Vulnerabilities > Dell
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-12-25 | CVE-2024-52534 | Authentication Bypass by Capture-replay vulnerability in Dell Elastic Cloud Storage Dell ECS, version(s) prior to ECS 3.8.1.3, contain(s) an Authentication Bypass by Capture-replay vulnerability. | 5.4 |
2024-12-25 | CVE-2024-52543 | Exposure of Resource to Wrong Sphere vulnerability in Dell Nativeedge Orchestrator Dell NativeEdge, version(s) 2.1.0.0, contain(s) a Creation of Temporary File With Insecure Permissions vulnerability. | 4.4 |
2024-12-25 | CVE-2024-47978 | Unspecified vulnerability in Dell Nativeedge Orchestrator Dell NativeEdge, version(s) 2.1.0.0, contain(s) an Execution with Unnecessary Privileges vulnerability. | 7.8 |
2024-12-25 | CVE-2024-52535 | Link Following vulnerability in Dell products Dell SupportAssist for Home PCs versions 4.6.1 and prior and Dell SupportAssist for Business PCs versions 4.5.0 and prior, contain a symbolic link (symlink) attack vulnerability in the software remediation component. | 8.8 |
2024-12-25 | CVE-2024-53291 | Unspecified vulnerability in Dell Nativeedge Orchestrator Dell NativeEdge, version(s) 2.1.0.0, contain(s) an Exposure of Sensitive Information Through Metadata vulnerability. | 7.5 |
2024-12-19 | CVE-2024-51532 | Argument Injection or Modification vulnerability in Dell Powerstoreos Dell PowerStore contains an Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability. | 7.1 |
2024-12-18 | CVE-2024-47480 | Link Following vulnerability in Dell Inventory Collector 12.3.0.6 Dell Inventory Collector Client, versions prior to 12.7.0, contains an Improper Link Resolution Before File Access vulnerability. | 7.8 |
2024-12-17 | CVE-2024-52542 | Link Following vulnerability in Dell Appsync Dell AppSync, version 4.6.0.x, contain a Symbolic Link (Symlink) Following vulnerability. | 5.5 |
2024-12-13 | CVE-2024-24902 | Unspecified vulnerability in Dell Recoverpoint for Virtual Machines 6.0 Dell RecoverPoint for Virtual Machines 6.0.x contains an Improper access control vulnerability. | 5.5 |
2024-12-13 | CVE-2024-28980 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Recoverpoint for Virtual Machines 6.0 Dell RecoverPoint for VMs, version(s) 6.0.x contain(s) a Use of a Broken or Risky Cryptographic Algorithm vulnerability in the SSH. | 9.8 |