Vulnerabilities > Dell
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-07-02 | CVE-2024-37126 | Unspecified vulnerability in Dell Powerscale Onefs Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contain an improper privilege management vulnerability. | 6.7 |
2024-07-02 | CVE-2024-37132 | Unspecified vulnerability in Dell Powerscale Onefs Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contain an incorrect privilege assignment vulnerability. | 6.7 |
2024-07-02 | CVE-2024-37133 | Unspecified vulnerability in Dell Powerscale Onefs Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contain an improper privilege management vulnerability. | 6.7 |
2024-07-02 | CVE-2024-37134 | Unspecified vulnerability in Dell Powerscale Onefs Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contain an improper privilege management vulnerability. | 6.7 |
2024-07-02 | CVE-2024-0158 | Unspecified vulnerability in Dell products Dell BIOS contains an improper input validation vulnerability. | 6.7 |
2024-07-02 | CVE-2024-32852 | Unspecified vulnerability in Dell Powerscale Onefs Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.0 contain use of a broken or risky cryptographic algorithm vulnerability. | 7.5 |
2024-07-02 | CVE-2024-32853 | Unspecified vulnerability in Dell Powerscale Onefs Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.2 contain an execution with unnecessary privileges vulnerability. | 7.8 |
2024-07-02 | CVE-2024-32854 | Unspecified vulnerability in Dell Powerscale Onefs Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contain an improper privilege management vulnerability. | 6.7 |
2024-06-29 | CVE-2024-25943 | Unspecified vulnerability in Dell Idrac9 iDRAC9, versions prior to 7.00.00.172 for 14th Generation and 7.10.50.00 for 15th and 16th Generations, contains a session hijacking vulnerability in IPMI. | 9.8 |
2024-06-28 | CVE-2024-37137 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Cloudlink Dell Key Trust Platform, v3.0.6 and prior, contains Use of a Cryptographic Primitive with a Risky Implementation vulnerability. | 5.5 |