Exporters From Japan

Teams chat, instant message

 
Wholesale exporters from Japan   Company Established 1983
  • HOME
  • ABOUT
    • RESULTS
    • differences
    • BENEFITS
    • HISTORY
    • TEAM
    • LOCATION
    • FACILITIES
    • BANKING
    • MEMBERSHIPS
    • APPROVALS
    • LICENCES
    • SUPPLIERS
    • SPONSORSHIPS
    • MEDIA
    • PRIVACY
  • AUCTIONS
    • VEHICLE AUCTIONS
    • YAHOO! AUCTION
    • GOVERNMENT AUCTIONS
    • AUCTION MEMBERSHIPS
    • BID TRACKER
    • COST ESTIMATOR
    • COST VERIFICATION
  • SHIPPING
    • SHIPPING SERVICES
    • SHIPPING ESTIMATOR
    • SHIPPING SCHEDULE
    • SHIPMENT TRACKING
    • SHIP LOCATORS
  • FEES
    • TS REWARDS
  • TOOLS
    • CURRENCY CONVERTER
    • AUCTION TRANSPORT
    • VIN DECODERS
    • YEAR CONVERTER
  • guides
    • SELECT EXPORTER
    • IMPORT VEHICLE
    • IMPORT PARTS
    • HALF CUTS
    • MAXIMISE PROFITS
  • FAQ
    • general
    • vehicles
    • vehicle auctions
    • YAHOO! auction
    • GOVERNMENT AUCTIONS
    • parts
    • shipping
    • trading account
    • how to import
  • CONTACT
    • CONNECT
  • VEHICLES
    • GOONET
    • INSPECTIONS
    • SPECIFICATIONS
  • BRAND
    • JAPANESE CARS
      • DAIHATSU
      • EUNOS
      • FORD
      • HONDA
      • ISUZU
      • LEXUS
      • MAZDA
      • MITSUBISHI
      • MITSUOKA
      • NISSAN
      • SUBARU
      • SUZUKI
      • TOYOTA
    • GERMAN CARS
    • AMERICAN CARS
    • BRITISH CARS
    • ITALIAN CARS
    • FRENCH CARS
    • SWEDISH CARS
    • KOREAN CARS
  • TYPE
    • mobility
    • VENDING
    • instruction
    • TAXIS
    • AMBULANCES
    • FIRE ENGINES
    • HEARSES
    • LIMOUSINES
    • COMMERCIAL
  • CLASS
    • SPORTS CARS
    • MOTORSPORT
    • LEFT HAND DRIVE
    • FOUR WHEEL DRIVE
    • NEW VEHICLES
    • SALVAGE VEHICLES
    • PASSENGER VANS
    • LUXURY CARS
    • CLASSIC CARS
    • REPLICA CARS
    • RETRO CARS
    • BOX CARS
    • KEI MINI CARS
    • KEI MINI VANS
    • CONVERTIBLES
    • MICRO CARS
    • COMMUTER CARS
  • FUEL
    • HYBRID VEHICLES
    • ELECTRIC VEHICLES
    • CNG VEHICLES
    • LPG VEHICLES
    • DIESEL VEHICLES
  • TRUCKS
    • HINO TRUCKS
    • TOYOTA TRUCKS
    • ISUZU TRUCKS
    • NISSAN TRUCKS
    • UD TRUCKS
    • MAZDA TRUCKS
    • MITSUBISHI TRUCKS
    • FUSO TRUCKS
    • MERCEDES TRUCKS
    • VOLVO TRUCKS
    • DUMP TRUCKS
    • WING TRUCKS
    • REFRIGERATED TRUCKS
    • CRANE TRUCKS
    • CAR CARRIERS
    • TOW TRUCKS
    • PLATFORM TRUCKS
    • TANKER TRUCKS
    • VACUUM TRUCKS
    • COMPACTOR TRUCKS
    • CONCRETE MIXERS
    • CONCRETE PUMPS
    • ROLL TRUCKS
    • FIRE TRUCKS
    • PRIME MOVERS
    • 4WD TRUCKS
    • HYBRID TRUCKS
    • CNG TRUCKS
  • minitrucks
    • DAIHATSU
    • HONDA
    • MAZDA
    • MITSUBISHI
    • NISSAN
    • SUBARU
    • SUZUKI
    • DUMP
    • CRANE
    • CAMPER
    • REFRIGERATED
    • 4WD
    • NEW
  • BUSES
  • MOTORHOMES
    • YAHOO!
    • RAKUTEN
    • DEALER
  • PARTS
    • FREE REPORT
    • PARTS CONTAINERS
    • PARTS SYSTEMS
    • PARTS PROTECTION
    • BODY SHELLS
    • DISMANTLING
    • ONLINE PARTS
    • NEW PARTS
    • INTERIOR PARTS
      • SEATS
      • AUDIO VISUAL
      • METERS & GAUGES
      • TURBO TIMERS
      • AIRBAGS
    • EXTERIOR PARTS
      • BONNETS
      • BUMPERS
      • GRILLES
      • FENDERS
      • DOORS
      • TRUNKS
      • SPOILERS
      • LIGHTS
      • EMBLEMS
      • CAMERAS
    • ENGINES
    • TRANSMISSIONS
    • WHEELS & TYRES
      • WHEELS
      • TYRES
  • CUTS
  • PERFORMANCE PARTS
    • TURBOCHARGERS
    • ENGINE PARTS
    • SPARK PLUGS
    • ECU
    • MUFFLERS
    • SUSPENSIONS
    • BRAKES
    • CARBON PARTS
    • CLEANERS & FILTERS
    • TOWER & ROLL BARS
  • TRUCK PARTS
    • TRUCK CABINS
    • TRUCK BODIES
    • TRUCK DOORS
    • TRUCK BUMPERS
    • TRUCK GRILLES
    • TRUCK HEADLIGHTS
    • TRUCK TAIL LIGHTS
    • TRUCK CRANES
    • TRUCK WINCHES
    • TRUCK BATTERIES
    • TRUCK WHEELS & TYRES
      • WHEELS
      • TYRES
  • MOTORBIKE PARTS
    • MOTORBIKE ENGINES
    • MOTORBIKE ACCESSORIES
  • MOTORBIKES
    • SALVAGE MOTORBIKES
    • QUAD BIKES
    • TRIKES
    • ELECTRIC SCOOTERS
  • MARINE
    • POWER BOATS
    • SAIL BOATS
    • JETSKIS
    • MARINE ENGINES
  • FORKLIFTS
    • AUCTION FORKLIFTS
    • DEALER FORKLIFTS
    • NEW FORKLIFTS
    • TOYOTA FORKLIFTS
    • NISSAN FORKLIFTS
    • KOMATSU FORKLIFTS
    • MITSUBISHI FORKLIFTS
    • TCM FORKLIFTS
    • NICHIYU FORKLIFTS
    • REACH FORKLIFTS
    • ELECTRIC FORKLIFTS
    • GASOLINE FORKLIFTS
    • LPG FORKLIFTS
    • DIESEL FORKLIFTS
    • FORKLIFT PARTS
    • FORKLIFT SHIPPING
  • MACHINERY
    • CRANES
    • EXCAVATORS
    • MINI EXCAVATORS
    • WHEEL LOADERS
    • BULLDOZERS
    • SKID STEERS
    • ELEVATED PLATFORMS
    • BREAKERS
    • CONCRETE CUTTERS
  • AGRICULTURAL
    • TRACTORS
    • HAND TRACTORS
    • COMBINES
    • BINDERS
    • RICE PLANTERS
  • OTHER
    • GO KARTS
    • MOBILITY SCOOTERS
    • GOLF CARTS
    • BICYCLES
    • SNOWMOBILES
    • SNOW PLOWS
    • GENERATORS
    • COMPRESSORS
    • WELDERS
  • COUNTRY
    • AUSTRALIA
    • CANADA
    • KENYA
    • MYANMAR
    • NEW ZEALAND
    • PAKISTAN
    • TANZANIA
    • UNITED STATES
CARVIEW
MOTORHOMES
Select Language
HTTP/2 200 content-type: text/html; charset=UTF-8 server: Apache x-content-type-options: nosniff x-drupal-dynamic-cache: UNCACHEABLE (poor cacheability) content-language: en x-frame-options: SAMEORIGIN x-generator: Drupal 11 (https://www.drupal.org) x-wcm-h: WCM-13-101 x-drupal-cache: HIT content-encoding: gzip content-length: 23906 cache-control: private, no-cache, must-revalidate expires: Tue, 07 Oct 2025 00:18:02 GMT date: Tue, 07 Oct 2025 00:18:02 GMT vary: Accept-Encoding strict-transport-security: max-age=31536000 ; includeSubDomains Known Exploited Vulnerabilities Catalog | CISA
Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NOTICE: Due to the lapse in federal funding, this website will not be actively managed. 


Free Cyber ServicesCybersecurity Awareness MonthSecure by design Shields UpReport A Cyber Issue 

Cybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and ResilienceCybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and Resilience
CISA Logo

Search

 

America's Cyber Defense Agency
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help LocallyFaith-Based CommunityExecutivesHigh-Risk Communities
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
    CISA Conferences
    CISA Live!
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
  • About
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Site Links
    CISA GitHub
    CISA Central
    Contact Us
    Subscribe
    Transparency and Accountability
    Policies & Plans

NOTICE: Due to the lapse in federal funding, this website will not be actively managed. 


Free Cyber ServicesCybersecurity Awareness MonthSecure by design Shields UpReport A Cyber Issue 

Breadcrumb
  1. Home
  2. Known Exploited Vulnerabilities Catalog
Share:

Filters

  • Accellion
  • Qlik
  • CrushFTP
  • Craft CMS
  • TeleMessage
  • ConnectWise
  • OSGeo
  • ServiceNow
  • Dahua
  • PTZOptics
  • CyberPersons
  • Cleo
  • Reolink
  • NUUO
  • BeyondTrust
  • Paessler
  • Hitachi Vantara
  • Advantive
  • Commvault
  • GeoVision
  • ASUS
  • N-able
  • Unitronics
  • FXC
  • Spreadsheet::ParseExcel
  • Joomla!
  • Sunhillo
  • Nice
  • NextGen Healthcare
  • Justice AV Solutions
  • Check Point
  • PHP Group
  • Twilio
  • Acronis
  • Versa
  • Kingsoft
  • ScienceLogic
  • Nostromo
  • Metabase
  • Array Networks
  • North Grid
  • ProjectSend
  • Acclaim Systems
  • JQuery
  • Audinate
  • 7-Zip
  • Trimble
  • SimpleHelp
  • tj-actions
  • NAKIVO
  • Edimax
  • reviewdog
  • Gladinet
  • Broadcom
  • Qualitia
  • Yiiframework
  • Langflow
  • FreeType
  • ZKTeco
  • Srimax
  • MDaemon
  • Erlang
  • Wazuh
  • AMI
  • Looking Glass
  • Wing FTP Server
  • Git
  • Sangoma
  • Dassault Systèmes
  • Libraesva
  • Adminer
  • Smartbedded
  • ownCloud
  • Adobe
  • Alcatel
  • Amcrest
  • Android
  • Apache
  • Apple
  • Arcadyan
  • Arcserve
  • Arm
  • Artifex
  • Atlassian
  • Aviatrix
  • Barracuda Networks
  • BQE
  • Cacti
  • ChakraCore
  • Checkbox
  • Cisco
  • Citrix
  • Code Aurora
  • Crestron
  • CWP
  • D-Link
  • D-Link and TRENDnet
  • Dasan
  • Dell
  • Delta Electronics
  • Docker
  • dotCMS
  • DotNetNuke (DNN)
  • DrayTek
  • Drupal
  • Elastic
  • Embedthis
  • Exim
  • EyesOfNetwork
  • F5
  • FatPipe
  • ForgeRock
  • Fortinet
  • Fortra
  • Fuel CMS
  • GIGABYTE
  • GitLab
  • GNU
  • Google
  • Grafana Labs
  • Grandstream
  • Hewlett Packard (HP)
  • Hikvision
  • IBM
  • IETF
  • Ignite Realtime
  • ImageMagick
  • InduSoft
  • Intel
  • Ivanti
  • Jenkins
  • JetBrains
  • Juniper
  • Kaseya
  • Kentico
  • Laravel
  • LG
  • Liferay
  • Linux
  • McAfee
  • MediaTek
  • Meta Platforms
  • Micro Focus
  • Microsoft
  • MikroTik
  • MinIO
  • Mitel
  • MongoDB
  • Mozilla
  • Nagios
  • NETGEAR
  • Netis
  • Netwrix
  • Novi Survey
  • Npm package
  • October CMS
  • OpenBSD
  • OpenSSL
  • Oracle
  • Palo Alto Networks
  • PaperCut
  • PEAR
  • Perl
  • PHP
  • phpMyAdmin
  • PHPUnit
  • Pi-hole
  • PlaySMS
  • Plex
  • Primetek
  • Progress
  • Pulse Secure
  • QNAP
  • QNAP Systems
  • Qualcomm
  • Quest
  • Rails
  • RARLAB
  • rConfig
  • Realtek
  • Red Hat
  • Redis
  • Rejetto
  • Roundcube
  • Ruckus Wireless
  • SaltStack
  • Samba
  • Samsung
  • SAP
  • Schneider Electric
  • Siemens
  • SIMalliance
  • Sitecore
  • SolarView
  • SolarWinds
  • Sonatype
  • SonicWall
  • Sophos
  • Sudo
  • SugarCRM
  • Sumavision
  • Symantec
  • Synacor
  • SysAid
  • TeamViewer
  • Teclib
  • Telerik
  • Tenda
  • TerraMaster
  • ThinkPHP
  • TIBCO
  • TP-Link
  • Treck TCP/IP stack
  • Trend Micro
  • Trihedral
  • TVT
  • Ubiquiti
  • Unraid
  • vBulletin
  • Veeam
  • Veritas
  • VMware
  • VMware Tanzu
  • WatchGuard
  • WebKitGTK
  • Webmin
  • WebRTC
  • WordPress
  • WSO2
  • XStream
  • Yealink
  • Zabbix
  • ZK Framework
  • Zoho
  • Zyxel
No result
Reset

Known Exploited Vulnerabilities Catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.

How to use the KEV Catalog

The KEV catalog is also available in these formats:

CSV
JSON
JSON Schema (updated 06-25-2024)
Print View
License


Showing 1 - 20 of 1434
Oracle | E-Business Suite

CVE-2025-61882

Oracle E-Business Suite Unspecified Vulnerability: Oracle E-Business Suite contains an unspecified vulnerability in the BI Publisher Integration component. The vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks can result in takeover of Oracle Concurrent Processing.

Known To Be Used in Ransomware Campaigns? Known

Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
  • Date Added: 2025-10-06
  • Due Date: 2025-10-27
Additional Notes
https://www.oracle.com/security-alerts/alert-cve-2025-61882.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-61882
Mozilla | Multiple Products

CVE-2010-3765

Mozilla Multiple Products Remote Code Execution Vulnerability: Mozilla Firefox, SeaMonkey, and Thunderbird contain an unspecified vulnerability when JavaScript is enabled. This allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
  • Date Added: 2025-10-06
  • Due Date: 2025-10-27
Additional Notes
https://www.mozilla.org/en-US/security/advisories/mfsa2010-73 ; https://nvd.nist.gov/vuln/detail/CVE-2010-3765
Microsoft | Windows

CVE-2011-3402

Microsoft Windows Remote Code Execution Vulnerability: Microsoft Windows Kernel contains an unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers that allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
  • Date Added: 2025-10-06
  • Due Date: 2025-10-27
Additional Notes
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-087 ; https://nvd.nist.gov/vuln/detail/CVE-2011-3402
Microsoft | Windows

CVE-2013-3918

Microsoft Windows Out-of-Bounds Write Vulnerability: Microsoft Windows contains a n out-of-bounds write vulnerability in the InformationCardSigninHelper Class ActiveX control, icardie.dll. An attacker could exploit the vulnerability by constructing a specially crafted webpage. When a user views the webpage, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
  • Date Added: 2025-10-06
  • Due Date: 2025-10-27
Additional Notes
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-090 ; https://nvd.nist.gov/vuln/detail/CVE-2013-3918
Microsoft | Windows

CVE-2021-43226

Microsoft Windows Privilege Escalation Vulnerability: Microsoft Windows Common Log File System Driver contains a privilege escalation vulnerability that could allow a local, privileged attacker to bypass certain security mechanisms.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
  • Date Added: 2025-10-06
  • Due Date: 2025-10-27
Additional Notes
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-43226 ; https://nvd.nist.gov/vuln/detail/CVE-2021-43226
Microsoft | Internet Explorer

CVE-2010-3962

Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability: Microsoft Internet Explorer contains an uninitialized memory corruption vulnerability that could allow for remote code execution. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
  • Date Added: 2025-10-06
  • Due Date: 2025-10-27
Additional Notes
https://learn.microsoft.com/en-us/security-updates/SecurityAdvisories/2010/2458511?redirectedfrom=MSDN ; https://nvd.nist.gov/vuln/detail/CVE-2010-3962
Linux | Kernel

CVE-2021-22555

Linux Kernel Heap Out-of-Bounds Write Vulnerability: Linux Kernel contains a heap out-of-bounds write vulnerability that could allow an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space.

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
  • Date Added: 2025-10-06
  • Due Date: 2025-10-27
Additional Notes
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21 ; https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d ; https://security.netapp.com/advisory/ntap-20210805-0010/ ; https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528 ; https://nvd.nist.gov/vuln/detail/CVE-2021-22555
Smartbedded | Meteobridge

CVE-2025-4008

Smartbedded Meteobridge Command Injection Vulnerability: Smartbedded Meteobridge contains a command injection vulnerability that could allow remote unauthenticated attackers to gain arbitrary command execution with elevated privileges (root) on affected devices.

Related CWEs: CWE-306| CWE-77

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
  • Date Added: 2025-10-02
  • Due Date: 2025-10-23
Additional Notes
https://forum.meteohub.de/viewtopic.php?t=18687 ; https://nvd.nist.gov/vuln/detail/CVE-2025-4008
Samsung | Mobile Devices

CVE-2025-21043

Samsung Mobile Devices Out-of-Bounds Write Vulnerability: Samsung mobile devices contain an out-of-bounds write vulnerability in libimagecodec.quram.so which allows remote attackers to execute arbitrary code.

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
  • Date Added: 2025-10-02
  • Due Date: 2025-10-23
Additional Notes
https://security.samsungmobile.com/securityUpdate.smsb?year=2025&month=09 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21043
Juniper | ScreenOS

CVE-2015-7755

Juniper ScreenOS Improper Authentication Vulnerability: Juniper ScreenOS contains an improper authentication vulnerability that could allow unauthorized remote administrative access to the device.

Related CWE: CWE-287

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
  • Date Added: 2025-10-02
  • Due Date: 2025-10-23
Additional Notes
https://supportportal.juniper.net/s/article/2015-12-Out-of-Cycle-Security-Bulletin-ScreenOS-Multiple-Security-issues-with-ScreenOS-CVE-2015-7755-CVE-2015-7756 ; https://nvd.nist.gov/vuln/detail/CVE-2015-7755
Jenkins | Jenkins

CVE-2017-1000353

Jenkins Remote Code Execution Vulnerability: Jenkins contains a remote code execution vulnerability. This vulnerability that could allowed attackers to transfer a serialized Java SignedObject object to the remoting-based Jenkins CLI, that would be deserialized using a new ObjectInputStream, bypassing the existing blocklist-based protection mechanism.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
  • Date Added: 2025-10-02
  • Due Date: 2025-10-23
Additional Notes
https://www.jenkins.io/security/advisory/2017-04-26/ ; https://nvd.nist.gov/vuln/detail/CVE-2017-1000353
GNU | GNU Bash

CVE-2014-6278

GNU Bash OS Command Injection Vulnerability: GNU Bash contains an OS command injection vulnerability which allows remote attackers to execute arbitrary commands via a crafted environment.

Related CWE: CWE-78

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
  • Date Added: 2025-10-02
  • Due Date: 2025-10-23
Additional Notes
This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027 ; https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/23467 ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash ; https://www.ibm.com/support/pages/security-bulletin-update-vulnerabilities-bash-affect-aix-toolbox-linux-applications-cve-2014-6271-cve-2014-6277-cve-2014-6278-cve-2014-7169-cve-2014-7186-and-cve-2014-7187 ; https://nvd.nist.gov/vuln/detail/CVE-2014-6278
Adminer | Adminer

CVE-2021-21311

Adminer Server-Side Request Forgery Vulnerability: Adminer contains a server-side request forgery vulnerability that, when exploited, allows a remote attacker to obtain potentially sensitive information.

Related CWE: CWE-918

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
  • Date Added: 2025-09-29
  • Due Date: 2025-10-20
Additional Notes
https://github.com/vrana/adminer/security/advisories/GHSA-x5r2-hj5c-8jx6 ; https://nvd.nist.gov/vuln/detail/CVE-2021-21311
Cisco | IOS and IOS XE

CVE-2025-20352

Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability: Cisco IOS and IOS XE contains a stack-based buffer overflow vulnerability in the Simple Network Management Protocol (SNMP) subsystem that could allow for denial of service or remote code execution. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system.

Related CWE: CWE-121

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
  • Date Added: 2025-09-29
  • Due Date: 2025-10-20
Additional Notes
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte ; https://nvd.nist.gov/vuln/detail/CVE-2025-20352
Fortra | GoAnywhere MFT

CVE-2025-10035

Fortra GoAnywhere MFT Deserialization of Untrusted Data Vulnerability: Fortra GoAnywhere MFT contains a deserialization of untrusted data vulnerability allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.

Related CWEs: CWE-502| CWE-77

Known To Be Used in Ransomware Campaigns? Known

Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
  • Date Added: 2025-09-29
  • Due Date: 2025-10-20
Additional Notes
https://www.fortra.com/security/advisories/product-security/fi-2025-012 ; https://nvd.nist.gov/vuln/detail/CVE-2025-10035
Libraesva | Email Security Gateway

CVE-2025-59689

Libraesva Email Security Gateway Command Injection Vulnerability: Libraesva Email Security Gateway (ESG) contains a command injection vulnerability which allows command injection via a compressed e-mail attachment.

Related CWE: CWE-77

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
  • Date Added: 2025-09-29
  • Due Date: 2025-10-20
Additional Notes
https://docs.libraesva.com/knowledgebase/security-advisory-command-injection-vulnerability-cve-2025-59689/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-59689
Sudo | Sudo

CVE-2025-32463

Sudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability: Sudo contains an inclusion of functionality from untrusted control sphere vulnerability. This vulnerability could allow local attacker to leverage sudo’s -R (--chroot) option to run arbitrary commands as root, even if they are not listed in the sudoers file.

Related CWE: CWE-829

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
  • Date Added: 2025-09-29
  • Due Date: 2025-10-20
Additional Notes
This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://www.sudo.ws/security/advisories/chroot_bug/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-32463
Cisco | Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense

CVE-2025-20333

Cisco Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) Buffer Overflow Vulnerability: Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Software VPN Web Server contain a buffer overflow vulnerability that allows for remote code execution. This vulnerability could be chained with CVE-2025-20362.

Related CWE: CWE-120

Known To Be Used in Ransomware Campaigns? Unknown

Action: The KEV due date refers to the deadline by which FCEB agencies are expected to review and begin implementing the guidance outlined in Emergency Directive (ED) 25-03 (URL listed below in Notes). Agencies must follow the mitigation steps provided by CISA (URL listed below in Notes) and vendor’s instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
  • Date Added: 2025-09-25
  • Due Date: 2025-09-26
Additional Notes
CISA Mitigation Instructions: https://www.cisa.gov/news-events/directives/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices ; https://www.cisa.gov/news-events/directives/supplemental-direction-ed-25-03-core-dump-and-hunt-instructions ; https://www.cisa.gov/eviction-strategies-tool/create-from-template ; https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks ; https://sec.cloudapps.cisco.com/security/center/private/resources/asa_ftd_continued_attacks#Details ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-z5xP8EUB ; https://nvd.nist.gov/vuln/detail/CVE-2025-20333
Cisco | Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense

CVE-2025-20362

Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Missing Authorization Vulnerability: Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Software VPN Web Server contain a missing authorization vulnerability. This vulnerability could be chained with CVE-2025-20333.

Related CWE: CWE-862

Known To Be Used in Ransomware Campaigns? Unknown

Action: The KEV due date refers to the deadline by which FCEB agencies are expected to review and begin implementing the guidance outlined in Emergency Directive (ED) 25-03 (URL listed below in Notes). Agencies must follow the mitigation steps provided by CISA (URL listed below in Notes) and vendor’s instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
  • Date Added: 2025-09-25
  • Due Date: 2025-09-26
Additional Notes
CISA Mitigation Instructions: https://www.cisa.gov/news-events/directives/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices ; https://www.cisa.gov/news-events/directives/supplemental-direction-ed-25-03-core-dump-and-hunt-instructions ; https://www.cisa.gov/eviction-strategies-tool/create-from-template ; https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks ; https://sec.cloudapps.cisco.com/security/center/private/resources/asa_ftd_continued_attacks#Details ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-YROOTUW ; https://nvd.nist.gov/vuln/detail/CVE-2025-20362
Google | Chromium V8

CVE-2025-10585

Google Chromium V8 Type Confusion Vulnerability: Google Chromium contains a type confusion vulnerability in the V8 JavaScript and WebAssembly engine.

Related CWE: CWE-843

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
  • Date Added: 2025-09-23
  • Due Date: 2025-10-14
Additional Notes
https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_17.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-10585
  • Currently on page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • …
  • Go to next pageNext
  • Go to last pageLast

Subscribe to the KEV Catalog Updates

Stay up to date on the latest known exploited vulnerabilities.

Subscribe Now
Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • X
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 1-844-Say-CISA contact@cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • Subscribe
  • The White House
  • USA.gov
  • Website Feedback
  • HOME
  • ABOUT
  • AUCTIONS
  • SHIPPING
  • FEES
  • TOOLS
  • HOW
  • FAQ
  • CONTACT
 
Original Source | Taken Source