Skip to content

Commit f172276

Browse files
committed
Flat: latest data (2026-01-30T04:29:49.157Z)
{ "date": "2026-01-30T04:29:49.157Z", "files": [ { "name": "anac/drones.json", "deltaBytes": 33081, "source": "https://sistemas.anac.gov.br/dadosabertos/Aeronaves/drones%20cadastrados/SISANT.json" }, { "name": "known_exploited_vulnerabilities.json", "deltaBytes": 1541, "source": "https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json" } ] }
1 parent 8686e6f commit f172276

2 files changed

Lines changed: 23 additions & 8 deletions

File tree

anac/drones.json

Lines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.

known_exploited_vulnerabilities.json

Lines changed: 22 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,24 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2026.01.27",
4-
"dateReleased": "2026-01-27T20:51:50.7688Z",
5-
"count": 1500,
3+
"catalogVersion": "2026.01.29",
4+
"dateReleased": "2026-01-29T20:24:37.0959Z",
5+
"count": 1501,
66
"vulnerabilities": [
7+
{
8+
"cveID": "CVE-2026-1281",
9+
"vendorProject": "Ivanti",
10+
"product": "Endpoint Manager Mobile (EPMM)",
11+
"vulnerabilityName": "Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability",
12+
"dateAdded": "2026-01-29",
13+
"shortDescription": "Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution.",
14+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15+
"dueDate": "2026-02-01",
16+
"knownRansomwareCampaignUse": "Unknown",
17+
"notes": "Please adhere to Ivanti's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Ivanti products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as possible. For more information please: see: https:\/\/forums.ivanti.com\/s\/article\/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340 ; https:\/\/support.mobileiron.com\/mi\/vsp\/AB1771634\/ivanti-security-update-1761642-1.0.0S-5.noarch.rpm ; https:\/\/support.mobileiron.com\/mi\/vsp\/AB1771634\/ivanti-security-update-1761642-1.0.0L-5.noarch.rpm ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-1281",
18+
"cwes": [
19+
"CWE-94"
20+
]
21+
},
722
{
823
"cveID": "CVE-2026-24858",
924
"vendorProject": "Fortinet",
@@ -4353,7 +4368,7 @@
43534368
"shortDescription": "Microsoft Windows Task Scheduler contains a privilege escalation vulnerability that can allow an attacker-provided, local application to escalate privileges outside of its AppContainer, and access privileged RPC functions.",
43544369
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
43554370
"dueDate": "2024-12-03",
4356-
"knownRansomwareCampaignUse": "Unknown",
4371+
"knownRansomwareCampaignUse": "Known",
43574372
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-49039 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-49039",
43584373
"cwes": [
43594374
"CWE-287"
@@ -4383,7 +4398,7 @@
43834398
"shortDescription": "CyberPanel contains an incorrect default permissions vulnerability that allows a remote, unauthenticated attacker to execute commands as root.",
43844399
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
43854400
"dueDate": "2024-11-28",
4386-
"knownRansomwareCampaignUse": "Unknown",
4401+
"knownRansomwareCampaignUse": "Known",
43874402
"notes": "https:\/\/cyberpanel.net\/blog\/detials-and-fix-of-recent-security-issue-and-patch-of-cyberpanel ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-51567",
43884403
"cwes": [
43894404
"CWE-276"
@@ -4559,7 +4574,7 @@
45594574
"shortDescription": "Mozilla Firefox and Firefox ESR contain a use-after-free vulnerability in Animation timelines that allows for code execution in the content process.",
45604575
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
45614576
"dueDate": "2024-11-05",
4562-
"knownRansomwareCampaignUse": "Unknown",
4577+
"knownRansomwareCampaignUse": "Known",
45634578
"notes": "https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2024-51\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-9680",
45644579
"cwes": [
45654580
"CWE-416"
@@ -4574,7 +4589,7 @@
45744589
"shortDescription": "Microsoft Windows Kernel contains a time-of-check to time-of-use (TOCTOU) race condition vulnerability that could allow for privilege escalation. ",
45754590
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
45764591
"dueDate": "2024-11-05",
4577-
"knownRansomwareCampaignUse": "Unknown",
4592+
"knownRansomwareCampaignUse": "Known",
45784593
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-30088 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-30088",
45794594
"cwes": [
45804595
"CWE-367"

0 commit comments

Comments
 (0)