6 results (0.009 seconds)

CVSS: 5.5EPSS: 0%CPEs: 10EXPL: 0

Dell Wyse ThinOS versions prior to 2306 (9.4.2103) contain a sensitive information disclosure vulnerability. A malicious user with local access to the device could exploit this vulnerability to read sensitive information written to the log files. • https://www.dell.com/support/kbdoc/en-us/000215864/dsa-2023-247 • CWE-312: Cleartext Storage of Sensitive Information CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 5.5EPSS: 0%CPEs: 10EXPL: 0

Dell Wyse ThinOS versions prior to 2208 (9.3.2102) contain a sensitive information disclosure vulnerability. An unauthenticated malicious user with local access to the device could exploit this vulnerability to read sensitive information written to the log files. • https://www.dell.com/support/kbdoc/en-us/000215864/dsa-2023-247 • CWE-312: Cleartext Storage of Sensitive Information CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 6.8EPSS: 0%CPEs: 7EXPL: 0

Dell Wyse ThinOS 2205 contains a Regular Expression Denial of Service Vulnerability in UI. An admin privilege attacker could potentially exploit this vulnerability, leading to denial-of-service. Dell Wyse ThinOS versión 2205, contiene una vulnerabilidad de Denegación de Servicio por Expresión Regular en la Interfaz de Usuario. Un atacante con privilegios de administrador podría explotar esta vulnerabilidad, conllevando a una denegación de servicio • https://www.dell.com/support/kbdoc/en-us/000203376/dsa-2022-247-dell-wyse-thinos-security-update-for-a-regular-expression-vulnerability • CWE-1333: Inefficient Regular Expression Complexity •

CVSS: 6.3EPSS: 0%CPEs: 2EXPL: 0

Dell Wyse ThinOS 8.6 MR9 contains remediation for an improper management server validation vulnerability that could be potentially exploited to redirect a client to an attacker-controlled management server, thus allowing the attacker to change the device configuration or certificate file. Dell Wyse ThinOS versión 8.6, MR9 contiene una corrección para una vulnerabilidad de comprobación inapropiada del servidor de administración que podría ser potencialmente explotada para redireccionar un cliente a un servidor de administración controlado por un atacante, permitiendo así al atacante cambiar la configuración del dispositivo o el archivo de certificado. • https://www.dell.com/support/kbdoc/en-us/000184665/dsa-2021-069-dell-wyse-thinos-8-6-security-update-for-an-improper-management-server-validation-vulnerabilitydsa-2021-069-dell-wyse-thinos-8-6-security-update-for-an-improper-management-server-validation- • CWE-16: Configuration CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 0%CPEs: 8EXPL: 0

Dell Wyse ThinOS 8.6 and prior versions contain an insecure default configuration vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to access the writable file and manipulate the configuration of any target specific station. Dell Wyse ThinOS versiones 8.6 y anteriores, contienen una vulnerabilidad de configuración predeterminada no segura. Un atacante remoto no autenticado podría potencialmente explotar esta vulnerabilidad para acceder al archivo grabable y manipular la configuración de cualquier estación específica objetivo. • https://www.dell.com/support/kbdoc/en-us/000180768/dsa-2020-281 • CWE-276: Incorrect Default Permissions •