Critical
Third Party Open-Source Components CVE Details:
Third-party Components | CVEs | More Information |
---|---|---|
Spring Boot 2.7.17 | CVE-2023-34055 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
Node.js 18.18.0 | CVE-2023-38552, CVE-2023-44487 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
libcurl 7.87 | CVE-2023-38545 | https://nvd.nist.gov/vuln/detail/CVE-2023-38545 |
jose4j 0.7.12 | CVE-2023-31582 | https://nvd.nist.gov/vuln/detail/CVE-2023-31582 |
Logback1.2.12 | CVE-2023-6378 | https://nvd.nist.gov/vuln/detail/CVE-2023-6378 |
Third-party Component | CVEs | More Information |
---|---|---|
python3-cryptography=3.3.2-150400.23.1 | CVE-2023-49083 | https://www.suse.com/security/cve/CVE-2023-49083.html |
libz1=1.2.11-150000.3.48.1 | CVE-2023-45853 | https://www.suse.com/security/cve/CVE-2023-45853.html |
libpq5=16.1-150200.5.7.1 postgresql14-server=14.10-150200.5.36.1 postgresql14=14.10-150200.5.36.1 |
CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
libsqlite3-0=3.44.0-150000.3.23.1 sqlite3-tcl=3.44.0-150000.3.23.1 |
CVE-2023-2137 | https://www.suse.com/security/cve/CVE-2023-2137.html |
libncurses6=6.1-150000.5.20.1 ncurses-utils=6.1-150000.5.20.1 terminfo-base=6.1-150000.5.20.1 terminfo-iterm=6.1-150000.5.20.1 terminfo-screen=6.1-150000.5.20.1 terminfo=6.1-150000.5.20.1 |
CVE-2023-50495 | https://www.suse.com/security/cve/CVE-2023-50495.html |
docker=24.0.7_ce-150000.190.4 | CVE-2020-12912 | https://www.suse.com/security/cve/CVE-2020-12912.html |
curl=8.0.1-150400.5.41.1 libcurl4=8.0.1-150400.5.41.1 |
CVE-2023-46218, CVE-2023-46219 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
libopenssl1_1-hmac=1.1.1l-150400.7.60.2 libopenssl1_1=1.1.1l-150400.7.60.2 openssl-1_1=1.1.1l-150400.7.60.2 |
CVE-2023-5678 | https://www.suse.com/security/cve/CVE-2023-5678.html |
traceroute=2.0.21-150000.3.3.1 | CVE-2023-46316 | https://www.suse.com/security/cve/CVE-2023-46316.html |
libruby2_5-2_5=2.5.9-150000.4.29.1 ruby2.5-stdlib=2.5.9-150000.4.29.1 ruby2.5=2.5.9-150000.4.29.1 |
CVE-2021-33621, CVE-2023-28755, CVE-2023-28756 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
libxml2-2=2.9.14-150400.5.25.1 libxml2-tools=2.9.14-150400.5.25.1 |
CVE-2023-45322 | https://www.suse.com/security/cve/CVE-2023-45322.html |
tar-lang=1.34-150000.3.34.1 tar-rmt=1.34-150000.3.34.1 tar=1.34-150000.3.34.1 |
CVE-2023-39804 | https://www.suse.com/security/cve/CVE-2023-39804.html |
kernel-default=5.14.21-150400.24.100.2 | CVE-2023-2006, CVE-2023-2163, CVE-2023-25775, CVE-2023-2860, CVE-2023-31085, CVE-2023-34324, CVE-2023-3777, CVE-2023-39189, CVE-2023-39197, CVE-2023-39198, CVE-2023-4244, CVE-2023-45862, CVE-2023-45863, CVE-2023-45871, CVE-2023-46813, CVE-2023-46862, CVE-2023-5158,CVE-2023-5178, CVE-2023-5717, CVE-2023-6039, CVE-2023-6176 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
libvmtools0=12.3.5-150300.46.1 open-vm-tools=12.3.5-150300.46.1 |
CVE-2023-34058, CVE-2023-34059 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
vim-data-common=9.0.2103-150000.5.57.1 vim-data=9.0.2103-150000.5.57.1 vim=9.0.2103-150000.5.57.1 |
CVE-2023-46246, CVE-2023-5344, CVE-2023-5441, CVE-2023-5535 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
python3-urllib3=1.25.10-150300.4.9.1 | CVE-2023-45803 | https://www.suse.com/security/cve/CVE-2023-45803.html |
ucode-intel=20231114-150200.35.1 | CVE-2023-23583 | https://www.suse.com/security/cve/CVE-2023-23583.html |
python3-setuptools=44.1.1-150400.9.6.1 | CVE-2022-40897 | https://www.suse.com/security/cve/CVE-2022-40897.html |
libgnutls30-hmac=3.7.3-150400.4.38.1 libgnutls30=3.7.3-150400.4.38.1 |
CVE-2023-5981 | https://www.suse.com/security/cve/CVE-2023-5981.html |
xen-libs=4.16.5_10-150400.4.43.1 | CVE-2023-46835, CVE-2023-46836 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
libnghttp2-14=1.40.0-150200.12.1 | CVE-2023-44487 | https://www.suse.com/security/cve/CVE-2023-44487.html |
java-17-openjdk-headless=17.0.9.0-150400.3.33.1 | CVE-2023-22025, CVE-2023-22081 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
libzck1=1.1.16-150400.3.7.1 | CVE-2023-46228 | https://www.suse.com/security/cve/CVE-2023-46228.html |
libavahi-client3=0.8-150400.7.13.1 libavahi-common3=0.8-150400.7.13.1 |
CVE-2023-38470, CVE-2023-38472, CVE-2023-38473 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
curl >= 8.0.1-150400.5.32.1 libcurl-devel >= 8.0.1-150400.5.32.1 libcurl4 >= 8.0.1-150400.5.32.1 libcurl4-32bit >= 8.0.1-150400.5.32.1 |
CVE-2023-38545, CVE-2023-38546 | See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve |
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
---|---|---|---|
CVE-2024-22454 | Dell PowerProtect Data Manager, version 19.15 and prior versions, contain a weak password recovery mechanism for forgotten passwords. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to unauthorized access to the application with privileges of the compromised account. The attacker could retrieve the reset password token without authorization and then perform the password change | 8.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2024-22445 | Dell PowerProtect Data Manager, version 19.15 and prior versions, contain an OS command injection vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
---|---|---|---|
CVE-2024-22454 | Dell PowerProtect Data Manager, version 19.15 and prior versions, contain a weak password recovery mechanism for forgotten passwords. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to unauthorized access to the application with privileges of the compromised account. The attacker could retrieve the reset password token without authorization and then perform the password change | 8.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2024-22445 | Dell PowerProtect Data Manager, version 19.15 and prior versions, contain an OS command injection vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
Product | Affected Versions | Updated Versions | Link to Update | |
---|---|---|---|---|
Dell Power Protect Data Manager | 19.15 and prior | 19.15. build 025 and later | PPDM 19.15 drivers and downloads |
|
Product | Affected Versions | Updated Versions | Link to Update | |
---|---|---|---|---|
Dell Power Protect Data Manager | 19.15 and prior | 19.15. build 025 and later | PPDM 19.15 drivers and downloads |
|
Revision | Date | Description |
---|---|---|
1.0 | 2024-02-13 | Initial Release |