Skip to content

Commit de58946

Browse files
author
rxerium
committed
CISA KEV Updates
1 parent aa8136f commit de58946

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

cisa-kev.csv

+1-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ CVE-2024-50603,Aviatrix,Controllers,"Aviatrix Controllers OS Command Injection V
33
CVE-2025-21335,Microsoft,Windows,"Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability",2025-01-14,"Microsoft Windows Hyper-V NT Kernel Integration VSP contains a use-after-free vulnerability that allows a local attacker to gain SYSTEM privileges.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-04,Unknown,"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21335 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21335",CWE-416
44
CVE-2025-21334,Microsoft,Windows,"Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability",2025-01-14,"Microsoft Windows Hyper-V NT Kernel Integration VSP contains a use-after-free vulnerability that allows a local attacker to gain SYSTEM privileges.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-04,Unknown,"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21334 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21334",CWE-416
55
CVE-2025-21333,Microsoft,Windows,"Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability",2025-01-14,"Microsoft Windows Hyper-V NT Kernel Integration VSP contains a heap-based buffer overflow vulnerability that allows a local attacker to gain SYSTEM privileges.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-04,Unknown,"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21333 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21333",CWE-122
6-
CVE-2024-55591,Fortinet,FortiOS,"Fortinet FortiOS Authorization Bypass Vulnerability",2025-01-14,"Fortinet FortiOS contains an authorization bypass vulnerability that may allow an unauthenticated remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-01-21,Unknown,"https://fortiguard.fortinet.com/psirt/FG-IR-24-535 ; https://nvd.nist.gov/vuln/detail/CVE-2024-55591",CWE-288
6+
CVE-2024-55591,Fortinet,"FortiOS and FortiProxy","Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability",2025-01-14,"Fortinet FortiOS and FortiProxy contain an authentication bypass vulnerability that may allow an unauthenticated, remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-01-21,Unknown,"https://fortiguard.fortinet.com/psirt/FG-IR-24-535 ; https://nvd.nist.gov/vuln/detail/CVE-2024-55591",CWE-288
77
CVE-2023-48365,Qlik,Sense,"Qlik Sense HTTP Tunneling Vulnerability",2025-01-13,"Qlik Sense contains an HTTP tunneling vulnerability that allows an attacker to escalate privileges and execute HTTP requests on the backend server hosting the software.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-03,Unknown,"https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/tac-p/2120510 ; https://nvd.nist.gov/vuln/detail/CVE-2023-48365",CWE-444
88
CVE-2024-12686,BeyondTrust,"Privileged Remote Access (PRA) and Remote Support (RS)","BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) OS Command Injection Vulnerability",2025-01-13,"BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) contain an OS command injection vulnerability that can be exploited by an attacker with existing administrative privileges to upload a malicious file. Successful exploitation of this vulnerability can allow a remote attacker to execute underlying operating system commands within the context of the site user.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-03,Unknown,"https://www.beyondtrust.com/trust-center/security-advisories/bt24-11 ; https://nvd.nist.gov/vuln/detail/CVE-2024-12686",CWE-78
99
CVE-2025-0282,Ivanti,"Connect Secure, Policy Secure, and ZTA Gateways","Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability",2025-01-08,"Ivanti Connect Secure, Policy Secure, and ZTA Gateways contain a stack-based buffer overflow which can lead to unauthenticated remote code execution.","Apply mitigations as set forth in the CISA instructions linked below to include conducting hunt activities, taking remediation actions if applicable, and applying updates prior to returning a device to service.",2025-01-15,Unknown,"CISA Mitigation Instructions: https://www.cisa.gov/cisa-mitigation-instructions-CVE-2025-0282 Additional References: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283 ; https://nvd.nist.gov/vuln/detail/CVE-2025-0282",CWE-121

nuclei-templates

+1-1
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
Subproject commit ef90d483eddd58d469675bef5f6900dd754c34ef
1+
Subproject commit d2f170c523f37f508d43231627204f123e629eb2

0 commit comments

Comments
 (0)