Skip to content

Commit

Permalink
Merge pull request #1418 from e-m-b-a/known_exploited_update
Browse files Browse the repository at this point in the history
CISA known exploited database update
  • Loading branch information
m-1-k-3 authored Dec 22, 2024
2 parents 0ca1a80 + 1d76fd1 commit 251a905
Showing 1 changed file with 10 additions and 2 deletions.
12 changes: 10 additions & 2 deletions config/known_exploited_vulnerabilities.csv
Original file line number Diff line number Diff line change
@@ -1,13 +1,21 @@
cveID,vendorProject,product,vulnerabilityName,dateAdded,shortDescription,requiredAction,dueDate,knownRansomwareCampaignUse,notes,cwes
CVE-2024-50623,Cleo,"Multiple Products","Cleo Multiple Products Unrestricted File Upload Vulnerability",2024-12-13,"Cleo Harmony, VLTrader, and LexiCom, which are managed file transfer products, contain an unrestricted file upload and download vulnerability that can lead to remote code execution with elevated privileges.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-01-03,Known,"https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Update ; https://nvd.nist.gov/vuln/detail/CVE-2024-50623",CVE-434
CVE-2024-12356,BeyondTrust,"Privileged Remote Access (PRA) and Remote Support (RS) ","BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability ",2024-12-19,"BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) contain a command injection vulnerability, which can allow an unauthenticated attacker to inject commands that are run as a site user. ","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-12-27,Unknown,"https://www.beyondtrust.com/trust-center/security-advisories/bt24-10 ; https://nvd.nist.gov/vuln/detail/CVE-2024-12356",CWE-77
CVE-2021-40407,Reolink,"RLC-410W IP Camera","Reolink RLC-410W IP Camera OS Command Injection Vulnerability ",2024-12-18,"Reolink RLC-410W IP cameras contain an authenticated OS command injection vulnerability in the device network settings functionality.","The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.",2025-01-08,Unknown,"https://reolink.com/product-eol/ ; https://reolink.com/download-center/ ; https://nvd.nist.gov/vuln/detail/CVE-2021-40407",CWE-78
CVE-2019-11001,Reolink,"Multiple IP Cameras","Reolink Multiple IP Cameras OS Command Injection Vulnerability",2024-12-18,"Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W IP cameras contain an authenticated OS command injection vulnerability. This vulnerability allows an authenticated admin to use the ""TestEmail"" functionality to inject and run OS commands as root.","The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.",2025-01-08,Unknown,"https://reolink.com/product-eol/ ; https://reolink.com/download-center/ ; https://nvd.nist.gov/vuln/detail/CVE-2019-11001",CWE-78
CVE-2022-23227,NUUO,"NVRmini2 Devices","NUUO NVRmini 2 Devices Missing Authentication Vulnerability ",2024-12-18,"NUUO NVRmini 2 devices contain a missing authentication vulnerability that allows an unauthenticated attacker to upload an encrypted TAR archive, which can be abused to add arbitrary users. ","The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.",2025-01-08,Unknown,"https://nuuo.com/wp-content/uploads/2023/03/NUUO-EOL-letter_NVRmini-2-and-NVRsolo-series.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2022-23227",CWE-306
CVE-2018-14933,NUUO,"NVRmini Devices","NUUO NVRmini Devices OS Command Injection Vulnerability ",2024-12-18,"NUUO NVRmini devices contain an OS command injection vulnerability. This vulnerability allows remote command execution via shell metacharacters in the uploaddir parameter for a writeuploaddir command.","The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.",2025-01-08,Unknown,"https://nuuo.com/wp-content/uploads/2023/03/NUUO-EOL-letter%EF%BC%BFNVRmini-2-and-NVRsolo-series.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2018-14933",CWE-78
CVE-2024-55956,Cleo,"Multiple Products","Cleo Multiple Products Unauthenticated File Upload Vulnerability",2024-12-17,"Cleo Harmony, VLTrader, and LexiCom, which are managed file transfer products, contain an unrestricted file upload vulnerability that could allow an unauthenticated user to import and execute arbitrary bash or PowerShell commands on the host system by leveraging the default settings of the Autorun directory.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-01-07,Known,"https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Update-CVE-2024-55956 ; https://nvd.nist.gov/vuln/detail/CVE-2024-55956",
CVE-2024-35250,Microsoft,Windows,"Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability ",2024-12-16,"Microsoft Windows Kernel-Mode Driver contains an untrusted pointer dereference vulnerability that allows a local attacker to escalate privileges.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-01-06,Unknown,"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35250 ; https://nvd.nist.gov/vuln/detail/CVE-2024-35250",CWE-822
CVE-2024-20767,Adobe,ColdFusion,"Adobe ColdFusion Improper Access Control Vulnerability",2024-12-16,"Adobe ColdFusion contains an improper access control vulnerability that could allow an attacker to access or modify restricted files via an internet-exposed admin panel.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-01-06,Unknown,"https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-20767",CWE-284
CVE-2024-50623,Cleo,"Multiple Products","Cleo Multiple Products Unrestricted File Upload Vulnerability",2024-12-13,"Cleo Harmony, VLTrader, and LexiCom, which are managed file transfer products, contain an unrestricted file upload and download vulnerability that can lead to remote code execution with elevated privileges.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-01-03,Known,"https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Update ; https://nvd.nist.gov/vuln/detail/CVE-2024-50623",CWE-434
CVE-2024-49138,Microsoft,Windows,"Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability",2024-12-10,"Microsoft Windows Common Log File System (CLFS) driver contains a heap-based buffer overflow vulnerability that allows a local attacker to escalate privileges.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-12-31,Unknown,"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49138 ; https://nvd.nist.gov/vuln/detail/CVE-2024-49138",CWE-122
CVE-2024-51378,CyberPersons,CyberPanel,"CyberPanel Incorrect Default Permissions Vulnerability",2024-12-04,"CyberPanel contains an incorrect default permissions vulnerability that allows for authentication bypass and the execution of arbitrary commands using shell metacharacters in the statusfile property.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-12-25,Known,"https://cyberpanel.net/KnowledgeBase/home/change-logs/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-51378",CWE-276
CVE-2024-11667,Zyxel,"Multiple Firewalls","Zyxel Multiple Firewalls Path Traversal Vulnerability",2024-12-03,"Multiple Zyxel firewalls contain a path traversal vulnerability in the web management interface that could allow an attacker to download or upload files via a crafted URL.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-12-24,Known,"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-protecting-against-recent-firewall-threats-11-21-2024 ; https://nvd.nist.gov/vuln/detail/CVE-2024-11667",CWE-22
CVE-2024-11680,ProjectSend,ProjectSend,"ProjectSend Improper Authentication Vulnerability",2024-12-03,"ProjectSend contains an improper authentication vulnerability that allows a remote, unauthenticated attacker to enable unauthorized modification of the application's configuration via crafted HTTP requests to options.php. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-12-24,Unknown,"https://github.com/projectsend/projectsend/commit/193367d937b1a59ed5b68dd4e60bd53317473744 ; https://nvd.nist.gov/vuln/detail/CVE-2024-11680",CWE-287
CVE-2023-45727,"North Grid",Proself,"North Grid Proself Improper Restriction of XML External Entity (XXE) Reference Vulnerability",2024-12-03,"North Grid Proself Enterprise/Standard, Gateway, and Mail Sanitize contain an improper restriction of XML External Entity (XXE) reference vulnerability, which could allow a remote, unauthenticated attacker to conduct an XXE attack.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-12-24,Unknown,"https://www.proself.jp/information/153/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-45727",CWE-611
CVE-2023-28461,"Array Networks ","AG/vxAG ArrayOS","Array Networks AG and vxAG ArrayOS Missing Authentication for Critical Function Vulnerability",2024-11-25,"Array Networks AG and vxAG ArrayOS contain a missing authentication for critical function vulnerability that allows an attacker to read local files and execute code on the SSL VPN gateway.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-12-16,Known,"https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_for_Remote_Code_Execution_Vulnerability_AG.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2023-28461",CWE-306
CVE-2024-21287,Oracle,"Agile Product Lifecycle Management (PLM)","Oracle Agile Product Lifecycle Management (PLM) Incorrect Authorization Vulnerability",2024-11-21,"Oracle Agile Product Lifecycle Management (PLM) contains an incorrect authorization vulnerability in the Process Extension component of the Software Development Kit. Successful exploitation of this vulnerability may result in unauthenticated file disclosure.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-12-12,Unknown,"https://www.oracle.com/security-alerts/alert-cve-2024-21287.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-21287",CWE-863
CVE-2024-44309,Apple,"Multiple Products","Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability",2024-11-21,"Apple iOS, macOS, and other Apple products contain an unspecified vulnerability when processing maliciously crafted web content that may lead to a cross-site scripting (XSS) attack.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-12-12,Unknown,"https://support.apple.com/en-us/121752, https://support.apple.com/en-us/121753, https://support.apple.com/en-us/121754, https://support.apple.com/en-us/121755, https://support.apple.com/en-us/121756 ; https://nvd.nist.gov/vuln/detail/CVE-2024-44309",
CVE-2024-44309,Apple,"Multiple Products","Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability",2024-11-21,"Apple iOS, macOS, and other Apple products contain an unspecified vulnerability when processing maliciously crafted web content that may lead to a cross-site scripting (XSS) attack.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-12-12,Unknown,"https://support.apple.com/en-us/121752, https://support.apple.com/en-us/121753, https://support.apple.com/en-us/121754, https://support.apple.com/en-us/121755, https://support.apple.com/en-us/121756 ; https://nvd.nist.gov/vuln/detail/CVE-2024-44309",CWE-79
CVE-2024-44308,Apple,"Multiple Products","Apple Multiple Products Code Execution Vulnerability",2024-11-21,"Apple iOS, macOS, and other Apple products contain an unspecified vulnerability when processing maliciously crafted web content that may lead to arbitrary code execution.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-12-12,Unknown,"https://support.apple.com/en-us/121752, https://support.apple.com/en-us/121753, https://support.apple.com/en-us/121754, https://support.apple.com/en-us/121755, https://support.apple.com/en-us/121756 ; https://nvd.nist.gov/vuln/detail/CVE-2024-44308",
CVE-2024-38813,VMware,"vCenter Server","VMware vCenter Server Privilege Escalation Vulnerability",2024-11-20,"VMware vCenter contains an improper check for dropped privileges vulnerability. This vulnerability could allow an attacker with network access to the vCenter Server to escalate privileges to root by sending a specially crafted packet.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-12-11,Unknown,"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968 ; https://nvd.nist.gov/vuln/detail/CVE-2024-38813","CWE-250, CWE-273"
CVE-2024-38812,VMware,"vCenter Server","VMware vCenter Server Heap-Based Buffer Overflow Vulnerability",2024-11-20,"VMware vCenter Server contains a heap-based buffer overflow vulnerability in the implementation of the DCERPC protocol. This vulnerability could allow an attacker with network access to the vCenter Server to execute remote code by sending a specially crafted packet.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-12-11,Unknown,"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968 ; https://nvd.nist.gov/vuln/detail/CVE-2024-38812",CWE-122
Expand Down

0 comments on commit 251a905

Please sign in to comment.