Filtered by vendor Dell Subscriptions
Filtered by product Emc Powerstore Subscriptions
Total 5 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2020-29503 1 Dell 1 Emc Powerstore 2024-09-17 4.1 Medium
Dell EMC PowerStore versions prior to 1.0.3.0.5.xxx contain a file permission Vulnerability. A locally authenticated attacker could potentially exploit this vulnerability, leading to the information disclosure of certain system directory.
CVE-2020-29500 1 Dell 2 Emc Powerstore, Emc Powerstore Firmware 2024-09-17 7.5 High
Dell EMC PowerStore versions prior to 1.0.3.0.5.007 contain a Plain-Text Password Storage Vulnerability in PowerStore T environments. A locally authenticated attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.
CVE-2020-29499 1 Dell 1 Emc Powerstore 2024-09-17 6.4 Medium
Dell EMC PowerStore versions prior to 1.0.3.0.5.006 contain an OS Command Injection vulnerability in PowerStore X environment . A locally authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS command on the PowerStore underlying OS. Exploiting may lead to a system take over by an attacker.
CVE-2020-29502 1 Dell 2 Emc Powerstore, Emc Powerstore Firmware 2024-09-17 7.5 High
Dell EMC PowerStore versions prior to 1.0.3.0.5.007 contain a Plain-Text Password Storage Vulnerability in PowerStore X & T environments. A locally authenticated attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.
CVE-2020-29501 1 Dell 2 Emc Powerstore, Emc Powerstore Firmware 2024-09-16 6.4 Medium
Dell EMC PowerStore versions prior to 1.0.3.0.5.007 contain a Plain-Text Password Storage Vulnerability in PowerStore X & T environments. A locally authenticated attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.