Powerstoreos Dell Powerstoreos

Do you want an email whenever new security vulnerabilities are reported in Dell Powerstoreos?

By the Year

In 2024 there have been 0 vulnerabilities in Dell Powerstoreos . Last year Powerstoreos had 1 security vulnerability published. Right now, Powerstoreos is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 1 4.90
2022 2 7.65
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Powerstoreos vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Dell Powerstoreos Security Vulnerabilities

Dell PowerStore versions prior to 3.5.0.1 contain an insertion of sensitive information into log file vulnerability

CVE-2023-32478 4.9 - Medium - July 21, 2023

Dell PowerStore versions prior to 3.5.0.1 contain an insertion of sensitive information into log file vulnerability. A high privileged malicious user could potentially exploit this vulnerability, leading to sensitive information disclosure.

Insertion of Sensitive Information into Log File

Dell PowerStore versions 2.1.0.x contain an Authentication bypass vulnerability

CVE-2022-26870 9.8 - Critical - October 21, 2022

Dell PowerStore versions 2.1.0.x contain an Authentication bypass vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability under specific configuration. An attacker would gain unauthorized access upon successful exploit.

authentification

Dell PowerStore Versions before v2.1.1.0

CVE-2022-26866 5.5 - Medium - June 02, 2022

Dell PowerStore Versions before v2.1.1.0. contains a Stored Cross-Site Scripting vulnerability. A high privileged network attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.

XSS

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Dell Powerstoreos or by Dell? Click the Watch button to subscribe.

Dell
Vendor

subscribe