Skip to content
  Saturday 24 May 2025
Trending
November 28, 2024URGENT: 25+ Flaws Found in Advantech Wi-Fi Access Points – Update Now! July 31, 2024Principal, Cybersecurity Strategy October 13, 2024Cybersecurity Specialist November 9, 2023SLP Vulnerability, with High Severity, Currently Being Actively Exploited July 30, 2024Account Executive – Secureworks Cybersecurity Sales – US Remote Philadelphia July 27, 2024Senior Cybersecurity SME July 26, 2024Cybersecurity Engineer -L2 December 7, 2024<h3>Cybersecurity Giants: 2025 Outlook Revealed</h3> July 18, 2024EPASS GBG.027.031 Cybersecurity, Journeyman April 14, 2025Unleashing Chaos: Windows 0-Day, VPN Exploits, Weaponized AI, Hijacked Antivirus and Beyond
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Threat Advisories  CISA Adds One Known Exploited Vulnerability to Catalog
Threat Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

Mister CybersecurityMister Cybersecurity—April 3, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail


More stories

Johnson Controls exacqVision Web Service

August 2, 2024

CISA, NSA, FBI, and International Partners Release Joint CSA on Top Routinely Exploited Vulnerabilities of 2022 

August 3, 2023

Siemens Teamcenter Visualization | CISA

May 15, 2025

Microsoft Releases April 2024 Security Updates 

April 9, 2024

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog based on evidence of active exploitation.

  • CVE-2022-27926 Zimbra Collaboration (ZCS) Cross-Site Scripting (XSS) Vulnerability

These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Note: To view other newly added vulnerabilities in the catalog, click on the arrow in the “Date Added to Catalog” column—which will sort by descending dates.

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

Please share your thoughts. We recently updated our anonymous Product Feedback Survey and we’d welcome your feedback.



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

CISA Adds Ten Known Exploited Vulnerabilities to Catalog
Cybersecurity Update April 4th 2023: Breaches, Remote Work Risks, and Malware Attacks
Related posts
  • Related posts
  • More from author
Threat Advisories

Advisory Update on Cyber Threat Activity Targeting Commvault’s SaaS Cloud Application (Metallic)

May 22, 20250
Threat Advisories

Lantronix Device Installer | CISA

May 22, 20250
Threat Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

May 22, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Industry News

Rethinking Risk in the AI Era

May 24, 20250
Industry News

Hack on UK Legal Aid Agency Jeopardizes Legal Representation

May 23, 20250
Industry News

Global Darknet Bust: ‘Operation RapTor’ Strikes Criminal Networks

May 23, 20250
Industry News

Unmasking Threats: Exclusive Google Intelligence Webinar

May 23, 20250
Industry News

Cognyte Amplifies Threat Intelligence with $4M GroupSense Acquisition

May 23, 20250
Industry News

Hackers Spread Vidar and StealC Malware Through TikTok Videos Using ClickFix Technique

May 23, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Rethinking Risk in the AI Era

  • Hack on UK Legal Aid Agency Jeopardizes Legal Representation

  • Global Darknet Bust: ‘Operation RapTor’ Strikes Criminal Networks

  • Unmasking Threats: Exclusive Google Intelligence Webinar

  • Cognyte Amplifies Threat Intelligence with $4M GroupSense Acquisition

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures