Page 184 of 1115 results (0.008 seconds)

CVSS: 7.2EPSS: 0%CPEs: 482EXPL: 0

Select Dell Client Commercial and Consumer platforms contain an Improper Access Vulnerability. An unauthenticated attacker with physical access to the system could potentially bypass intended Secure Boot restrictions to run unsigned and untrusted code on expansion cards installed in the system during platform boot. Refer to https://www.dell.com/support/article/us/en/04/sln317683/dsa-2019-043-dell-client-improper-access-control-vulnerability?lang=en for versions affected by this vulnerability. Las plataformas Select Dell Client Commercial and Consumer contienen una vulnerabilidad de Acceso Inapropiado. • https://www.dell.com/support/article/us/en/04/sln317683/dsa-2019-043-dell-client-improper-access-control-vulnerability?lang=en •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Dell EMC Unity and UnityVSA versions prior to 5.0.0.0.5.116 contain a plain-text password storage vulnerability. A Unisphere user’s (including the admin privilege user) password is stored in a plain text in Unity Data Collection bundle (logs files for troubleshooting). A local authenticated attacker with access to the Data Collection bundle may use the exposed password to gain access with the privileges of the compromised user. Las versiones de Dell EMC Unity y UnityVSA anteriores a la versión 5.0.0.0.5.116 contienen una vulnerabilidad de almacenamiento de contraseña de texto sin formato. La contraseña de un usuario de Unisphere (incluido el usuario con privilegios de administrador) se almacena en un texto sin formato en el paquete de Unity Data Collection (archivos de registro para la resolución de problemas). • https://productsecurity-ux.ausmp1z1.pcf.dell.com/support/security/us/en/04/details/535028/DSA-2019-086-Dell-EMC-Unity-Family-Multiple-Vulnerabilities • CWE-693: Protection Mechanism Failure •

CVSS: 5.4EPSS: 0%CPEs: 2EXPL: 0

Dell EMC Unity and UnityVSA versions prior to 5.0.0.0.5.116 contain an improper authorization vulnerability in NAS Server quotas configuration. A remote authenticated Unisphere Operator could potentially exploit this vulnerability to edit quota configuration of other users. Las versiones de Dell EMC Unity y UnityVSA anteriores a 5.0.0.0.5.116 contienen una vulnerabilidad de autorización inadecuada en la configuración de cuotas del servidor NAS. Un Operador de Unisphere autenticado a distancia podría potencialmente explotar esta vulnerabilidad para editar la configuración de cuotas de otros usuarios. • https://productsecurity-ux.ausmp1z1.pcf.dell.com/support/security/us/en/04/details/535028/DSA-2019-086-Dell-EMC-Unity-Family-Multiple-Vulnerabilities •

CVSS: 7.8EPSS: 0%CPEs: 11EXPL: 0

Dell SupportAssist for Business PCs version 2.0 and Dell SupportAssist for Home PCs version 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2, and 3.2.1 contain an Improper Privilege Management Vulnerability. A malicious local user can exploit this vulnerability by inheriting a system thread using a leaked thread handle to gain system privileges on the affected machine. Dell SupportAssist para PCs de Empresas versión 2.0 y Dell SupportAssist para PCs de Hogar versiones 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2 y 3.2.1, contienen una Vulnerabilidad de Administración de Privilegios Inapropiada . Un usuario local malicioso puede explotar esta vulnerabilidad al heredar un hilo (subproceso) del sistema utilizando un identificador de hilo (subproceso) filtrado para alcanzar privilegios del sistema en la máquina afectada. • http://www.dell.com/support/article/sln317453 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

PC-Doctor Toolbox before 7.3 has an Uncontrolled Search Path Element. PC-Doctor Toolbox anterior a la versión 7.3 tiene un elemento path de búsqueda no controlada. • http://packetstormsecurity.com/files/153374/PC-Doctor-Toolbox-DLL-Hijacking.html http://seclists.org/fulldisclosure/2019/Jun/29 http://www.pc-doctor.com/company/pr-articles/130-pc-doctor-responds-to-software-vulnerability-report http://www.securityfocus.com/bid/108880 https://safebreach.com/Press-Post/SafeBreach-Identifies-Serious-Vulnerability-In-PC-Doctor-Software https://seclists.org/fulldisclosure/2019/Jun/29 https://www.dell.com/support/article/il/en/ilbsdt1/sln317291/dsa-2019-084-dell-supportassist • CWE-427: Uncontrolled Search Path Element •