Vulnerabilities > Dell
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2011-04-10 | CVE-2011-1672 | Information Exposure vulnerability in Dell Kace K2000 Systems Deployment Appliance The Dell KACE K2000 Systems Deployment Appliance 3.3.36822 and earlier contains a peinst CIFS share, which allows remote attackers to obtain sensitive information by reading the (1) unattend.xml or (2) sysprep.inf file, as demonstrated by reading a password. | 5.0 |
2011-02-21 | CVE-2011-0330 | Permissions, Privileges, and Access Controls vulnerability in Dell Dellsystemlite.Scanner Activex Control 1.0.0.0 The Dell DellSystemLite.Scanner ActiveX control in DellSystemLite.ocx 1.0.0.0 does not properly restrict the values of the WMIAttributesOfInterest property, which allows remote attackers to execute arbitrary WMI Query Language (WQL) statements via a crafted value, as demonstrated by a value that triggers disclosure of information about installed software. | 5.0 |
2011-02-21 | CVE-2011-0329 | Path Traversal vulnerability in Dell Dellsystemlite.Scanner Activex Control 1.0.0.0 Directory traversal vulnerability in the GetData method in the Dell DellSystemLite.Scanner ActiveX control in DellSystemLite.ocx 1.0.0.0 allows remote attackers to read arbitrary files via directory traversal sequences in the fileID parameter. | 5.0 |
2010-08-10 | CVE-2010-0834 | Improper Authentication vulnerability in Ubuntu Linux 10.04/9.10 The base-files package before 5.0.0ubuntu7.1 on Ubuntu 9.10 and before 5.0.0ubuntu20.10.04.2 on Ubuntu 10.04 LTS, as shipped on Dell Latitude 2110 netbooks, does not require authentication for package installation, which allows remote archive servers and man-in-the-middle attackers to execute arbitrary code via a crafted package. | 9.3 |
2007-08-15 | CVE-2007-4360 | Remote Access Card 4/P SSH Remote Denial Of Service vulnerability in Dell Remote Access Card 4 Unspecified vulnerability in Dell Remote Access Card 4 (DRAC4) with firmware 1.50 Build 02.16 allows remote attackers to cause a denial of service (SSH daemon crash) via certain network traffic, as demonstrated by an "nmap -O" scan with nmap 4.03, possibly related to a Mocana (Mocanada) SSH vulnerability. network dell | 4.3 |
2007-05-22 | CVE-2006-3894 | Unspecified vulnerability in Dell Bsafe Cert-C and Bsafe Crypto-C The RSA Crypto-C before 6.3.1 and Cert-C before 2.8 libraries, as used by RSA BSAFE, multiple Cisco products, and other products, allows remote attackers to cause a denial of service via malformed ASN.1 objects. | 5.0 |
2006-08-25 | CVE-2006-2113 | Improper Authentication vulnerability in multiple products The embedded HTTP server in Fuji Xerox Printing Systems (FXPS) print engine, as used in products including (1) Dell 3000cn through 5110cn and (2) Fuji Xerox DocuPrint firmware before 20060628 and Network Option Card firmware before 5.13, does not properly perform authentication for HTTP requests, which allows remote attackers to modify system configuration via crafted requests, including changing the administrator password or causing a denial of service to the print server. | 6.4 |
2006-08-25 | CVE-2006-2112 | Permissions, Privileges, and Access Controls vulnerability in multiple products Fuji Xerox Printing Systems (FXPS) print engine, as used in products including (1) Dell 3000cn through 5110cn and (2) Fuji Xerox DocuPrint firmware before 20060628 and Network Option Card firmware before 5.13, allows remote attackers to use the FTP printing interface as a proxy ("FTP bounce") by using arbitrary PORT arguments to connect to systems for which access would be otherwise restricted. | 7.5 |
2006-07-10 | CVE-2006-3470 | Remote Security vulnerability in Openmanage Cd The Dell Openmanage CD launches X11 and SSH daemons that do not require authentication, which allows remote attackers to gain privileges. | 7.5 |
2005-12-08 | CVE-2005-3661 | Remote Credential Reset vulnerability in Dell TrueMobile 2300 Dell TrueMobile 2300 Wireless Broadband Router running firmware 3.0.0.8 and 5.1.1.6, and possibly other versions, allows remote attackers to reset authentication credentials, then change configuration or firmware, via a direct request to apply.cgi with the Page parameter set to adv_password.asp. | 5.0 |