7 results (0.013 seconds)

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

Dell PowerStore versions prior to 3.5.0.1 contain an insertion of sensitive information into log file vulnerability. A high privileged malicious user could potentially exploit this vulnerability, leading to sensitive information disclosure. • https://www.dell.com/support/kbdoc/en-us/000215171/dsa-2023-173-dell-powerstore-family-security-update-for-multiple-vulnerabilities • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

Dell PowerStore versions 2.0.0.x, 2.0.1.x and 2.1.0.x contains an open port vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to information disclosure and arbitrary code execution. Dell PowerStore versiones 2.0.0.x, 2.0.1.x y 2.1.0.x, contienen una vulnerabilidad de puerto abierto. Un atacante remoto no autenticado podría explotar esta vulnerabilidad, conllevando a una divulgación de información y la ejecución de código arbitrario • https://www.dell.com/support/kbdoc/000196367 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

Dell EMC PowerStore versions 2.0.0.x, 2.0.1.x, and 2.1.0.x are vulnerable to a command injection flaw. An authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system takeover by an attacker. Dell EMC PowerStore versiones 2.0.0.x, 2.0.1.x y 2.1.0.x de Dell EMC PowerStore son vulnerables a un fallo de inyección de comandos. Un atacante autenticado podría explotar esta vulnerabilidad, conllevando a una ejecución de comandos arbitrarios en el Sistema Operativo subyacente de la aplicación, con los privilegios de la aplicación vulnerable. • https://www.dell.com/support/kbdoc/000196367 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 8.0EPSS: 0%CPEs: 3EXPL: 0

PowerStore SW v2.1.1.0 supports the option to export data to either a CSV or an XLSX file. The data is taken as is, without any validation or sanitization. It allows a malicious, authenticated user to inject payloads that might get interpreted as formulas by the corresponding spreadsheet application that is being used to open the CSV/XLSX file. PowerStore SW v2.1.1.0 soporta la opción de exportar datos a un archivo CSV o XLSX. Los datos se toman tal cual, sin ningún tipo de comprobación o saneo. • https://www.dell.com/support/kbdoc/000196367 • CWE-1236: Improper Neutralization of Formula Elements in a CSV File •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Dell PowerStore Versions before v2.1.1.0. contains a Stored Cross-Site Scripting vulnerability. A high privileged network attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery. Dell PowerStore versiones anteriores a v2.1.1.0. contienen una vulnerabilidad de tipo Cross-Site Scripting almacenado. • https://www.dell.com/support/kbdoc/000196367 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •