Show filters
80 Total Results
Displaying 11-20 of 80
Sort by:
Attacker Value
Unknown

CVE-2024-8279

Disclosure Date: September 13, 2024 (last updated January 05, 2025)
A privilege escalation vulnerability was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection via specially crafted file uploads.
0
Attacker Value
Unknown

CVE-2024-8278

Disclosure Date: September 13, 2024 (last updated January 05, 2025)
A privilege escalation vulnerability was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection via specially crafted IPMI commands.
0
Attacker Value
Unknown

CVE-2024-8059

Disclosure Date: September 13, 2024 (last updated September 14, 2024)
IPMI credentials may be captured in XCC audit log entries when the account username length is 16 characters.
Attacker Value
Unknown

CVE-2023-32460

Disclosure Date: December 08, 2023 (last updated December 15, 2023)
Dell PowerEdge BIOS contains an improper privilege management security vulnerability. An unauthenticated local attacker could potentially exploit this vulnerability, leading to privilege escalation.
Attacker Value
Unknown

CVE-2023-20081

Disclosure Date: March 22, 2023 (last updated October 08, 2023)
A vulnerability in the IPv6 DHCP (DHCPv6) client module of Cisco Adaptive Security Appliance (ASA) Software, Cisco Firepower Threat Defense (FTD) Software, Cisco IOS Software, and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of DHCPv6 messages. An attacker could exploit this vulnerability by sending crafted DHCPv6 messages to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Note: To successfully exploit this vulnerability, the attacker would need to either control the DHCPv6 server or be in a man-in-the-middle position.
Attacker Value
Unknown

CVE-2021-30066

Disclosure Date: April 03, 2022 (last updated February 23, 2025)
On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, an arbitrary firmware image can be loaded because firmware signature verification (for a USB stick) can be bypassed. NOTE: this issue exists because of an incomplete fix of CVE-2017-11400.
Attacker Value
Unknown

CVE-2021-30065

Disclosure Date: April 03, 2022 (last updated October 07, 2023)
On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, crafted ModBus packets can bypass the ModBus enforcer. NOTE: this issue exists because of an incomplete fix of CVE-2017-11401.
Attacker Value
Unknown

CVE-2021-30064

Disclosure Date: April 03, 2022 (last updated February 23, 2025)
On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, an SSH login can succeed with hardcoded default credentials (if the device is in the uncommissioned state).
Attacker Value
Unknown

CVE-2021-30063

Disclosure Date: April 03, 2022 (last updated October 07, 2023)
On Schneider Electric ConneXium Tofino OPCLSM TCSEFM0000 before 03.23 and Belden Tofino Xenon Security Appliance, crafted OPC packets can cause an OPC enforcer denial of service.
Attacker Value
Unknown

CVE-2021-30062

Disclosure Date: April 03, 2022 (last updated October 07, 2023)
On Schneider Electric ConneXium Tofino OPCLSM TCSEFM0000 before 03.23 and Belden Tofino Xenon Security Appliance, crafted OPC packets can bypass the OPC enforcer.