Skip to content

Commit

Permalink
fetch kev
Browse files Browse the repository at this point in the history
  • Loading branch information
Marcuccio committed Aug 24, 2024
1 parent fd0b2bf commit 28a3618
Showing 1 changed file with 16 additions and 3 deletions.
19 changes: 16 additions & 3 deletions kev.json
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
{
"title": "CISA Catalog of Known Exploited Vulnerabilities",
"catalogVersion": "2024.08.21",
"dateReleased": "2024-08-21T14:01:44.5031Z",
"count": 1155,
"catalogVersion": "2024.08.23",
"dateReleased": "2024-08-23T23:22:22.3834Z",
"count": 1156,
"vulnerabilities": [
{
"cveID": "CVE-2021-27104",
Expand Down Expand Up @@ -15018,6 +15018,19 @@
"knownRansomwareCampaignUse": "Unknown",
"notes": "https:\/\/www.dahuasecurity.com\/aboutUs\/trustedCenter\/details\/582",
"cwes": []
},
{
"cveID": "CVE-2024-39717",
"vendorProject": "Versa",
"product": "Director",
"vulnerabilityName": "Versa Director Dangerous File Type Upload Vulnerability",
"dateAdded": "2024-08-23",
"shortDescription": "The Versa Director GUI contains an unrestricted upload of file with dangerous type vulnerability that allows administrators with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin privileges to customize the user interface. The \u201cChange Favicon\u201d (Favorite Icon) enables the upload of a .png file, which can be exploited to upload a malicious file with a .png extension disguised as an image.",
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"dueDate": "2024-09-13",
"knownRansomwareCampaignUse": "Unknown",
"notes": "Customers may download the update from the vendor at following link (note, a customer account is required): https:\/\/support.versa-networks.com\/support\/solutions\/articles\/23000026724-versa-director-ha-port-exploit-discovery-remediation ",
"cwes": []
}
]
}

0 comments on commit 28a3618

Please sign in to comment.