www.cisa.gov
Open in
urlscan Pro
2a02:26f0:dc:184::447a
Public Scan
Submitted URL: http://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkI...
Effective URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?utm_source=govdelivery
Submission Tags: falconsandbox
Submission: On February 25 via api from US — Scanned from DE
Effective URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?utm_source=govdelivery
Submission Tags: falconsandbox
Submission: On February 25 via api from US — Scanned from DE
Form analysis
2 forms found in the DOM<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id1">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id2">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
Text Content
Skip to main content An official website of the United States government Here’s how you know Here’s how you know Official websites use .gov A .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites. Cybersecurity & Infrastructure Security Agency America's Cyber Defense Agency Search × search Menu Close × search * Topics Topics Cybersecurity Best Practices Cyber Threats and Advisories Critical Infrastructure Security and Resilience Election Security Emergency Communications Industrial Control Systems Information and Communications Technology Supply Chain Security Partnerships and Collaboration Physical Security Risk Management How can we help? GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium Businesses * Spotlight * Resources & Tools Resources & Tools All Resources & Tools Services Programs Resources Training Groups * News & Events News & Events News Events Cybersecurity Alerts & Advisories Directives Request a CISA Speaker Congressional Testimony * Careers Careers Benefits & Perks HireVue Applicant Reasonable Accommodations Process Hiring Resume & Application Tips Students & Recent Graduates Veteran and Military Spouses Work @ CISA * About About Culture Divisions & Offices Regions Leadership Doing Business with CISA Contact Us Site Links CISA Administrative Subpoena Reporting Employee and Contractor Misconduct CISA GitHub Report a Cyber Issue Breadcrumb 1. Home Share: KNOWN EXPLOITED VULNERABILITIES CATALOG Download CSV version Download JSON version Download JSON schema Subscribe to the Known Exploited Vulnerabilities Catalog Update Bulletin(link is external) Back to previous page for background on known exploited vulnerabilities Show 102550100 entries Search: CVEVendor/ProjectProductVulnerability NameDate Added to CatalogShort DescriptionActionDue DateNotesCVE-2022-47986(link is external) IBM Aspera Faspex IBM Aspera Faspex Code Execution Vulnerability 2023-02-21 IBM Aspera Faspex could allow a remote attacker to execute code on the system, caused by a YAML deserialization flaw. Apply updates per vendor instructions. 2023-03-14 https://exchange.xforce.ibmcloud.com/vulnerabilities/243512?_ga=2.189195179.1800390251.1676559338-700333034.1676325890 * Notes https://exchange.xforce.ibmcloud.com/vulnerabilities/243512?_ga=2.189195179.1800390251.1676559338-700333034.1676325890 CVE-2022-41223(link is external) Mitel MiVoice Connect Mitel MiVoice Connect Code Injection Vulnerability 2023-02-21 The Director component in Mitel MiVoice Connect allows an authenticated attacker with internal network access to execute code within the context of the application. Apply updates per vendor instructions. 2023-03-14 https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0008 * Notes https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0008 CVE-2022-40765(link is external) Mitel MiVoice Connect Mitel MiVoice Connect Command Injection Vulnerability 2023-02-21 The Mitel Edge Gateway component of MiVoice Connect allows an authenticated attacker with internal network access to execute commands within the context of the system. Apply updates per vendor instructions. 2023-03-14 https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0007 * Notes https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0007 CVE-2022-46169(link is external) Cacti Cacti Cacti Command Injection Vulnerability 2023-02-16 Cacti contains a command injection vulnerability that allows an unauthenticated user to execute code. Apply updates per vendor instructions. 2023-03-09 https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf * Notes https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf CVE-2023-21715(link is external) Microsoft Office Microsoft Office Publisher Security Feature Bypass Vulnerability 2023-02-14 Microsoft Office Publisher contains a security feature bypass vulnerability which allows for a local, authenticated attack on a targeted system. Apply updates per vendor instructions. 2023-03-07 https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21715 * Notes https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21715 CVE-2023-23376(link is external) Microsoft Windows Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability 2023-02-14 Microsoft Windows Common Log File System (CLFS) driver contains an unspecified vulnerability which allows for privilege escalation. Apply updates per vendor instructions. 2023-03-07 https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-23376 * Notes https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-23376 CVE-2023-23529(link is external) Apple Multiple Products Apple Multiple Products WebKit Type Confusion Vulnerability 2023-02-14 WebKit in Apple iOS, MacOS, Safari and iPadOS contains a type confusion vulnerability that may lead to code execution. Apply updates per vendor instructions. 2023-03-07 https://support.apple.com/en-us/HT213635, https://support.apple.com/en-us/HT213633, https://support.apple.com/en-us/HT213638 * Notes https://support.apple.com/en-us/HT213635, https://support.apple.com/en-us/HT213633, https://support.apple.com/en-us/HT213638 CVE-2023-21823(link is external) Microsoft Windows Microsoft Windows Graphic Component Privilege Escalation Vulnerability 2023-02-14 Microsoft Windows Graphic Component contains an unspecified vulnerability which allows for privilege escalation. Apply updates per vendor instructions. 2023-03-07 https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21823 * Notes https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21823 CVE-2015-2291(link is external) Intel Ethernet Diagnostics Driver for Windows Intel Ethernet Diagnostics Driver for Windows Denial-of-Service Vulnerability 2023-02-10 Intel ethernet diagnostics driver for Windows IQVW32.sys and IQVW64.sys contain an unspecified vulnerability that allows for a denial-of-service. Apply updates per vendor instructions. 2023-03-03 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00051.html * Notes https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00051.html CVE-2022-24990(link is external) TerraMaster TerraMaster OS TerraMaster OS Remote Command Execution Vulnerability 2023-02-10 TerraMaster OS contains a remote command execution vulnerability that allows an unauthenticated user to execute commands on the target endpoint. Apply updates per vendor instructions. 2023-03-03 https://forum.terra-master.com/en/viewtopic.php?t=3030 * Notes https://forum.terra-master.com/en/viewtopic.php?t=3030 Showing 1 to 10 of 886 entries Previous12345…89Next Back to top Return to top * Topics * Spotlight * Resources & Tools * News & Events * Careers * About Cybersecurity & Infrastructure Security Agency * Facebook * Twitter * LinkedIn * YouTube * Instagram * RSS CISA Central 888-282-0870 Central@cisa.dhs.gov(link sends email) DHS Seal CISA.gov An official website of the U.S. Department of Homeland Security * About CISA * Accessibility * Budget and Performance * DHS.gov * FOIA Requests * No FEAR Act * Office of Inspector General * Privacy Policy * The White House * USA.gov * Website Feedback