Dell

Kace K2000 Systems Deployment Appliance

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.29%
  • Veröffentlicht 12.11.2011 00:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Dell KACE K2000 System Deployment Appliance stores the recovery account password in cleartext within a PHP script, which allows context-dependent attackers to obtain sensitive information by examining script source code.

  • EPSS 0.83%
  • Veröffentlicht 12.11.2011 00:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Dell KACE K2000 System Deployment Appliance allows remote attackers to execute arbitrary commands by leveraging database write access.

  • EPSS 0.6%
  • Veröffentlicht 12.11.2011 00:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Dell KACE K2000 System Deployment Appliance has a default username and password for the read-only reporting account, which makes it easier for remote attackers to obtain sensitive information from the database by leveraging the default credential...

  • EPSS 0.5%
  • Veröffentlicht 12.11.2011 00:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple cross-site scripting (XSS) vulnerabilities in the administrative web interface on the Dell KACE K2000 System Deployment Appliance allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  • EPSS 0.8%
  • Veröffentlicht 10.04.2011 02:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Dell KACE K2000 Systems Deployment Appliance 3.3.36822 and earlier contains a peinst CIFS share, which allows remote attackers to obtain sensitive information by reading the (1) unattend.xml or (2) sysprep.inf file, as demonstrated by reading a p...