|
5 | 5 | Content-Type: "application/json" |
6 | 6 | responses: |
7 | 7 | - status_code: 200 |
8 | | - body: "{\n \"title\": \"CISA Catalog of Known Exploited Vulnerabilities\",\n \"catalogVersion\": \"2024.02.16\",\n \"dateReleased\": \"2024-02-16T19:54:05.3915Z\",\n \"count\": 1081,\n \"vulnerabilities\": [\n {\n \"cveID\":\"CVE-2020-3259\",\"vendorProject\":\"Cisco\",\"product\":\"Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)\",\"vulnerabilityName\":\"Cisco ASA and FTD Information Disclosure Vulnerability\",\"dateAdded\":\"2024-02-15\",\"shortDescription\":\"Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain an information disclosure vulnerability. An attacker could retrieve memory contents on an affected device, which could lead to the disclosure of confidential information due to a buffer tracking issue when the software parses invalid URLs that are requested from the web services interface. This vulnerability affects only specific AnyConnect and WebVPN configurations.\",\"requiredAction\":\"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\",\"dueDate\":\"2024-03-07\",\"knownRansomwareCampaignUse\":\"Known\",\"notes\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-info-disclose-9eJtycMB\"\n },\n {\n \"cveID\":\"CVE-2024-21410\",\"vendorProject\":\"Microsoft\",\"product\":\"Exchange Server\",\"vulnerabilityName\":\"Microsoft Exchange Server Privilege Escalation Vulnerability\",\"dateAdded\":\"2024-02-15\",\"shortDescription\":\"Microsoft Exchange Server contains an unspecified vulnerability that allows for privilege escalation.\",\"requiredAction\":\"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\",\"dueDate\":\"2024-03-07\",\"knownRansomwareCampaignUse\":\"Unknown\",\"notes\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21410\"\n },\n { \n \"cveID\":\"CVE-2024-1709\",\"vendorProject\":\"ConnectWise\",\"product\":\"ScreenConnect\",\"vulnerabilityName\":\"ConnectWise ScreenConnect Authentication Bypass Vulnerability\",\"dateAdded\":\"2024-02-22\",\"shortDescription\":\"ConnectWise ScreenConnect contains an authentication bypass vulnerability that allows an attacker with network access to the management interface to create a new, administrator-level account on affected devices.\",\"requiredAction\":\"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\",\"dueDate\":\"2024-02-29\",\"knownRansomwareCampaignUse\":\"Known\",\"notes\":\"https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8\"\n }\n ]\n}" |
| 8 | + body: |- |
| 9 | + {{ minify_json ` |
| 10 | + { |
| 11 | + "title": "CISA Catalog of Known Exploited Vulnerabilities", |
| 12 | + "catalogVersion": "2024.02.16", |
| 13 | + "dateReleased": "2024-02-16T19:54:05.3915Z", |
| 14 | + "count": 1081, |
| 15 | + "vulnerabilities": [ |
| 16 | + { |
| 17 | + "cveID": "CVE-2020-3259", |
| 18 | + "vendorProject": "Cisco", |
| 19 | + "product": "Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)", |
| 20 | + "vulnerabilityName": "Cisco ASA and FTD Information Disclosure Vulnerability", |
| 21 | + "dateAdded": "2024-02-15", |
| 22 | + "shortDescription": "Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain an information disclosure vulnerability. An attacker could retrieve memory contents on an affected device, which could lead to the disclosure of confidential information due to a buffer tracking issue when the software parses invalid URLs that are requested from the web services interface. This vulnerability affects only specific AnyConnect and WebVPN configurations.", |
| 23 | + "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", |
| 24 | + "dueDate": "2024-03-07", |
| 25 | + "knownRansomwareCampaignUse": "Known", |
| 26 | + "notes": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-info-disclose-9eJtycMB" |
| 27 | + }, |
| 28 | + { |
| 29 | + "cveID": "CVE-2024-21410", |
| 30 | + "vendorProject": "Microsoft", |
| 31 | + "product": "Exchange Server", |
| 32 | + "vulnerabilityName": "Microsoft Exchange Server Privilege Escalation Vulnerability", |
| 33 | + "dateAdded": "2024-02-15", |
| 34 | + "shortDescription": "Microsoft Exchange Server contains an unspecified vulnerability that allows for privilege escalation.", |
| 35 | + "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", |
| 36 | + "dueDate": "2024-03-07", |
| 37 | + "knownRansomwareCampaignUse": "Unknown", |
| 38 | + "notes": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21410" |
| 39 | + }, |
| 40 | + { |
| 41 | + "cveID": "CVE-2024-1709", |
| 42 | + "vendorProject": "ConnectWise", |
| 43 | + "product": "ScreenConnect", |
| 44 | + "vulnerabilityName": "ConnectWise ScreenConnect Authentication Bypass Vulnerability", |
| 45 | + "dateAdded": "2024-02-22", |
| 46 | + "shortDescription": "ConnectWise ScreenConnect contains an authentication bypass vulnerability that allows an attacker with network access to the management interface to create a new, administrator-level account on affected devices.", |
| 47 | + "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", |
| 48 | + "dueDate": "2024-02-29", |
| 49 | + "knownRansomwareCampaignUse": "Known", |
| 50 | + "notes": "https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8" |
| 51 | + } |
| 52 | + ] |
| 53 | + } |
| 54 | + `}} |
0 commit comments