{"vulnerability": "CVE-2025-2998", "sightings": [{"uuid": "d4975f32-5c3f-42f7-ae65-0bd3cc874edf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29981", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llsfiztwn42m", "content": "", "creation_timestamp": "2025-04-02T03:01:23.949579Z"}, {"uuid": "3cd20fef-f4ed-498a-9b13-c8caca687d41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29980", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lktozk2zlx2h", "content": "", "creation_timestamp": "2025-03-20T21:59:06.175440Z"}, {"uuid": "6848b70a-7792-4503-b6fd-a66023cadfe9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29980", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114196651102766521", "content": "", "creation_timestamp": "2025-03-20T20:30:11.297132Z"}, {"uuid": "7f6bf373-b293-4c16-87c5-84e1d95d025e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29980", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lktkmq635l24", "content": "", "creation_timestamp": "2025-03-20T20:40:19.599207Z"}, {"uuid": "72206303-b2fe-4b9a-82d7-c407720efa36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29980", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkv2o5utvi23", "content": "", "creation_timestamp": "2025-03-21T11:00:09.408632Z"}, {"uuid": "292f7bb9-90c7-4348-aaab-d99ce2cf7d1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29980", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114196722769530679", "content": "", "creation_timestamp": "2025-03-20T20:48:25.781775Z"}, {"uuid": "a46ca62d-34fa-4b39-9621-1aa818b7493e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29982", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llsfizzs522i", "content": "", "creation_timestamp": "2025-04-02T03:01:25.123930Z"}, {"uuid": "e5b27f1c-04e9-4181-b098-f7cb0743b38d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29987", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114275287492006712", "content": "", "creation_timestamp": "2025-04-03T17:48:27.462223Z"}, {"uuid": "e9f42ad1-cfc7-46b2-8490-9f2b24b29217", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29987", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114275287492006712", "content": "", "creation_timestamp": "2025-04-03T17:48:27.460985Z"}, {"uuid": "22838709-b484-4508-8a64-f9f2a0aaa2a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29987", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3llwu54xzg226", "content": "", "creation_timestamp": "2025-04-03T21:33:44.450910Z"}, {"uuid": "b5a7c9aa-ad9e-48ec-8911-85be56d06859", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29988", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmehvt2xur25", "content": "", "creation_timestamp": "2025-04-09T07:32:11.253842Z"}, {"uuid": "a00d3fa5-65ff-4ee4-8767-ca62ddbb5da2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29987", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llwlvmnd4z2k", "content": "", "creation_timestamp": "2025-04-03T19:06:24.140113Z"}, {"uuid": "c9d9dd85-dff9-469d-ae8f-b6c8542b8c6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29986", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmcgsnq3wu2g", "content": "", "creation_timestamp": "2025-04-08T12:07:12.351093Z"}, {"uuid": "00a44350-b4fa-4c24-afc2-b137eed89465", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29986", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114302654546052784", "content": "", "creation_timestamp": "2025-04-08T13:48:15.769136Z"}, {"uuid": "aabe4197-14ed-4576-bae7-15eab247a49c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2998", "type": "seen", "source": "https://gist.github.com/konard/a0178709d5a7b5a78586698b8c042b15", "content": "", "creation_timestamp": "2026-01-19T11:29:46.000000Z"}, {"uuid": "f042c19f-c762-4190-bbbf-cfed03883394", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29984", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lmt6alocuf27", "content": "", "creation_timestamp": "2025-04-15T03:49:10.754999Z"}, {"uuid": "c82025bf-bda6-4734-8c2c-e10238ffc9de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29984", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmtayd3afa2q", "content": "", "creation_timestamp": "2025-04-15T04:38:17.565299Z"}, {"uuid": "018dabb5-896f-4294-8df4-cd4276f65239", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29983", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmtaydxrqg2i", "content": "", "creation_timestamp": "2025-04-15T04:38:21.755976Z"}, {"uuid": "fce0202c-c4c1-4597-91ea-06eeaaab66c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2998", "type": "seen", "source": "https://gist.github.com/konard/65ced3fd74042bf5ba0737f60d57d145", "content": "", "creation_timestamp": "2026-01-19T00:13:20.000000Z"}, {"uuid": "6fe53102-cc2a-4a05-be75-167945f0f7b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2998", "type": "seen", "source": "https://gist.github.com/konard/045d80a762f6e756763e0ef7e0895c77", "content": "", "creation_timestamp": "2026-01-19T00:16:50.000000Z"}, {"uuid": "161b9451-c66c-4093-ac05-f70c1525d873", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2998", "type": "seen", "source": "https://gist.github.com/konard/ed57bdf6f23e9388249c3e81f52a7d40", "content": "", "creation_timestamp": "2026-01-19T00:16:42.000000Z"}, {"uuid": "e75b674e-3e55-41a9-8157-793f1d241ebf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29982", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10067", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29982\n\ud83d\udd25 CVSS Score: 6.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H)\n\ud83d\udd39 Description: Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Insecure Inherited Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Unauthorized access.\n\ud83d\udccf Published: 2025-04-02T00:06:40.090Z\n\ud83d\udccf Modified: 2025-04-02T13:27:33.761Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000296515/dsa-2025-135", "creation_timestamp": "2025-04-02T13:33:37.000000Z"}, {"uuid": "b5b784a7-2cea-4189-91c7-c00535250274", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29980", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8275", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29980\n\ud83d\udd25 CVSS Score: 9.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A SQL injection issue has been discovered in eTRAKiT.net release 3.2.1.77. Due to improper input validation, a remote unauthenticated attacker can run arbitrary commands as the current MS SQL server account. It is recommended that the CRM feature is turned off while on eTRAKiT.net release 3.2.1.77. eTRAKiT.Net is no longer supported, and users are recommended to migrate to the latest version of CentralSquare Community Development.\n\ud83d\udccf Published: 2025-03-20T19:03:05.501Z\n\ud83d\udccf Modified: 2025-03-20T19:03:05.501Z\n\ud83d\udd17 References:\n1. https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-079-01.json", "creation_timestamp": "2025-03-20T19:18:41.000000Z"}, {"uuid": "09ce620e-bf21-4426-910f-b720aa0d8413", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2998", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9662", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2998\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in PyTorch 2.6.0. It has been declared as critical. Affected by this vulnerability is the function torch.nn.utils.rnn.pad_packed_sequence. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-31T14:00:12.169Z\n\ud83d\udccf Modified: 2025-03-31T14:00:12.169Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.302047\n2. https://vuldb.com/?ctiid.302047\n3. https://vuldb.com/?submit.524151\n4. https://github.com/pytorch/pytorch/issues/149622\n5. https://github.com/pytorch/pytorch/issues/149622#issue-2935495265", "creation_timestamp": "2025-03-31T14:32:11.000000Z"}, {"uuid": "f35197b4-effd-48d3-b6cd-dc19441d6d72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29981", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10066", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29981\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Exposure of Sensitive Information Through Data Queries vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure.\n\ud83d\udccf Published: 2025-04-02T00:01:31.828Z\n\ud83d\udccf Modified: 2025-04-02T13:27:40.913Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000296515/dsa-2025-135", "creation_timestamp": "2025-04-02T13:33:36.000000Z"}, {"uuid": "fd1fd557-9537-4fed-a19d-1d2bfc6022e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29980", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10783", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29980\n\ud83d\udd25 CVSS Score: 9.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A SQL injection issue has been discovered in eTRAKiT.net release 3.2.1.77. Due to improper input validation, a remote unauthenticated attacker can run arbitrary commands as the current MS SQL server account. It is recommended that the CRM feature is turned off while on eTRAKiT.net release 3.2.1.77. eTRAKiT.Net is no longer supported, and users are recommended to migrate to the latest version of CentralSquare Community Development.\n\ud83d\udccf Published: 2025-03-20T19:03:05.501Z\n\ud83d\udccf Modified: 2025-04-07T20:37:39.482Z\n\ud83d\udd17 References:\n1. https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-079-01.json\n2. https://github.com/cisagov/CSAF/pull/182/files#diff-53861466371a59578b21f5e4b4b6be7b2a6267c5d0fe81eda2a849bf6915ed8d", "creation_timestamp": "2025-04-07T20:46:12.000000Z"}, {"uuid": "f50b30db-35cf-4458-900c-1fb76cc527a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29988", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11021", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29988\n\ud83d\udd25 CVSS Score: 6.9 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:H)\n\ud83d\udd39 Description: Dell Client Platform BIOS contains a Stack-based Buffer Overflow Vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution.\n\ud83d\udccf Published: 2025-04-09T02:25:06.695Z\n\ud83d\udccf Modified: 2025-04-09T02:25:06.695Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-in/000283859/dsa-2025-088", "creation_timestamp": "2025-04-09T02:47:37.000000Z"}, {"uuid": "1fda599a-07cc-4755-b8c6-3fd894b1e498", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29989", "type": "seen", "source": "https://t.me/cvedetector/22613", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29989 - Dell Client Platform BIOS Denial of Service (DoS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29989 \nPublished : April 10, 2025, 2:15 a.m. | 35\u00a0minutes ago \nDescription : Dell Client Platform BIOS contains a Security Version Number Mutable to Older Versions vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to BIOS upgrade denial. \nSeverity: 3.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-10T05:19:25.000000Z"}, {"uuid": "6d162440-b357-4f89-9aa9-35342a82ac94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29986", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10894", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29986\n\ud83d\udd25 CVSS Score: 8.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Dell Common Event Enabler, version(s) CEE 9.0.0.0, contain(s) an Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Common Anti-Virus Agent (CAVA). An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.\n\ud83d\udccf Published: 2025-04-08T10:40:39.690Z\n\ud83d\udccf Modified: 2025-04-08T10:40:39.690Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000303931/dsa-2025-158-security-update-for-dell-common-event-enabler-vulnerabilities", "creation_timestamp": "2025-04-08T10:47:46.000000Z"}, {"uuid": "9cb74c7d-3519-4a10-a05a-6ac1766c9c4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29985", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10898", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29985\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Dell Common Event Enabler, version(s) CEE 9.0.0.0, contain(s) an Initialization of a Resource with an Insecure Default vulnerability in the Common Anti-Virus Agent (CAVA). An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.\n\ud83d\udccf Published: 2025-04-08T10:44:24.736Z\n\ud83d\udccf Modified: 2025-04-08T10:44:24.736Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000303931/dsa-2025-158-security-update-for-dell-common-event-enabler-vulnerabilities", "creation_timestamp": "2025-04-08T11:46:24.000000Z"}, {"uuid": "2ecb7268-0a56-4bc1-8bef-4cbaadfa3915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29984", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11741", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29984\n\ud83d\udd25 CVSS Score: 6.7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell Trusted Device, versions prior to 7.0.3.0, contain an Incorrect Default Permissions  vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.\n\ud83d\udccf Published: 2025-04-15T03:38:08.310Z\n\ud83d\udccf Modified: 2025-04-15T03:38:08.310Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000299528/dsa-2025-151", "creation_timestamp": "2025-04-15T03:54:16.000000Z"}, {"uuid": "ab75d088-ba8d-41ad-b2db-5029dfd86638", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29983", "type": "seen", "source": "https://t.me/cvedetector/22905", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29983 - Dell Trusted Device Link Following Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29983 \nPublished : April 15, 2025, 4:15 a.m. | 40\u00a0minutes ago \nDescription : Dell Trusted Device, versions prior to 7.0.3.0, contain an Improper Link Resolution Before File Access ('Link Following') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T07:24:02.000000Z"}, {"uuid": "735be3c5-1724-47f6-b7dd-e5d3e8ec8fc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29984", "type": "seen", "source": "https://t.me/cvedetector/22904", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29984 - Dell Trusted Device Default Permission Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29984 \nPublished : April 15, 2025, 4:15 a.m. | 40\u00a0minutes ago \nDescription : Dell Trusted Device, versions prior to 7.0.3.0, contain an Incorrect Default Permissions  vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T07:24:01.000000Z"}, {"uuid": "28c60f4a-475f-4608-849a-2dfaca2e3409", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29988", "type": "seen", "source": "https://t.me/cvedetector/22535", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29988 - Dell Client Platform BIOS Stack-based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29988 \nPublished : April 9, 2025, 3:15 a.m. | 34\u00a0minutes ago \nDescription : Dell Client Platform BIOS contains a Stack-based Buffer Overflow Vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution. \nSeverity: 6.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T05:54:06.000000Z"}, {"uuid": "a4732eba-b372-448b-af16-0819371503c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29983", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11744", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29983\n\ud83d\udd25 CVSS Score: 6.7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell Trusted Device, versions prior to 7.0.3.0, contain an Improper Link Resolution Before File Access ('Link Following') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.\n\ud83d\udccf Published: 2025-04-15T03:30:46.207Z\n\ud83d\udccf Modified: 2025-04-15T03:31:33.847Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000299528/dsa-2025-151", "creation_timestamp": "2025-04-15T03:54:19.000000Z"}, {"uuid": "80e91a7e-21f8-4c54-988b-d1648708d4a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29985", "type": "seen", "source": "https://t.me/cvedetector/22458", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29985 - Dell CEE Common Anti-Virus Agent (CAVA) Initialization of Resource with Insecure Default Unauthorized Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29985 \nPublished : April 8, 2025, 11:15 a.m. | 2\u00a0hours, 11\u00a0minutes ago \nDescription : Dell Common Event Enabler, version(s) CEE 9.0.0.0, contain(s) an Initialization of a Resource with an Insecure Default vulnerability in the Common Anti-Virus Agent (CAVA). An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T15:40:26.000000Z"}, {"uuid": "8d15d381-d116-4a3d-be65-9e759de3922d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29986", "type": "seen", "source": "https://t.me/cvedetector/22456", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29986 - Dell Common Event Enabler CEE Improper Restriction of Communication Channel to Intended Endpoints\", \n  \"Content\": \"CVE ID : CVE-2025-29986 \nPublished : April 8, 2025, 11:15 a.m. | 2\u00a0hours, 11\u00a0minutes ago \nDescription : Dell Common Event Enabler, version(s) CEE 9.0.0.0, contain(s) an Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Common Anti-Virus Agent (CAVA). An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access. \nSeverity: 8.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T15:40:24.000000Z"}, {"uuid": "8ab358e7-4c75-40d0-80e4-5f793aaea096", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29982", "type": "seen", "source": "https://t.me/cvedetector/21838", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29982 - Dell Wyse Management Suite Insecure Inherited Permissions Unauthorized Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29982 \nPublished : April 2, 2025, 1:15 a.m. | 32\u00a0minutes ago \nDescription : Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Insecure Inherited Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Unauthorized access. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T04:07:08.000000Z"}, {"uuid": "4d71e167-df39-4fe4-9bb2-0eade8beec0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29987", "type": "seen", "source": "https://t.me/cvedetector/21994", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29987 - Dell PowerProtect Data Domain DD OS Insufficient Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29987 \nPublished : April 3, 2025, 4:15 p.m. | 47\u00a0minutes ago \nDescription : Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) versions prior to 8.3.0.15 contain an Insufficient Granularity of Access Control vulnerability. An authenticated user from a trusted remote client could exploit this vulnerability to execute arbitrary commands with root privileges. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T19:25:01.000000Z"}, {"uuid": "62ba1a9d-140e-47e3-85c3-ce486b617e2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29981", "type": "seen", "source": "https://t.me/cvedetector/21837", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29981 - Dell Wyse Management Suite Exposure of Sensitive Information Through Data Queries Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29981 \nPublished : April 2, 2025, 1:15 a.m. | 32\u00a0minutes ago \nDescription : Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Exposure of Sensitive Information Through Data Queries vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T04:07:04.000000Z"}, {"uuid": "2ac5fcdd-dc43-4108-8be5-b657d6fb8b76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29980", "type": "seen", "source": "https://t.me/cvedetector/20759", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29980 - eTRAKiT.net SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29980 \nPublished : March 20, 2025, 7:15 p.m. | 59\u00a0minutes ago \nDescription : A SQL injection issue has been discovered in eTRAKiT.net release 3.2.1.77. Due to improper input validation, a remote unauthenticated attacker can run arbitrary commands as the current MS SQL server account. It is recommended that the CRM feature is turned off while on eTRAKiT.net release 3.2.1.77. eTRAKiT.Net is no longer supported, and users are recommended to migrate to the latest version of CentralSquare Community Development. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-20T21:34:58.000000Z"}, {"uuid": "127d0c60-7161-40dc-a48a-76769b4d8f5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2998", "type": "seen", "source": "https://t.me/cvedetector/21592", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2998 - PyTorch Memory Corruption Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-2998 \nPublished : March 31, 2025, 2:15 p.m. | 39\u00a0minutes ago \nDescription : A vulnerability was found in PyTorch 2.6.0. It has been declared as critical. Affected by this vulnerability is the function torch.nn.utils.rnn.pad_packed_sequence. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T17:31:34.000000Z"}, {"uuid": "435cb1f0-d193-4290-a238-58955ab2bd11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29980", "type": "published-proof-of-concept", "source": "Telegram/sqlAUNS-cbU8Yn3yqBRR2i7kwCaQSr-HL8WHiqAVhMRSKEw", "content": "", "creation_timestamp": "2025-03-20T21:00:24.000000Z"}, {"uuid": "fab9e918-1f47-4017-a3ca-6f538c595161", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29981", "type": "seen", "source": "Telegram/OGOcjCYMiqUsTcFkOgAkHuzHtb9b6RwrTZgd02eDZSDUHbA", "content": "", "creation_timestamp": "2025-04-02T03:30:15.000000Z"}]}