Vulnerabilities (CVE)

Filtered by vendor Dell Subscribe
Total 1010 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-25947 1 Dell 1 Emc Idrac Service Module 2024-08-02 N/A 4.4 MEDIUM
Dell iDRAC Service Module version 5.3.0.0 and prior, contain an Out of bound Read Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event.
CVE-2024-38489 1 Dell 1 Emc Idrac Service Module 2024-08-02 N/A 4.4 MEDIUM
Dell iDRAC Service Module version 5.3.0.0 and prior contains Out of bound write Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service (partial) event.
CVE-2024-38490 1 Dell 1 Emc Idrac Service Module 2024-08-02 N/A 4.4 MEDIUM
Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Write Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event.
CVE-2024-38481 1 Dell 1 Emc Idrac Service Module 2024-08-02 N/A 4.4 MEDIUM
Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Read Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event.
CVE-2024-0158 1 Dell 776 Alienware M15 R6, Alienware M15 R6 Firmware, Alienware M15 R7 and 773 more 2024-07-31 N/A 6.7 MEDIUM
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges
CVE-2020-11899 2 Dell, Treck 7 Wyse 5030, Wyse 5030 Firmware, Wyse 5050 All-in-one and 4 more 2024-07-24 4.8 MEDIUM 5.4 MEDIUM
The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.
CVE-2021-21551 1 Dell 1 Dbutil 2 3.sys 2024-07-09 4.6 MEDIUM 7.8 HIGH
Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required.
CVE-2024-37134 1 Dell 1 Powerscale Onefs 2024-07-03 N/A 6.7 MEDIUM
Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contain an improper privilege management vulnerability. A local high privileged attacker could potentially exploit this vulnerability to gain root-level access.
CVE-2024-37133 1 Dell 1 Powerscale Onefs 2024-07-03 N/A 6.7 MEDIUM
Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contain an improper privilege management vulnerability. A local high privileged attacker could potentially exploit this vulnerability, leading to unauthorized gain of root-level access.
CVE-2024-37132 1 Dell 1 Powerscale Onefs 2024-07-03 N/A 6.7 MEDIUM
Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contain an incorrect privilege assignment vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Denial of service and Elevation of privileges.
CVE-2024-37126 1 Dell 1 Powerscale Onefs 2024-07-03 N/A 6.7 MEDIUM
Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contain an improper privilege management vulnerability. A local high privileged attacker could potentially exploit this vulnerability, leading to unauthorized gain of root-level access.
CVE-2024-32854 1 Dell 1 Powerscale Onefs 2024-07-03 N/A 6.7 MEDIUM
Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contain an improper privilege management vulnerability. A local high privilege attacker could potentially exploit this vulnerability, leading to privilege escalation.
CVE-2024-32853 1 Dell 1 Powerscale Onefs 2024-07-03 N/A 7.8 HIGH
Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.2 contain an execution with unnecessary privileges vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to escalation of privileges.
CVE-2024-32852 1 Dell 1 Powerscale Onefs 2024-07-03 N/A 7.5 HIGH
Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.0 contain use of a broken or risky cryptographic algorithm vulnerability. An unprivileged network malicious attacker could potentially exploit this vulnerability, leading to data leaks.
CVE-2024-28978 1 Dell 1 Openmanage Enterprise 2024-05-23 N/A 6.5 MEDIUM
Dell OpenManage Enterprise, versions 3.10 and 4.0, contains an Improper Access Control vulnerability. A high privileged remote attacker could potentially exploit this vulnerability, leading to unauthorized access to resources.
CVE-2020-12695 21 Asus, Broadcom, Canon and 18 more 217 Rt-n11, Adsl, Selphy Cp1200 and 214 more 2024-04-08 7.8 HIGH 7.5 HIGH
The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.
CVE-2024-22222 1 Dell 1 Unity Operating Environment 2024-02-28 N/A 7.8 HIGH
Dell Unity, versions prior to 5.4, contains an OS Command Injection Vulnerability within its svc_udoctor utility. An authenticated malicious user with local access could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application.
CVE-2024-22430 1 Dell 1 Powerscale Onefs 2024-02-28 N/A 5.5 MEDIUM
Dell PowerScale OneFS versions 8.2.x through 9.6.0.x contains an incorrect default permissions vulnerability. A local low privileges malicious user could potentially exploit this vulnerability, leading to denial of service.
CVE-2023-32454 1 Dell 1 Update Package Framework 2024-02-28 N/A 7.1 HIGH
DUP framework version 4.9.4.36 and prior contains insecure operation on Windows junction/Mount point vulnerability. A local malicious standard user could exploit the vulnerability to create arbitrary files, leading to denial of service
CVE-2023-39256 1 Dell 1 Rugged Control Center 2024-02-28 N/A 7.8 HIGH
Dell Rugged Control Center, version prior to 4.7, contains an improper access control vulnerability. A local malicious standard user could potentially exploit this vulnerability to modify the content in an unsecured folder during product installation and upgrade, leading to privilege escalation on the system.