|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2026.03.20", |
4 | | - "dateReleased": "2026-03-20T15:03:55.6382Z", |
5 | | - "count": 1551, |
| 3 | + "catalogVersion": "2026.03.25", |
| 4 | + "dateReleased": "2026-03-25T16:56:27.6647Z", |
| 5 | + "count": 1552, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2026-33017", |
| 9 | + "vendorProject": "Langflow", |
| 10 | + "product": "Langflow", |
| 11 | + "vulnerabilityName": "Langflow Code Injection Vulnerability", |
| 12 | + "dateAdded": "2026-03-25", |
| 13 | + "shortDescription": "Langflow contains a code injection vulnerability that could allow building public flows without requiring authentication.", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2026-04-08", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "https:\/\/github.com\/langflow-ai\/langflow\/security\/advisories\/GHSA-vwmf-pq79-vjvx ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-33017", |
| 18 | + "cwes": [ |
| 19 | + "CWE-94", |
| 20 | + "CWE-95", |
| 21 | + "CWE-306" |
| 22 | + ] |
| 23 | + }, |
7 | 24 | { |
8 | 25 | "cveID": "CVE-2025-32432", |
9 | 26 | "vendorProject": "Craft CMS", |
|
164 | 181 | "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
165 | 182 | "dueDate": "2026-03-27", |
166 | 183 | "knownRansomwareCampaignUse": "Unknown", |
167 | | - "notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https:\/\/chromereleases.googleblog.com\/2026\/03\/stable-channel-update-for-desktop_12.html#:~:text=Google%20is%20aware ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-3909", |
| 184 | + "notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https:\/\/chromereleases.googleblog.com\/2026\/03\/stable-channel-update-for-desktop_13.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-3909", |
168 | 185 | "cwes": [ |
169 | 186 | "CWE-787" |
170 | 187 | ] |
|
0 commit comments