dell
-
A vulnerability was found in Dell Mobility E-Lab Navigator 3.1.9/3.2.0. It has been rated as problematic. This issue affects some unknown processing of the component Feedback Submission Handler. The manipulation leads to clickjacking. The identification of this vulnerability is CVE-2024-22455. The attack may be initiated remotely. There is no exploit available.
-
Dell has released a security advisory addressing multiple vulnerabilities in PowerScale OneFS, its scale-out network-attached storage operating system. The vulnerabilities could be exploited by malicious users to compromise affected systems. The advisory provides details on several vulnerabilities, including: CVE-2025-27690: A use of default password vulnerability in PowerScale OneFS versions 9.5.0.0 through 9.10.1.0. An unauthenticated attacker…
-
Dell Technologies has released a security update addressing a critical vulnerability (CVE-2025-29987) in its PowerProtect Data Domain Operating System (DD OS). The vulnerability allows authenticated attackers to execute arbitrary commands with root privileges, posing a high security risk. Users are strongly urged to update their systems to the latest remediated versions to protect against potential…
-
A vulnerability, which was classified as problematic, was found in Dell Wyse Management Suite up to 5.0. Affected is an unknown function. The manipulation leads to insufficient resource pool. This vulnerability is traded as CVE-2025-27694. It is possible to launch the attack remotely. There is no exploit available. It is recommended to upgrade the affected…
-
A vulnerability classified as problematic was found in Dell Wyse Management Suite up to 5.0. This vulnerability affects unknown code. The manipulation leads to exposure of sensitive information through data queries. This vulnerability was named CVE-2025-29981. The attack can be initiated remotely. There is no exploit available. It is recommended to upgrade the affected component.
-
Cyber Threats Hit TAP Air, Check Point, Dell, and Samsung Germany This week, SOCRadar’s Dark Web Team uncovered several notable cyber threats circulating on hacker forums. Among the key findings are an alleged leak of TAP Air Portugal customer data and a controversial claim involving unauthorized network access to Check Point systems – though Check…
-
Dell has released a security update for Unity OS version 5.4 and earlier, addressing a set of critical The post CVE-2025-22398: Dell Unity Hit by 9.8 CVSS Root-Level Command Injection Flaw appeared first on Daily CyberSecurity.
-
CVE-2024-28964 | Dell Common Event Enabler up to 8.9.10.0 CAVATools deserialization (dsa-2024-179)
·
A vulnerability was found in Dell Common Event Enabler up to 8.9.10.0. It has been classified as very critical. Affected is an unknown function of the component CAVATools. The manipulation leads to deserialization. This vulnerability is traded as CVE-2024-28964. It is possible to launch the attack remotely. There is no exploit available. It is recommended…
-
A vulnerability was found in Dell Secure Connect Gateway Policy Manager up to 5.22.00.18. It has been classified as problematic. This affects an unknown part. The manipulation leads to permissive cross-domain policy with untrusted domains. This vulnerability is uniquely identified as CVE-2024-37131. It is possible to initiate the attack remotely. There is no exploit available.
-
A vulnerability classified as problematic has been found in Dell PowerProtect DD. Affected is an unknown function. The manipulation leads to open redirect. This vulnerability is traded as CVE-2024-37141. It is possible to launch the attack remotely. There is no exploit available. It is recommended to upgrade the affected component.
-
A vulnerability was found in Dell PowerProtect DD. It has been rated as problematic. This issue affects some unknown processing of the component Trusted Application Data Store. The manipulation leads to cross site scripting. The identification of this vulnerability is CVE-2024-28973. The attack may be initiated remotely. There is no exploit available. It is recommended…
-
Dell has issued several critical security alerts regarding vulnerabilities in its Secure Connect Gateway (SCG) products. These vulnerabilities pose significant risks to users, including potential data breaches and unauthorized access to sensitive information. This article will delve into the details of these vulnerabilities, their impact, and the necessary steps users can take to protect themselves.…
-
Dell has released a security update to address multiple vulnerabilities in its SmartFabric OS10 Software. The vulnerabilities, affecting The post Multiple Vulnerabilities Patched in Dell SmartFabric OS10 Software appeared first on Cybersecurity News.
-
Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor. Enroll Now and Save 10%: Coupon Code MWNEWS10 Note: Affiliate link – your enrollment helps support this platform at no extra cost to you. Article Link: Dell security advisory (AV25-147) – Canadian…
-
A vulnerability, which was classified as problematic, was found in Dell SmartFabric OS10 Software up to 10.5.5.10/10.5.6.x. This affects an unknown part. The manipulation leads to use of hard-coded password. This vulnerability is uniquely identified as CVE-2024-39585. It is possible to initiate the attack remotely. There is no exploit available.
-
A vulnerability, which was classified as problematic, was found in Dell SmartFabric OS10 Software up to 10.5.5.10/10.5.6.x. This affects an unknown part. The manipulation leads to use of hard-coded password. This vulnerability is uniquely identified as CVE-2024-39585. It is possible to initiate the attack remotely. There is no exploit available.
-
A vulnerability, which was classified as problematic, was found in Dell SmartFabric OS10 Software up to 10.5.5.10/10.5.6.x. This affects an unknown part. The manipulation leads to use of hard-coded password. This vulnerability is uniquely identified as CVE-2024-39585. It is possible to initiate the attack remotely. There is no exploit available.