Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Emc_unity_operating_environment
(Dell)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 24 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-07-12 | CVE-2021-21589 | Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.1.0.0.5.394 do not exit on failed Initialization. A local authenticated Service user could potentially exploit this vulnerability to escalate privileges. | Emc_unity_operating_environment, Emc_unity_xt_operating_environment, Emc_unityvsa_operating_environment | 6.7 | ||
2021-07-12 | CVE-2021-21590 | Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.1.0.0.5.394 contain a plain-text password storage vulnerability. A local malicious user with high privileges may use the exposed password to gain access with the privileges of the compromised user. | Emc_unity_operating_environment, Emc_unity_xt_operating_environment, Emc_unityvsa_operating_environment | 6.7 | ||
2021-07-12 | CVE-2021-21591 | Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.1.0.0.5.394 contain a plain-text password storage vulnerability. A local malicious user with high privileges may use the exposed password to gain access with the privileges of the compromised user. | Emc_unity_operating_environment, Emc_unity_xt_operating_environment, Emc_unityvsa_operating_environment | 6.7 | ||
2022-01-24 | CVE-2021-43589 | Dell EMC Unity, Dell EMC UnityVSA and Dell EMC Unity XT versions prior to 5.1.2.0.5.007 contain an operating system (OS) command injection Vulnerability. A locally authenticated user with high privileges may potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the Unity underlying OS, with the privileges of the vulnerable application. Exploitation may lead to an elevation of privilege. | Emc_unity_operating_environment, Emc_unity_xt_operating_environment, Emc_unityvsa_operating_environment | 6.7 | ||
2022-01-25 | CVE-2021-36289 | Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain a sensitive information disclosure vulnerability. A local malicious user may exploit this vulnerability to read sensitive information and use it. | Emc_unity_operating_environment | 7.8 | ||
2022-01-25 | CVE-2021-36294 | Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authentication bypass vulnerability. A remote unauthenticated attacker may exploit this vulnerability by forging a cookie to login as any user. | Emc_unity_operating_environment | 9.8 | ||
2022-01-25 | CVE-2021-36295 | Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authenticated remote code execution vulnerability. A remote malicious user with privileges may exploit this vulnerability to execute commands on the system. | Emc_unity_operating_environment | 7.2 | ||
2022-01-25 | CVE-2021-36296 | Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authenticated remote code execution vulnerability. A remote malicious user with privileges may exploit this vulnerability to execute commands on the system. | Emc_unity_operating_environment | 7.2 | ||
2022-04-08 | CVE-2021-36287 | Dell VNX2 for file version 8.1.21.266 and earlier, contain an unauthenticated remote code execution vulnerability which may lead unauthenticated users to execute commands on the system. | Emc_unity_operating_environment | 9.8 | ||
2022-04-08 | CVE-2021-36288 | Dell VNX2 for File version 8.1.21.266 and earlier, contain a path traversal vulnerability which may lead unauthenticated users to read/write restricted files | Emc_unity_operating_environment | 9.1 |