Filtered by vendor Dell Subscriptions
Filtered by product Powerscale Onefs Subscriptions
Total 87 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-32489 1 Dell 1 Powerscale Onefs 2024-11-21 6.7 Medium
Dell PowerScale OneFS 8.2x -9.5x contains a privilege escalation vulnerability. A local attacker with high privileges could potentially exploit this vulnerability, to bypass mode protections and gain elevated privileges.  
CVE-2023-32488 1 Dell 1 Powerscale Onefs 2024-11-21 5.3 Medium
Dell PowerScale OneFS, 8.2.x-9.5.0.x, contains an information disclosure vulnerability in NFS. A low privileged attacker could potentially exploit this vulnerability, leading to information disclosure.
CVE-2023-32487 1 Dell 1 Powerscale Onefs 2024-11-21 7.8 High
Dell PowerScale OneFS, 8.2.x - 9.5.0.x, contains an elevation of privilege vulnerability. A low privileged local attacker could potentially exploit this vulnerability, leading to denial of service, code execution and information disclosure.
CVE-2023-32486 1 Dell 1 Powerscale Onefs 2024-11-21 6.7 Medium
Dell PowerScale OneFS 9.5.x version contain a privilege escalation vulnerability. A low privilege local attacker could potentially exploit this vulnerability, leading to escalation of privileges.
CVE-2023-32457 1 Dell 1 Powerscale Onefs 2024-11-21 7.5 High
Dell PowerScale OneFS, versions 8.2.2.x-9.5.0.x, contains an improper privilege management vulnerability. A remote attacker with low privileges could potentially exploit this vulnerability, leading to escalation of privileges.
CVE-2022-31230 1 Dell 1 Powerscale Onefs 2024-11-21 8.1 High
Dell PowerScale OneFS, versions 8.2.x-9.2.x, contain broken or risky cryptographic algorithm. A remote unprivileged malicious attacker could potentially exploit this vulnerability, leading to full system access.
CVE-2021-36350 1 Dell 1 Powerscale Onefs 2024-11-21 5.9 Medium
Dell PowerScale OneFS, versions 8.2.2-9.3.0.x, contain an authentication bypass by primary weakness in one of the authentication factors. A remote unauthenticated attacker may potentially exploit this vulnerability and bypass one of the factors of authentication.