Vulnerabilities > Dell > Data Domain Operating System > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2025-02-01 | CVE-2024-53296 | Out-of-bounds Write vulnerability in Dell Data Domain Operating System Dell PowerProtect DD versions prior to 7.10.1.50 and 7.13.1.20 contain a Stack-based Buffer Overflow vulnerability in the RestAPI. | 4.9 |
2024-11-08 | CVE-2024-48011 | Unspecified vulnerability in Dell Data Domain Operating System Dell PowerProtect DD, versions prior to 7.7.5.50, contains an Exposure of Sensitive Information to an Unauthorized Actor vulnerability. | 6.5 |
2024-06-26 | CVE-2024-37138 | Unspecified vulnerability in Dell Data Domain Operating System Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 on DDMC contain a relative path traversal vulnerability. | 6.8 |
2024-06-26 | CVE-2024-37139 | Unspecified vulnerability in Dell Data Domain Operating System Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain an Improper Control of a Resource Through its Lifetime vulnerability in an admin operation. | 6.5 |
2024-06-26 | CVE-2024-28973 | Unspecified vulnerability in Dell Data Domain Operating System Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a Stored Cross-Site Scripting Vulnerability. | 4.8 |
2024-06-26 | CVE-2024-29173 | Unspecified vulnerability in Dell Data Domain Operating System Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a Server-Side Request Forgery (SSRF) vulnerability. | 4.9 |
2024-06-26 | CVE-2024-29174 | Unspecified vulnerability in Dell Data Domain Operating System Dell Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.30, LTS 7.10.1.20 contain an SQL Injection vulnerability. | 4.4 |
2024-06-26 | CVE-2024-29175 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Data Domain Operating System Dell PowerProtect Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.40, LTS 7.10.1.30 contain an weak cryptographic algorithm vulnerability. | 5.9 |