Show filters
155 Total Results
Displaying 31-40 of 155
Sort by:
Attacker Value
Unknown

CVE-2023-32464

Disclosure Date: June 23, 2023 (last updated October 08, 2023)
Dell VxRail, versions prior to 7.0.450, contain an improper certificate validation vulnerability. A high privileged remote attacker may potentially exploit this vulnerability to carry out a man-in-the-middle attack by supplying a crafted certificate and intercepting the victim's traffic to view or modify a victim’s data in transit.
Attacker Value
Unknown

CVE-2023-32463

Disclosure Date: June 23, 2023 (last updated October 08, 2023)
Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.
Attacker Value
Unknown

CVE-2023-23694

Disclosure Date: May 23, 2023 (last updated October 08, 2023)
Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
Attacker Value
Unknown

CVE-2023-23693

Disclosure Date: May 23, 2023 (last updated October 08, 2023)
Dell VxRail, versions prior to 7.0.450, contains an OS command injection Vulnerability in DCManager command-line utility. A local high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
Attacker Value
Unknown

CVE-2023-31994

Disclosure Date: May 23, 2023 (last updated October 08, 2023)
Certain Hanwha products are vulnerable to Denial of Service (DoS). ck vector is: When an empty UDP packet is sent to the listening service, the service thread results in a non-functional service (DoS) via WS Discovery and Hanwha proprietary discovery services. This affects IP Camera ANE-L7012R 1.41.01 and IP Camera XNV-9082R 2.10.02.
Attacker Value
Unknown

CVE-2023-25771

Disclosure Date: May 10, 2023 (last updated October 08, 2023)
Improper access control for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable denial of service via local access.
Attacker Value
Unknown

CVE-2022-37327

Disclosure Date: May 10, 2023 (last updated October 08, 2023)
Improper input validation in BIOS firmware for Intel(R) NUC, Intel(R) NUC Performance Kit, Intel(R) NUC Performance Mini PC, Intel(R) NUC 8 Compute Element, Intel(R) NUC Pro Kit, Intel(R) NUC Pro Board, Intel(R) NUC 11 Compute Element, Intel(R) NUC 12 Compute Element, Intel(R) NUC Extreme, Intel(R) NUC 12 Extreme Compute Element, Intel(R) NUC Laptop Kit, Intel(R) NUC Enthusiast, Intel(R) NUC Essential, Intel(R) NUC Laptop Kit, Intel(R) NUC Extreme Compute Element, Intel(R) NUC Boards, Intel(R) NUC Pro Compute Element, Intel(R) NUC Rugged may allow a privileged user to enable information disclosure via local access.
Attacker Value
Unknown

CVE-2022-32582

Disclosure Date: May 10, 2023 (last updated October 08, 2023)
Improper access control in firmware for some Intel(R) NUC Boards, Intel(R) NUC 11 Performance Kit, Intel(R) NUC 11 Performance Mini PC, Intel(R) NUC Pro Compute Element may allow a privileged user to potentially enable denial of service via local access.
Attacker Value
Unknown

CVE-2023-25492

Disclosure Date: May 01, 2023 (last updated October 08, 2023)
A valid, authenticated user may be able to trigger a denial of service of the XCC web user interface or other undefined behavior through a format string injection vulnerability in a web interface API.
Attacker Value
Unknown

CVE-2023-0683

Disclosure Date: May 01, 2023 (last updated October 08, 2023)
A valid, authenticated XCC user with read only access may gain elevated privileges through a specifically crafted API call.