Page 29 of 1115 results (0.002 seconds)

CVSS: 6.7EPSS: 0%CPEs: 1EXPL: 0

Dell Update Package (DUP), Versions prior to 4.9.10 contain an Uncontrolled Search Path vulnerability. A malicious user with local access to the system could potentially exploit this vulnerability to run arbitrary code as admin. • https://www.dell.com/support/kbdoc/en-us/000217701/dsa-2023-338-security-update-for-a-dell-update-package-dup-framework-vulnerability • CWE-427: Uncontrolled Search Path Element •

CVSS: 6.8EPSS: 0%CPEs: 12EXPL: 0

Dell Platform BIOS contains an Improper Null Termination vulnerability. A high privilege user with network access to the system could potentially send malicious data to the device in order to cause some services to cease to function. • https://www.dell.com/support/kbdoc/en-us/000220410/dsa-2023-467 • CWE-170: Improper Null Termination •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

Dell Secure Connect Gateway 5.20 contains an improper authentication vulnerability during the SRS to SCG update path. A remote low privileged attacker could potentially exploit this vulnerability, leading to impersonation of the server through presenting a fake self-signed certificate and communicating with the remote server. Dell Secure Connect Gateway 5.20 contiene una vulnerabilidad de autenticación incorrecta durante la ruta de actualización de SRS a SCG. Un atacante remoto con pocos privilegios podría explotar esta vulnerabilidad, lo que llevaría a la suplantación del servidor mediante la presentación de un certificado autofirmado falso y la comunicación con el servidor remoto. • https://www.dell.com/support/kbdoc/en-us/000222433/dsa-2024-076-security-update-for-dell-secure-connect-gateway-appliance-vulnerabilities • CWE-290: Authentication Bypass by Spoofing •

CVSS: 3.7EPSS: 0%CPEs: 1EXPL: 0

Dell Secure Connect Gateway, 5.18, contains an Inadequate Encryption Strength Vulnerability. An unauthenticated network attacker could potentially exploit this vulnerability, allowing an attacker to recover plaintext from a block of ciphertext. Dell Secure Connect Gateway, versión 5.18, contiene una vulnerabilidad de potencia de cifrado inadecuada. Un atacante de red no autenticado podría explotar esta vulnerabilidad, permitiéndole recuperar texto plano de un bloque de texto cifrado. • https://www.dell.com/support/kbdoc/en-us/000222433/dsa-2024-076-security-update-for-dell-secure-connect-gateway-appliance-vulnerabilities • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 6.8EPSS: 0%CPEs: 3EXPL: 0

Dell ECS, versions 3.6 through 3.6.2.5, and 3.7 through 3.7.0.6, and 3.8 through 3.8.0.4 versions, contain an improper access control vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to unauthorized access to all buckets and their data within a namespace Dell ECS, versiones 3.6 a 3.6.2.5, 3.7 a 3.7.0.6 y 3.8 a 3.8.0.4, contienen una vulnerabilidad de control de acceso inadecuado. Un atacante remoto con altos privilegios podría explotar esta vulnerabilidad, lo que llevaría a un acceso no autorizado a todos los depósitos y sus datos dentro de un espacio de nombres. • https://www.dell.com/support/kbdoc/en-us/000222470/dsa-2024-078-security-update-for-dell-ecs-access-control-vulnerability • CWE-284: Improper Access Control •