High
Please note that 5978.714.714.10408 is equivalent to the previously used verbiage 5978.714.714 patch 10408. This is only a formatting change; there are no changes to the delivery or the application of the remediation.
Third-Party Component | CVEs | More information |
---|---|---|
python-cryptography | CVE-2023-50782, CVE-2023-52425 | See the NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
Docker | CVE-2024-41110 | See the NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
Windows TCP/IP | CVE-2024-38063 | See the NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
SLES 12 SP5 | CVE-2021-46933, CVE-2021-46955, CVE-2021-47074, CVE-2021-47113, CVE-2021-47131, CVE-2021-47162, CVE-2021-47171, CVE-2021-47188, CVE-2021-47206, CVE-2021-47220, CVE-2021-47229, CVE-2021-47231, CVE-2021-47235, CVE-2021-47236, CVE-2021-47237, CVE-2021-47238, CVE-2021-47239, CVE-2021-47245, CVE-2021-47246, CVE-2021-47248, CVE-2021-47249, CVE-2021-47250, CVE-2021-47252, CVE-2021-47254, CVE-2021-47258, CVE-2021-47260, CVE-2021-47261, CVE-2021-47265, CVE-2021-47269, CVE-2021-47274, CVE-2021-47276, CVE-2021-47277, CVE-2021-47280, CVE-2021-47281, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47310, CVE-2021-47311, CVE-2021-47314, CVE-2021-47315, CVE-2021-47319, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47330, CVE-2021-47334, CVE-2021-47337, CVE-2021-47343, CVE-2021-47344, CVE-2021-47345, CVE-2021-47347, CVE-2021-47352, CVE-2021-47353, CVE-2021-47355, CVE-2021-47356, CVE-2021-47357, CVE-2021-47361, CVE-2021-47362, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47382, CVE-2021-47383, CVE-2021-47391, CVE-2021-47397, CVE-2021-47400, CVE-2021-47401, CVE-2021-47404, CVE-2021-47409, CVE-2021-47416, CVE-2021-47423, CVE-2021-47424, CVE-2021-47431, CVE-2021-47435, CVE-2021-47436, CVE-2021-47456, CVE-2021-47458, CVE-2021-47460, CVE-2021-47469, CVE-2021-47472, CVE-2021-47473, CVE-2021-47478, CVE-2021-47480, CVE-2021-47483, CVE-2021-47485, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47500, CVE-2021-47506, CVE-2021-47509, CVE-2021-47511, CVE-2021-47523, CVE-2021-47541, CVE-2021-47548, CVE-2021-47565, CVE-2022-48636, CVE-2022-48650, CVE-2022-48672, CVE-2022-48686, CVE-2022-48697, CVE-2022-48702, CVE-2022-48704, CVE-2022-48708, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-42755, CVE-2023-47233, CVE-2023-52527, CVE-2023-52586, CVE-2023-52591, CVE-2023-52646, CVE-2023-52653, CVE-2023-52655, CVE-2023-52664, CVE-2023-52685, CVE-2023-52686, CVE-2023-52691, CVE-2023-52696, CVE-2023-52698, CVE-2023-52703, CVE-2023-52730, CVE-2023-52732, CVE-2023-52741, CVE-2023-52742, CVE-2023-52747, CVE-2023-52759, CVE-2023-52774, CVE-2023-52781, CVE-2023-52796, CVE-2023-52803, CVE-2023-52821, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52875, CVE-2023-52880, CVE-2024-0639, CVE-2024-26625, CVE-2024-26739, CVE-2024-26752, CVE-2024-26775, CVE-2024-26791, CVE-2024-26828, CVE-2024-26846, CVE-2024-26874, CVE-2024-26876, CVE-2024-26900, CVE-2024-26915, CVE-2024-26920, CVE-2024-26921, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26934, CVE-2024-26957, CVE-2024-26958, CVE-2024-26984, CVE-2024-26996, CVE-2024-27008, CVE-2024-27054, CVE-2024-27059, CVE-2024-27062, CVE-2024-27388, CVE-2024-27396, CVE-2024-27398, CVE-2024-27401, CVE-2024-27419, CVE-2024-27436, CVE-2024-35789, CVE-2024-35791, CVE-2024-35809, CVE-2024-35811, CVE-2024-35830, CVE-2024-35849, CVE-2024-35877, CVE-2024-35878, CVE-2024-35887, CVE-2024-35895, CVE-2024-35914, CVE-2024-35932, CVE-2024-35935, CVE-2024-35936, CVE-2024-35944, CVE-2024-35955, CVE-2024-35969, CVE-2024-35982, CVE-2024-36015, CVE-2024-36029, CVE-2024-36954, CVE-2017-9271, CVE-2020-12762, CVE-2020-26137, CVE-2021-23134, CVE-2021-3750, CVE-2022-0216, CVE-2022-48560, CVE-2022-48566, CVE-2023-0330, CVE-2023-27043, CVE-2023-3164, CVE-2023-3180, CVE-2023-3354, CVE-2023-38470, CVE-2023-38472, CVE-2023-4408, CVE-2023-50387, CVE-2023-50868, CVE-2023-52425, CVE-2023-6597, CVE-2024-0450, CVE-2024-2961, CVE-2024-32487, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-34397, CVE-2024-34459, CVE-2024-35195, CVE-2024-35235, CVE-2024-3651, CVE-2024-36954, CVE-2024-37370, CVE-2024-37371, CVE-2024-38428, CVE-2024-4317 |
See the NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
SLES 15 SP4 | CVE-2022-34903, CVE-2023-0687, CVE-2023-36054, CVE-2024-2398, CVE-2024-2004, CVE-2023-30608 | See the NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
Oracle JRE 1.8.0_421 | CVE-2024-27983, CVE-2024-21147, CVE-2024-21145, CVE-2024-21140, CVE-2024-21144, CVE-2024-21131, CVE-2024-21138 | See the NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
Windows 10 | CVE-2024-38223, CVE-2024-38215, CVE-2022-3775, CVE-2024-38187, CVE-2024-38186, CVE-2024-38185, CVE-2024-38180, CVE-2024-38155, CVE-2024-38153, CVE-2024-38152, CVE-2024-38151, CVE-2024-38146, CVE-2024-38145, CVE-2024-38144, CVE-2024-38143, CVE-2024-38142, CVE-2024-38141, CVE-2024-38140, CVE-2024-38136, CVE-2024-38134, CVE-2024-38133, CVE-2024-38132, CVE-2024-38131, CVE-2024-38130, CVE-2024-38126, CVE-2024-38125, CVE-2024-38122, CVE-2024-38118, CVE-2024-38117, CVE-2024-38116, CVE-2024-38115, CVE-2024-38114, CVE-2024-29995, CVE-2024-38107, CVE-2024-38106, CVE-2024-38063, CVE-2023-40547, CVE-2024-38213, CVE-2024-38199, CVE-2024-38198, CVE-2024-38196, CVE-2024-38193, CVE-2024-38191, CVE-2024-38184, CVE-2024-38178, CVE-2024-38161, CVE-2022-2601, CVE-2024-38202, CVE-2024-21302, CVE-2024-37989, CVE-2024-38070, CVE-2024-38069, CVE-2024-38066, CVE-2024-38058, CVE-2024-38047, CVE-2024-38057, CVE-2024-38052, CVE-2024-38050, CVE-2024-39684, CVE-2024-38079, CVE-2024-38101, CVE-2024-38068, CVE-2024-38053, CVE-2024-38017, CVE-2024-38030, CVE-2024-38010, CVE-2024-38105, CVE-2024-38033, CVE-2024-38048, CVE-2024-38011, CVE-2024-37984, CVE-2024-38028, CVE-2024-38065, CVE-2024-38019, CVE-2024-38049, CVE-2024-38027, CVE-2024-37973, CVE-2024-37988, CVE-2024-37975, CVE-2024-37972, CVE-2024-37971, CVE-2024-3596, CVE-2024-30079, CVE-2024-30071, CVE-2024-30013, CVE-2024-38112, CVE-2024-38104, CVE-2024-38102, CVE-2024-38091, CVE-2024-38085, CVE-2024-38064, CVE-2024-38062, CVE-2024-38061, CVE-2024-38060, CVE-2024-38056, CVE-2024-38055, CVE-2024-38054, CVE-2024-38051, CVE-2024-38517, CVE-2024-38043, CVE-2024-38041, CVE-2024-38034, CVE-2024-38025, CVE-2024-38022, CVE-2024-38013, CVE-2024-37987, CVE-2024-37986, CVE-2024-37981, CVE-2024-37974, CVE-2024-37970, CVE-2024-37969, CVE-2024-35270, CVE-2024-30098, CVE-2024-30081, CVE-2024-28899, CVE-2024-21417 | See the NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
---|---|---|---|
CVE-2024-42431 | Dell Unisphere for PowerMax vApp, version(s) 9.2.4.x, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Remote execution.. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVE-2024-47245 | Dell PowermaxOS, versions prior to 10.1.0.2, contain a Broken or Risky Cryptographic Algorithm vulnerability.A local, unauthenticated, non-privileged user could potentially exploit this vulnerability, leading to information disclosure. | 4.5 | CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L |
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
---|---|---|---|
CVE-2024-42431 | Dell Unisphere for PowerMax vApp, version(s) 9.2.4.x, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Remote execution.. | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVE-2024-47245 | Dell PowermaxOS, versions prior to 10.1.0.2, contain a Broken or Risky Cryptographic Algorithm vulnerability.A local, unauthenticated, non-privileged user could potentially exploit this vulnerability, leading to information disclosure. | 4.5 | CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L |
CVEs | Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
CVE-2024-27983, CVE-2024-21147, CVE-2024-21145, CVE-2024-21140, CVE-2024-21144, CVE-2024-21131, CVE-2024-21138 | Unisphere for PowerMax 9.2 | Host Installation | Versions prior to 9.2.4.11 | Version 9.2.4.11 and later | https://www.dell.com/support/home/en-us/product-support/product/unisphere-powermax/drivers |
CVE-2024-27983, CVE-2024-21147, CVE-2024-21145, CVE-2024-21140, CVE-2024-21144, CVE-2024-21131, CVE-2024-21138, CVE-2024-42431 | Unisphere for PowerMax Virtual Appliance 9.2 | Virtual Appliance | Versions prior to 9.2.4.11 | Version 9.2.4.11 and later | https://www.dell.com/support/home/en-us/product-support/product/unisphere-powermax/drivers |
CVE-2024-27983, CVE-2024-21147, CVE-2024-21145, CVE-2024-21140, CVE-2024-21144, CVE-2024-21131, CVE-2024-21138 | Unisphere 360 9.2 | Host Installation | Versions prior to 9.2.4.22 | Version 9.2.4.22 and later | https://www.dell.com/support/home/en-us/product-support/product/unisphere-360/drivers |
CVE-2024-27983, CVE-2024-21147, CVE-2024-21145, CVE-2024-21140, CVE-2024-21144, CVE-2024-21131, CVE-2024-21138 | Unisphere for PowerMax 10.1 | Host Installation | Versions prior to 10.1.0.8 | Version 10.1.0.8 and later | https://www.dell.com/support/home/en-us/product-support/product/unisphere-powermax/drivers |
CVE-2021-46933, CVE-2021-46955, CVE-2021-47074, CVE-2021-47113, CVE-2021-47131, CVE-2021-47162, CVE-2021-47171, CVE-2021-47188, CVE-2021-47206, CVE-2021-47220, CVE-2021-47229, CVE-2021-47231, CVE-2021-47235, CVE-2021-47236, CVE-2021-47237, CVE-2021-47238, CVE-2021-47239, CVE-2021-47245, CVE-2021-47246, CVE-2021-47248, CVE-2021-47249, CVE-2021-47250, CVE-2021-47252, CVE-2021-47254, CVE-2021-47258, CVE-2021-47260, CVE-2021-47261, CVE-2021-47265, CVE-2021-47269, CVE-2021-47274, CVE-2021-47276, CVE-2021-47277, CVE-2021-47280, CVE-2021-47281, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47310, CVE-2021-47311, CVE-2021-47314, CVE-2021-47315, CVE-2021-47319, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47330, CVE-2021-47334, CVE-2021-47337, CVE-2021-47343, CVE-2021-47344, CVE-2021-47345, CVE-2021-47347, CVE-2021-47352, CVE-2021-47353, CVE-2021-47355, CVE-2021-47356, CVE-2021-47357, CVE-2021-47361, CVE-2021-47362, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47382, CVE-2021-47383, CVE-2021-47391, CVE-2021-47397, CVE-2021-47400, CVE-2021-47401, CVE-2021-47404, CVE-2021-47409, CVE-2021-47416, CVE-2021-47423, CVE-2021-47424, CVE-2021-47431, CVE-2021-47435, CVE-2021-47436, CVE-2021-47456, CVE-2021-47458, CVE-2021-47460, CVE-2021-47469, CVE-2021-47472, CVE-2021-47473, CVE-2021-47478, CVE-2021-47480, CVE-2021-47483, CVE-2021-47485, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47500, CVE-2021-47506, CVE-2021-47509, CVE-2021-47511, CVE-2021-47523, CVE-2021-47541, CVE-2021-47548, CVE-2021-47565, CVE-2022-48636, CVE-2022-48650, CVE-2022-48672, CVE-2022-48686, CVE-2022-48697, CVE-2022-48702, CVE-2022-48704, CVE-2022-48708, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-42755, CVE-2023-47233, CVE-2023-52527, CVE-2023-52586, CVE-2023-52591, CVE-2023-52646, CVE-2023-52653, CVE-2023-52655, CVE-2023-52664, CVE-2023-52685, CVE-2023-52686, CVE-2023-52691, CVE-2023-52696, CVE-2023-52698, CVE-2023-52703, CVE-2023-52730, CVE-2023-52732, CVE-2023-52741, CVE-2023-52742, CVE-2023-52747, CVE-2023-52759, CVE-2023-52774, CVE-2023-52781, CVE-2023-52796, CVE-2023-52803, CVE-2023-52821, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52875, CVE-2023-52880, CVE-2024-0639, CVE-2024-26625, CVE-2024-26739, CVE-2024-26752, CVE-2024-26775, CVE-2024-26791, CVE-2024-26828, CVE-2024-26846, CVE-2024-26874, CVE-2024-26876, CVE-2024-26900, CVE-2024-26915, CVE-2024-26920, CVE-2024-26921, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26934, CVE-2024-26957, CVE-2024-26958, CVE-2024-26984, CVE-2024-26996, CVE-2024-27008, CVE-2024-27054, CVE-2024-27059, CVE-2024-27062, CVE-2024-27388, CVE-2024-27396, CVE-2024-27398, CVE-2024-27401, CVE-2024-27419, CVE-2024-27436, CVE-2024-35789, CVE-2024-35791, CVE-2024-35809, CVE-2024-35811, CVE-2024-35830, CVE-2024-35849, CVE-2024-35877, CVE-2024-35878, CVE-2024-35887, CVE-2024-35895, CVE-2024-35914, CVE-2024-35932, CVE-2024-35935, CVE-2024-35936, CVE-2024-35944, CVE-2024-35955, CVE-2024-35969, CVE-2024-35982, CVE-2024-36015, CVE-2024-36029, CVE-2024-36954, CVE-2017-9271, CVE-2020-12762, CVE-2020-26137, CVE-2021-23134, CVE-2021-3750, CVE-2022-0216, CVE-2022-48560, CVE-2022-48566, CVE-2023-0330, CVE-2023-27043, CVE-2023-3164, CVE-2023-3180, CVE-2023-3354, CVE-2023-38470, CVE-2023-38472, CVE-2023-4408, CVE-2023-50387, CVE-2023-50868, CVE-2023-52425, CVE-2023-6597, CVE-2024-0450, CVE-2024-2961, CVE-2024-32487, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-34397, CVE-2024-34459, CVE-2024-35195, CVE-2024-35235, CVE-2024-3651, CVE-2024-36954, CVE-2024-37370, CVE-2024-37371, CVE-2024-38428, CVE-2024-4317 |
Dell PowerMax EEM 5978 | Embedded Management | Version 5978.714.714.10408 and prior | Version 5978.714.714.10550 and later | Contact customer support and request DSA-2024-375 |
CVE-2024-41110, CVE-2023-50782, CVE-2023-52425, CVE-2022-34903, CVE-2023-0687, CVE-2023-36054, CVE-2024-2398, CVE-2024-2004, CVE-2023-30608 | Dell PowerMax EEM 10.1 | Embedded Management | Version 10.1.0.4 and prior | Version 10.1.0.5 and later | Contact customer support and request DSA-2024-375 |
CVE-2024-38063, CVE-2024-38223, CVE-2024-38215, CVE-2022-3775, CVE-2024-38187, CVE-2024-38186, CVE-2024-38185, CVE-2024-38180, CVE-2024-38155, CVE-2024-38153, CVE-2024-38152, CVE-2024-38151, CVE-2024-38146, CVE-2024-38145, CVE-2024-38144, CVE-2024-38143, CVE-2024-38142, CVE-2024-38141, CVE-2024-38140, CVE-2024-38136, CVE-2024-38134, CVE-2024-38133, CVE-2024-38132, CVE-2024-38131, CVE-2024-38130, CVE-2024-38126, CVE-2024-38125, CVE-2024-38122, CVE-2024-38118, CVE-2024-38117, CVE-2024-38116, CVE-2024-38115, CVE-2024-38114, CVE-2024-29995, CVE-2024-38107, CVE-2024-38106, CVE-2024-38063, CVE-2023-40547, CVE-2024-38213, CVE-2024-38199, CVE-2024-38198, CVE-2024-38196, CVE-2024-38193, CVE-2024-38191, CVE-2024-38184, CVE-2024-38178, CVE-2024-38161, CVE-2022-2601, CVE-2024-38202, CVE-2024-21302, CVE-2024-37989, CVE-2024-38070, CVE-2024-38069, CVE-2024-38066, CVE-2024-38058, CVE-2024-38047, CVE-2024-38057, CVE-2024-38052, CVE-2024-38050, CVE-2024-39684, CVE-2024-38079, CVE-2024-38101, CVE-2024-38068, CVE-2024-38053, CVE-2024-38017, CVE-2024-38030, CVE-2024-38010, CVE-2024-38105, CVE-2024-38033, CVE-2024-38048, CVE-2024-38011, CVE-2024-37984, CVE-2024-38028, CVE-2024-38065, CVE-2024-38019, CVE-2024-38049, CVE-2024-38027, CVE-2024-37973, CVE-2024-37988, CVE-2024-37975, CVE-2024-37972, CVE-2024-37971, CVE-2024-3596, CVE-2024-30079, CVE-2024-30071, CVE-2024-30013, CVE-2024-38112, CVE-2024-38104, CVE-2024-38102, CVE-2024-38091, CVE-2024-38085, CVE-2024-38064, CVE-2024-38062, CVE-2024-38061, CVE-2024-38060, CVE-2024-38056, CVE-2024-38055, CVE-2024-38054, CVE-2024-38051, CVE-2024-38517, CVE-2024-38043, CVE-2024-38041, CVE-2024-38034, CVE-2024-38025, CVE-2024-38022, CVE-2024-38013, CVE-2024-37987, CVE-2024-37986, CVE-2024-37981, CVE-2024-37974, CVE-2024-37970, CVE-2024-37969, CVE-2024-35270, CVE-2024-30098, CVE-2024-30081, CVE-2024-28899, CVE-2024-21417 | PowerMaxOS 5978 | PowerMax OS | Version 5978.714.714.10408 and prior | Version 5978.714.714.10550 and later | Contact customer support and request DSA-2024-375 |
CVE-2024-38063, CVE-2024-38223, CVE-2024-38215, CVE-2022-3775, CVE-2024-38187, CVE-2024-38186, CVE-2024-38185, CVE-2024-38180, CVE-2024-38155, CVE-2024-38153, CVE-2024-38152, CVE-2024-38151, CVE-2024-38146, CVE-2024-38145, CVE-2024-38144, CVE-2024-38143, CVE-2024-38142, CVE-2024-38141, CVE-2024-38140, CVE-2024-38136, CVE-2024-38134, CVE-2024-38133, CVE-2024-38132, CVE-2024-38131, CVE-2024-38130, CVE-2024-38126, CVE-2024-38125, CVE-2024-38122, CVE-2024-38118, CVE-2024-38117, CVE-2024-38116, CVE-2024-38115, CVE-2024-38114, CVE-2024-29995, CVE-2024-38107, CVE-2024-38106, CVE-2024-38063, CVE-2023-40547, CVE-2024-38213, CVE-2024-38199, CVE-2024-38198, CVE-2024-38196, CVE-2024-38193, CVE-2024-38191, CVE-2024-38184, CVE-2024-38178, CVE-2024-38161, CVE-2022-2601, CVE-2024-38202, CVE-2024-21302, CVE-2024-37989, CVE-2024-38070, CVE-2024-38069, CVE-2024-38066, CVE-2024-38058, CVE-2024-38047, CVE-2024-38057, CVE-2024-38052, CVE-2024-38050, CVE-2024-39684, CVE-2024-38079, CVE-2024-38101, CVE-2024-38068, CVE-2024-38053, CVE-2024-38017, CVE-2024-38030, CVE-2024-38010, CVE-2024-38105, CVE-2024-38033, CVE-2024-38048, CVE-2024-38011, CVE-2024-37984, CVE-2024-38028, CVE-2024-38065, CVE-2024-38019, CVE-2024-38049, CVE-2024-38027, CVE-2024-37973, CVE-2024-37988, CVE-2024-37975, CVE-2024-37972, CVE-2024-37971, CVE-2024-3596, CVE-2024-30079, CVE-2024-30071, CVE-2024-30013, CVE-2024-38112, CVE-2024-38104, CVE-2024-38102, CVE-2024-38091, CVE-2024-38085, CVE-2024-38064, CVE-2024-38062, CVE-2024-38061, CVE-2024-38060, CVE-2024-38056, CVE-2024-38055, CVE-2024-38054, CVE-2024-38051, CVE-2024-38517, CVE-2024-38043, CVE-2024-38041, CVE-2024-38034, CVE-2024-38025, CVE-2024-38022, CVE-2024-38013, CVE-2024-37987, CVE-2024-37986, CVE-2024-37981, CVE-2024-37974, CVE-2024-37970, CVE-2024-37969, CVE-2024-35270, CVE-2024-30098, CVE-2024-30081, CVE-2024-28899, CVE-2024-21417 | PowerMaxOS 10.1 | PowerMax OS | Version 10.1.0.4 and prior | Version 10.1.0.5 and later | Contact customer support and request DSA-2024-375 |
CVEs | Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
CVE-2024-27983, CVE-2024-21147, CVE-2024-21145, CVE-2024-21140, CVE-2024-21144, CVE-2024-21131, CVE-2024-21138 | Unisphere for PowerMax 9.2 | Host Installation | Versions prior to 9.2.4.11 | Version 9.2.4.11 and later | https://www.dell.com/support/home/en-us/product-support/product/unisphere-powermax/drivers |
CVE-2024-27983, CVE-2024-21147, CVE-2024-21145, CVE-2024-21140, CVE-2024-21144, CVE-2024-21131, CVE-2024-21138, CVE-2024-42431 | Unisphere for PowerMax Virtual Appliance 9.2 | Virtual Appliance | Versions prior to 9.2.4.11 | Version 9.2.4.11 and later | https://www.dell.com/support/home/en-us/product-support/product/unisphere-powermax/drivers |
CVE-2024-27983, CVE-2024-21147, CVE-2024-21145, CVE-2024-21140, CVE-2024-21144, CVE-2024-21131, CVE-2024-21138 | Unisphere 360 9.2 | Host Installation | Versions prior to 9.2.4.22 | Version 9.2.4.22 and later | https://www.dell.com/support/home/en-us/product-support/product/unisphere-360/drivers |
CVE-2024-27983, CVE-2024-21147, CVE-2024-21145, CVE-2024-21140, CVE-2024-21144, CVE-2024-21131, CVE-2024-21138 | Unisphere for PowerMax 10.1 | Host Installation | Versions prior to 10.1.0.8 | Version 10.1.0.8 and later | https://www.dell.com/support/home/en-us/product-support/product/unisphere-powermax/drivers |
CVE-2021-46933, CVE-2021-46955, CVE-2021-47074, CVE-2021-47113, CVE-2021-47131, CVE-2021-47162, CVE-2021-47171, CVE-2021-47188, CVE-2021-47206, CVE-2021-47220, CVE-2021-47229, CVE-2021-47231, CVE-2021-47235, CVE-2021-47236, CVE-2021-47237, CVE-2021-47238, CVE-2021-47239, CVE-2021-47245, CVE-2021-47246, CVE-2021-47248, CVE-2021-47249, CVE-2021-47250, CVE-2021-47252, CVE-2021-47254, CVE-2021-47258, CVE-2021-47260, CVE-2021-47261, CVE-2021-47265, CVE-2021-47269, CVE-2021-47274, CVE-2021-47276, CVE-2021-47277, CVE-2021-47280, CVE-2021-47281, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47310, CVE-2021-47311, CVE-2021-47314, CVE-2021-47315, CVE-2021-47319, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47330, CVE-2021-47334, CVE-2021-47337, CVE-2021-47343, CVE-2021-47344, CVE-2021-47345, CVE-2021-47347, CVE-2021-47352, CVE-2021-47353, CVE-2021-47355, CVE-2021-47356, CVE-2021-47357, CVE-2021-47361, CVE-2021-47362, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47382, CVE-2021-47383, CVE-2021-47391, CVE-2021-47397, CVE-2021-47400, CVE-2021-47401, CVE-2021-47404, CVE-2021-47409, CVE-2021-47416, CVE-2021-47423, CVE-2021-47424, CVE-2021-47431, CVE-2021-47435, CVE-2021-47436, CVE-2021-47456, CVE-2021-47458, CVE-2021-47460, CVE-2021-47469, CVE-2021-47472, CVE-2021-47473, CVE-2021-47478, CVE-2021-47480, CVE-2021-47483, CVE-2021-47485, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47500, CVE-2021-47506, CVE-2021-47509, CVE-2021-47511, CVE-2021-47523, CVE-2021-47541, CVE-2021-47548, CVE-2021-47565, CVE-2022-48636, CVE-2022-48650, CVE-2022-48672, CVE-2022-48686, CVE-2022-48697, CVE-2022-48702, CVE-2022-48704, CVE-2022-48708, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-42755, CVE-2023-47233, CVE-2023-52527, CVE-2023-52586, CVE-2023-52591, CVE-2023-52646, CVE-2023-52653, CVE-2023-52655, CVE-2023-52664, CVE-2023-52685, CVE-2023-52686, CVE-2023-52691, CVE-2023-52696, CVE-2023-52698, CVE-2023-52703, CVE-2023-52730, CVE-2023-52732, CVE-2023-52741, CVE-2023-52742, CVE-2023-52747, CVE-2023-52759, CVE-2023-52774, CVE-2023-52781, CVE-2023-52796, CVE-2023-52803, CVE-2023-52821, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52875, CVE-2023-52880, CVE-2024-0639, CVE-2024-26625, CVE-2024-26739, CVE-2024-26752, CVE-2024-26775, CVE-2024-26791, CVE-2024-26828, CVE-2024-26846, CVE-2024-26874, CVE-2024-26876, CVE-2024-26900, CVE-2024-26915, CVE-2024-26920, CVE-2024-26921, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26934, CVE-2024-26957, CVE-2024-26958, CVE-2024-26984, CVE-2024-26996, CVE-2024-27008, CVE-2024-27054, CVE-2024-27059, CVE-2024-27062, CVE-2024-27388, CVE-2024-27396, CVE-2024-27398, CVE-2024-27401, CVE-2024-27419, CVE-2024-27436, CVE-2024-35789, CVE-2024-35791, CVE-2024-35809, CVE-2024-35811, CVE-2024-35830, CVE-2024-35849, CVE-2024-35877, CVE-2024-35878, CVE-2024-35887, CVE-2024-35895, CVE-2024-35914, CVE-2024-35932, CVE-2024-35935, CVE-2024-35936, CVE-2024-35944, CVE-2024-35955, CVE-2024-35969, CVE-2024-35982, CVE-2024-36015, CVE-2024-36029, CVE-2024-36954, CVE-2017-9271, CVE-2020-12762, CVE-2020-26137, CVE-2021-23134, CVE-2021-3750, CVE-2022-0216, CVE-2022-48560, CVE-2022-48566, CVE-2023-0330, CVE-2023-27043, CVE-2023-3164, CVE-2023-3180, CVE-2023-3354, CVE-2023-38470, CVE-2023-38472, CVE-2023-4408, CVE-2023-50387, CVE-2023-50868, CVE-2023-52425, CVE-2023-6597, CVE-2024-0450, CVE-2024-2961, CVE-2024-32487, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-34397, CVE-2024-34459, CVE-2024-35195, CVE-2024-35235, CVE-2024-3651, CVE-2024-36954, CVE-2024-37370, CVE-2024-37371, CVE-2024-38428, CVE-2024-4317 |
Dell PowerMax EEM 5978 | Embedded Management | Version 5978.714.714.10408 and prior | Version 5978.714.714.10550 and later | Contact customer support and request DSA-2024-375 |
CVE-2024-41110, CVE-2023-50782, CVE-2023-52425, CVE-2022-34903, CVE-2023-0687, CVE-2023-36054, CVE-2024-2398, CVE-2024-2004, CVE-2023-30608 | Dell PowerMax EEM 10.1 | Embedded Management | Version 10.1.0.4 and prior | Version 10.1.0.5 and later | Contact customer support and request DSA-2024-375 |
CVE-2024-38063, CVE-2024-38223, CVE-2024-38215, CVE-2022-3775, CVE-2024-38187, CVE-2024-38186, CVE-2024-38185, CVE-2024-38180, CVE-2024-38155, CVE-2024-38153, CVE-2024-38152, CVE-2024-38151, CVE-2024-38146, CVE-2024-38145, CVE-2024-38144, CVE-2024-38143, CVE-2024-38142, CVE-2024-38141, CVE-2024-38140, CVE-2024-38136, CVE-2024-38134, CVE-2024-38133, CVE-2024-38132, CVE-2024-38131, CVE-2024-38130, CVE-2024-38126, CVE-2024-38125, CVE-2024-38122, CVE-2024-38118, CVE-2024-38117, CVE-2024-38116, CVE-2024-38115, CVE-2024-38114, CVE-2024-29995, CVE-2024-38107, CVE-2024-38106, CVE-2024-38063, CVE-2023-40547, CVE-2024-38213, CVE-2024-38199, CVE-2024-38198, CVE-2024-38196, CVE-2024-38193, CVE-2024-38191, CVE-2024-38184, CVE-2024-38178, CVE-2024-38161, CVE-2022-2601, CVE-2024-38202, CVE-2024-21302, CVE-2024-37989, CVE-2024-38070, CVE-2024-38069, CVE-2024-38066, CVE-2024-38058, CVE-2024-38047, CVE-2024-38057, CVE-2024-38052, CVE-2024-38050, CVE-2024-39684, CVE-2024-38079, CVE-2024-38101, CVE-2024-38068, CVE-2024-38053, CVE-2024-38017, CVE-2024-38030, CVE-2024-38010, CVE-2024-38105, CVE-2024-38033, CVE-2024-38048, CVE-2024-38011, CVE-2024-37984, CVE-2024-38028, CVE-2024-38065, CVE-2024-38019, CVE-2024-38049, CVE-2024-38027, CVE-2024-37973, CVE-2024-37988, CVE-2024-37975, CVE-2024-37972, CVE-2024-37971, CVE-2024-3596, CVE-2024-30079, CVE-2024-30071, CVE-2024-30013, CVE-2024-38112, CVE-2024-38104, CVE-2024-38102, CVE-2024-38091, CVE-2024-38085, CVE-2024-38064, CVE-2024-38062, CVE-2024-38061, CVE-2024-38060, CVE-2024-38056, CVE-2024-38055, CVE-2024-38054, CVE-2024-38051, CVE-2024-38517, CVE-2024-38043, CVE-2024-38041, CVE-2024-38034, CVE-2024-38025, CVE-2024-38022, CVE-2024-38013, CVE-2024-37987, CVE-2024-37986, CVE-2024-37981, CVE-2024-37974, CVE-2024-37970, CVE-2024-37969, CVE-2024-35270, CVE-2024-30098, CVE-2024-30081, CVE-2024-28899, CVE-2024-21417 | PowerMaxOS 5978 | PowerMax OS | Version 5978.714.714.10408 and prior | Version 5978.714.714.10550 and later | Contact customer support and request DSA-2024-375 |
CVE-2024-38063, CVE-2024-38223, CVE-2024-38215, CVE-2022-3775, CVE-2024-38187, CVE-2024-38186, CVE-2024-38185, CVE-2024-38180, CVE-2024-38155, CVE-2024-38153, CVE-2024-38152, CVE-2024-38151, CVE-2024-38146, CVE-2024-38145, CVE-2024-38144, CVE-2024-38143, CVE-2024-38142, CVE-2024-38141, CVE-2024-38140, CVE-2024-38136, CVE-2024-38134, CVE-2024-38133, CVE-2024-38132, CVE-2024-38131, CVE-2024-38130, CVE-2024-38126, CVE-2024-38125, CVE-2024-38122, CVE-2024-38118, CVE-2024-38117, CVE-2024-38116, CVE-2024-38115, CVE-2024-38114, CVE-2024-29995, CVE-2024-38107, CVE-2024-38106, CVE-2024-38063, CVE-2023-40547, CVE-2024-38213, CVE-2024-38199, CVE-2024-38198, CVE-2024-38196, CVE-2024-38193, CVE-2024-38191, CVE-2024-38184, CVE-2024-38178, CVE-2024-38161, CVE-2022-2601, CVE-2024-38202, CVE-2024-21302, CVE-2024-37989, CVE-2024-38070, CVE-2024-38069, CVE-2024-38066, CVE-2024-38058, CVE-2024-38047, CVE-2024-38057, CVE-2024-38052, CVE-2024-38050, CVE-2024-39684, CVE-2024-38079, CVE-2024-38101, CVE-2024-38068, CVE-2024-38053, CVE-2024-38017, CVE-2024-38030, CVE-2024-38010, CVE-2024-38105, CVE-2024-38033, CVE-2024-38048, CVE-2024-38011, CVE-2024-37984, CVE-2024-38028, CVE-2024-38065, CVE-2024-38019, CVE-2024-38049, CVE-2024-38027, CVE-2024-37973, CVE-2024-37988, CVE-2024-37975, CVE-2024-37972, CVE-2024-37971, CVE-2024-3596, CVE-2024-30079, CVE-2024-30071, CVE-2024-30013, CVE-2024-38112, CVE-2024-38104, CVE-2024-38102, CVE-2024-38091, CVE-2024-38085, CVE-2024-38064, CVE-2024-38062, CVE-2024-38061, CVE-2024-38060, CVE-2024-38056, CVE-2024-38055, CVE-2024-38054, CVE-2024-38051, CVE-2024-38517, CVE-2024-38043, CVE-2024-38041, CVE-2024-38034, CVE-2024-38025, CVE-2024-38022, CVE-2024-38013, CVE-2024-37987, CVE-2024-37986, CVE-2024-37981, CVE-2024-37974, CVE-2024-37970, CVE-2024-37969, CVE-2024-35270, CVE-2024-30098, CVE-2024-30081, CVE-2024-28899, CVE-2024-21417 | PowerMaxOS 10.1 | PowerMax OS | Version 10.1.0.4 and prior | Version 10.1.0.5 and later | Contact customer support and request DSA-2024-375 |
None
Revision | Date | Description |
---|---|---|
1.0 | 2024-09-26 | Initial Version |
2.0 | 2024-09-27 | Formatting changes |
3.0 | 2024-10-01 | Product tagging update |