Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-36283

Summary
Assigner-dell
Assigner Org ID-c550e75a-17ff-4988-97f0-544cde3820fe
Published At-28 Sep, 2021 | 19:20
Updated At-16 Sep, 2024 | 16:58
Rejected At-
Credits

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:dell
Assigner Org ID:c550e75a-17ff-4988-97f0-544cde3820fe
Published At:28 Sep, 2021 | 19:20
Updated At:16 Sep, 2024 | 16:58
Rejected At:
▼CVE Numbering Authority (CNA)

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.

Affected Products
Vendor
Dell Inc.Dell
Product
CPG BIOS
Versions
Affected
  • From unspecified before 1.3.1 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-20CWE-20: Improper Input Validation
Type: CWE
CWE ID: CWE-20
Description: CWE-20: Improper Input Validation
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.dell.com/support/kbdoc/000191495/
x_refsource_MISC
Hyperlink: https://www.dell.com/support/kbdoc/000191495/
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.dell.com/support/kbdoc/000191495/
x_refsource_MISC
x_transferred
Hyperlink: https://www.dell.com/support/kbdoc/000191495/
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security_alert@emc.com
Published At:28 Sep, 2021 | 20:15
Updated At:04 Oct, 2021 | 14:37

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.7MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Secondary3.17.5HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.2
Base severity: HIGH
Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Dell Inc.
dell
>>chengming_3990_firmware>>Versions before 1.3.1(exclusive)
cpe:2.3:o:dell:chengming_3990_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>chengming_3990>>-
cpe:2.3:h:dell:chengming_3990:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>chengming_3991_firmware>>Versions before 1.3.1(exclusive)
cpe:2.3:o:dell:chengming_3991_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>chengming_3991>>-
cpe:2.3:h:dell:chengming_3991:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>g3_15_3500_firmware>>Versions before 1.7.1(exclusive)
cpe:2.3:o:dell:g3_15_3500_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>g3_15_3500>>-
cpe:2.3:h:dell:g3_15_3500:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>g3_15_3590_firmware>>Versions before 1.12.0(exclusive)
cpe:2.3:o:dell:g3_15_3590_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>g3_15_3590>>-
cpe:2.3:h:dell:g3_15_3590:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>g3_15_5500_firmware>>Versions before 1.7.1(exclusive)
cpe:2.3:o:dell:g3_15_5500_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>g3_15_5500>>-
cpe:2.3:h:dell:g3_15_5500:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_3493_firmware>>Versions before 1.12.0(exclusive)
cpe:2.3:o:dell:inspiron_3493_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_3493>>-
cpe:2.3:h:dell:inspiron_3493:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_3501_firmware>>Versions before 1.1.0(exclusive)
cpe:2.3:o:dell:inspiron_3501_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_3501>>-
cpe:2.3:h:dell:inspiron_3501:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_3593_firmware>>Versions before 1.12.0(exclusive)
cpe:2.3:o:dell:inspiron_3593_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_3593>>-
cpe:2.3:h:dell:inspiron_3593:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_3793_firmware>>Versions before 1.12.0(exclusive)
cpe:2.3:o:dell:inspiron_3793_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_3793>>-
cpe:2.3:h:dell:inspiron_3793:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_3880_firmware>>Versions before 1.3.1(exclusive)
cpe:2.3:o:dell:inspiron_3880_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_3880>>-
cpe:2.3:h:dell:inspiron_3880:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_3881_firmware>>Versions before 1.3.1(exclusive)
cpe:2.3:o:dell:inspiron_3881_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_3881>>-
cpe:2.3:h:dell:inspiron_3881:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_5400_2-in-1_firmware>>Versions before 1.5.0(exclusive)
cpe:2.3:o:dell:inspiron_5400_2-in-1_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_5400_2-in-1>>-
cpe:2.3:h:dell:inspiron_5400_2-in-1:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_5490_firmware>>Versions before 1.12.0(exclusive)
cpe:2.3:o:dell:inspiron_5490_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_5490>>-
cpe:2.3:h:dell:inspiron_5490:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_5493_firmware>>Versions before 1.12.0(exclusive)
cpe:2.3:o:dell:inspiron_5493_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_5493>>-
cpe:2.3:h:dell:inspiron_5493:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_5498_firmware>>Versions before 1.12.0(exclusive)
cpe:2.3:o:dell:inspiron_5498_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_5498>>-
cpe:2.3:h:dell:inspiron_5498:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_5590_firmware>>Versions before 1.12.0(exclusive)
cpe:2.3:o:dell:inspiron_5590_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_5590>>-
cpe:2.3:h:dell:inspiron_5590:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_5593_firmware>>Versions before 1.12.0(exclusive)
cpe:2.3:o:dell:inspiron_5593_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_5593>>-
cpe:2.3:h:dell:inspiron_5593:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_5598_firmware>>Versions before 1.12.0(exclusive)
cpe:2.3:o:dell:inspiron_5598_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_5598>>-
cpe:2.3:h:dell:inspiron_5598:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_7391_2-in-1_firmware>>Versions before 1.9.1(exclusive)
cpe:2.3:o:dell:inspiron_7391_2-in-1_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_7391_2-in-1>>-
cpe:2.3:h:dell:inspiron_7391_2-in-1:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_7500_firmware>>Versions before 1.5.1(exclusive)
cpe:2.3:o:dell:inspiron_7500_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_7500>>-
cpe:2.3:h:dell:inspiron_7500:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_7500_2-in-1_silver_firmware>>Versions before 1.5.0(exclusive)
cpe:2.3:o:dell:inspiron_7500_2-in-1_silver_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_7500_2-in-1_silver>>-
cpe:2.3:h:dell:inspiron_7500_2-in-1_silver:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_7501_firmware>>Versions before 1.5.1(exclusive)
cpe:2.3:o:dell:inspiron_7501_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_7501>>-
cpe:2.3:h:dell:inspiron_7501:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_7590_firmware>>Versions before 1.8.0(exclusive)
cpe:2.3:o:dell:inspiron_7590_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_7590>>-
cpe:2.3:h:dell:inspiron_7590:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_7591_firmware>>Versions before 1.8.0(exclusive)
cpe:2.3:o:dell:inspiron_7591_firmware:*:*:*:*:*:*:*:*
Dell Inc.
dell
>>inspiron_7591>>-
cpe:2.3:h:dell:inspiron_7591:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>latitude_3310>>-
cpe:2.3:h:dell:latitude_3310:-:*:*:*:*:*:*:*
Dell Inc.
dell
>>latitude_3310_firmware>>Versions before 1.8.3(exclusive)
cpe:2.3:o:dell:latitude_3310_firmware:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarysecurity_alert@emc.com
CWE ID: CWE-20
Type: Primary
Source: security_alert@emc.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.dell.com/support/kbdoc/000191495/security_alert@emc.com
Patch
Vendor Advisory
Hyperlink: https://www.dell.com/support/kbdoc/000191495/
Source: security_alert@emc.com
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

734Records found

CVE-2021-36279
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.12%
||
7 Day CHG~0.00%
Published-16 Aug, 2021 | 22:00
Updated-16 Sep, 2024 | 23:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC PowerScale OneFS versions 8.2.x - 9.2.x contain an incorrect permission assignment for critical resource vulnerability. This could allow a user with ISI_PRIV_LOGIN_SSH or ISI_PRIV_LOGIN_CONSOLE to access privileged information about the cluster.

Action-Not Available
Vendor-Dell Inc.
Product-emc_powerscale_onefsPowerScale OneFS
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2023-25940
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 13.46%
||
7 Day CHG~0.00%
Published-04 Apr, 2023 | 10:14
Updated-11 Feb, 2025 | 17:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS version 9.5.0.0 contains improper link resolution before file access vulnerability in isi_gather_info. A high privileged local attacker could potentially exploit this vulnerability, leading to system takeover and it breaks the compliance mode guarantees.

Action-Not Available
Vendor-Dell Inc.
Product-emc_powerscale_onefsPowerScale OneFS
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2023-25536
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 10.48%
||
7 Day CHG~0.00%
Published-02 Mar, 2023 | 15:55
Updated-05 Mar, 2025 | 20:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS 9.4.0.x contains exposure of sensitive information to an unauthorized actor. A malicious authenticated local user could potentially exploit this vulnerability in certificate management, leading to a potential system takeover.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFS
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-36317
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.29%
||
7 Day CHG~0.00%
Published-21 Dec, 2021 | 17:05
Updated-16 Sep, 2024 | 16:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC Avamar Server version 19.4 contains a plain-text password storage vulnerability in AvInstaller. A local attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.

Action-Not Available
Vendor-Dell Inc.
Product-emc_powerprotect_data_protection_applianceemc_avamar_serverAvamar
CWE ID-CWE-256
Plaintext Storage of a Password
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2021-36318
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 18.90%
||
7 Day CHG~0.00%
Published-21 Dec, 2021 | 17:05
Updated-17 Sep, 2024 | 02:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC Avamar versions 18.2,19.1,19.2,19.3,19.4 contain a plain-text password storage vulnerability. A high privileged user could potentially exploit this vulnerability, leading to a complete outage.

Action-Not Available
Vendor-Dell Inc.
Product-emc_avamar_serverAvamar
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2021-36315
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.8||MEDIUM
EPSS-0.04% / 12.83%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 22:15
Updated-17 Sep, 2024 | 00:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC PowerScale Nodes contain a hardware design flaw. This may allow a local unauthenticated user to escalate privileges. This also affects Compliance mode and for Compliance mode clusters, is a critical vulnerability. Dell EMC recommends applying the workaround at your earliest opportunity.

Action-Not Available
Vendor-Dell Inc.
Product-emc_powerscale_nodes_a3000_firmwareemc_powerscale_nodes_h5600_firmwareemc_powerscale_nodes_f810_firmwareemc_powerscale_nodes_h400_firmwareemc_powerscale_nodes_h700emc_powerscale_nodes_h5600emc_powerscale_nodes_h700_firmwareemc_powerscale_nodes_x410emc_powerscale_nodes_a200_firmwareemc_powerscale_nodes_f200_firmwareemc_powerscale_nodes_x210emc_powerscale_nodes_a100_firmwareemc_powerscale_nodes_s210_firmwareemc_powerscale_nodes_f800_firmwareemc_powerscale_nodes_f600_firmwareemc_powerscale_nodes_f600emc_powerscale_nodes_a300_firmwareemc_powerscale_nodes_a200emc_powerscale_nodes_a3000emc_powerscale_nodes_h7000_firmwareemc_powerscale_nodes_x210_firmwareemc_powerscale_nodes_a2000emc_powerscale_nodes_f200emc_powerscale_nodes_h500_firmwareemc_powerscale_nodes_s210emc_powerscale_nodes_nl410emc_powerscale_nodes_h400emc_powerscale_nodes_h7000emc_powerscale_nodes_h600emc_powerscale_nodes_nl410_firmwareemc_powerscale_nodes_a100emc_powerscale_nodes_x410_firmwareemc_powerscale_nodes_a300emc_powerscale_nodes_a2000_firmwareemc_powerscale_nodes_f810emc_powerscale_nodes_h500emc_powerscale_nodes_f800emc_powerscale_nodes_h600_firmwarePowerScale Nodes
CVE-2019-18576
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.12% / 31.50%
||
7 Day CHG~0.00%
Published-13 Mar, 2020 | 20:30
Updated-16 Sep, 2024 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC XtremIO XMS versions prior to 6.3.0 contain an information disclosure vulnerability where OS users’ passwords are logged in local files. Malicious local users with access to the log files may use the exposed passwords to gain access to XtremIO with the privileges of the compromised user.

Action-Not Available
Vendor-Dell Inc.
Product-xtremio_management_serverXtremIO
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2023-28063
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 1.54%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 07:38
Updated-02 Aug, 2024 | 12:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.

Action-Not Available
Vendor-Dell Inc.
Product-inspiron_24_5410_all-in-onelatitude_5401vostro_5391_firmwarexps_15_9510_firmwarelatitude_3520precision_3561_firmwarexps_17_9710_firmwareoptiplex_tower_plus_7010_firmwareprecision_7770_firmwareprecision_7560inspiron_5590_firmwareg7_17_7790_firmwareoptiplex_all-in-one_7410_firmwarexps_13_9315inspiron_7490optiplex_5090_small_form_factor_firmwareprecision_7540inspiron_15_3511_firmwarelatitude_9420inspiron_5490_firmwareprecision_5470_firmwarelatitude_5590optiplex_5080inspiron_5502latitude_5511inspiron_5620_firmwareinspiron_7501latitude_7390_2-in-1inspiron_7300_2-in-1chengming_3911_firmwareprecision_5530_2-in-1precision_5550xps_17_9700optiplex_3000_microoptiplex_7000_microlatitude_5300vostro_3400g3_3500optiplex_3000_tower_firmwareoptiplex_micro_7010_firmwarelatitude_7320latitude_7300optiplex_7090g7_17_7700_firmwareinspiron_7000latitude_3420latitude_7490_firmwareoptiplex_tower_7010latitude_5310_2-in-1_firmwareprecision_3570inspiron_7490_firmwareinspiron_5409latitude_7400latitude_5591inspiron_3511_firmwarelatitude_5531_firmwareinspiron_14_5410precision_3570_firmwareprecision_5770_firmwarelatitude_3400latitude_3420_firmwareg5_5000xps_15_9575_2-in-1inspiron_14_5420_firmwareinspiron_5491_2-in-1_firmwareoptiplex_3090_firmwareg15_5520_firmwarelatitude_3530inspiron_7506_2-in-1_firmwarexps_13_plus_9320optiplex_7000_small_form_factor_firmwarelatitude_7320_detachable_firmwarelatitude_9410optiplex_7400_all-in-oneoptiplex_7080_firmwarelatitude_5420_rugged_firmwarelatitude_5310latitude_5530vostro_5391latitude_5431_firmwarelatitude_5420_ruggedoptiplex_7090_ultra_firmwareinspiron_7000_firmwareprecision_3450chengming_3900latitude_7390_2-in-1_firmwarelatitude_5495inspiron_5400latitude_7330_firmwarexps_15_9520_firmwarevostro_3020_small_desktopvostro_5591precision_5560optiplex_5400_all-in-one_firmwarelatitude_7430_firmwarelatitude_3330_firmwareinspiron_3881_firmwarelatitude_5521optiplex_7000_tower_firmwareoptiplex_5480_all-in-one_firmwareprecision_3540precision_5570_firmwareinspiron_3910inspiron_7510_firmwarelatitude_7520optiplex_7400_all-in-one_firmwareinspiron_7500_2-in-1_black_firmwarelatitude_3310latitude_5290_2-in-1optiplex_3090latitude_7290vostro_5410vostro_7620_firmwareinspiron_16_7620_2-in-1inspiron_5402latitude_5430_firmwarelatitude_7230_rugged_extreme_tabletprecision_7540_firmwarevostro_3881inspiron_7391_firmwarevostro_5401inspiron_24_5411_all-in-one_firmwarelatitude_5420_firmwareprecision_3561inspiron_14_7420_2-in-1vostro_5300inspiron_3493_firmwareoptiplex_3000_towerprecision_3460_xe_small_form_factor_firmwarelatitude_3190_2-in-1_firmwarevostro_5301xps_15_9510inspiron_16_plus_7620latitude_7210_2-in-1inspiron_7590vostro_5880precision_3260_compactalienware_m15_r7_firmwarealienware_m15_r6_firmwarelatitude_5491latitude_3140_firmwarelatitude_9520_firmwareprecision_5560_firmwarelatitude_5330vostro_3690_firmwarelatitude_5520_firmwareoptiplex_5480_all-in-oneinspiron_24_5410_all-in-one_firmwareinspiron_5591_2-in-1_firmwarelatitude_5400latitude_5410precision_7865_towerprecision_3541xps_8940precision_7730_firmwareprecision_3551latitude_5401_firmwareoptiplex_all-in-one_7410optiplex_3000_small_form_factor_firmwareprecision_7730inspiron_3520precision_3640_tower_firmwareinspiron_7610vostro_5301_firmwareg7_17_7790vostro_5890inspiron_5400_2-in-1latitude_5400_firmwareinspiron_7610_firmwareinspiron_5400_2-in-1_firmwareg7_15_7590inspiron_7391latitude_9330_firmwareinspiron_7700_all-in-oneprecision_3440latitude_rugged_7220ex_firmwareinspiron_13_5320vostro_5402optiplex_tower_7010_firmwareoptiplex_7090_ultrag5_5000_firmwareprecision_3550_firmwarelatitude_3310_firmwarevostro_3690precision_3460_small_form_factor_firmwareinspiron_5300_firmwareoptiplex_xe4_oemready_firmwarelatitude_7530optiplex_7490_all-in-onevostro_7500alienware_m15_r7inspiron_7590_firmwareinspiron_7791_firmwareprecision_7740_firmwareoptiplex_5090_towervostro_3681latitude_7400_2-in-1_firmwareprecision_3530latitude_5411_firmwarelatitude_3510_firmwareinspiron_3593inspiron_15_5518_firmwareprecision_7740optiplex_tower_plus_7010latitude_7310_firmwareoptiplex_3000_thin_clientinspiron_7306_2-in-1latitude_7530_firmwarexps_13_9310_firmwarexps_13_7390_firmwarelatitude_9510optiplex_3280_all-in-oneprecision_5760_firmwarevostro_3420_firmwarevostro_3681_firmwarevostro_5890_firmwarelatitude_9510_firmwareinspiron_3910_firmwareinspiron_5406_2-in-1precision_7760_firmwarelatitude_5300_2-in-1_firmwareinspiron_3511xps_13_9305_firmwareinspiron_5410vostro_5502optiplex_7780_all-in-oneinspiron_5490inspiron_3501_firmwarelatitude_5300_firmwareinspiron_3880optiplex_7000_xe_microprecision_7865_tower_firmwarexps_17_9720precision_7550inspiron_5391optiplex_small_form_factor_7010g5_15_5590_firmwareinspiron_5598inspiron_14_plus_7420latitude_5320_firmwareg7_15_7590_firmwareoptiplex_3080xps_13_9315_firmwarexps_13_9300_firmwareprecision_5750inspiron_27_7710_all-in-one_firmwarelatitude_rugged_5430precision_5570inspiron_7591latitude_7310inspiron_14_5410_firmwareinspiron_7500g15_5511inspiron_5620precision_5760optiplex_7480_all-in-onechengming_3990_firmwareprecision_3551_firmwareinspiron_3020_small_desktop_firmwarelatitude_9430vostro_3400_firmwarevostro_5310_firmwarelatitude_5290_firmwarelatitude_7424_rugged_extremeoptiplex_7480_all-in-one_firmwarelatitude_7390vostro_3500xps_13_9315_2-in-1precision_7750_firmwarelatitude_3520_firmwarechengming_3991_firmwarevostro_7590_firmwareinspiron_14_5418inspiron_7400latitude_9430_firmwareprecision_3650_tower_firmwareinspiron_24_5411_all-in-onevostro_3510xps_13_9310_2-in-1inspiron_5400_firmwarelatitude_5424_ruggedinspiron_7500_firmwareprecision_3541_firmwareinspiron_5591_2-in-1latitude_7330inspiron_14_5420inspiron_7506_2-in-1latitude_5330_firmwareprecision_3650_towervostro_3881_firmwarelatitude_7200_2-in-1latitude_5511_firmwarelatitude_3430_firmwareprecision_3550inspiron_3891_firmwareoptiplex_3090_ultra_firmwarexps_13_7390_2-in-1_firmwarelatitude_7420_firmwareinspiron_5501vostro_5501_firmwarelatitude_3310_2-in-1optiplex_5090_tower_firmwareoptiplex_3090_ultralatitude_5490vostro_5620_firmwareinspiron_3520_firmwarelatitude_3190_2-in-1inspiron_3891xps_13_9305vostro_5310optiplex_7000_xe_micro_firmwarelatitude_9410_firmwarevostro_7590optiplex_7090_firmwareinspiron_7300_2-in-1_firmwarelatitude_5300_2-in-1latitude_7424_rugged_extreme_firmwareg15_5511_firmwarelatitude_7410_firmwareprecision_3660latitude_5310_2-in-1vostro_3910inspiron_14_5418_firmwarelatitude_7230_rugged_extreme_tablet_firmwarelatitude_rugged_7330_firmwareinspiron_3020_desktoplatitude_7390_firmwarelatitude_5500_firmwarelatitude_5410_firmwarelatitude_5430xps_13_7390latitude_3530_firmwarelatitude_3400_firmwarevostro_3890latitude_3510chengming_3901_firmwareprecision_3560_firmwarelatitude_5495_firmwarevostro_5401_firmwareinspiron_3880_firmwareinspiron_5310_firmwareinspiron_5501_firmwareg7_15_7500optiplex_5080_firmwareinspiron_14_7420_2-in-1_firmwarexps_17_9700_firmwarevostro_3520_firmwareoptiplex_xe4_firmwareoptiplex_7000_micro_firmwarelatitude_5530_firmwareprecision_5470vostro_3590precision_3470_firmwareoptiplex_small_form_factor_plus_7010inspiron_15_5510vostro_5590_firmwarevostro_3020_tower_desktop_firmwareinspiron_16_plus_7620_firmwareprecision_7530_firmwarechengming_3901optiplex_5000_tower_firmwareoptiplex_micro_7010xps_13_9300xps_15_9500latitude_5500inspiron_5508_firmwareprecision_7550_firmwarelatitude_3500_firmwarechengming_3900_firmwarechengming_3991precision_3260_xe_compact_firmwareprecision_3260_xe_compactinspiron_7501_firmwareoptiplex_5090_small_form_factorinspiron_7500_2-in-1_blackg15_5510_firmwarevostro_7510_firmwarelatitude_5290_2-in-1_firmwarevostro_7510inspiron_7791latitude_5501latitude_7400_firmwarevostro_5320_firmwareprecision_3450_firmwareprecision_3460_small_form_factorchengming_3990inspiron_5301latitude_5491_firmwareprecision_3470vostro_5880_firmwarexps_17_9710inspiron_3493precision_5750_firmwareoptiplex_small_form_factor_plus_7010_firmwarelatitute_5421latitude_5520latitude_3410_firmwareinspiron_7510inspiron_7400_firmwareprecision_3260_compact_firmwareoptiplex_5400_all-in-onelatitude_3320precision_3530_firmwarexps_13_9310_2-in-1_firmwarevostro_5320xps_13_9315_2-in-1_firmwarexps_15_9575_2-in-1_firmwareinspiron_3020_small_desktopprecision_7750latitude_3430latitude_3320_firmwareoptiplex_5490_all-in-one_firmwareoptiplex_7080g15_5510inspiron_15_5518vostro_7500_firmwarelatitude_9330inspiron_16_7620_2-in-1_firmwareinspiron_15_3511inspiron_5310vostro_5510_firmwarelatitude_5424_rugged_firmwareoptiplex_5000_small_form_factor_firmwarelatitude_rugged_7330chengming_3910_firmwarelatitude_7300_firmwarelatitude_9420_firmwarelatitude_5510g7_17_7700inspiron_5401_aio_firmwarevostro_5300_firmwareoptiplex_5090_micro_firmwareinspiron_3593_firmwareoptiplex_7780_all-in-one_firmwarevostro_3710_firmwareprecision_3440_firmwareprecision_5530_2-in-1_firmwareoptiplex_5000_micro_firmwarelatitude_3310_2-in-1_firmwareg7_15_7500_firmwarelatitude_5320latitude_3330optiplex_7000_small_form_factorlatitude_7410latitude_5501_firmwareprecision_3571xps_13_7390_2-in-1optiplex_3280_all-in-one_firmwarexps_15_9500_firmwareoptiplex_xe4_oemreadylatitude_5411optiplex_5090_microvostro_3020_tower_desktopprecision_7760xps_17_9720_firmwarevostro_3500_firmwareinspiron_7306_2-in-1_firmwarelatitude_7320_detachablelatitude_9520vostro_3520inspiron_5509vostro_3590_firmwareinspiron_5406_2-in-1_firmwareinspiron_27_7710_all-in-oneinspiron_5498latitude_7420inspiron_7591_firmwarelatitude_5290inspiron_5300precision_7670inspiron_5508precision_5550_firmwareinspiron_5491_2-in-1latitude_3120_firmwarelatitude_5590_firmwareinspiron_5590vostro_5490precision_7670_firmwareinspiron_5301_firmwareinspiron_5408_firmwareinspiron_5498_firmwareprecision_3571_firmwarevostro_5490_firmwarevostro_5620latitude_7520_firmwarelatitude_5431vostro_3710optiplex_3000_thin_client_firmwarelatitude_5420inspiron_5402_firmwareprecision_7560_firmwareoptiplex_micro_plus_7010latitude_3300_firmwarelatitude_7400_2-in-1precision_3640_towervostro_5510inspiron_3490precision_7770latitude_7210_2-in-1_firmwarelatitude_rugged_5430_firmwarexps_13_9310latitude_5510_firmwarevostro_3510_firmwareoptiplex_5000_microinspiron_5410_firmwareinspiron_15_5510_firmwareinspiron_5408vostro_5410_firmwarevostro_5502_firmwareprecision_3540_firmwarelatitude_7430g3_3500_firmwareoptiplex_3000_small_form_factoroptiplex_3080_firmwarexps_13_plus_9320_firmwareoptiplex_small_form_factor_7010_firmwarelatitude_3410vostro_5402_firmwarelatitude_rugged_7220g5_15_5590inspiron_7700_all-in-one_firmwareinspiron_3881optiplex_7490_all-in-one_firmwarexps_13_9380latitude_5531precision_3660_firmwarevostro_3020_small_desktop_firmwarechengming_3910optiplex_3000_micro_firmwarevostro_3420optiplex_5000_small_form_factorlatitude_5490_firmwarelatitude_5591_firmwareinspiron_3501latitude_3140latitude_3500latitude_5310_firmwarealienware_m15_r6vostro_3890_firmwarexps_15_7590latitude_3300vostro_5590optiplex_micro_plus_7010_firmwareinspiron_5401_firmwareprecision_3460_xe_small_form_factorvostro_5501xps_15_9520latitude_7320_firmwareoptiplex_5490_all-in-onexps_8940_firmwarelatitude_3120latitude_rugged_7220_firmwareprecision_3560inspiron_5401_aiolatitude_rugged_7220exinspiron_5509_firmwarelatitude_7200_2-in-1_firmwareinspiron_3020_desktop_firmwareinspiron_5598_firmwareinspiron_13_5320_firmwarevostro_3910_firmwarelatitude_7290_firmwareprecision_5770chengming_3911precision_7530vostro_7620inspiron_5391_firmwareinspiron_5502_firmwarexps_15_7590_firmwareinspiron_3490_firmwareinspiron_14_plus_7420_firmwareg15_5520inspiron_5409_firmwarexps_13_9380_firmwarelatitude_7490optiplex_7000_towerlatitude_5521_firmwareoptiplex_5000_towerinspiron_5401latitute_5421_firmwareoptiplex_xe4vostro_5591_firmwareCPG BIOS
CWE ID-CWE-195
Signed to Unsigned Conversion Error
CWE ID-CWE-681
Incorrect Conversion between Numeric Types
CVE-2021-36293
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.4||MEDIUM
EPSS-0.13% / 33.38%
||
7 Day CHG~0.00%
Published-08 Apr, 2022 | 19:50
Updated-17 Sep, 2024 | 01:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell VNX2 for File version 8.1.21.266 and earlier, contain a privilege escalation vulnerability. A local malicious admin may potentially exploit vulnerability and gain elevated privileges.

Action-Not Available
Vendor-Dell Inc.
Product-vnxe1600vnx5600vnx5400vnx5800vnx_vg10emc_unity_operating_environmentvnx5200vnx_vg50vnx7600vnx8000VNX2
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-269
Improper Privilege Management
CVE-2016-8216
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.39% / 58.90%
||
7 Day CHG~0.00%
Published-03 Feb, 2017 | 07:24
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

EMC Data Domain OS (DD OS) 5.4 all versions, EMC Data Domain OS (DD OS) 5.5 family all versions prior to 5.5.5.0, EMC Data Domain OS (DD OS) 5.6 family all versions prior to 5.6.2.0, EMC Data Domain OS (DD OS) 5.7 family all versions prior to 5.7.2.10 has a command injection vulnerability that could potentially be exploited by malicious users to compromise the affected system.

Action-Not Available
Vendor-n/aDell Inc.
Product-emc_data_domain_osEMC Data Domain DD OS EMC Data Domain OS (DD OS) 5.4 all versions, EMC Data Domain OS (DD OS) 5.5 family all versions prior to 5.5.5.0, EMC Data Domain OS (DD OS) 5.6 family all versions prior to 5.6.2.0, EMC Data Domain OS (DD OS) 5.7 family all versions prior to 5.7.2.10
CVE-2019-3742
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-7.8||HIGH
EPSS-0.13% / 32.58%
||
7 Day CHG~0.00%
Published-09 Aug, 2019 | 19:12
Updated-17 Sep, 2024 | 00:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell/Alienware Digital Delivery versions prior to 3.5.2013 contain a privilege escalation vulnerability. A local non-privileged malicious user could exploit a named pipe that performs binary deserialization via a process hollowing technique to inject malicous code to run an executable with elevated privileges.

Action-Not Available
Vendor-Dell Inc.
Product-digital_deliveryAlienware Digital DeliveryDell Digital Delivery
CVE-2019-3744
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.64%
||
7 Day CHG~0.00%
Published-09 Aug, 2019 | 19:13
Updated-16 Sep, 2024 | 17:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell/Alienware Digital Delivery versions prior to 4.0.41 contain a privilege escalation vulnerability. A local non-privileged malicious user could exploit a Universal Windows Platform application by manipulating the install software package feature with a race condition and a path traversal exploit in order to run a malicious executable with elevated privileges.

Action-Not Available
Vendor-Dell Inc.
Product-digital_deliveryAlienware Digital DeliveryDell Digital Delivery
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2019-3704
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-7.8||HIGH
EPSS-0.33% / 55.41%
||
7 Day CHG~0.00%
Published-07 Feb, 2019 | 19:00
Updated-16 Sep, 2024 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VNX Control Station in Dell EMC VNX2 OE for File versions prior to 8.1.9.236 contains OS command injection vulnerability. Due to inadequate restriction configured in sudores, a local authenticated malicious user could potentially execute arbitrary OS commands as root by exploiting this vulnerability.

Action-Not Available
Vendor-Dell Inc.
Product-emc_vnx2_firmwareemc_vnx2VNX Control Station in Dell EMC VNX2 OE for File
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-3717
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-7.1||HIGH
EPSS-0.07% / 21.10%
||
7 Day CHG~0.00%
Published-05 Aug, 2019 | 16:38
Updated-16 Sep, 2024 | 16:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Select Dell Client Commercial and Consumer platforms contain an Improper Access Vulnerability. An unauthenticated attacker with physical access to the system could potentially bypass intended Secure Boot restrictions to run unsigned and untrusted code on expansion cards installed in the system during platform boot. Refer to https://www.dell.com/support/article/us/en/04/sln317683/dsa-2019-043-dell-client-improper-access-control-vulnerability?lang=en for versions affected by this vulnerability.

Action-Not Available
Vendor-Dell Inc.
Product-inspiron_3567precision_t5810_firmwareg7_7590inspiron_3470latitude_e7270vostro_3468xps_9560inspiron_5458precision_7920_firmwarevenue_7140_firmwareinspiron_7570vostro_3669precision_7820_firmwareinspiron_3476_firmwarevostro_5568_firmwareinspiron_7373latitude_e5550optiplex_7040_firmwarelatitude_5179latitude_7380_firmwarelatitude_7370latitude_7370_firmwarexps_9575_firmwareinspiron_5570wyse_7040latitude_e5270precision_3420wyse_5070inspiron_5368_firmwarelatitude_5490inspiron_5579latitude_5590latitude_7390_2-in-1precision_5530_2-in-1inspiron_7567vostro_3070_firmwareprecision_5720_aio_firmwareinspiron_7580_firmwareinspiron_7568_firmwareinspiron_7778_firmwareinspiron_7579precision_7920inspiron_3583precision_7720vostro_5581_firmwareinspiron_7786latitude_3380_firmwareoptiplex_7760_aiolatitude_3150inspiron_7378_firmwareprecision_5530_firmwareoptiplex_5040latitude_e7270_firmwarelatitude_5280_firmwareg5_5587_firmwarelatitude_3180inspiron_3268latitude_7424_rugged_extreme_firmwarelatitude_e5470optiplex_5250_aio_firmwareprecision_t5810optiplex_5050vostro_3667latitude_3460_firmwarelatitude_3470latitude_e7470_firmwareinspiron_7359_firmwareoptiplex_3050_aiog5_5590vostro_5468precision_7720_firmwareinspiron_3476optiplex_3060_firmwareinspiron_3558inspiron_7566_firmwareinspiron_3780latitude_3590_firmwareinspiron_5557latitude_7490_firmwareinspiron_7380_firmwarelatitude_7390_firmwarexps_9350latitude_7250_firmwareprecision_7710precision_5520precision_5720_aiolatitude_5591precision_3520inspiron_7573_firmwareinspiron_5468precision_3620precision_5820inspiron_7572g7_7790inspiron_5758_firmwareinspiron_7572_firmwareinspiron_5767_firmwarelatitude_e5570latitude_3390optiplex_5050_firmwareprecision_7520_firmwareoptiplex_3050latitude_5175_firmwarelatitude_5250xps_9380latitude_7414latitude_7414_firmwarelatitude_e5270_firmwareinspiron_7586optiplex_3040_firmwareoptiplex_7460_aio_firmwareprecision_3630_firmwarevostro_3458_firmwareinspiron_3480_firmwareg5_5590_firmwareprecision_3430inspiron_7466_firmwarexps_7760_firmwareinspiron_5568optiplex_5060_firmwarelatitude_3150_firmwarexps_9250_firmwarelatitude_7285_firmwareinspiron_670latitude_3560inspiron_5567_firmwarelatitude_e7250_firmwarevostro_3581_firmwarelatitude_3470_firmwareinspiron_7778precision_7530_firmwarelatitude_7275vostro_3581latitude_3570vostro_3583_firmwarelatitude_5414latitude_3190_firmwareinspiron_3568optiplex_5260_aioinspiron_3459_firmwarelatitude_7202inspiron_7779_firmwareg3_3779_firmwarevostro_3268_firmwarevostro_3660wyse_7040_firmwareoptiplex_7450_aiolatitude_7390_2-in-1_firmwarechengming_3967inspiron_5457latitude_7480_firmwarexps_9550_firmwarelatitude_3350_firmwarevostro_3568latitude_e5470_firmwarelatitude_7202_firmwarechengming_3977latitude_5285_firmwarelatitude_5288_firmwareinspiron_3568_firmwareinspiron_5559inspiron_5480latitude_3190vostro_5370inspiron_7460inspiron_5580_firmwareoptiplex_7760_aio_firmwarexps_9250latitude_5488latitude_5290_2-in-1_firmwarexps_9360vostro_3669_firmwarevostro_3478inspiron_7569_firmwarelatitude_7380precision_7710_firmwarelatitude_3590inspiron_3580_firmwareinspiron_3781_firmwarelatitude_5550_firmwarevostro_5370_firmwareinspiron_7472_firmwarewyse_5070_firmwarevostro_3670_firmwareinspiron_670_firmwarelatitude_7275_firmwareprecision_7520latitude_5290_2-in-1vostro_3660_firmwarevostro_3583latitude_5491_firmwareinspiron_5482latitude_7290inspiron_3153_firmwareoptiplex_3240_aioinspiron_7560precision_3630latitude_7480latitude_7214_firmwareinspiron_3559_firmwareoptiplex_3060optiplex_5060xps_7760latitude_5420_firmwareinspiron_3468inspiron_7580latitude_5550inspiron_3668inspiron_5770latitude_3450inspiron_3584latitude_3580inspiron_5482_firmwarevostro_5481latitude_7250inspiron_3668_firmwareinspiron_5559_firmwareinspiron_7467precision_3530_firmwareprecision_3930_firmwarelatitude_5285latitude_7212latitude_5580_firmwareinspiron_5480_firmwarelatitude_3189chengming_3967_firmwareoptiplex_xe3_firmwareinspiron_3158vostro_3580inspiron_7566vostro_7570_firmwarevostro_7580latitude_7350_firmwarevostro_3268inspiron_5368vostro_3584optiplex_xe3inspiron_7472latitude_5175precision_3620_firmwareprecision_5510embedded_box_pc_5000inspiron_5379_firmwareinspiron_7370xps_8900latitude_5491inspiron_3580vostro_3267_firmwarevostro_5468_firmwarevostro_3470_firmwareg3_3579inspiron_5557_firmwareinspiron_7386_firmwareinspiron_7773_firmwareoptiplex_7040inspiron_7386xps_9370_firmwareinspiron_5379latitude_7280inspiron_5579_firmwarexps_9343_firmwarexps_9570vostro_3459inspiron_7466inspiron_7373_firmwarelatitude_5480optiplex_7050_firmwarevostro_5471_firmwarelatitude_3379_firmwareinspiron_7773inspiron_7779optiplex_3046vostro_3468_firmwareinspiron_7380xps_9370latitude_7350latitude_3160_firmwareoptiplex_5260_aio_firmwarelatitude_7285inspiron_7570_firmwareinspiron_3559inspiron_7353_firmwareinspiron_5378_firmwareprecision_3420_firmwareinspiron_5459_firmwarevostro_3459_firmwareprecision_7510_firmwareinspiron_5481precision_t7810_firmwareprecision_5530_2-in-1_firmwarexps_9550inspiron_5567inspiron_7786_firmwareinspiron_7569inspiron_3458optiplex_7450_aio_firmwarelatitude_e5450inspiron_3576xps_9350_firmwarevostro_3668_firmwareinspiron_5578latitude_3160latitude_7214inspiron_3781inspiron_3576_firmwareprecision_3430_firmwareinspiron_5468_firmwarelatitude_3550_firmwareg7_7588_firmwarelatitude_3570_firmwareoptiplex_3050_firmwareoptiplex_3050_aio_firmwarevostro_3568_firmwareg3_3579_firmwarelatitude_3480_firmwarelatitude_3189_firmwarexps_9570_firmwarelatitude_7389optiplex_7440_aio_firmwarelatitude_3560_firmwareinspiron_5570_firmwarelatitude_5290latitude_5289_firmwarechengming_3980_firmwareinspiron_3481inspiron_3780_firmwareprecision_3530g7_7588xps_9380_firmwareinspiron_3470_firmwarelatitude_5590_firmwarelatitude_3350vostro_5481_firmwareinspiron_5370latitude_5250_firmwareinspiron_7467_firmwareoptiplex_7460_aioinspiron_7577_firmwarevostro_3267inspiron_3481_firmwareprecision_5530inspiron_7577optiplex_5250_aiolatitude_7212_firmwareinspiron_5582optiplex_7440_aioinspiron_3584_firmwarelatitude_3450_firmwareinspiron_3459precision_t7910_firmwareprecision_3930inspiron_3480inspiron_3583_firmwareinspiron_5770_firmwareinspiron_7586_firmwarelatitude_3490inspiron_3153latitude_e5450_firmwareinspiron_5568_firmwarelatitude_5420latitude_3180_firmwareinspiron_3558_firmwarevostro_3580_firmwareinspiron_3581_firmwarexps_8900_firmwarevostro_5471latitude_3490_firmwareinspiron_5759_firmwarevostro_5581vostro_3668inspiron_5566inspiron_7378inspiron_5558xps_9343latitude_7280_firmwareg7_7790_firmwareinspiron_5758vostro_3670latitude_5280latitude_5179_firmwareinspiron_3467latitude_e5570_firmwarexps_9560_firmwareinspiron_7460_firmwareoptiplex_3240_aio_firmwarexps_9360_firmwareoptiplex_3046_firmwarelatitude_3380inspiron_5580latitude_5289latitude_5480_firmwarelatitude_e7450_firmwareinspiron_5582_firmwareinspiron_7368latitude_3460precision_7820inspiron_7359precision_5510_firmwareinspiron_5558_firmwarelatitude_e5550_firmwareinspiron_7579_firmwareinspiron_3468_firmwarelatitude_3480inspiron_5459latitude_5490_firmwarelatitude_5591_firmwareinspiron_5378vostro_3070latitude_e7450inspiron_5481_firmwareprecision_5520_firmwarelatitude_5580latitude_3379inspiron_7573vostro_3584_firmwareinspiron_5457_firmwareinspiron_3268_firmwarevostro_3478_firmwarevostro_3480precision_3520_firmwareinspiron_3567_firmwarelatitude_3550chengming_3980inspiron_7567_firmwarelatitude_5450precision_t7810vostro_3458optiplex_7060inspiron_7560_firmwareinspiron_3467_firmwarelatitude_5290_firmwarelatitude_7424_rugged_extremeprecision_t7910g5_5587latitude_3580_firmwarevostro_3470inspiron_7353latitude_7390optiplex_3040vostro_7570venue_7140latitude_5450_firmwarelatitude_7290_firmwareprecision_7530inspiron_5370_firmwarelatitude_3390_firmwarechengming_3977_firmwarexps_9575vostro_3480_firmwareprecision_7510latitude_e5250g7_7590_firmwarelatitude_e5250_firmwareembedded_box_pc_5000_firmwareoptiplex_7050inspiron_3458_firmwarevostro_7580_firmwareprecision_3510_firmwareprecision_3510inspiron_7370_firmwareinspiron_5458_firmwarelatitude_5414_firmwarelatitude_7490inspiron_5759latitude_7389_firmwarelatitude_5288inspiron_5566_firmwareinspiron_5767inspiron_3158_firmwareoptiplex_7060_firmwareinspiron_7368_firmwareg3_3779latitude_e7470precision_5820_firmwareoptiplex_5040_firmwareinspiron_5578_firmwareinspiron_3581vostro_5568vostro_3667_firmwareinspiron_7568latitude_e7250latitude_5488_firmwareDell Client Commercial and Consumer platforms
CVE-2019-3735
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-7||HIGH
EPSS-0.03% / 8.06%
||
7 Day CHG~0.00%
Published-20 Jun, 2019 | 21:43
Updated-17 Sep, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell SupportAssist for Business PCs version 2.0 and Dell SupportAssist for Home PCs version 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2, and 3.2.1 contain an Improper Privilege Management Vulnerability. A malicious local user can exploit this vulnerability by inheriting a system thread using a leaked thread handle to gain system privileges on the affected machine.

Action-Not Available
Vendor-Dell Inc.
Product-supportassist_for_business_pcssupportassist_for_home_pcsDell SupportAssist for Home PCsDell SupportAssist for Business PCs
CWE ID-CWE-269
Improper Privilege Management
CVE-2019-3727
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 10.26%
||
7 Day CHG~0.00%
Published-15 May, 2019 | 15:45
Updated-17 Sep, 2024 | 03:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OS command injection vulnerability

Dell EMC RecoverPoint versions prior to 5.1.3 and RecoverPoint for VMs versions prior to 5.2.0.2 contain an OS command injection vulnerability in the installation feature of Boxmgmt CLI. A malicious boxmgmt user may potentially be able to execute arbitrary commands as root.

Action-Not Available
Vendor-Dell Inc.
Product-emc_recoverpointrecoverpoint_for_virtual_machinesRecoverPoint
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-11072
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.52%
||
7 Day CHG~0.00%
Published-02 Oct, 2018 | 13:00
Updated-16 Sep, 2024 | 19:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Digital Delivery versions prior to 3.5.1 contain a DLL Injection Vulnerability. A local authenticated malicious user with advance knowledge of the application workflow could potentially load and execute a malicious DLL with administrator privileges.

Action-Not Available
Vendor-Dell Inc.
Product-digital_deliveryDell Digital Delivery
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-18579
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-7.6||HIGH
EPSS-0.23% / 45.36%
||
7 Day CHG~0.00%
Published-16 Dec, 2019 | 19:45
Updated-16 Sep, 2024 | 22:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Settings for the Dell XPS 13 2-in-1 (7390) BIOS versions prior to 1.1.3 contain a configuration vulnerability. The BIOS configuration for the "Enable Thunderbolt (and PCIe behind TBT) pre-boot modules" setting is enabled by default. A local unauthenticated attacker with physical access to a user's system can obtain read or write access to main memory via a DMA attack during platform boot.

Action-Not Available
Vendor-Dell Inc.
Product-xps_7390_firmwarexps_7390CPG BIOS
CWE ID-CWE-16
Not Available
CVE-2019-18577
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.10% / 28.97%
||
7 Day CHG~0.00%
Published-13 Mar, 2020 | 20:30
Updated-16 Sep, 2024 | 18:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC XtremIO XMS versions prior to 6.3.0 contain an incorrect permission assignment vulnerability. A malicious local user with XtremIO xinstall privileges may exploit this vulnerability to gain root access.

Action-Not Available
Vendor-Dell Inc.
Product-xtremio_management_serverXtremIO
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2021-21595
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6||MEDIUM
EPSS-0.14% / 34.21%
||
7 Day CHG-0.05%
Published-16 Aug, 2021 | 22:00
Updated-17 Sep, 2024 | 00:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC PowerScale OneFS versions 8.2.x - 9.1.1.x contain an improper neutralization of special elements used in an OS command. This vulnerability could allow the compadmin user to elevate privileges. This only impacts Smartlock WORM compliance mode clusters as a critical vulnerability and Dell recommends to update/upgrade at the earliest opportunity.

Action-Not Available
Vendor-Dell Inc.
Product-emc_powerscale_onefsPowerScale OneFS
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2021-21553
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-7.3||HIGH
EPSS-0.03% / 7.88%
||
7 Day CHG~0.00%
Published-02 Aug, 2021 | 23:45
Updated-17 Sep, 2024 | 03:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS versions 8.1.0-9.1.0 contain an Incorrect User Management vulnerability.under some specific conditions, this can allow the CompAdmin user to elevate privileges and break out of Compliance mode. This is a critical vulnerability and Dell recommends upgrading at the earliest.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFS
CWE ID-CWE-286
Incorrect User Management
CVE-2021-36290
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.4||MEDIUM
EPSS-0.11% / 30.45%
||
7 Day CHG~0.00%
Published-08 Apr, 2022 | 19:50
Updated-16 Sep, 2024 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell VNX2 for File version 8.1.21.266 and earlier, contain a privilege escalation vulnerability. A local malicious admin may potentially exploit vulnerability and gain privileges.

Action-Not Available
Vendor-Dell Inc.
Product-vnxe1600vnx5600vnx5400vnx5800vnx_vg10emc_unity_operating_environmentvnx5200vnx_vg50vnx7600vnx8000VNX2
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CWE ID-CWE-269
Improper Privilege Management
CVE-2022-46756
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-8.2||HIGH
EPSS-0.05% / 14.59%
||
7 Day CHG~0.00%
Published-01 Feb, 2023 | 05:37
Updated-27 Mar, 2025 | 13:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.

Action-Not Available
Vendor-Dell Inc.
Product-vxrail_managerVxRail HCI
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2025-30098
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 13.73%
||
7 Day CHG~0.00%
Published-04 Aug, 2025 | 14:42
Updated-12 Aug, 2025 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges.

Action-Not Available
Vendor-Dell Inc.
Product-PowerProtect Data Domain LTS 2023PowerProtect Data Domain Feature ReleasePowerProtect Data Domain LTS2024
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-30097
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 13.73%
||
7 Day CHG~0.00%
Published-04 Aug, 2025 | 14:38
Updated-12 Aug, 2025 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges

Action-Not Available
Vendor-Dell Inc.
Product-PowerProtect Data Domain LTS 2023PowerProtect Data Domain Feature ReleasePowerProtect Data Domain LTS2024
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-30096
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 13.73%
||
7 Day CHG~0.00%
Published-04 Aug, 2025 | 14:32
Updated-12 Aug, 2025 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the DDSH CLI. A high privileged attacker with local access could potentially exploit this vulnerability to execute arbitrary commands with root privileges.

Action-Not Available
Vendor-Dell Inc.
Product-PowerProtect Data Domain LTS 2023PowerProtect Data Domain Feature ReleasePowerProtect Data Domain LTS2024
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-45095
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 23.14%
||
7 Day CHG~0.00%
Published-01 Feb, 2023 | 04:45
Updated-27 Mar, 2025 | 13:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS, 8.2.x-9.4.x, contain a command injection vulnerability. An authenticated user having access local shell and having the privilege to gather logs from the cluster could potentially exploit this vulnerability, leading to execute arbitrary commands, denial of service, information disclosure, and data deletion.

Action-Not Available
Vendor-Dell Inc.
Product-emc_powerscale_onefsPowerScale OneFS
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2016-0911
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-8.2||HIGH
EPSS-0.35% / 56.72%
||
7 Day CHG-0.32%
Published-19 Jun, 2016 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

EMC Data Domain OS 5.4 through 5.7 before 5.7.2.0 has a default no_root_squash option for NFS exports, which makes it easier for remote attackers to obtain filesystem access by leveraging client root privileges.

Action-Not Available
Vendor-n/aDell Inc.
Product-emc_data_domain_osn/a
CVE-2024-25961
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6||MEDIUM
EPSS-0.06% / 17.39%
||
7 Day CHG~0.00%
Published-28 Mar, 2024 | 18:00
Updated-09 Jan, 2025 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.x contains an improper privilege management vulnerability. A local high privileged attacker could potentially exploit this vulnerability, leading to escalation of privileges.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFS
CWE ID-CWE-269
Improper Privilege Management
CVE-2025-21111
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-7.5||HIGH
EPSS-0.02% / 2.44%
||
7 Day CHG~0.00%
Published-08 Jan, 2025 | 17:38
Updated-24 Jan, 2025 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell VxRail, versions 8.0.000 through 8.0.311, contain(s) a Plaintext Storage of a Password vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure.

Action-Not Available
Vendor-Dell Inc.
Product-vxrail_s670vxrail_e665_firmwarevxrail_p670n_firmwarevxrail_e665fvxrail_p675nvxrail_p570_vcfvxrail_p580nvxrail_g560_vcfvxrail_v570_firmwarevxrail_e560f_vcfvxrail_p580n_vcfvxrail_v570_vcf_firmwarevxrail_vd-4520c_firmwarevxrail_vd-4000zvxrail_e665f_firmwarevxrail_p570vxrail_p670nvxrail_e560fvxrail_v670fvxrail_d560f_firmwarevxrail_vd-4520cvxrail_e665vxrail_e660nvxrail_e560_vcf_firmwarevxrail_e660f_firmwarevxrail_p570f_firmwarevxrail_p580n_firmwarevxrail_e560nvxrail_v570_vcfvxrail_e660n_firmwarevxrail_p570_firmwarevxrail_e560f_firmwarevxrail_vd-4510cvxrail_g560vxrail_e560n_firmwarevxrail_e665nvxrail_p570_vcf_firmwarevxrail_p675f_firmwarevxrail_e560n_vcfvxrail_e660_firmwarevxrail_e560f_vcf_firmwarevxrail_vd-4000wvxrail_g560_vcf_firmwarevxrail_g560fvxrail_v470vxrail_e460_firmwarevxrail_s570_vcfvxrail_p570f_vcf_firmwarevxrail_p670f_firmwarevxrail_e460vxrail_e660vxrail_e560_vcfvxrail_s670_firmwarevxrail_p670fvxrail_p470_firmwarevxrail_d560vxrail_d560fvxrail_v570vxrail_vd-4510c_firmwarevxrail_e560_firmwarevxrail_s570_vcf_firmwarevxrail_g560_firmwarevxrail_s470vxrail_v470_firmwarevxrail_p570fvxrail_e665n_firmwarevxrail_g560f_firmwarevxrail_v670f_firmwarevxrail_p675n_firmwarevxrail_vd-4000rvxrail_d560_firmwarevxrail_s570vxrail_s470_firmwarevxrail_s570_firmwarevxrail_e660fvxrail_vd-4000r_firmwarevxrail_e560vxrail_vd-4000z_firmwarevxrail_e560n_vcf_firmwarevxrail_p570f_vcfvxrail_vd-4000w_firmwarevxrail_p675fvxrail_p580n_vcf_firmwarevxrail_p470Dell VxRail HCI
CWE ID-CWE-256
Plaintext Storage of a Password
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2025-21102
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-7.5||HIGH
EPSS-0.02% / 2.88%
||
7 Day CHG~0.00%
Published-08 Jan, 2025 | 11:25
Updated-24 Jan, 2025 | 19:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell VxRail, versions 7.0.000 through 7.0.532, contain(s) a Plaintext Storage of a Password vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure.

Action-Not Available
Vendor-Dell Inc.
Product-vxrail_s670vxrail_e665_firmwarevxrail_p670n_firmwarevxrail_e665fvxrail_p675nvxrail_p570_vcfvxrail_p580nvxrail_g560_vcfvxrail_v570_firmwarevxrail_e560f_vcfvxrail_p580n_vcfvxrail_v570_vcf_firmwarevxrail_vd-4520c_firmwarevxrail_vd-4000zvxrail_e665f_firmwarevxrail_p570vxrail_p670nvxrail_e560fvxrail_v670fvxrail_d560f_firmwarevxrail_vd-4520cvxrail_e665vxrail_e660nvxrail_e560_vcf_firmwarevxrail_e660f_firmwarevxrail_p570f_firmwarevxrail_p580n_firmwarevxrail_e560nvxrail_v570_vcfvxrail_e660n_firmwarevxrail_p570_firmwarevxrail_e560f_firmwarevxrail_vd-4510cvxrail_g560vxrail_e560n_firmwarevxrail_e665nvxrail_p570_vcf_firmwarevxrail_p675f_firmwarevxrail_e560n_vcfvxrail_e660_firmwarevxrail_e560f_vcf_firmwarevxrail_vd-4000wvxrail_g560_vcf_firmwarevxrail_g560fvxrail_v470vxrail_e460_firmwarevxrail_s570_vcfvxrail_p570f_vcf_firmwarevxrail_p670f_firmwarevxrail_e460vxrail_e660vxrail_e560_vcfvxrail_s670_firmwarevxrail_p670fvxrail_p470_firmwarevxrail_d560vxrail_d560fvxrail_v570vxrail_vd-4510c_firmwarevxrail_e560_firmwarevxrail_s570_vcf_firmwarevxrail_g560_firmwarevxrail_s470vxrail_v470_firmwarevxrail_p570fvxrail_e665n_firmwarevxrail_g560f_firmwarevxrail_v670f_firmwarevxrail_p675n_firmwarevxrail_vd-4000rvxrail_d560_firmwarevxrail_s570vxrail_s470_firmwarevxrail_s570_firmwarevxrail_e660fvxrail_vd-4000r_firmwarevxrail_e560vxrail_vd-4000z_firmwarevxrail_e560n_vcf_firmwarevxrail_p570f_vcfvxrail_vd-4000w_firmwarevxrail_p675fvxrail_p580n_vcf_firmwarevxrail_p470Dell VxRail HCI
CWE ID-CWE-256
Plaintext Storage of a Password
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2024-52537
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.3||MEDIUM
EPSS-0.01% / 2.11%
||
7 Day CHG~0.00%
Published-11 Dec, 2024 | 07:26
Updated-04 Feb, 2025 | 16:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Client Platform Firmware Update Utility contains an Improper Link Resolution vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

Action-Not Available
Vendor-Dell Inc.Linux Kernel Organization, IncMicrosoft Corporation
Product-windowsdock_wd19_firmware_update_utilitylinux_kerneldock_wd22tb4_firmware_update_utilitydock_hd22q_firmware_update_utilityDell Client Platform BIOS
CWE ID-CWE-61
UNIX Symbolic Link (Symlink) Following
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2024-53292
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-7.2||HIGH
EPSS-0.02% / 4.07%
||
7 Day CHG~0.00%
Published-11 Dec, 2024 | 07:55
Updated-04 Feb, 2025 | 16:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell VxVerify, versions prior to x.40.405, contain a Plain-text Password Storage Vulnerability in the shell wrapper. A local high privileged attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable component with privileges of the compromised account.

Action-Not Available
Vendor-Dell Inc.
Product-vxrail_hyperconverged_infrastructureDell VxRail HCI
CWE ID-CWE-256
Plaintext Storage of a Password
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2024-48015
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 3.12%
||
7 Day CHG+0.01%
Published-17 Mar, 2025 | 17:16
Updated-14 Jul, 2025 | 20:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution.

Action-Not Available
Vendor-Dell Inc.
Product-smartfabric_os10SmartFabric OS10 Software
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2024-39580
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 7.36%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 08:54
Updated-16 Sep, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale InsightIQ, versions 5.0 through 5.1, contains an Improper Access Control vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

Action-Not Available
Vendor-Dell Inc.
Product-insightiqPowerScale InsightIQpowerscale_insightiq
CWE ID-CWE-284
Improper Access Control
CVE-2024-39574
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.30%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 09:01
Updated-16 Sep, 2024 | 15:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale InsightIQ, version 5.1, contain an Improper Privilege Management vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Denial of service.

Action-Not Available
Vendor-Dell Inc.
Product-insightiqPowerScale InsightIQpowerscale_insightiq
CWE ID-CWE-269
Improper Privilege Management
CVE-2024-39579
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 7.22%
||
7 Day CHG~0.00%
Published-31 Aug, 2024 | 07:40
Updated-03 Sep, 2024 | 20:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contains an incorrect privilege assignment vulnerability. A local high privileged attacker could potentially exploit this vulnerability to gain root-level access.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFSpowerscale_onefs
CWE ID-CWE-266
Incorrect Privilege Assignment
CVE-2024-38296
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 5.79%
||
7 Day CHG~0.00%
Published-22 Nov, 2024 | 02:58
Updated-04 Feb, 2025 | 16:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Edge Gateway 3200, versions prior to 15.40.30.2879, and Edge Gateway 5200, versions prior to 12.0.94.2380, contain an Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to information exposure.

Action-Not Available
Vendor-Dell Inc.
Product-edge_gateway_5200intel_management_engine_firmware_update_utilityedge_gateway_3200Edge Gateway 5200edge_gateway_5200_firmware
CWE ID-CWE-1421
Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution
CVE-2024-37133
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.10%
||
7 Day CHG~0.00%
Published-02 Jul, 2024 | 07:18
Updated-02 Aug, 2024 | 03:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contain an improper privilege management vulnerability. A local high privileged attacker could potentially exploit this vulnerability, leading to unauthorized gain of root-level access.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFSpowerscale_onefs
CWE ID-CWE-269
Improper Privilege Management
CVE-2024-37132
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.22%
||
7 Day CHG~0.00%
Published-02 Jul, 2024 | 07:14
Updated-02 Aug, 2024 | 03:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contain an incorrect privilege assignment vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Denial of service and Elevation of privileges.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFSpowerscale_onefs
CWE ID-CWE-266
Incorrect Privilege Assignment
CVE-2024-37126
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.10%
||
7 Day CHG~0.00%
Published-02 Jul, 2024 | 07:28
Updated-02 Aug, 2024 | 03:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contain an improper privilege management vulnerability. A local high privileged attacker could potentially exploit this vulnerability, leading to unauthorized gain of root-level access.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFSpowerscale_onefs
CWE ID-CWE-269
Improper Privilege Management
CVE-2024-37134
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 17.74%
||
7 Day CHG~0.00%
Published-02 Jul, 2024 | 07:24
Updated-02 Aug, 2024 | 03:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contain an improper privilege management vulnerability. A local high privileged attacker could potentially exploit this vulnerability to gain root-level access.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFSpowerscale_onefs
CWE ID-CWE-266
Incorrect Privilege Assignment
CVE-2024-32854
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.10% / 28.60%
||
7 Day CHG~0.00%
Published-02 Jul, 2024 | 07:08
Updated-02 Aug, 2024 | 02:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contain an improper privilege management vulnerability. A local high privilege attacker could potentially exploit this vulnerability, leading to privilege escalation.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFSpowerscale_onefs
CWE ID-CWE-269
Improper Privilege Management
CVE-2015-4056
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 18.89%
||
7 Day CHG~0.00%
Published-21 Feb, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The System Library in VCE Vision Intelligent Operations before 2.6.5 does not properly implement cryptography, which makes it easier for local users to discover credentials by leveraging administrative access.

Action-Not Available
Vendor-n/aDell Inc.
Product-vce_vision_intelligent_operationsn/a
CVE-2015-2890
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-6||MEDIUM
EPSS-0.43% / 61.67%
||
7 Day CHG~0.00%
Published-01 Aug, 2015 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The BIOS implementation on Dell Latitude, OptiPlex, Precision Mobile Workstation, and Precision Workstation Client Solutions (CS) devices with model-dependent firmware before A21 does not enforce a BIOS_CNTL locking protection mechanism upon being woken from sleep, which allows local users to conduct EFI flash attacks by leveraging console access, a similar issue to CVE-2015-3692.

Action-Not Available
Vendor-n/aDell Inc.
Product-latitude_e6420_xfrlatitude_e5420latitude_e4310bioslatitude_e6420_atgprecision_t5600latitude_e5520precision_t5600_xlprecision_t1600precision_mobile_m4500optiplex_390precision_mobile_m4600latitude_e5410optiplex_990latitude_xt3latitude_e6320latitude_e6510precision_t3600optiplex_790latitude_e6410_atglatitude_e5510precision_mobile_m6600latitude_e6220latitude_e6520n/a
CVE-2024-25967
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.08% / 23.37%
||
7 Day CHG~0.00%
Published-14 May, 2024 | 06:44
Updated-09 Jan, 2025 | 15:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS versions 8.2.x through 9.7.0.1 contains an execution with unnecessary privileges vulnerability. A local high privileged attacker could potentially exploit this vulnerability, leading to escalation of privileges.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFSpowerscale_onefs
CWE ID-CWE-250
Execution with Unnecessary Privileges
CVE-2022-34401
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-7.5||HIGH
EPSS-0.03% / 6.04%
||
7 Day CHG~0.00%
Published-18 Jan, 2023 | 05:51
Updated-03 Apr, 2025 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell BIOS contains a stack based buffer overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to send larger than expected input to a parameter in order to gain arbitrary code execution in SMRAM.

Action-Not Available
Vendor-Dell Inc.
Product-g15_5525_firmwarealienware_m17_r5_firmwarealienware_m15_a6_firmwareg15_5525alienware_m15_a6alienware_m17_r5CPG BIOS
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-34403
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-7.5||HIGH
EPSS-0.04% / 10.46%
||
7 Day CHG~0.00%
Published-01 Feb, 2023 | 05:19
Updated-26 Mar, 2025 | 18:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell BIOS contains a Stack based buffer overflow vulnerability. A local authenticated attacker could potentially exploit this vulnerability by using an SMI to send larger than expected input to a parameter to gain arbitrary code execution in SMRAM.

Action-Not Available
Vendor-Dell Inc.
Product-inspiron_15_3511inspiron_5310vostro_5510_firmwarexps_15_9510_firmwarelatitude_3520vostro_3525_firmwareprecision_3561_firmwarexps_17_9710_firmwareinspiron_3275inspiron_7610precision_3650_towerlatitude_rugged_7330precision_7560latitude_5421vostro_5890latitude_9420_firmwareinspiron_3891_firmwareinspiron_3785_firmwareinspiron_3525_firmwarelatitude_7420_firmwareinspiron_7610_firmwareinspiron_15_3511_firmwareoptiplex_5090_firmwareinspiron_3515_firmwarelatitude_9420g15_5525_firmwareinspiron_3475inspiron_5505inspiron_3505g15_5525optiplex_7090_ultrainspiron_3595inspiron_5485_2-in-1latitude_5320inspiron_3891vostro_5310inspiron_5510_firmwarealienware_m17_r5_amdinspiron_7405_2-in-1inspiron_3275_firmwarevostro_3690precision_7760inspiron_5425g15_5511_firmwarelatitude_7320alienware_m15_r7inspiron_5485vostro_5515_firmwarevostro_5625latitude_7320_detachablelatitude_9520vostro_3425vostro_3515_firmwareoptiplex_7090_tower_firmwareinspiron_5515inspiron_5415_firmwarelatitude_3420inspiron_14_5410_2-in-1_firmwareinspiron_3505_firmwareinspiron_5585optiplex_7090_aiolatitude_7420latitude_rugged_7330_firmwareinspiron_3785vostro_3890optiplex_7090_aio_firmwareprecision_3560_firmwareinspiron_7415inspiron_3525vostro_3515inspiron_5310_firmwareinspiron_5505_firmwarelatitude_7520_firmwareinspiron_14_5410_2-in-1inspiron_7425latitude_3420_firmwarelatitude_5420precision_5760_firmwareinspiron_5485_firmwareg5_se_5505_firmwareprecision_7560_firmwarevostro_5890_firmwareprecision_7760_firmwareinspiron_7425_firmwarevostro_3525vostro_5510inspiron_5515_firmwarelatitude_rugged_5430_firmwareinspiron_5410latitude_7320_detachable_firmwareinspiron_3585vostro_3510_firmwareg5_se_5505inspiron_5410_firmwarevostro_5410_firmwarevostro_5415inspiron_7415_firmwareoptiplex_7090_ultra_firmwareinspiron_5415precision_3450inspiron_5510precision_5560alienware_m17_r5_amd_firmwarelatitude_5320_firmwareg15_5510_firmwarevostro_7510_firmwarelatitude_5521vostro_5515g15_5515vostro_7510inspiron_7510_firmwarelatitude_rugged_5430latitude_7520alienware_m15_r6vostro_3890_firmwareprecision_3450_firmwarelatitude_5421_firmwareg15_5511vostro_3405optiplex_7090_towerprecision_5760g15_5515_firmwareinspiron_3195_2-in-1_firmwarealienware_m15_ryzen_edition_r5latitude_7320_firmwareoptiplex_5490_all-in-onexps_17_9710precision_3560vostro_5410inspiron_5405_firmwareinspiron_5425_firmwareinspiron_7405_2-in-1_firmwarevostro_5310_firmwareinspiron_3515latitude_5420_firmwareprecision_3561latitude_5520inspiron_7510latitude_3320vostro_3405_firmwarevostro_5625_firmwareinspiron_3195_2-in-1xps_15_9510alienware_m15_ryzen_edition_r5_firmwarelatitude_3520_firmwarevostro_3425_firmwareinspiron_5485_2-in-1_firmwarealienware_m15_r7_firmwarealienware_m15_r6_firmwareinspiron_3595_firmwarelatitude_3320_firmwareprecision_3650_tower_firmwarelatitude_5521_firmwarelatitude_9520_firmwareinspiron_3585_firmwareoptiplex_5490_all-in-one_firmwareprecision_5560_firmwareinspiron_5585_firmwarevostro_3510vostro_3690_firmwarevostro_5415_firmwareg15_5510inspiron_5405inspiron_3475_firmwarelatitude_5520_firmwareoptiplex_5090CPG BIOS
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-5348
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.8||MEDIUM
EPSS-0.11% / 30.90%
||
7 Day CHG~0.00%
Published-03 Apr, 2020 | 23:20
Updated-17 Sep, 2024 | 03:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Latitude 7202 Rugged Tablet BIOS versions prior to A28 contain a UAF vulnerability in EFI_BOOT_SERVICES in system management mode. A local unauthenticated attacker may exploit this vulnerability by overwriting the EFI_BOOT_SERVICES structure to execute arbitrary code in system management mode.

Action-Not Available
Vendor-Dell Inc.
Product-latitude_7202_firmwarelatitude_7202CPG BIOS
CWE ID-CWE-416
Use After Free
CVE-2020-5363
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-8.6||HIGH
EPSS-0.05% / 14.47%
||
7 Day CHG~0.00%
Published-10 Jun, 2020 | 20:40
Updated-16 Sep, 2024 | 20:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Select Dell Client Consumer and Commercial platforms include an issue that allows the BIOS Admin password to be changed through Dell's manageability interface without knowledge of the current BIOS Admin password. This could potentially allow an unauthorized actor, with physical access and/or OS administrator privileges to the device, to gain privileged access to the platform and the hard drive.

Action-Not Available
Vendor-Dell Inc.
Product-latitude_7300latitude_5401precision_7740_firmwareprecision_3541precision_3541_firmwarelatitude_5401_firmwareprecision_7540_firmwarelatitude_5500_firmwareprecision_3540_firmwarelatitude_5300_firmwarexps_13_9300xps_7390_2-in-1_firmwarelatitude_7300_firmwarelatitude_5500latitude_7400latitude_5400_firmwarelatitude_7200_2_in_1_firmwarelatitude_7220_firmwareprecision_7540precision_7740latitude_7220ex_rugged_extreme_tabletxps_7590_firmwarelatitude_7220ex_rugged_extreme_tablet_firmwarexps_7590latitude_7220latitude_7200_2_in_1latitude_5501latitude_5300latitude_7400_firmwareprecision_3540xps_13_9300_firmwarexps_7390_2-in-1latitude_5501_firmwarelatitude_5300_2-in-1latitude_5300_2-in-1_firmwarelatitude_5400Dell Client Consumer and Commercial platforms
CWE ID-CWE-158
Improper Neutralization of Null Byte or NUL Character
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 14
  • 15
  • Next
Details not found