You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: cisa-kev.csv
+1-1
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ CVE-2024-50603,Aviatrix,Controllers,"Aviatrix Controllers OS Command Injection V
3
3
CVE-2025-21335,Microsoft,Windows,"Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability",2025-01-14,"Microsoft Windows Hyper-V NT Kernel Integration VSP contains a use-after-free vulnerability that allows a local attacker to gain SYSTEM privileges.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-04,Unknown,"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21335 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21335",CWE-416
4
4
CVE-2025-21334,Microsoft,Windows,"Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability",2025-01-14,"Microsoft Windows Hyper-V NT Kernel Integration VSP contains a use-after-free vulnerability that allows a local attacker to gain SYSTEM privileges.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-04,Unknown,"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21334 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21334",CWE-416
5
5
CVE-2025-21333,Microsoft,Windows,"Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability",2025-01-14,"Microsoft Windows Hyper-V NT Kernel Integration VSP contains a heap-based buffer overflow vulnerability that allows a local attacker to gain SYSTEM privileges.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-04,Unknown,"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21333 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21333",CWE-122
6
-
CVE-2024-55591,Fortinet,FortiOS,"Fortinet FortiOS Authorization Bypass Vulnerability",2025-01-14,"Fortinet FortiOS contains an authorization bypass vulnerability that may allow an unauthenticated remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-01-21,Unknown,"https://fortiguard.fortinet.com/psirt/FG-IR-24-535 ; https://nvd.nist.gov/vuln/detail/CVE-2024-55591",CWE-288
6
+
CVE-2024-55591,Fortinet,"FortiOS and FortiProxy","Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability",2025-01-14,"Fortinet FortiOS and FortiProxy contain an authentication bypass vulnerability that may allow an unauthenticated, remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-01-21,Unknown,"https://fortiguard.fortinet.com/psirt/FG-IR-24-535 ; https://nvd.nist.gov/vuln/detail/CVE-2024-55591",CWE-288
7
7
CVE-2023-48365,Qlik,Sense,"Qlik Sense HTTP Tunneling Vulnerability",2025-01-13,"Qlik Sense contains an HTTP tunneling vulnerability that allows an attacker to escalate privileges and execute HTTP requests on the backend server hosting the software.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-03,Unknown,"https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/tac-p/2120510 ; https://nvd.nist.gov/vuln/detail/CVE-2023-48365",CWE-444
8
8
CVE-2024-12686,BeyondTrust,"Privileged Remote Access (PRA) and Remote Support (RS)","BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) OS Command Injection Vulnerability",2025-01-13,"BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) contain an OS command injection vulnerability that can be exploited by an attacker with existing administrative privileges to upload a malicious file. Successful exploitation of this vulnerability can allow a remote attacker to execute underlying operating system commands within the context of the site user.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-03,Unknown,"https://www.beyondtrust.com/trust-center/security-advisories/bt24-11 ; https://nvd.nist.gov/vuln/detail/CVE-2024-12686",CWE-78
9
9
CVE-2025-0282,Ivanti,"Connect Secure, Policy Secure, and ZTA Gateways","Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability",2025-01-08,"Ivanti Connect Secure, Policy Secure, and ZTA Gateways contain a stack-based buffer overflow which can lead to unauthenticated remote code execution.","Apply mitigations as set forth in the CISA instructions linked below to include conducting hunt activities, taking remediation actions if applicable, and applying updates prior to returning a device to service.",2025-01-15,Unknown,"CISA Mitigation Instructions: https://www.cisa.gov/cisa-mitigation-instructions-CVE-2025-0282 Additional References: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283 ; https://nvd.nist.gov/vuln/detail/CVE-2025-0282",CWE-121
0 commit comments