CVE-2025-22474 – “Dell SmartFabric OS10 SSRF Vulnerability”
Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) a Server-Side Request Forgery (SSRF) vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Server-side request forgery.
CVE-2024-48830 – Dell SmartFabric OS10 Command Injection Vulnerability
Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Improper Neutralization of Special Elements used in a Command (‘Command Injection’) vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution.
CVE-2024-48013 – Dell SmartFabric OS10 Execution with Unnecessary Privileges Vulnerability
Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Execution with Unnecessary Privileges vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.
CVE-2025-30143 – Akamai App & API Protector JavaScript Variable Assignment Vulnerability
The following table lists the changes that have been made to the CVE-2025-30143 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 17, 2025 Action […]
CVE-2025-2384 – Real Estate Property Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-2384 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 17, 2025 Action […]
CVE-2025-2383 – PHPGurukul Doctor Appointment Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-2383 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 17, 2025 Action […]
CVE-2025-2382 – PHPGurukul Online Banquet Booking System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-2382 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 17, 2025 Action […]
CVE-2025-2381 – PHPGurukul Curfew e-Pass Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-2381 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 17, 2025 Action […]
CVE-2025-27512 – Fedora CoreOS Zincati Polkit Privilege Escalation
Zincati is an auto-update agent for Fedora CoreOS hosts. Zincati ships a polkit rule which allows the `zincati` system user to use the actions `org.projectatomic.rpmostree1.deploy` to deploy updates to the system and `org.projectatomic.rpmostree1.finalize-deployment` to reboot the system into the deployed update. Since Zincati v0.0.24, this polkit rule contains a logic error which broadens access of […]
CVE-2025-26127 – FileCloud Stored XSS
The following table lists the changes that have been made to the CVE-2025-26127 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 17, 2025 Action […]