From e47d7f127df57ed121a7d7ad941923798221e99f Mon Sep 17 00:00:00 2001 From: AboutCode Automation Date: Wed, 11 Dec 2024 00:12:28 +0000 Subject: [PATCH] Update KEV: Wed Dec 11 00:12:28 UTC 2024 Signed-off-by: AboutCode Automation --- known_exploited_vulnerabilities.json | 21 ++++++++++++++++++--- 1 file changed, 18 insertions(+), 3 deletions(-) diff --git a/known_exploited_vulnerabilities.json b/known_exploited_vulnerabilities.json index 2c1de71..3d50713 100644 --- a/known_exploited_vulnerabilities.json +++ b/known_exploited_vulnerabilities.json @@ -1,9 +1,24 @@ { "title": "CISA Catalog of Known Exploited Vulnerabilities", - "catalogVersion": "2024.12.05", - "dateReleased": "2024-12-05T16:38:31.1946Z", - "count": 1227, + "catalogVersion": "2024.12.10", + "dateReleased": "2024-12-10T18:13:48.3556Z", + "count": 1228, "vulnerabilities": [ + { + "cveID": "CVE-2024-49138", + "vendorProject": "Microsoft", + "product": "Windows", + "vulnerabilityName": "Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability", + "dateAdded": "2024-12-10", + "shortDescription": "Microsoft Windows Common Log File System (CLFS) driver contains a heap-based buffer overflow vulnerability that allows a local attacker to escalate privileges.", + "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "dueDate": "2024-12-31", + "knownRansomwareCampaignUse": "Unknown", + "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-49138 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-49138", + "cwes": [ + "CWE-122" + ] + }, { "cveID": "CVE-2024-51378", "vendorProject": "CyberPersons",