{"vulnerability": "CVE-2025-2647", "sightings": [{"uuid": "700f39ac-9851-4ff2-90fd-769c42d46c1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26478", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-09T13:26:56.000000Z"}, {"uuid": "29061759-4624-40e9-bd39-dd207818912f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26478", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-11T18:47:38.000000Z"}, {"uuid": "1badf06d-6750-4255-8eb7-8958983729b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26478", "type": "seen", "source": "https://t.me/cvedetector/23229", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26478 - Dell ECS Certificate Validation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26478 \nPublished : April 17, 2025, 12:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : Dell ECS version 3.8.1.4 and prior contain an Improper Certificate Validation vulnerability. An unauthenticated attacker with adjacent network access could potentially exploit this vulnerability, leading to Information disclosure. \nSeverity: 3.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T17:09:32.000000Z"}, {"uuid": "4a4f729d-d23f-463e-b5cd-4655eca89ead", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26477", "type": "seen", "source": "https://t.me/cvedetector/23233", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26477 - Dell ECS Improper Input Validation Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26477 \nPublished : April 17, 2025, 12:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : Dell ECS version 3.8.1.4 and prior contain an Improper Input Validation vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Code execution. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T17:09:38.000000Z"}, {"uuid": "a40dc536-051d-4e9e-a7eb-ecf86b8a7615", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26475", "type": "seen", "source": "https://t.me/cvedetector/20652", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26475 - Dell Secure Connect Gateway SRS Unvalidated Live-Restore Setting\", \n  \"Content\": \"CVE ID : CVE-2025-26475 \nPublished : March 19, 2025, 4:15 p.m. | 1\u00a0hour, 11\u00a0minutes ago \nDescription : Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.26, Enables Live-Restore setting which enhances security by keeping containers running during daemon restarts, reducing attack exposure, preventing accidental misconfigurations, and ensuring security controls remain active. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-19T18:49:29.000000Z"}, {"uuid": "02cfeea4-5361-43f2-87c5-fc962b96e14f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26473", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-17", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "d92beb88-1e78-40bb-8444-da83ca98d5f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26475", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkqtnbfvtu26", "content": "", "creation_timestamp": "2025-03-19T18:43:42.990755Z"}, {"uuid": "9bfc0921-5173-40ff-828a-642f07d6a355", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26477", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12205", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26477\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Dell ECS version 3.8.1.4 and prior contain an Improper Input Validation vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Code execution.\n\ud83d\udccf Published: 2025-04-17T11:45:19.319Z\n\ud83d\udccf Modified: 2025-04-17T11:45:19.319Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-in/000300068/dsa-2025-097-security-update-for-dell-objectscale-4-0-multiple-vulnerabilities", "creation_timestamp": "2025-04-17T12:00:52.000000Z"}, {"uuid": "23b5a202-2402-442c-9dbc-fa2443d959e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26478", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12206", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26478\n\ud83d\udd25 CVSS Score: 3.1 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Dell ECS version 3.8.1.4 and prior contain an Improper Certificate Validation vulnerability. An unauthenticated attacker with adjacent network access could potentially exploit this vulnerability, leading to Information disclosure.\n\ud83d\udccf Published: 2025-04-17T11:37:44.401Z\n\ud83d\udccf Modified: 2025-04-17T11:37:44.401Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-in/000300068/dsa-2025-097-security-update-for-dell-objectscale-4-0-multiple-vulnerabilities", "creation_timestamp": "2025-04-17T12:00:53.000000Z"}, {"uuid": "ac94ffa6-18b6-494f-8b42-7c4db8c390ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26479", "type": "seen", "source": "https://t.me/cvedetector/22620", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26479 - Dell PowerScale OneFS Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26479 \nPublished : April 10, 2025, 3:15 a.m. | 1\u00a0hour, 41\u00a0minutes ago \nDescription : Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.0, contains an out-of-bounds write vulnerability. An attacker could potentially exploit this vulnerability in NFS workflows, leading to data integrity issues. \nSeverity: 3.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-10T06:59:53.000000Z"}, {"uuid": "faab1d1f-50b7-4056-a27b-b788fa07df3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26473", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113998670958991211", "content": "", "creation_timestamp": "2025-02-13T21:21:14.349081Z"}, {"uuid": "cb98138a-efd7-403d-9592-4a02571bbfc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26473", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li3po5opb62x", "content": "", "creation_timestamp": "2025-02-13T22:16:19.011623Z"}, {"uuid": "698322f5-760e-48d1-9764-a33f6512356b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26473", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li3xgcnigb2c", "content": "", "creation_timestamp": "2025-02-14T00:35:05.765252Z"}, {"uuid": "c63c93a2-b6bf-483e-983c-8e2410546bd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26477", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmze2iuly32l", "content": "", "creation_timestamp": "2025-04-17T14:49:09.217526Z"}, {"uuid": "0f957d33-0534-42c2-90a4-07fe6f58f179", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26478", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmze2j3ibf2j", "content": "", "creation_timestamp": "2025-04-17T14:49:10.477727Z"}, {"uuid": "85e8e8d6-0a6e-49d6-9b4f-cfd21ba4263f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26473", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4403", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26473\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: The Mojave Inverter uses the GET method for sensitive information.\n\ud83d\udccf Published: 2025-02-14T00:30:44Z\n\ud83d\udccf Modified: 2025-02-14T00:30:44Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-26473\n2. https://old.outbackpower.com/about-outback/contact/contact-us\n3. https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-17", "creation_timestamp": "2025-02-14T01:16:51.000000Z"}, {"uuid": "d20176f4-8faf-403c-8d82-a3fcb17a809c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26479", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11188", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26479\n\ud83d\udd25 CVSS Score: 3.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.0, contains an out-of-bounds write vulnerability. An attacker could potentially exploit this vulnerability in NFS workflows, leading to data integrity issues.\n\ud83d\udccf Published: 2025-04-10T02:32:40.194Z\n\ud83d\udccf Modified: 2025-04-10T02:32:40.194Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", "creation_timestamp": "2025-04-10T02:49:22.000000Z"}, {"uuid": "41cb4837-da61-475a-bc35-33c9cfd77cc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2647", "type": "seen", "source": "https://t.me/cvedetector/20897", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2647 - \"PHPGurukul Art Gallery Management System SQL Injection\"\", \n  \"Content\": \"CVE ID : CVE-2025-2647 \nPublished : March 23, 2025, 11:15 a.m. | 1\u00a0hour ago \nDescription : A vulnerability was found in PHPGurukul Art Gallery Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /search.php. The manipulation of the argument Search leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-23T13:58:40.000000Z"}, {"uuid": "80ee82ce-e107-4994-9835-6ddd25c80bc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2647", "type": "published-proof-of-concept", "source": "Telegram/SimtlYSWAu4a50RNZLq43tlMg6yM1hAsbeUI0zQM_oQeEfU", "content": "", "creation_timestamp": "2025-03-23T12:30:27.000000Z"}, {"uuid": "daf87c6b-c1de-41b1-a26f-5ce4c9d4f849", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26479", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114314020757340212", "content": "", "creation_timestamp": "2025-04-10T13:58:50.921319Z"}]}