PRIOn Logo

Search KB


Search our pre-analyzed vulnerability database

Total Results: 718

of 36

Published:   Updated:

Vulnerability Type: Improper access control

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Dell OpenManage Server Administrator, versions 11.0.0.0 and prior, contains an Improper Access Control vulnerability. A local low-privileged malicious user could potentially exploit this vulnerability to execute arbitrary code in order to elevate privileges on the system. Exploitation may lead to a complete system compromise.

Published:   Updated:

Vulnerability Type: Improper access control

Vendor(s):  Emc
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Dell AppSync, versions 4.4.0.0 to 4.6.0.0 including Service Pack releases, contains an improper access control vulnerability in Embedded Service Enabler component. A local malicious user could potentially exploit this vulnerability during installation leading to a privilege escalation.

Published:   Updated:

Vulnerability Type: Buffer overflow

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.7

Dell PowerEdge BIOS and Dell Precision BIOS contain a buffer overflow vulnerability. A local malicious user with high privileges could potentially exploit this vulnerability, leading to corrupt memory and potentially escalate privileges.

Published:   Updated:

Vulnerability Type: Privilege escalation

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Dell PowerEdge 14G server BIOS versions prior to 2.18.1 and Dell Precision BIOS versions prior to 2.18.2, contain an Out of Bounds write vulnerability. A local attacker with low privileges could potentially exploit this vulnerability leading to exposure of some SMRAM stack/data/code in System Management Mode, leading to arbitrary code execution or escalation of privilege.

Published:   Updated:

Vulnerability Type: Denial of service

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

Dell PowerScale OneFS versions 8.2.x-9.4.x contain an uncontrolled resource consumption vulnerability. A malicious network user with low privileges could potentially exploit this vulnerability in SMB, leading to a potential denial of service.

Published:   Updated:

Vulnerability Type: Information disclosure

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Dell PowerScale OneFS versions 8.2.x-9.5.0.x contain an elevation of privilege vulnerability. A low-privileged local attacker could potentially exploit this vulnerability, leading to Denial of service, escalation of privileges, and information disclosure. This vulnerability breaks the compliance mode guarantee.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Dell PowerScale OneFS version 9.5.0.0 contains improper link resolution before file access vulnerability in isi_gather_info. A high privileged local attacker could potentially exploit this vulnerability, leading to system takeover and it breaks the compliance mode guarantees.

Published:   Updated:

Vulnerability Type: Input validation

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.4

Dell EMC Unisphere for PowerMax versions before 9.1.0.27, Dell EMC Unisphere for PowerMax Virtual Appliance versions before 9.1.0.27, and PowerMax OS Release 5978 contain an improper certificate validation vulnerability. An unauthenticated remote attacker may potentially exploit this vulnerability to carry out a man-in-the-middle attack by supplying a crafted certificate and intercepting the victim's traffic to view or modify a victim’s data in transit.

Published:   Updated:

Vulnerability Type: Information disclosure

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

Dell NetWorker versions 19.5 and earlier contain 'Apache Tomcat' version disclosure vulnerability. A NetWorker server user with remote access to NetWorker clients may potentially exploit this vulnerability and may launch target-specific attacks.

Published:   Updated:

Vulnerability Type: Information disclosure

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

Dell NetWorker versions 19.5 and earlier contain 'RabbitMQ' version disclosure vulnerability. A NetWorker server user with remote access to NetWorker clients may potentially exploit this vulnerability and may launch target-specific attacks.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.1

Dell PowerScale OneFS 9.4.0.x contains an incorrect default permissions vulnerability. A local malicious user could potentially exploit this vulnerability to overwrite arbitrary files causing denial of service.

Published:   Updated:

Vulnerability Type: Information disclosure

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.9

Dell EMC Unity versions before 5.2.0.0.5.173 , use(es) broken cryptographic algorithm. A remote unauthenticated attacker could potentially exploit this vulnerability by performing MitM attacks and let attackers obtain sensitive information.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.8

Dell PowerScale OneFS, versions 8.2.x through 9.4.x contain multiple stored cross-site scripting vulnerabilities. A remote authenticated malicious user with high privileges may potentially exploit these vulnerabilities to store malicious HTML or JavaScript code through multiple affected fields.

Published:   Updated:

Vulnerability Type: Heap overflow

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.7

Dell PowerScale OneFS, versions 8.2.x-9.3.x, contain a heap-based buffer overflow. A local privileged malicious user could potentially exploit this vulnerability, leading to system takeover. This impacts compliance mode clusters.

Published:   Updated:

Vulnerability Type: Remote code execution

Vendor(s):  Dell
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

EMC NetWorker may potentially be vulnerable to an unauthenticated remote code execution vulnerability in the NetWorker Client execution service (nsrexecd) irrespective of any auth used.

Published:   Updated:

Vulnerability Type: Information disclosure

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.8

Dell PowerScale OneFS 9.0.0.x - 9.4.0.x contain an insertion of sensitive information into log file vulnerability in celog. A low privileges user could potentially exploit this vulnerability, leading to information disclosure and escalation of privileges.

Published:   Updated:

Vulnerability Type: Information disclosure

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.1

Dell PowerScale OneFS 9.0.0.x - 9.4.0.x contain an insertion of sensitive information into log file vulnerability in platform API of IPMI module. A low-privileged user with permission to read logs on the cluster could potentially exploit this vulnerability, leading to Information disclosure and denial of service.

Published:   Updated:

Vulnerability Type: Information disclosure

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

Dell PowerScale OneFS 9.0.0.x-9.4.0.x contain an insertion of sensitive information into log file vulnerability in cloudpool. A low privileged local attacker could potentially exploit this vulnerability, leading to sensitive information disclosure.

Published:   Updated:

Vulnerability Type: Command injection

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.8

Dell EMC prior to version DDOS 7.9 contain(s) an OS command injection Vulnerability. An authenticated non admin attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Dell PowerScale OneFS 9.1.0.x-9.4.0.x contain an insertion of sensitive information into log file vulnerability in change password api. A low privilege local attacker could potentially exploit this vulnerability, leading to system takeover.

of 36