8 results (0.005 seconds)

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

Dell PowerStore versions prior to 3.5.0.1 contain an insertion of sensitive information into log file vulnerability. A high privileged malicious user could potentially exploit this vulnerability, leading to sensitive information disclosure. • https://www.dell.com/support/kbdoc/en-us/000215171/dsa-2023-173-dell-powerstore-family-security-update-for-multiple-vulnerabilities • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

Dell PowerStore versions 2.1.0.x contain an Authentication bypass vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability under specific configuration. An attacker would gain unauthorized access upon successful exploit. Dell PowerStore versiones 2.1.0.x, contienen una vulnerabilidad de omisión de autenticación. Un atacante remoto no autenticado podría explotar esta vulnerabilidad bajo una configuración específica. • https://www.dell.com/support/kbdoc/000196367 • CWE-287: Improper Authentication CWE-288: Authentication Bypass Using an Alternate Path or Channel •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

Dell PowerStore versions 2.0.0.x, 2.0.1.x and 2.1.0.x contains an open port vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to information disclosure and arbitrary code execution. Dell PowerStore versiones 2.0.0.x, 2.0.1.x y 2.1.0.x, contienen una vulnerabilidad de puerto abierto. Un atacante remoto no autenticado podría explotar esta vulnerabilidad, conllevando a una divulgación de información y la ejecución de código arbitrario • https://www.dell.com/support/kbdoc/000196367 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

Dell EMC PowerStore versions 2.0.0.x, 2.0.1.x, and 2.1.0.x are vulnerable to a command injection flaw. An authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system takeover by an attacker. Dell EMC PowerStore versiones 2.0.0.x, 2.0.1.x y 2.1.0.x de Dell EMC PowerStore son vulnerables a un fallo de inyección de comandos. Un atacante autenticado podría explotar esta vulnerabilidad, conllevando a una ejecución de comandos arbitrarios en el Sistema Operativo subyacente de la aplicación, con los privilegios de la aplicación vulnerable. • https://www.dell.com/support/kbdoc/000196367 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 8.0EPSS: 0%CPEs: 3EXPL: 0

PowerStore SW v2.1.1.0 supports the option to export data to either a CSV or an XLSX file. The data is taken as is, without any validation or sanitization. It allows a malicious, authenticated user to inject payloads that might get interpreted as formulas by the corresponding spreadsheet application that is being used to open the CSV/XLSX file. PowerStore SW v2.1.1.0 soporta la opción de exportar datos a un archivo CSV o XLSX. Los datos se toman tal cual, sin ningún tipo de comprobación o saneo. • https://www.dell.com/support/kbdoc/000196367 • CWE-1236: Improper Neutralization of Formula Elements in a CSV File •