\nAffected: Gladinet CentreStack and Triofox\n\nGladinet CentreStack and TrioFox contain a hardcoded cryptographic keys vulnerability for their implementation of the AES cryptoscheme. This vulnerability degrades security for public exposed endpoints that may make use of it and may offer arbitrary local file inclusion when provided a specially crafted request without authentication.\n\nRequired Action: Apply mitigations per vendor", "cve_id": "CVE-2025-14611", "title": "Gladinet CentreStack and Triofox Hard Coded Cryptographic Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-15", "split": "test"} -{"id": "CVE-2016-10033", "text": "PHPMailer Command Injection Vulnerability\n\nAffected: PHP PHPMailer\n\nPHPMailer contains a command injection vulnerability because it fails to sanitize user-supplied input. Specifically, this issue affects the 'mail()' function of 'class.phpmailer.php' script. An attacker can exploit this issue to execute arbitrary code within the context of the application. Failed exploit attempts will result in a denial-of-service condition.\n\nRequired Action: Apply mitigations per vendor instructions, follow app", "cve_id": "CVE-2016-10033", "title": "PHPMailer Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-07", "split": "test"} -{"id": "CVE-2024-38813", "text": "VMware vCenter Server Privilege Escalation Vulnerability\n\nAffected: VMware vCenter Server\n\nVMware vCenter contains an improper check for dropped privileges vulnerability. This vulnerability could allow an attacker with network access to the vCenter Server to escalate privileges to root by sending a specially crafted packet.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-250, CWE-273\n\n[Source: CISA Known E", "cve_id": "CVE-2024-38813", "title": "VMware vCenter Server Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-20", "split": "test"} -{"id": "CVE-2026-21643", "text": "Fortinet SQL Injection Vulnerability\n\nAffected: Fortinet FortiClient EMS\n\nFortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-89\n\n[Source: CISA Known Exploited Vulnera", "cve_id": "CVE-2026-21643", "title": "Fortinet SQL Injection Vulnerability", "source": "cisa_kev", "timestamp": "2026-04-13", "split": "test"} -{"id": "CVE-2016-3714", "text": "ImageMagick Improper Input Validation Vulnerability\n\nAffected: ImageMagick ImageMagick\n\nImageMagick contains an improper input validation vulnerability that affects the EPHEMERAL, HTTPS, MVG, MSL, TEXT, SHOW, WIN, and PLT coders. This allows a remote attacker to execute arbitrary code via shell metacharacters in a crafted image.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-20\n\n[Source: CISA Known Exploi", "cve_id": "CVE-2016-3714", "title": "ImageMagick Improper Input Validation Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-09", "split": "test"} -{"id": "CVE-2014-0502", "text": "Adobe Flash Player Double Free Vulnerablity\n\nAffected: Adobe Flash Player\n\nAdobe Flash Player contains a double free vulnerability that allows a remote attacker to execute arbitrary code.\n\nRequired Action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.\n\nCWE(s): CWE-399\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2014-0502", "title": "Adobe Flash Player Double Free Vulnerablity", "source": "cisa_kev", "timestamp": "2024-09-17", "split": "test"} -{"id": "CVE-2024-56145", "text": "Craft CMS Code Injection Vulnerability\n\nAffected: Craft CMS Craft CMS\n\nCraft CMS contains a code injection vulnerability. Users with affected versions are vulnerable to remote code execution if their php.ini configuration has `register_argc_argv` enabled.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabiliti", "cve_id": "CVE-2024-56145", "title": "Craft CMS Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-02", "split": "test"} -{"id": "d38cbf25bfc58fa449fe", "text": "[Uncontrolled Resource Consumption] Denial of Service caused by HTTP/2 CONTINUATION Flood\n\nI sent the following report to Apache Tomcat Security Team. They confirmed the report and assigned CVE-2024-24549. I'd like to ask if this is eligible for a bounty.\n\nI'd like to report a DoS vulnerability in Tomcat. I tested 10.1.18 and 11.0 (tomcat:latest and tomcat:11.0 docker images respectively) and it seems that both are vulnerable.\n\nAn attacker can send headers using HTTP/2 CONTINUATION frames up to", "cve_id": "CVE-2024-24549", "title": "Denial of Service caused by HTTP/2 CONTINUATION Flood (Uncontrolled Resource Consumption)", "source": "hackerone", "timestamp": "2024-04-22", "split": "test"} -{"id": "CVE-2025-62215", "text": "Microsoft Windows Race Condition Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Kernel contains a race condition vulnerability that allows a local attacker with low-level privileges to escalate privileges. Successful exploitation of this vulnerability could enable the attacker to gain SYSTEM-level access.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavail", "cve_id": "CVE-2025-62215", "title": "Microsoft Windows Race Condition Vulnerability", "source": "cisa_kev", "timestamp": "2025-11-12", "split": "test"} -{"id": "CVE-2024-20439", "text": "Cisco Smart Licensing Utility Static Credential Vulnerability\n\nAffected: Cisco Smart Licensing Utility\n\nCisco Smart Licensing Utility contains a static credential vulnerability that allows an unauthenticated, remote attacker to log in to an affected system and gain administrative credentials.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-912\n\n[Sou", "cve_id": "CVE-2024-20439", "title": "Cisco Smart Licensing Utility Static Credential Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-31", "split": "test"} -{"id": "CVE-2025-43529", "text": "Apple Multiple Products Use-After-Free WebKit Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and other Apple products contain a use-after-free vulnerability in WebKit. Processing maliciously crafted web content may lead to memory corruption. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply mitigations per vendor instructions,", "cve_id": "CVE-2025-43529", "title": "Apple Multiple Products Use-After-Free WebKit Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-15", "split": "test"} -{"id": "CVE-2025-0994", "text": "Trimble Cityworks Deserialization Vulnerability\n\nAffected: Trimble Cityworks\n\nTrimble Cityworks contains a deserialization vulnerability. This could allow an authenticated user to perform a remote code execution attack against a customer's Microsoft Internet Information Services (IIS) web server.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-0994", "title": "Trimble Cityworks Deserialization Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-07", "split": "test"} -{"id": "CVE-2026-21385", "text": "Qualcomm Multiple Chipsets Memory Corruption Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain a memory corruption vulnerability while using alignments for memory allocation. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-190\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2026-21385", "title": "Qualcomm Multiple Chipsets Memory Corruption Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-03", "split": "test"} -{"id": "CVE-2026-20700", "text": "Apple Multiple Buffer Overflow Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker with memory write the capability to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCW", "cve_id": "CVE-2026-20700", "title": "Apple Multiple Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-12", "split": "test"} -{"id": "CVE-2025-21333", "text": "Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Hyper-V NT Kernel Integration VSP contains a heap-based buffer overflow vulnerability that allows a local attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-21333", "title": "Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2025-01-14", "split": "test"} -{"id": "CVE-2024-20359", "text": "Cisco ASA and FTD Privilege Escalation Vulnerability\n\nAffected: Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)\n\nCisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain a privilege escalation vulnerability that can allow local privilege escalation from Administrator to root.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2024-20359", "title": "Cisco ASA and FTD Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2024-04-24", "split": "test"} -{"id": "CVE-2024-4885", "text": "Progress WhatsUp Gold Path Traversal Vulnerability\n\nAffected: Progress WhatsUp Gold\n\nProgress WhatsUp Gold contains a path traversal vulnerability that allows an unauthenticated attacker to achieve remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-4885", "title": "Progress WhatsUp Gold Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-03", "split": "test"} -{"id": "CVE-2025-48384", "text": "Git Link Following Vulnerability\n\nAffected: Git Git\n\nGit contains a link following vulnerability that stems from Git’s inconsistent handling of carriage return characters in configuration files.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-59, CWE-436\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-48384", "title": "Git Link Following Vulnerability", "source": "cisa_kev", "timestamp": "2025-08-25", "split": "test"} -{"id": "CVE-2024-9537", "text": "ScienceLogic SL1 Unspecified Vulnerability\n\nAffected: ScienceLogic SL1\n\nScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-9537", "title": "ScienceLogic SL1 Unspecified Vulnerability", "source": "cisa_kev", "timestamp": "2024-10-21", "split": "test"} -{"id": "CVE-2018-4063", "text": "Sierra Wireless AirLink ALEOS Unrestricted Upload of File with Dangerous Type Vulnerability\n\nAffected: Sierra Wireless AirLink ALEOS\n\nSierra Wireless AirLink ALEOS contains an unrestricted upload of file with dangerous type vulnerability. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability. The impacted product could be end-of-life (EoL) an", "cve_id": "CVE-2018-4063", "title": "Sierra Wireless AirLink ALEOS Unrestricted Upload of File with Dangerous Type Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-12", "split": "test"} -{"id": "CVE-2024-41713", "text": "Mitel MiCollab Path Traversal Vulnerability\n\nAffected: Mitel MiCollab\n\nMitel MiCollab contains a path traversal vulnerability that could allow an attacker to gain unauthorized and unauthenticated access. This vulnerability can be chained with CVE-2024-55550, which allows an unauthenticated, remote attacker to read arbitrary files on the server.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s):", "cve_id": "CVE-2024-41713", "title": "Mitel MiCollab Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-01-07", "split": "test"} -{"id": "CVE-2010-3765", "text": "Mozilla Multiple Products Remote Code Execution Vulnerability\n\nAffected: Mozilla Multiple Products\n\nMozilla Firefox, SeaMonkey, and Thunderbird contain an unspecified vulnerability when JavaScript is enabled. This allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption.\n\nRequired Action: Apply mitigations per vendor instr", "cve_id": "CVE-2010-3765", "title": "Mozilla Multiple Products Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-06", "split": "test"} -{"id": "CVE-2025-37164", "text": "Hewlett Packard Enterprise (HPE) OneView Code Injection Vulnerability\n\nAffected: Hewlett Packard Enterprise (HPE) OneView\n\nHewlett Packard Enterprise (HPE) OneView contains a code injection vulnerability that allows a remote unauthenticated user to perform remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known", "cve_id": "CVE-2025-37164", "title": "Hewlett Packard Enterprise (HPE) OneView Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2026-01-07", "split": "test"} -{"id": "CVE-2023-27524", "text": "Apache Superset Insecure Default Initialization of Resource Vulnerability\n\nAffected: Apache Superset\n\nApache Superset contains an insecure default initialization of a resource vulnerability that allows an attacker to authenticate and access unauthorized resources on installations that have not altered the default configured SECRET_KEY according to installation instructions.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailabl", "cve_id": "CVE-2023-27524", "title": "Apache Superset Insecure Default Initialization of Resource Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-08", "split": "test"} -{"id": "CVE-2025-68613", "text": "n8n Improper Control of Dynamically-Managed Code Resources Vulnerability\n\nAffected: n8n n8n\n\nn8n contains an improper control of dynamically managed code resources vulnerability in its workflow expression evaluation system that allows for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-913\n\n[Source: CISA Known Exploited Vulner", "cve_id": "CVE-2025-68613", "title": "n8n Improper Control of Dynamically-Managed Code Resources Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-11", "split": "test"} -{"id": "CVE-2023-43208", "text": "NextGen Healthcare Mirth Connect Deserialization of Untrusted Data Vulnerability\n\nAffected: NextGen Healthcare Mirth Connect\n\nNextGen Healthcare Mirth Connect contains a deserialization of untrusted data vulnerability that allows for unauthenticated remote code execution via a specially crafted request.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2023-43208", "title": "NextGen Healthcare Mirth Connect Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2024-05-20", "split": "test"} -{"id": "CVE-2024-23222", "text": "Apple Multiple Products WebKit Type Confusion Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, and Safari WebKit contain a type confusion vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply mitigations per vendor instructions or disco", "cve_id": "CVE-2024-23222", "title": "Apple Multiple Products WebKit Type Confusion Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-23", "split": "test"} -{"id": "CVE-2024-4879", "text": "ServiceNow Improper Input Validation Vulnerability\n\nAffected: ServiceNow Utah, Vancouver, and Washington DC Now Platform\n\nServiceNow Utah, Vancouver, and Washington DC Now Platform releases contain a jelly template injection vulnerability in UI macros. An unauthenticated user could exploit this vulnerability to execute code remotely. \n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-1287\n\n[Source: CISA Know", "cve_id": "CVE-2024-4879", "title": "ServiceNow Improper Input Validation Vulnerability", "source": "cisa_kev", "timestamp": "2024-07-29", "split": "test"} -{"id": "77d40f35cded9385cb51", "text": "[HTTP Request Smuggling] Request Smuggling in Apache Tomcat (Important, CVE-2023-45648)\n\nApache Tomcat supports Trailer Section. However, we found that in version prior than 11.0.0-M11, 10.1.13, 9.0.80, 8.5.93, Apache Tomcat cannot properly parse the trailer section if there's no colon in the trailer header's line. It will skip the following lines until the last line with a valid colon-separated key-value header pair, which can be leveraged to perform HTTP request smuggling.\n\nIf we send the foll", "cve_id": "CVE-2023-45648", "title": "Request Smuggling in Apache Tomcat (Important, CVE-2023-45648) (HTTP Request Smuggling)", "source": "hackerone", "timestamp": "2024-02-07", "split": "test"} -{"id": "CVE-2016-7836", "text": "SKYSEA Client View Improper Authentication Vulnerability\n\nAffected: SKYSEA Client View\n\nSKYSEA Client View contains an improper authentication vulnerability that allows remote code execution via a flaw in processing authentication on the TCP connection with the management console program.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-287\n\n[Source:", "cve_id": "CVE-2016-7836", "title": "SKYSEA Client View Improper Authentication Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-14", "split": "test"} -{"id": "CVE-2020-0618", "text": "Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability\n\nAffected: Microsoft SQL Server\n\nMicrosoft SQL Server Reporting Services contains a deserialization vulnerability when handling page requests incorrectly. An authenticated attacker can exploit this vulnerability to execute code in the context of the Report Server service account.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502", "cve_id": "CVE-2020-0618", "title": "Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-18", "split": "test"} -{"id": "CVE-2025-24813", "text": "Apache Tomcat Path Equivalence Vulnerability\n\nAffected: Apache Tomcat\n\nApache Tomcat contains a path equivalence vulnerability that allows a remote attacker to execute code, disclose information, or inject malicious content via a partial PUT request.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-44, CWE-502\n\n[Source: CISA Known Exploited Vulnerabi", "cve_id": "CVE-2025-24813", "title": "Apache Tomcat Path Equivalence Vulnerability", "source": "cisa_kev", "timestamp": "2025-04-01", "split": "test"} -{"id": "CVE-2024-53704", "text": "SonicWall SonicOS SSLVPN Improper Authentication Vulnerability\n\nAffected: SonicWall SonicOS\n\nSonicWall SonicOS contains an improper authentication vulnerability in the SSLVPN authentication mechanism that allows a remote attacker to bypass authentication.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-287\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-53704", "title": "SonicWall SonicOS SSLVPN Improper Authentication Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-18", "split": "test"} -{"id": "CVE-2024-21413", "text": "Microsoft Outlook Improper Input Validation Vulnerability\n\nAffected: Microsoft Office Outlook\n\nMicrosoft Outlook contains an improper input validation vulnerability that allows for remote code execution. Successful exploitation of this vulnerability would allow an attacker to bypass the Office Protected View and open in editing mode rather than protected mode.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CW", "cve_id": "CVE-2024-21413", "title": "Microsoft Outlook Improper Input Validation Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-06", "split": "test"} -{"id": "CVE-2024-13161", "text": "Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability\n\nAffected: Ivanti Endpoint Manager (EPM)\n\nIvanti Endpoint Manager (EPM) contains an absolute path traversal vulnerability that allows a remote unauthenticated attacker to leak sensitive information.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-36\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2024-13161", "title": "Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-10", "split": "test"} -{"id": "CVE-2025-48543", "text": "Android Runtime Use-After-Free Vulnerability\n\nAffected: Android Runtime\n\nAndroid Runtime contains a use-after-free vulnerability potentially allowing a chrome sandbox escape leading to local privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-48543", "title": "Android Runtime Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2025-09-04", "split": "test"} -{"id": "CVE-2021-41277", "text": "Metabase GeoJSON API Local File Inclusion Vulnerability\n\nAffected: Metabase Metabase\n\nMetabase contains a local file inclusion vulnerability in the custom map support in the API to read GeoJSON formatted data.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-200\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2021-41277", "title": "Metabase GeoJSON API Local File Inclusion Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-12", "split": "test"} -{"id": "CVE-2025-59230", "text": "Microsoft Windows Improper Access Control Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows contains an improper access control vulnerability in Windows Remote Access Connection Manager which could allow an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploite", "cve_id": "CVE-2025-59230", "title": "Microsoft Windows Improper Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-14", "split": "test"} -{"id": "CVE-2019-9875", "text": "Sitecore CMS and Experience Platform (XP) Deserialization Vulnerability\n\nAffected: Sitecore CMS and Experience Platform (XP)\n\nSitecore CMS and Experience Platform (XP) contain a deserialization vulnerability in the Sitecore.Security.AntiCSRF module that allows an authenticated attacker to execute arbitrary code by sending a serialized .NET object in the HTTP POST parameter __CSRFTOKEN.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud ser", "cve_id": "CVE-2019-9875", "title": "Sitecore CMS and Experience Platform (XP) Deserialization Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-26", "split": "test"} -{"id": "CVE-2023-25280", "text": "D-Link DIR-820 Router OS Command Injection Vulnerability\n\nAffected: D-Link DIR-820 Router\n\nD-Link DIR-820 routers contain an OS command injection vulnerability that allows a remote, unauthenticated attacker to escalate privileges to root via a crafted payload with the ping_addr parameter to ping.ccp.\n\nRequired Action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabi", "cve_id": "CVE-2023-25280", "title": "D-Link DIR-820 Router OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-30", "split": "test"} -{"id": "CVE-2026-21519", "text": "Microsoft Windows Type Confusion Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2026-21519", "title": "Microsoft Windows Type Confusion Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-10", "split": "test"} -{"id": "CVE-2025-43510", "text": "Apple Multiple Products Improper Locking Vulnerability\n\nAffected: Apple Multiple Products\n\nApple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability that could allow a malicious application to cause unexpected changes in memory shared between processes.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-667\n\n[Sourc", "cve_id": "CVE-2025-43510", "title": "Apple Multiple Products Improper Locking Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-20", "split": "test"} -{"id": "CVE-2024-38094", "text": "Microsoft SharePoint Deserialization Vulnerability\n\nAffected: Microsoft SharePoint\n\nMicrosoft SharePoint contains a deserialization vulnerability that allows for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38094", "title": "Microsoft SharePoint Deserialization Vulnerability", "source": "cisa_kev", "timestamp": "2024-10-22", "split": "test"} -{"id": "CVE-2023-46805", "text": "Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability\n\nAffected: Ivanti Connect Secure and Policy Secure\n\nIvanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure gateways contain an authentication bypass vulnerability in the web component that allows an attacker to access restricted resources by bypassing control checks. This vulnerability can be leveraged in conjunction with CVE-2024-21887, a command injection vulnerability.\n\nRequired A", "cve_id": "CVE-2023-46805", "title": "Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-10", "split": "test"} -{"id": "CVE-2022-22948", "text": "VMware vCenter Server Incorrect Default File Permissions Vulnerability \n\nAffected: VMware vCenter Server\n\nVMware vCenter Server contains an incorrect default file permissions vulnerability that allows a remote, privileged attacker to gain access to sensitive information.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-276\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22948", "title": "VMware vCenter Server Incorrect Default File Permissions Vulnerability ", "source": "cisa_kev", "timestamp": "2024-07-17", "split": "test"} -{"id": "CVE-2025-24984", "text": "Microsoft Windows NTFS Information Disclosure Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows New Technology File System (NTFS) contains an insertion of sensitive Information into log file vulnerability that allows an unauthorized attacker to disclose information with a physical attack. An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 gui", "cve_id": "CVE-2025-24984", "title": "Microsoft Windows NTFS Information Disclosure Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-11", "split": "test"} -{"id": "CVE-2023-50224", "text": "TP-Link TL-WR841N Authentication Bypass by Spoofing Vulnerability\n\nAffected: TP-Link TL-WR841N\n\nTP-Link TL-WR841N contains an authentication bypass by spoofing vulnerability within the httpd service, which listens on TCP port 80 by default, leading to the disclose of stored credentials. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01", "cve_id": "CVE-2023-50224", "title": "TP-Link TL-WR841N Authentication Bypass by Spoofing Vulnerability", "source": "cisa_kev", "timestamp": "2025-09-03", "split": "test"} -{"id": "CVE-2025-60710", "text": "Microsoft Windows Link Following Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows contains a link following vulnerability that allows for privilege escalation\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-59\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-60710", "title": "Microsoft Windows Link Following Vulnerability", "source": "cisa_kev", "timestamp": "2026-04-13", "split": "test"} -{"id": "CVE-2019-7256", "text": "Nice Linear eMerge E3-Series OS Command Injection Vulnerability\n\nAffected: Nice Linear eMerge E3-Series\n\nNice Linear eMerge E3-Series contains an OS command injection vulnerability that allows an attacker to conduct remote code execution.\n\nRequired Action: Contact the vendor for guidance on remediating firmware, per their advisory.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2019-7256", "title": "Nice Linear eMerge E3-Series OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-03-25", "split": "test"} -{"id": "CVE-2024-57727", "text": "SimpleHelp Path Traversal Vulnerability\n\nAffected: SimpleHelp SimpleHelp\n\nSimpleHelp remote support software contains multiple path traversal vulnerabilities that allow unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files may include server configuration files and hashed user passwords.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware:", "cve_id": "CVE-2024-57727", "title": "SimpleHelp Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-13", "split": "test"} -{"id": "CVE-2026-21525", "text": "Microsoft Windows NULL Pointer Dereference Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-476\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2026-21525", "title": "Microsoft Windows NULL Pointer Dereference Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-10", "split": "test"} -{"id": "CVE-2026-24858", "text": "Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability\n\nAffected: Fortinet Multiple Products\n\nFortinet FortiAnalyzer, FortiManager, FortiOS, and FortiProxy contain an authentication bypass using an alternate path or channel that could allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.\n\nRequired Action: Apply mitigations", "cve_id": "CVE-2026-24858", "title": "Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability", "source": "cisa_kev", "timestamp": "2026-01-27", "split": "test"} -{"id": "CVE-2021-22175", "text": "GitLab Server-Side Request Forgery (SSRF) Vulnerability\n\nAffected: GitLab GitLab\n\nGitLab contains a server-side request forgery (SSRF) vulnerability when requests to the internal network for webhooks are enabled.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-918\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2021-22175", "title": "GitLab Server-Side Request Forgery (SSRF) Vulnerability", "source": "cisa_kev", "timestamp": "2026-02-18", "split": "test"} -{"id": "CVE-2024-27198", "text": "JetBrains TeamCity Authentication Bypass Vulnerability\n\nAffected: JetBrains TeamCity\n\nJetBrains TeamCity contains an authentication bypass vulnerability that allows an attacker to perform admin actions.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-288\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-27198", "title": "JetBrains TeamCity Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2024-03-07", "split": "test"} -{"id": "CVE-2025-22226", "text": "VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability\n\nAffected: VMware ESXi, Workstation, and Fusion\n\nVMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. Successful exploitation allows an attacker with administrative privileges to a virtual machine to leak memory from the vmx process.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or d", "cve_id": "CVE-2025-22226", "title": "VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-04", "split": "test"} -{"id": "CVE-2025-2775", "text": "SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability\n\nAffected: SysAid SysAid On-Prem\n\nSysAid On-Prem contains an improper restriction of XML external entity reference vulnerability in the Checkin processing functionality, allowing for administrator account takeover and file read primitives.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavai", "cve_id": "CVE-2025-2775", "title": "SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-22", "split": "test"} -{"id": "CVE-2025-0111", "text": "Palo Alto Networks PAN-OS File Read Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nPalo Alto Networks PAN-OS contains an external control of file name or path vulnerability. Successful exploitation enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s", "cve_id": "CVE-2025-0111", "title": "Palo Alto Networks PAN-OS File Read Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-20", "split": "test"} -{"id": "CVE-2024-38189", "text": "Microsoft Project Remote Code Execution Vulnerability \n\nAffected: Microsoft Project\n\nMicrosoft Project contains an unspecified vulnerability that allows for remote code execution via a malicious file.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-20\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2024-38189", "title": "Microsoft Project Remote Code Execution Vulnerability ", "source": "cisa_kev", "timestamp": "2024-08-13", "split": "test"} -{"id": "CVE-2024-11680", "text": "ProjectSend Improper Authentication Vulnerability\n\nAffected: ProjectSend ProjectSend\n\nProjectSend contains an improper authentication vulnerability that allows a remote, unauthenticated attacker to enable unauthorized modification of the application's configuration via crafted HTTP requests to options.php. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of", "cve_id": "CVE-2024-11680", "title": "ProjectSend Improper Authentication Vulnerability", "source": "cisa_kev", "timestamp": "2024-12-03", "split": "test"} -{"id": "CVE-2023-39780", "text": "ASUS RT-AX55 Routers OS Command Injection Vulnerability\n\nAffected: ASUS RT-AX55 Routers\n\nASUS RT-AX55 devices contain an OS command injection vulnerability that could allow a remote, authenticated attacker to execute arbitrary commands. As represented by CVE-2023-41346.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploite", "cve_id": "CVE-2023-39780", "title": "ASUS RT-AX55 Routers OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-02", "split": "test"} -{"id": "CVE-2025-2747", "text": "Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability\n\nAffected: Kentico Xperience CMS\n\nKentico Xperience CMS contains an authentication bypass using an alternate path or channel vulnerability that could allow an attacker to control administrative objects.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-288\n\n[S", "cve_id": "CVE-2025-2747", "title": "Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-20", "split": "test"} -{"id": "CVE-2025-49704", "text": "Microsoft SharePoint Code Injection Vulnerability\n\nAffected: Microsoft SharePoint\n\nMicrosoft SharePoint contains a code injection vulnerability that could allow an authorized attacker to execute code over a network. This vulnerability could be chained with CVE-2025-49706. CVE-2025-53770 is a patch bypass for CVE-2025-49704, and the updates for CVE-2025-53770 include more robust protection than those for CVE-2025-49704.\n\nRequired Action: Disconnect public-facing versions of SharePoint Server that", "cve_id": "CVE-2025-49704", "title": "Microsoft SharePoint Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-22", "split": "test"} -{"id": "CVE-2025-8110", "text": "Gogs Path Traversal Vulnerability\n\nAffected: Gogs Gogs\n\nGogs contains a path traversal vulnerability affecting improper Symbolic link handling in the PutContents API that could allow for code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2025-8110", "title": "Gogs Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2026-01-12", "split": "test"} -{"id": "CVE-2022-21445", "text": "Oracle ADF Faces Deserialization of Untrusted Data Vulnerability\n\nAffected: Oracle ADF Faces\n\nOracle ADF Faces library, included with Oracle JDeveloper Distribution, contains a deserialization of untrusted data vulnerability leading to unauthenticated remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-21445", "title": "Oracle ADF Faces Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-18", "split": "test"} -{"id": "CVE-2023-21237", "text": "Android Pixel Information Disclosure Vulnerability \n\nAffected: Android Pixel\n\nAndroid Pixel contains a vulnerability in the Framework component, where the UI may be misleading or insufficient, providing a means to hide a foreground service notification. This could enable a local attacker to disclose sensitive information.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-200\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2023-21237", "title": "Android Pixel Information Disclosure Vulnerability ", "source": "cisa_kev", "timestamp": "2024-03-05", "split": "test"} -{"id": "CVE-2026-22719", "text": "Broadcom VMware Aria Operations Command Injection Vulnerability\n\nAffected: Broadcom VMware Aria Operations\n\nBroadcom VMware Aria Operations formerly known as vRealize Operations (vROps) contains a command injection vulnerability that allows an unauthenticated attacker to execute arbitrary commands, potentially leading to remote code execution during support‑assisted product migration.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud serv", "cve_id": "CVE-2026-22719", "title": "Broadcom VMware Aria Operations Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-03", "split": "test"} -{"id": "CVE-2023-6548", "text": "Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability\n\nAffected: Citrix NetScaler ADC and NetScaler Gateway\n\nCitrix NetScaler ADC and NetScaler Gateway contain a code injection vulnerability that allows for authenticated remote code execution on the management interface with access to NSIP, CLIP, or SNIP.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2023-6548", "title": "Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-17", "split": "test"} -{"id": "CVE-2024-37079", "text": "Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability\n\nAffected: Broadcom VMware vCenter Server\n\nBroadcom VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. This could allow a malicious actor with network access to vCenter Server to send specially crafted network packets, potentially leading to remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud", "cve_id": "CVE-2024-37079", "title": "Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2026-01-23", "split": "test"}