[Security Vulnerability Alert] CISA adds 5 known vulnerabilities that have been exploited by hackers to the KEV catalog (2025/07/07-2025/07/13)

 
2025/7/16 ~ 2026/1/16
View Count:42

Forwarded by Taiwan Computer Network Crisis and Coordination Center TWCERTCC-200-202507-00000010

[Content Description]
1.【CVE-2019-9621】Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery (SSRF) Vulnerability (CVSS v3.1: 7.5)
【Whether it is exploited by ransomware: unknown】 Synacor Zimbra Collaboration Suite has a server-side request forgery vulnerability implemented through the ProxyServlet component.
[Affected Platforms] Please refer to the official list of affected versions
https://blog.zimbra.com/2019/05/9826/

2. [CVE-2019-5418] Rails Ruby on Rails Path Traversal Vulnerability (CVSS v3.1: 7.5)
[Whether it is exploited by ransomware: unknown] Rails Ruby on Rails has a path vulnerability in Action View. Combined with a specially crafted Accept header and a call to render file:, the contents of any file on the target server may be leaked.
[Affected Platforms] Please refer to the official list of affected versions
https://web.archive.org/web/20190313201629/https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/

3. [CVE-2016-10033] PHPMailer Command Injection Vulnerability (CVSS v3.1: 9.8)
[Whether it is exploited by ransomware: unknown] PHPMailer has a command injection vulnerability due to failure to properly handle user-supplied input. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application. If the attack attempt fails, it will result in a denial of service.
[Affected Platforms] Please refer to the official list of affected versions
https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities

4. [CVE-2014-3931] Multi-Router Looking Glass (MRLG) Buffer Overflow Vulnerability (CVSS v3.1: 9.8)
[Whether it is exploited by ransomware: unknown] Multi-Router Looking Glass has a buffer overflow vulnerability, which can be exploited by remote attackers to cause arbitrary memory writes and memory corruption.
[Affected Platforms] Please refer to the official list of affected versions
https://mrlg.op-sec.us/

5. [CVE-2025-5777] Citrix NetScaler ADC and Gateway Out-of-Bounds Read Vulnerability (CVSS v3.1: 7.5)
[Whether it is exploited by ransomware: unknown] Citrix NetScaler ADC and Gateway have an out-of-bounds read vulnerability caused by insufficient input validation. When NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server, this vulnerability may cause memory over-read.
[Affected Platforms] Please refer to the official affected versions
https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420

[Affected Platforms]
For details, please refer to the affected platforms in the content description column

[Recommended Measures]
1. [CVE-2019-9621] The official has released a fix for the vulnerability, please update to the relevant version
https://blog.zimbra.com/2019/05/9826/

2. [CVE-2019-5418] The official has released a fix for the vulnerability, please update to the relevant version https://web.archive.org/web/20190313201629/https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/

3.【CVE-2016-10033】 The official has released a fix for the vulnerability, please update to the relevant version
https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities

4.【CVE-2014-3931】 The official has released a fix for the vulnerability, please update to the relevant version
https://mrlg.op-sec.us/

5.【CVE-2025-5777】 The official has released a fix for the vulnerability, please update to the relevant version
https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420

Files
None
Top↑