SonicWall Issues Patch for Exploit Chain in SMA Devices
SonicWall Issues Patch for Exploit Chain in SMA Devices Source: Sundry Photography via Alamy Stock PhotoSonicWall has fixed three high-severity vulnerabilities affecting its unified secure access gateway devices, one of which has already been exploited in … Read more Published Date: May 08, 2025 (2 hours, 21 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-32821 […]
CVE-2025-27695 – Dell Wyse Management Suite Authentication Bypass
The following table lists the changes that have been made to the CVE-2025-27695 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]
CVE-2025-0505 – “Arista CloudVision Zero Touch Provisioning Privilege Escalation”
The following table lists the changes that have been made to the CVE-2025-0505 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]
CVE-2024-8100 – Arista CloudVision Portal – Token Privilege Escalation
The following table lists the changes that have been made to the CVE-2024-8100 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]
CVE-2024-12378 – Arista EOS Unencrypted VxLAN Tunnel Exposure
The following table lists the changes that have been made to the CVE-2024-12378 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]
CVE-2024-11186 – Arista CloudVision Portal Elevated Privilege Access Vulnerability
The following table lists the changes that have been made to the CVE-2024-11186 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]
CVE-2025-4098 – Horner Automation Cscape Out-of-Bounds Read Vulnerability
The following table lists the changes that have been made to the CVE-2025-4098 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]
CVE-2025-30102 – Dell PowerScale OneFS Out-of-Bounds Write Vulnerability
The following table lists the changes that have been made to the CVE-2025-30102 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]
CVE-2025-30101 – Dell PowerScale OneFS TOCTOU Race Condition Vulnerability
The following table lists the changes that have been made to the CVE-2025-30101 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]
CVE-2025-1948 – Jetty HTTP/2 Buffer Overflow
The following table lists the changes that have been made to the CVE-2025-1948 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 08, 2025 Action […]