|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2026.02.13", |
4 | | - "dateReleased": "2026-02-13T23:49:15.628Z", |
5 | | - "count": 1518, |
| 3 | + "catalogVersion": "2026.02.17", |
| 4 | + "dateReleased": "2026-02-17T20:07:57.4387Z", |
| 5 | + "count": 1522, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2020-7796", |
| 9 | + "vendorProject": "Synacor", |
| 10 | + "product": "Zimbra Collaboration Suite", |
| 11 | + "vulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability", |
| 12 | + "dateAdded": "2026-02-17", |
| 13 | + "shortDescription": "Synacor Zimbra Collaboration Suite (ZCS) contains a server-side request forgery vulnerability if WebEx zimlet installed and zimlet JSP is enabled.", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2026-03-10", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "https:\/\/wiki.zimbra.com\/wiki\/Zimbra_Releases\/8.8.15\/P7 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-7796", |
| 18 | + "cwes": [ |
| 19 | + "CWE-918" |
| 20 | + ] |
| 21 | + }, |
| 22 | + { |
| 23 | + "cveID": "CVE-2024-7694", |
| 24 | + "vendorProject": "TeamT5", |
| 25 | + "product": "ThreatSonar Anti-Ransomware", |
| 26 | + "vulnerabilityName": "TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability", |
| 27 | + "dateAdded": "2026-02-17", |
| 28 | + "shortDescription": "TeamT5 ThreatSonar Anti-Ransomware contains an unrestricted upload of file with dangerous type vulnerability. ThreatSonar Anti-Ransomware does not properly validate the content of uploaded files. Remote attackers with administrator privileges on the product platform can upload malicious files, which can be used to execute arbitrary system commands on the server.", |
| 29 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 30 | + "dueDate": "2026-03-10", |
| 31 | + "knownRansomwareCampaignUse": "Unknown", |
| 32 | + "notes": "https:\/\/teamt5.org\/en\/posts\/vulnerability-notice-threat-sonar-anti-ransomware-20240715\/ ; https:\/\/www.twcert.org.tw\/en\/cp-139-8000-e5a5c-2.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-7694", |
| 33 | + "cwes": [ |
| 34 | + "CWE-434" |
| 35 | + ] |
| 36 | + }, |
| 37 | + { |
| 38 | + "cveID": "CVE-2008-0015", |
| 39 | + "vendorProject": "Microsoft", |
| 40 | + "product": "Windows", |
| 41 | + "vulnerabilityName": " Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability", |
| 42 | + "dateAdded": "2026-02-17", |
| 43 | + "shortDescription": "Microsoft Windows Video ActiveX Control contains a remote code execution vulnerability. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.", |
| 44 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 45 | + "dueDate": "2026-03-10", |
| 46 | + "knownRansomwareCampaignUse": "Unknown", |
| 47 | + "notes": "https:\/\/web.archive.org\/web\/20110305211119\/https:\/\/www.microsoft.com\/technet\/security\/bulletin\/ms09-032.mspx ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2008-0015", |
| 48 | + "cwes": [] |
| 49 | + }, |
| 50 | + { |
| 51 | + "cveID": "CVE-2026-2441", |
| 52 | + "vendorProject": "Google", |
| 53 | + "product": "Chromium", |
| 54 | + "vulnerabilityName": "Google Chromium CSS Use-After-Free Vulnerability", |
| 55 | + "dateAdded": "2026-02-17", |
| 56 | + "shortDescription": "Google Chromium CSS contains a use-after-free vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.", |
| 57 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 58 | + "dueDate": "2026-03-10", |
| 59 | + "knownRansomwareCampaignUse": "Unknown", |
| 60 | + "notes": "https:\/\/chromereleases.googleblog.com\/2026\/02\/stable-channel-update-for-desktop_13.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-2441", |
| 61 | + "cwes": [ |
| 62 | + "CWE-416" |
| 63 | + ] |
| 64 | + }, |
7 | 65 | { |
8 | 66 | "cveID": "CVE-2026-1731", |
9 | 67 | "vendorProject": "BeyondTrust", |
|
0 commit comments