SonicWall Issues Patch for Exploit Chain in SMA Devices

SonicWall Issues Patch for Exploit Chain in SMA Devices Source: Sundry Photography via Alamy Stock PhotoSonicWall has fixed three high-severity vulnerabilities affecting its unified secure access gateway devices, one of which has already been exploited in … Read more Published Date: May 08, 2025 (2 hours, 21 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-32821 […]

CVE-2025-27695 – Dell Wyse Management Suite Authentication Bypass

The following table lists the changes that have been made to the CVE-2025-27695 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]

CVE-2025-0505 – “Arista CloudVision Zero Touch Provisioning Privilege Escalation”

The following table lists the changes that have been made to the CVE-2025-0505 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]

CVE-2024-8100 – Arista CloudVision Portal – Token Privilege Escalation

The following table lists the changes that have been made to the CVE-2024-8100 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]

CVE-2024-12378 – Arista EOS Unencrypted VxLAN Tunnel Exposure

The following table lists the changes that have been made to the CVE-2024-12378 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]

CVE-2024-11186 – Arista CloudVision Portal Elevated Privilege Access Vulnerability

The following table lists the changes that have been made to the CVE-2024-11186 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]

CVE-2025-4098 – Horner Automation Cscape Out-of-Bounds Read Vulnerability

The following table lists the changes that have been made to the CVE-2025-4098 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]

CVE-2025-30102 – Dell PowerScale OneFS Out-of-Bounds Write Vulnerability

The following table lists the changes that have been made to the CVE-2025-30102 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]

CVE-2025-30101 – Dell PowerScale OneFS TOCTOU Race Condition Vulnerability

The following table lists the changes that have been made to the CVE-2025-30101 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]

CVE-2025-1948 – Jetty HTTP/2 Buffer Overflow

The following table lists the changes that have been made to the CVE-2025-1948 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]