Evasa Provider Virtual Appliance Dell Evasa Provider Virtual Appliance

Do you want an email whenever new security vulnerabilities are reported in Dell Evasa Provider Virtual Appliance?

By the Year

In 2024 there have been 0 vulnerabilities in Dell Evasa Provider Virtual Appliance . Last year Evasa Provider Virtual Appliance had 2 security vulnerabilities published. Right now, Evasa Provider Virtual Appliance is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 2 7.25
2022 1 8.00
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Evasa Provider Virtual Appliance vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Dell Evasa Provider Virtual Appliance Security Vulnerabilities

Dell Unisphere for PowerMax vApp, VASA Provider vApp, and Solution Enabler vApp version 10.0.0.5 and below contains an authorization bypass vulnerability

CVE-2022-34397 5.7 - Medium - February 13, 2023

Dell Unisphere for PowerMax vApp, VASA Provider vApp, and Solution Enabler vApp version 10.0.0.5 and below contains an authorization bypass vulnerability, allowing users to perform actions in which they are not authorized.

Dell Unisphere for PowerMax vApp, VASA Provider vApp, and Solution Enabler vApp version 9.2.3.x contain a command execution vulnerability

CVE-2022-45104 8.8 - High - February 11, 2023

Dell Unisphere for PowerMax vApp, VASA Provider vApp, and Solution Enabler vApp version 9.2.3.x contain a command execution vulnerability. A low privileged remote attacker could potentially exploit this vulnerability, leading to execute arbitrary commands on the underlying system.

Shell injection

Unisphere for PowerMax versions before 9.2.3.15 contain a privilege escalation vulnerability

CVE-2022-31233 8 - High - August 31, 2022

Unisphere for PowerMax versions before 9.2.3.15 contain a privilege escalation vulnerability. An adjacent malicious user may potentially exploit this vulnerability to escalate their privileges and access functionalities they do not have access to.

Incorrect Resource Transfer Between Spheres

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Dell Vasa or by Dell? Click the Watch button to subscribe.

Dell
Vendor

subscribe