#kev

Patrick CoylePjcoyle@qoto.org
2025-06-26

CISA Adds FortiOS Vulnerability to KEV Catalog – 6-25-25 – tinyurl.com/3mpfmhm5 #KEV #CISA #FortiGuard

2025-06-10

So here's a dumb question. Does CVE-2025-33053 actually affect Apache #mod_dav after all?

#CISA #KEV seems to be implying this: "This vulnerability could affect various products that implement WebDAV, including but not limited to Microsoft Windows."

Like, is it a protocol bug, or a product bug? The CVE only lists Microsoft products as affected.

2025-06-09

#CISA added the Erlang/OTP and RoundCube bugs to the #KEV today.

@runZeroInc already has queries for both of these -- the Erlang/OTP one since April. rZ users should be well ahead of this today.

runzero.com/blog/erlang-otp-ss

runzero.com/blog/roundcube-web

Patrick CoylePjcoyle@qoto.org
2025-05-20

CISA Adds ZKTeco BioTime Vulnerability to KEV Catalog – 5-19-25 – tinyurl.com/ms84fzjp #CISA #KEV #ZKTeco

Patrick CoylePjcoyle@qoto.org
2025-05-15

CISA Adds FortiGuard Vulnerability to KEV Catalog – 5-14-25 – Stack-based buffer overflow in five FortiGuard product lines – tinyurl.com/ye5m9b7x #KEV #FortiGuard

2025-05-13

#CISA posts up a passel of new KEVs, completely blowing through the k-rad 1337 count.

Technically, it looks like CVE-2025-32709 is the winrar of Most LEET Bug on #KEV.

2025-05-12

#CISA se carga el feed RSS del #KEV y dice que si tal lo puedes seguir en Twitter 🤬

cisa.gov/news-events/alerts/20

Un recordatorio más de no basar la gestión de vulnerabilidades en una organización estatal.

2025-05-12

#CISA adds CVE-2025-47729 to the #KEV -- which is for the crazy hacked up version of Signal used by high-ranking US government officials.

Wowzo. That's something.

cve.org/CVERecord?id=CVE-2025-

2025-05-12

#CISA ends RSS for #KEV. Sigh.

UPDATE: No they didn't! H/t @ntkramer

"Update May 13: In an effort to enhance user experience and highlight the most timely and actionable information for cyber defenders, CISA announced a shift in how we share cybersecurity alerts and advisories. We recognize this has caused some confusion in the cyber community. As such, we have paused immediate changes while we re-assess the best approach to sharing with our stakeholders."

cisa.gov/news-events/alerts/20

Patrick CoylePjcoyle@qoto.org
2025-05-08

CISA Adds 2 GeoVision Vulnerabilities to KEV Catalog – 5-7-25 – OS command injection vulnerabilities initially reported in June and November 2024 – Affected products are EOL no mitigation measures are available – tinyurl.com/3c6jfhsb #KEV #CISA

Patrick CoylePjcoyle@qoto.org
2025-05-02

CISA Adds SonicWall Vulnerability to KEV Catalog – 5-1-25 – tinyurl.com/yb4dsuuk #KEV #SonicWall

Patrick CoylePjcoyle@qoto.org
2025-04-29

CISA Adds Broadcom Vulnerability to KEV Catalog – 4-28-25 – Code injection vulnerability in Brocade Fabric OS – Not yet clear what OT/IoT assets may be affected –tinyurl.com/38wswk3a #KEV

📰cyberlights💥 week 17 out now! I had a hard time choosing from all the #infosec news. the entry got a little longer than usual 👉infosec.press/wrzlbrmpfts-cybe

my fav this week is quite geeky, but discovering a bug because of "previously undefined behavior" is kinda cool 🫙 cookieplmonster.github.io/2025

a little sidenote: no new entries into CISA's #kev database. that does not happen very often. 🥸

mauvehed 🐿️ (KØMVH)mauvehed@defcon.social
2025-04-24

I wrote a Discord bot to monitor for CVEs being mentioned in chat, and then it will fetch the details and post it back to chat.

It also has a feature to monitor for new KEV notifications and send them to a dedicated channel

Collab with me. Use it. Abuse it. What ever ya want!

github.com/mauvehed/kevvy

#CVSS #CVE #KEV #CISA #Vulnerabilties #Discord

Patrick CoylePjcoyle@qoto.org
2025-04-17

CISA Adds SonicWall Vulnerability to KEV Catalog – 4-16-25 – Vulnerability initially reported on 2021 (and fixed) now being exploited in the wild – tinyurl.com/5n6p3fw7 #KEV #SonicWind

2025-04-08

Los recortes en #CISA a pesar de ser una agencia americana posiblemente terminen teniendo un impacto negativo en la #ciberseguridad global.

Por ejemplo el #KEV que mantienen (un catálogo de vulnerabilidades que se sabe que se están explotando por el mundo adelante) es una joya de cara a hacer una gestión de vulnerabilidades efectiva.

Otra cosa es que tengamos que quitarnos esa dependencia y buscar alternativas propias (además de ser conscientes de que no nos avisarán de las que exploten ellos, evidentemente), pero perder esa fuente va a hacer mucho daño a corto.

theregister.com/2025/04/08/cis

CWE ProgramCWE_Program
2025-04-03

Want to know the top ten in CISA’s “Known Exploited Vulnerabilities () Catalog”?

The “2024 CWE Top 10 KEV Weaknesses” list is now available on the CWE website!

List - cwe.mitre.org/top25/archive/20
Key Insights - cwe.mitre.org/top25/archive/20
Methodology - cwe.mitre.org/top25/archive/20

Tree Map of the https://cwe.mitre.org/top25/archive/2024/2024_kev_list.html
Patrick CoylePjcoyle@qoto.org
2025-03-20

CISA Adds Edimax IP-camera Vulnerability to KEV Catalog – 3-19-25 – tinyurl.com/2esdfdp9 #KEV #CISA

Thomas Fricke (he/him)thomasfricke@23.social
2025-03-19

@alvar @FITKOfoederal

Das gilt auch, und nicht nur für

1. #FOSS
2. #AI Modelle
3. #CVE #databases
4. #kev cisa.gov/known-exploited-vulne #CISA ist bereits unter Beschuss
5. #tor opentech.fund/ auch unter Beschuss

Wir können uns eigentlich nur noch auf reine #FOSS Modelle verlassen, und selbst das wird schwer, weil einige Communities gespalten sind.

Für alle, die jetzt noch gut schlafen konnten.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst