Lucene search

K

Insightiq Security Vulnerabilities

cve
cve

CVE-2024-25962

Dell InsightIQ, version 5.0, contains an improper access control vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to unauthorized access to monitoring data.

8.3CVSS

8AI Score

0.0004EPSS

2024-03-27 11:15 AM
27
cve
cve

CVE-2024-28972

Dell InsightIQ, Verion 5.0.0, contains a use of a broken or risky cryptographic algorithm vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to information disclosure.

7.5CVSS

6.9AI Score

0.001EPSS

2024-08-01 08:15 AM
27
cve
cve

CVE-2024-39574

Dell PowerScale InsightIQ, version 5.1, contain an Improper Privilege Management vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Denial of service.

6.7CVSS

6.5AI Score

0.0004EPSS

2024-09-10 09:15 AM
24
cve
cve

CVE-2024-39580

Dell PowerScale InsightIQ, versions 5.0 through 5.1, contains an Improper Access Control vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

6.7CVSS

6.5AI Score

0.0004EPSS

2024-09-10 09:15 AM
23
cve
cve

CVE-2024-39581

Dell PowerScale InsightIQ, versions 5.0 through 5.1, contains a File or Directories Accessible to External Parties vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability to read, modify, and delete arbitrary files.

9.8CVSS

7.2AI Score

0.001EPSS

2024-09-10 09:15 AM
27
cve
cve

CVE-2024-39582

Dell PowerScale InsightIQ, version 5.0, contain a Use of hard coded Credentials vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure.

4.4CVSS

6.5AI Score

0.0004EPSS

2024-09-10 09:15 AM
21
cve
cve

CVE-2024-39583

Dell PowerScale InsightIQ, versions 5.0 through 5.1, contains a Use of a Broken or Risky Cryptographic Algorithm vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.

9.8CVSS

7.2AI Score

0.001EPSS

2024-09-10 09:15 AM
25