CVE-2025-21110
- EPSS 0.02%
- Veröffentlicht 14.08.2025 18:11:32
- Zuletzt bearbeitet 18.08.2025 14:59:31
Dell Data Lakehouse, versions prior to 1.5.0.0, contains an Execution with Unnecessary Privileges vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Denial of service.
- EPSS 3.07%
- Veröffentlicht 10.12.2024 03:15:05
- Zuletzt bearbeitet 10.12.2024 03:15:05
Dell PowerFlex appliance versions prior to IC 46.381.00 and IC 46.376.00, Dell PowerFlex rack versions prior to RCM 3.8.1.0 (for RCM 3.8.x train) and prior to RCM 3.7.6.0 (for RCM 3.7.x train), Dell PowerFlex custom node using PowerFlex Manager versi...
CVE-2024-37144
- EPSS 0.04%
- Veröffentlicht 10.12.2024 03:15:05
- Zuletzt bearbeitet 10.12.2024 03:15:05
Dell PowerFlex appliance versions prior to IC 46.381.00 and IC 46.376.00, Dell PowerFlex rack versions prior to RCM 3.8.1.0 (for RCM 3.8.x train) and prior to RCM 3.7.6.0 (for RCM 3.7.x train), Dell PowerFlex custom node using PowerFlex Manager versi...
CVE-2024-47481
- EPSS 0.04%
- Veröffentlicht 25.10.2024 11:15:17
- Zuletzt bearbeitet 31.10.2024 00:01:40
Dell Data Lakehouse, version(s) 1.0.0.0, 1.1.0., contain(s) an Improper Access Control vulnerability. An unauthenticated attacker with adjacent network access could potentially exploit this vulnerability, leading to Denial of service.
CVE-2024-47483
- EPSS 0.13%
- Veröffentlicht 25.10.2024 11:15:17
- Zuletzt bearbeitet 31.10.2024 00:01:05
Dell Data Lakehouse, version(s) 1.0.0.0 and 1.1.0.0, contain(s) an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability. An unauthenticated attacker with local access could potentially exploit this vulner...
CVE-2024-38302
- EPSS 0.05%
- Veröffentlicht 18.07.2024 16:15:07
- Zuletzt bearbeitet 04.02.2025 17:24:53
Dell Data Lakehouse, version(s) 1.0.0.0, contain(s) a Missing Encryption of Sensitive Data vulnerability in the DDAE (Starburst). A low privileged attacker with adjacent network access could potentially exploit this vulnerability, leading to Informat...