Critical
Third-party Component |
CVEs |
More Information |
OpenSSL |
CVE-2023-0215, CVE-2022-4450, CVE-2023-0286, CVE-2022-4304 |
See NVD link below for individual score for each CVE. |
SLES Package Updates |
CVE-2023-41175, CVE-2023-40745, CVE-2023-38288, CVE-2015-8668, CVE-2024-26461, CVE-2024-26458, CVE-2022-48624, CVE-2023-37536, CVE-2024-20952, CVE-2024-20945, CVE-2024-20926, CVE-2024-20921, CVE-2024-20919, CVE-2024-20918, CVE-2024-27388, CVE-2024-27078, CVE-2024-27075, CVE-2024-27074, CVE-2024-27073, CVE-2024-27072, CVE-2024-27054, CVE-2024-27046, CVE-2024-27043, CVE-2024-27014, CVE-2024-27013, CVE-2024-26993, CVE-2024-26948, CVE-2024-26931, CVE-2024-26930, CVE-2024-26929, CVE-2024-26922, CVE-2024-26907, CVE-2024-26903, CVE-2024-26901, CVE-2024-26898, CVE-2024-26884, CVE-2024-26883, CVE-2024-26878, CVE-2024-26859, CVE-2024-26857, CVE-2024-26855, CVE-2024-26852, CVE-2024-26840, CVE-2024-26839, CVE-2024-26817, CVE-2024-26816, CVE-2024-26805, CVE-2024-26793, CVE-2024-26779, CVE-2024-26778, CVE-2024-26777, CVE-2024-26773, CVE-2024-26772, CVE-2024-26771, CVE-2024-26763, CVE-2024-26754, CVE-2024-26747, CVE-2024-26744, CVE-2024-26743, CVE-2024-26739, CVE-2024-26733, CVE-2024-26704, CVE-2024-26689, CVE-2024-26675, CVE-2024-26671, CVE-2024-26651, CVE-2024-26642, CVE-2024-26614, CVE-2024-24861, CVE-2024-24855, CVE-2024-23848, CVE-2024-23307, CVE-2024-22099, CVE-2024-2201, CVE-2023-7192, CVE-2023-7042, CVE-2023-6536, CVE-2023-6535, CVE-2023-6356, CVE-2023-6270, CVE-2023-52653, CVE-2023-52652, CVE-2023-52650, CVE-2023-52646, CVE-2023-52644, CVE-2023-52639, CVE-2023-52635, CVE-2023-52628, CVE-2023-52620, CVE-2023-52614, CVE-2023-52607, CVE-2023-52598, CVE-2023-52595, CVE-2023-52591, CVE-2023-52590, CVE-2023-52587, CVE-2023-52583, CVE-2023-52575, CVE-2023-52528, CVE-2023-52524, CVE-2023-52515, CVE-2023-52509, CVE-2023-52488, CVE-2023-52486, CVE-2023-52477, CVE-2023-52476, CVE-2023-52474, CVE-2023-52470, CVE-2023-52469, CVE-2023-52454, CVE-2023-0160, CVE-2022-48701, CVE-2022-48695, CVE-2022-48688, CVE-2022-48687, CVE-2022-48668, CVE-2022-48667, CVE-2022-48651, CVE-2022-48650, CVE-2022-48636, CVE-2022-48626, CVE-2022-48619, CVE-2022-0487, CVE-2021-47217, CVE-2021-47216, CVE-2021-47211, CVE-2021-47207, CVE-2021-47205, CVE-2021-47204, CVE-2021-47203, CVE-2021-47202, CVE-2021-47198, CVE-2021-47189, CVE-2021-47188, CVE-2021-47185, CVE-2021-47184, CVE-2021-47183, CVE-2021-47182, CVE-2021-47181, CVE-2021-47180, CVE-2021-47179, CVE-2021-47177, CVE-2021-47173, CVE-2021-47171, CVE-2021-47169, CVE-2021-47168, CVE-2021-47167, CVE-2021-47166, CVE-2021-47165, CVE-2021-47162, CVE-2021-47161, CVE-2021-47159, CVE-2021-47153, CVE-2021-47150, CVE-2021-47149, CVE-2021-47146, CVE-2021-47143, CVE-2021-47142, CVE-2021-47141, CVE-2021-47138, CVE-2021-47119, CVE-2021-47118, CVE-2021-47117, CVE-2021-47114, CVE-2021-47112, CVE-2021-47110, CVE-2021-47104, CVE-2021-47101, CVE-2021-47100, CVE-2021-47073, CVE-2021-47071, CVE-2021-47070, CVE-2021-47068, CVE-2021-47063, CVE-2021-47061, CVE-2021-47060, CVE-2021-47056, CVE-2021-47055, CVE-2021-47049, CVE-2021-47045, CVE-2021-47034, CVE-2021-47024, CVE-2021-47015, , CVE-2021-47006, CVE-2021-46998, CVE-2021-46990, CVE-2021-46988, CVE-2021-46981, CVE-2021-46975, CVE-2021-46966, CVE-2021-46964, CVE-2021-46963, CVE-2021-46960, CVE-2021-46958, CVE-2021-46950, CVE-2021-46941, CVE-2021-46939, CVE-2021-46938, CVE-2021-46909, CVE-2021-46907, CVE-2021-46905, CVE-2021-46904, CVE-2021-23134, CVE-2020-36312, CVE-2019-25160, CVE-2024-33602, CVE-2024-33601, CVE-2024-33600, CVE-2024-33599, CVE-2024-2961, CVE-2023-42465, CVE-2018-1311, CVE-2024-28085, CVE-2021-40633, CVE-2018-11490, CVE-2024-31744, CVE-2022-33065, CVE-2024-32487, CVE-2023-2255, CVE-2023-0950, CVE-2024-26622, CVE-2024-26600, CVE-2024-26595, CVE-2024-26585, CVE-2024-23851, CVE-2024-23849, CVE-2024-1151, CVE-2024-0607, CVE-2023-52605, CVE-2023-52597, CVE-2023-52574, CVE-2023-52532, CVE-2023-52531, CVE-2023-52530, CVE-2023-52502, CVE-2023-52482, CVE-2023-52478, CVE-2023-52475, CVE-2023-52464, CVE-2023-52451, CVE-2023-52449, CVE-2023-52445, CVE-2023-52443, CVE-2023-52429, CVE-2023-52340, CVE-2023-46343, CVE-2023-35827, CVE-2022-48627, CVE-2022-20154, CVE-2021-47078, CVE-2021-47077, CVE-2021-47076, CVE-2021-47054, CVE-2021-47013, CVE-2021-46992, CVE-2021-46991, CVE-2021-46974, CVE-2021-46953, CVE-2021-46932, CVE-2021-46929, CVE-2021-46924, CVE-2021-46921, CVE-2021-46915, CVE-2021-46906, CVE-2021-33200, CVE-2020-36784, CVE-2020-36777, CVE-2019-25162, CVE-2024-22667, CVE-2023-48706, CVE-2023-48237, CVE-2023-48236, CVE-2023-48235, CVE-2023-48234, CVE-2023-48233, CVE-2023-48232, CVE-2023-48231, CVE-2023-4750, CVE-2023-6918, CVE-2023-6004, CVE-2023-48795, CVE-2023-2283, CVE-2023-1667, CVE-2021-3634, CVE-2020-1730, CVE-2020-16135, CVE-2019-14889, CVE-2023-51257, CVE-2022-48622, CVE-2023-47855, CVE-2023-46103, CVE-2023-45745, CVE-2023-45733, CVE-2024-0727, CVE-2022-1210, CVE-2023-50495, CVE-2023-38471, CVE-2023-38469, CVE-2023-38472, CVE-2023-38470, CVE-2023-5388, CVE-2021-37750, CVE-2023-51764, CVE-2023-52425, CVE-2022-48560, CVE-2024-28182, CVE-2023-6597, CVE-2023-40217, CVE-2023-43490, CVE-2023-39368, CVE-2023-38575, CVE-2023-28746, CVE-2023-22655, CVE-2024-22365, CVE-2023-27043, CVE-2023-7207, CVE-1999-0524, CVE-2024-21094, CVE-2024-21085, CVE-2024-21068, CVE-2024-21011, CVE-2024-2398, CVE-2024-2004, CVE-2023-45918, CVE-2023-5752, CVE-2024-37370, CVE-2024-37371, CVE-2024-39689, CVE-2024-5535, CVE-2024-0450, CVE-2024-37891, CVE-2023-39742, CVE-2017-9271, CVE-2022-28506, CVE_2020-12762 |
See NVD link below for individual score for each CVE. |
Tomcat |
CVE-2023-44487, CVE-2024-23672, CVE-2024-24549 |
See NVD link below for individual score for each CVE. |
nghttp2 |
CVE-2023-44487 |
See NVD link below for individual score for each CVE. |
SNMP |
CVE-2022-44792, CVE-2022-44793 |
See NVD link below for individual score for each CVE. |
Proprietary Code CVEs |
Description |
CVSS Base Score |
CVSS Vector String |
CVE-2025-21106 |
Dell Recover Point for Virtual Machines 6.0.X contains a Weak file system permission vulnerability. A low privileged Local attacker could potentially exploit this vulnerability, leading to impacting only non-sensitive resources in the system. |
5.5 |
|
CVE-2025-21105 |
Dell RecoverPoint for Virtual Machines 6.0.X contains a command execution vulnerability. A Low privileged malicious user with local access could potentially exploit this vulnerability by running the specific binary and perform any administrative action permitted by it resulting in shutting down the server, modifying the configuration leading to gain access to unauthorized data. |
6.6 |
Proprietary Code CVEs |
Description |
CVSS Base Score |
CVSS Vector String |
CVE-2025-21106 |
Dell Recover Point for Virtual Machines 6.0.X contains a Weak file system permission vulnerability. A low privileged Local attacker could potentially exploit this vulnerability, leading to impacting only non-sensitive resources in the system. |
5.5 |
|
CVE-2025-21105 |
Dell RecoverPoint for Virtual Machines 6.0.X contains a command execution vulnerability. A Low privileged malicious user with local access could potentially exploit this vulnerability by running the specific binary and perform any administrative action permitted by it resulting in shutting down the server, modifying the configuration leading to gain access to unauthorized data. |
6.6 |
Product |
Affected Versions |
Remediated Versions |
Link |
RecoverPoint for Virtual Machines |
Versions 6.0 SP1, 6.0 SP1 P1 and 6.0 SP1 P2 |
Version 6.0 SP2 or later |
https://www.dell.com/support/home/product-support/product/recoverpoint-for-virtual-machines/drivers |
Product |
Affected Versions |
Remediated Versions |
Link |
RecoverPoint for Virtual Machines |
Versions 6.0 SP1, 6.0 SP1 P1 and 6.0 SP1 P2 |
Version 6.0 SP2 or later |
https://www.dell.com/support/home/product-support/product/recoverpoint-for-virtual-machines/drivers |
Revision |
Date |
Description |
1.0 |
2025-02-20 |
Initial Release |