By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation
Computing

CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation

News Room
Last updated: 2025/07/08 at 1:19 AM
News Room Published 8 July 2025
Share
SHARE

Jul 08, 2025Ravie LakshmananCyber Attacks / Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.

The list of flaws is as follows –

  • CVE-2014-3931 (CVSS score: 9.8) – A buffer overflow vulnerability in Multi-Router Looking Glass (MRLG) that could allow remote attackers to cause an arbitrary memory write and memory corruption
  • CVE-2016-10033 (CVSS score: 9.8) – A command injection vulnerability in PHPMailer that could allow an attacker to execute arbitrary code within the context of the application or result in a denial-of-service (DoS) condition
  • CVE-2019-5418 (CVSS score: 7.5) – A path traversal vulnerability in Ruby on Rails’ Action View that could cause contents of arbitrary files on the target system’s file system to be exposed
  • CVE-2019-9621 (CVSS score: 7.5) – A Server-Side Request Forgery (SSRF) vulnerability in the Zimbra Collaboration Suite that could result in unauthorized access to internal resources and remote code execution

There are currently no public reports on how the first three vulnerabilities are being exploited in real-world attacks. The abuse of CVE-2019-9621, on the other hand, was attributed by Trend Micro to a China-linked threat actor known as Earth Lusca in September 2023 to drop web shells and Cobalt Strike.

Cybersecurity

In light of active exploitation, Federal Civilian Executive Branch (FCEB) agencies are recommended to apply the necessary updates by July 28, 2025, to secure their networks.

Technical Details of Citrix Bleed 2 Out

The development comes as watchTowr Labs and Horizon3.ai have released technical analyses for a critical security flaw in Citrix NetScaler ADC (CVE-2025-5777 aka Citrix Bleed 2), which is assessed to have come under active exploitation.

“We’re seeing active exploitation of both CVE-2025-5777 and CVE-2025-6543 in the wild,” watchTowr CEO Benjamin Harris told The Hacker News. “This vulnerability allows reading of memory, which we believe attackers are using to read sensitive information (for example, information sent within HTTP requests that are then processed in-memory), credentials, valid Citrix session tokens, and more.”

The findings show that it’s possible to send a login request to the “/p/u/doAuthentication.do” endpoint and cause it (and other endpoints susceptible to the flaw) to reflect the user-supplied login value in the response, regardless of success or failure.

Horizon3.ai noted that the vulnerability could be used to leak approximately 127 bytes of data via a specially crafted HTTP request with a modified “login=” without an equal sign or value, thereby making it possible to extract session tokens or other sensitive information.

The shortcoming, watchTowr explained, stems from the use of the snprintf function along with a format string containing the “%.*s” format.

“The %.*s format tells snprintf: ‘Print up to N characters, or stop at the first null byte (\0) – whichever comes first.’ That null byte eventually appears somewhere in memory, so while the leak doesn’t run indefinitely, you still get a handful of bytes with each invocation,” the company said.

“So, every time you hit that endpoint without the =, you pull more uninitialized stack data into the response. Repeat it enough times, and eventually, you might land on something valuable.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article AirPods 4 vs. Airpods Pro 2: Which Prime Day deal should you buy?
Next Article Amazon and Walmart are amazingly selling Apple's AirPods Pro 2 at a lower-than-ever price
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Anthropic reportedly cut OpenAI access to Claude
News
Ninntedo Switch 2 heat warning issued — don’t play above this temperature
News
Every Airline That Supports AirTag’s Share Item Location Feature – BGR
News
I took Proton’s privacy-first chatbot for a spin and it failed to impress
News

You Might also Like

Computing

GNOME Mutter 49 Beta Released With Pointer Warp Protocol, Wayland Fixes

1 Min Read
Computing

13 Best Coda Alternatives to Build Smarter Docs in 2025

44 Min Read
Computing

Reproducible Go Toolchains: What You Need to Know | HackerNoon

38 Min Read
Computing

Europe’s Data Vision: Dataspaces for Zero-Trust AI Infrastructure | HackerNoon

11 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?