{"vulnerability": "CVE-2025-2247", "sightings": [{"uuid": "9c1797a3-7b41-49f1-9889-1c2130d55498", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22475", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhd3r524672e", "content": "", "creation_timestamp": "2025-02-04T03:16:10.668209Z"}, {"uuid": "e50a300d-fc99-4947-9320-7e9b072ec70b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22475", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhdfoqp3k72e", "content": "", "creation_timestamp": "2025-02-04T06:13:48.383109Z"}, {"uuid": "bf14c9a8-28e4-4edb-992c-f550647d79a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22473", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkm5q6rd2426", "content": "", "creation_timestamp": "2025-03-17T22:00:59.303482Z"}, {"uuid": "c7776a6e-995a-453f-91c7-e0dc5cc590df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22474", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114179224013214264", "content": "", "creation_timestamp": "2025-03-17T18:38:15.410152Z"}, {"uuid": "de5b9b00-54e7-4117-82fd-b5c9fa708a56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22472", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114179224013214264", "content": "", "creation_timestamp": "2025-03-17T18:38:15.832647Z"}, {"uuid": "5a98a5b1-0df7-412c-b084-8feb7b5b8273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22473", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114179224013214264", "content": "", "creation_timestamp": "2025-03-17T18:38:15.761955Z"}, {"uuid": "7fe5c473-07e3-4e45-b26e-8c7dcac56216", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22476", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lojis6m67t2p", "content": "", "creation_timestamp": "2025-05-06T18:21:48.187535Z"}, {"uuid": "73a7301e-3c8c-4c1c-b69d-e279d8e3eb8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22472", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkm5q73emo2e", "content": "", "creation_timestamp": "2025-03-17T22:01:01.038219Z"}, {"uuid": "4f5093a6-b84c-440f-b2ef-d38dbf37cc29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22471", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114314020757340212", "content": "", "creation_timestamp": "2025-04-10T13:58:50.692829Z"}, {"uuid": "79fcef0d-117f-43de-93d7-520cd460cc17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22479", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lojis7kdma2h", "content": "", "creation_timestamp": "2025-05-06T18:21:53.753399Z"}, {"uuid": "06c14e51-4e4c-4f67-bf7a-622f98d7a353", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22472", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}, {"uuid": "0752e3b3-9884-4664-952b-f0fdc3518e0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22470", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lvqdwom26u2p", "content": "", "creation_timestamp": "2025-08-06T13:39:46.201757Z"}, {"uuid": "2fb8227e-eca0-4fdb-a58b-df1cb99627b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22473", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7809", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22473\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.\n\ud83d\udccf Published: 2025-03-17T17:42:17.025Z\n\ud83d\udccf Modified: 2025-03-17T17:42:17.025Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000289970/dsa-2025-070-security-update-for-dell-networking-os10-vulnerabilities\n2. https://www.dell.com/support/kbdoc/en-us/000293638/dsa-2025-069-security-update-for-dell-networking-os10-vulnerabilities\n3. https://www.dell.com/support/kbdoc/en-us/000295014/dsa-2025-068-security-update-for-dell-networking-os10-vulnerabilities\n4. https://www.dell.com/support/kbdoc/en-us/000294091/dsa-2025-079-security-update-for-dell-networking-os10-vulnerabilities", "creation_timestamp": "2025-03-17T18:24:58.000000Z"}, {"uuid": "0afaaf28-742b-4807-9066-f2250807ca36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2247", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m3dnrmh6vg2a", "content": "", "creation_timestamp": "2025-10-16T21:02:44.944165Z"}, {"uuid": "6f70d12b-40f7-45c3-8ac7-950c41d8dc62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22472", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:31.000000Z"}, {"uuid": "cbf48537-bb51-49d1-b2cd-5ba47c4c0436", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22472", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7827", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22472\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to execution of commands with elevated privileges.\n\ud83d\udccf Published: 2025-03-17T17:47:44.343Z\n\ud83d\udccf Modified: 2025-03-17T18:35:43.615Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000289970/dsa-2025-070-security-update-for-dell-networking-os10-vulnerabilities\n2. https://www.dell.com/support/kbdoc/en-us/000293638/dsa-2025-069-security-update-for-dell-networking-os10-vulnerabilities\n3. https://www.dell.com/support/kbdoc/en-us/000295014/dsa-2025-068-security-update-for-dell-networking-os10-vulnerabilities\n4. https://www.dell.com/support/kbdoc/en-us/000294091/dsa-2025-079-security-update-for-dell-networking-os10-vulnerabilities", "creation_timestamp": "2025-03-17T19:34:22.000000Z"}, {"uuid": "b9d1e75c-4b6e-4505-92c3-cc7298f0ee51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22474", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7845", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22474\n\ud83d\udd25 CVSS Score: 6.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) a Server-Side Request Forgery (SSRF) vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Server-side request forgery.\n\ud83d\udccf Published: 2025-03-17T17:03:21.258Z\n\ud83d\udccf Modified: 2025-03-17T18:56:16.544Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000289970/dsa-2025-070-security-update-for-dell-networking-os10-vulnerabilities\n2. https://www.dell.com/support/kbdoc/en-us/000293638/dsa-2025-069-security-update-for-dell-networking-os10-vulnerabilities\n3. https://www.dell.com/support/kbdoc/en-us/000295014/dsa-2025-068-security-update-for-dell-networking-os10-vulnerabilities\n4. https://www.dell.com/support/kbdoc/en-us/000294091/dsa-2025-079-security-update-for-dell-networking-os10-vulnerabilities", "creation_timestamp": "2025-03-17T19:47:59.000000Z"}, {"uuid": "b171f54d-3fe2-495b-a72f-afaa750a14d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22471", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11191", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22471\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.1, contains an integer overflow or wraparound vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to denial of service.\n\ud83d\udccf Published: 2025-04-10T02:16:44.715Z\n\ud83d\udccf Modified: 2025-04-10T02:16:44.715Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "creation_timestamp": "2025-04-10T02:49:25.000000Z"}, {"uuid": "d79b6675-eace-493c-a3b0-bdd93849465d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22477", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15151", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22477\n\ud83d\udd25 CVSS Score: 8.3 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L)\n\ud83d\udd39 Description: Dell Storage Center - Dell Storage Manager, version(s) 20.1.20, contain(s) an Improper Authentication vulnerability. An unauthenticated attacker with adjacent network access could potentially exploit this vulnerability, leading to Elevation of privileges.\n\ud83d\udccf Published: 2025-05-06T16:03:29.485Z\n\ud83d\udccf Modified: 2025-05-06T16:03:29.485Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000317318/dsa-2025-191-security-update-for-storage-center-dell-storage-manager-vulnerabilities", "creation_timestamp": "2025-05-06T16:21:51.000000Z"}, {"uuid": "cdeacb25-49d1-4758-9c5c-61087b848283", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22476", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15148", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22476\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)\n\ud83d\udd39 Description: Dell Storage Center - Dell Storage Manager, version(s) 20.1.20, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with adjacent network access could potentially exploit this vulnerability, leading to Remote execution.\n\ud83d\udccf Published: 2025-05-06T16:08:47.526Z\n\ud83d\udccf Modified: 2025-05-06T16:08:47.526Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000317318/dsa-2025-191-security-update-for-storage-center-dell-storage-manager-vulnerabilities", "creation_timestamp": "2025-05-06T16:21:48.000000Z"}, {"uuid": "2c04db25-9684-471d-aed4-50c4a15a3795", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2247", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16752", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2247\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WP-PManager WordPress plugin through 1.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack\n\ud83d\udccf Published: 2025-05-15T20:07:27.502Z\n\ud83d\udccf Modified: 2025-05-16T20:23:31.203Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/3974c5c3-887e-46bd-aad7-4f3169bff6de/", "creation_timestamp": "2025-05-16T20:34:56.000000Z"}, {"uuid": "c620a1fb-b53b-44fb-94d6-44aae5cb38a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22479", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15147", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22479\n\ud83d\udd25 CVSS Score: 3.5 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Dell Storage Center - Dell Storage Manager, version(s) 20.0.21, contain(s) an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability. An unauthenticated attacker with adjacent network access could potentially exploit this vulnerability, leading to Script injection.\n\ud83d\udccf Published: 2025-05-06T15:46:45.181Z\n\ud83d\udccf Modified: 2025-05-06T16:11:03.550Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000317318/dsa-2025-191-security-update-for-storage-center-dell-storage-manager-vulnerabilities", "creation_timestamp": "2025-05-06T16:21:44.000000Z"}, {"uuid": "36e04398-be03-4b46-9da4-84d8f5b64140", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22478", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15155", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22478\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Dell Storage Center - Dell Storage Manager, version(s) 20.1.20, contain(s) an Improper Restriction of XML External Entity Reference vulnerability. An unauthenticated attacker with adjacent network access could potentially exploit this vulnerability, leading to Information disclosure and Information tampering.\n\ud83d\udccf Published: 2025-05-06T15:55:03.918Z\n\ud83d\udccf Modified: 2025-05-06T15:55:03.918Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000317318/dsa-2025-191-security-update-for-storage-center-dell-storage-manager-vulnerabilities", "creation_timestamp": "2025-05-06T16:21:58.000000Z"}, {"uuid": "4b23da0c-26d0-4888-9dd3-ae0085c1370e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22471", "type": "seen", "source": "https://t.me/cvedetector/22617", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22471 - Dell PowerScale OneFS Integer Overflow Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-22471 \nPublished : April 10, 2025, 3:15 a.m. | 1\u00a0hour, 41\u00a0minutes ago \nDescription : Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.1, contains an integer overflow or wraparound vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to denial of service. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-10T06:59:48.000000Z"}, {"uuid": "f105f479-b27f-4c06-a4f8-5eb857598a41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22472", "type": "seen", "source": "https://t.me/cvedetector/20515", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22472 - Dell SmartFabric OS10 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22472 \nPublished : March 17, 2025, 6:15 p.m. | 1\u00a0hour, 49\u00a0minutes ago \nDescription : Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to execution of commands with elevated privileges. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-17T21:39:47.000000Z"}, {"uuid": "2dc71958-e2ca-45a4-9097-09692c840199", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22473", "type": "seen", "source": "https://t.me/cvedetector/20512", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22473 - Dell SmartFabric OS10 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22473 \nPublished : March 17, 2025, 6:15 p.m. | 1\u00a0hour, 49\u00a0minutes ago \nDescription : Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-17T21:39:42.000000Z"}, {"uuid": "61681075-a8f1-4b7f-882e-c2d1968da108", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22474", "type": "seen", "source": "https://t.me/cvedetector/20492", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22474 - \"Dell SmartFabric OS10 SSRF Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-22474 \nPublished : March 17, 2025, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) a Server-Side Request Forgery (SSRF) vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Server-side request forgery. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-17T19:08:42.000000Z"}, {"uuid": "6fa96473-3bb2-409c-b7b6-7edd82f9af9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22475", "type": "seen", "source": "https://t.me/cvedetector/17142", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22475 - Dell PowerProtect DD Cryptographic Primitive Information Tampering Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22475 \nPublished : Feb. 4, 2025, 3:15 a.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : Dell PowerProtect DD, versions prior to DDOS 8.3.0.0, 7.10.1.50, and 7.13.1.10 contains a use of a Cryptographic Primitive with a Risky Implementation vulnerability. A remote attacker could potentially exploit this vulnerability, leading to Information tampering. \nSeverity: 3.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-04T06:21:46.000000Z"}, {"uuid": "cd38ffc8-6c48-4e10-b58d-0fa2bfae8dfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22478", "type": "seen", "source": "Telegram/GauoNXPt9XP7CBkSjGkMsiaSDY8cQ_HafAnFJBcE1wEqMBM", "content": "", "creation_timestamp": "2025-05-06T18:30:31.000000Z"}, {"uuid": "af3f0360-b022-43a4-b5f0-cc7ab6bdb640", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22475", "type": "seen", "source": "Telegram/clryKv31ifmqM5bVYRo3IHPAOmBnN8Rbvpjb8LbH5-oylcF8", "content": "", "creation_timestamp": "2025-02-06T02:40:20.000000Z"}, {"uuid": "45409f55-7417-41e2-bc92-9b637c96fda5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22477", "type": "seen", "source": "Telegram/GauoNXPt9XP7CBkSjGkMsiaSDY8cQ_HafAnFJBcE1wEqMBM", "content": "", "creation_timestamp": "2025-05-06T18:30:31.000000Z"}, {"uuid": "63bce2f1-88d4-4314-9935-0252553b7f47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22473", "type": "seen", "source": "Telegram/r8ru_SAfyv0cYfCWQL2RY3M8WbLJE6isd6j6oFDTTV3tTy4", "content": "", "creation_timestamp": "2025-03-17T19:32:25.000000Z"}, {"uuid": "56c0b864-77d4-4bd5-bd3c-1cc4cad9154f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22472", "type": "seen", "source": "Telegram/r8ru_SAfyv0cYfCWQL2RY3M8WbLJE6isd6j6oFDTTV3tTy4", "content": "", "creation_timestamp": "2025-03-17T19:32:25.000000Z"}, {"uuid": "3321f11a-2bf4-43dd-810f-fdcdac340c56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22477", "type": "seen", "source": "https://t.me/cvedetector/24638", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22477 - Dell Storage Center Dell Storage Manager Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-22477 \nPublished : May 6, 2025, 4:15 p.m. | 1\u00a0hour, 50\u00a0minutes ago \nDescription : Dell Storage Center - Dell Storage Manager, version(s) 20.1.20, contain(s) an Improper Authentication vulnerability. An unauthenticated attacker with adjacent network access could potentially exploit this vulnerability, leading to Elevation of privileges. \nSeverity: 8.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T20:20:35.000000Z"}, {"uuid": "68300cbb-6d4b-4f9f-bba1-8c9d6f8c65a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22478", "type": "seen", "source": "https://t.me/cvedetector/24639", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22478 - Dell Storage Center - Dell Storage Manager XML External Entity Reference Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22478 \nPublished : May 6, 2025, 4:15 p.m. | 1\u00a0hour, 50\u00a0minutes ago \nDescription : Dell Storage Center - Dell Storage Manager, version(s) 20.1.20, contain(s) an Improper Restriction of XML External Entity Reference vulnerability. An unauthenticated attacker with adjacent network access could potentially exploit this vulnerability, leading to Information disclosure and Information tampering. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T20:20:35.000000Z"}, {"uuid": "6f4eabe3-3ec1-491a-a896-f9cdc74d3118", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22476", "type": "seen", "source": "https://t.me/cvedetector/24627", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22476 - Dell Storage Center Dell Storage Manager Command Injection\", \n  \"Content\": \"CVE ID : CVE-2025-22476 \nPublished : May 6, 2025, 5:15 p.m. | 50\u00a0minutes ago \nDescription : Dell Storage Center - Dell Storage Manager, version(s) 20.1.20, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with adjacent network access could potentially exploit this vulnerability, leading to Remote execution. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T20:20:18.000000Z"}]}