{"vulnerability": "CVE-2025-2248", "sightings": [{"uuid": "85f9fc34-ba04-4f75-bc3f-7a6056e8c27e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22480", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113997461595813223", "content": "", "creation_timestamp": "2025-02-13T16:13:40.632183Z"}, {"uuid": "78b84a4f-fce3-47cc-bd04-4a63dcf89788", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22480", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li33lnqvjy2h", "content": "", "creation_timestamp": "2025-02-13T16:17:00.448996Z"}, {"uuid": "4cd3ec33-d508-4f39-90fb-353e62176e0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2248", "type": "seen", "source": "https://bsky.app/profile/thewhynet.bsky.social/post/3lntrgsnq6x2h", "content": "", "creation_timestamp": "2025-04-28T02:57:52.238852Z"}, {"uuid": "1e529ebb-8f21-4e03-a5f1-7abb536799dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22480", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4290", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22480\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-13T16:16:48.777\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000275712/dsa-2025-051", "creation_timestamp": "2025-02-13T17:15:29.000000Z"}, {"uuid": "5ba28786-0958-4466-8520-43e5d44ef0a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22481", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18044", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22481\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.4.3079 build 20250321 and later\nQuTS hero h5.2.4.3079 build 20250321 and later\n\ud83d\udccf Published: 2025-06-06T15:53:18.696Z\n\ud83d\udccf Modified: 2025-06-11T04:01:33.821Z\n\ud83d\udd17 References:\n1. https://www.qnap.com/en/security-advisory/qsa-25-12", "creation_timestamp": "2025-06-11T04:33:09.000000Z"}, {"uuid": "10dcad7d-51e8-46ac-89f7-38a302548bc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2248", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16753", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2248\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WP-PManager WordPress plugin through 1.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks\n\ud83d\udccf Published: 2025-05-15T20:07:27.813Z\n\ud83d\udccf Modified: 2025-05-16T20:22:26.373Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/b470a277-f5ad-49ff-97dd-4d3ee0269e5a/", "creation_timestamp": "2025-05-16T20:34:57.000000Z"}, {"uuid": "61bfdd59-23c6-4b7a-8667-1120602459b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22480", "type": "seen", "source": "https://t.me/cvedetector/18035", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22480 - Dell SupportAssist Symbolic Link Attack Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22480 \nPublished : Feb. 13, 2025, 4:16 p.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : Dell SupportAssist OS Recovery versions prior to 5.5.13.1 contain a symbolic link attack vulnerability. A low-privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary file deletion and Elevation of Privileges. \nSeverity: 7.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-13T18:50:44.000000Z"}]}