cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2018-1212,https://securityvulnerability.io/vulnerability/CVE-2018-1212,Authenticated remote code execution in iDRAC 6,The web-based diagnostics console in Dell EMC iDRAC6 (Monolithic versions prior to 2.91 and Modular all versions) contains a command injection vulnerability. A remote authenticated malicious iDRAC user with access to the diagnostics console could potentially exploit this vulnerability to execute arbitrary commands as root on the affected iDRAC system.,Dell,"Idrac6 (monolithic),Idrac6 (modular)",8.8,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2018-07-02T17:29:00.000Z,0 CVE-2018-1243,https://securityvulnerability.io/vulnerability/CVE-2018-1243,iDRAC6/iDRAC7/iDRAC8 - Weak CGI session ID vulnerability,"Dell EMC iDRAC6, versions prior to 2.91, iDRAC7/iDRAC8, versions prior to 2.60.60.60 and iDRAC9, versions prior to 3.21.21.21, contain a weak CGI session ID vulnerability. The sessions invoked via CGI binaries use 96-bit numeric-only session ID values, which makes it easier for remote attackers to perform bruteforce session guessing attacks.",Dell,"Idrac6,Idrac7,Idrac8",7.5,HIGH,0.0027199999894946814,false,,false,false,false,,,false,false,,2018-07-02T17:29:00.000Z,0 CVE-2014-8272,https://securityvulnerability.io/vulnerability/CVE-2014-8272,,"The IPMI 1.5 functionality in Dell iDRAC6 modular before 3.65, iDRAC6 monolithic before 1.98, and iDRAC7 before 1.57.57 does not properly select session ID values, which makes it easier for remote attackers to execute arbitrary commands via a brute-force attack.",Dell,Idrac6 Modular,,,0.03156000003218651,false,,false,false,false,,,false,false,,2014-12-19T11:00:00.000Z,0 CVE-2013-3589,https://securityvulnerability.io/vulnerability/CVE-2013-3589,,Cross-site scripting (XSS) vulnerability in the login page in the Administrative Web Interface on Dell iDRAC6 monolithic devices with firmware before 1.96 and iDRAC7 devices with firmware before 1.46.45 allows remote attackers to inject arbitrary web script or HTML via the ErrorMsg parameter.,Dell,"Idrac6 Firmware,Idrac6 Monolithic",,,0.001550000044517219,false,,false,false,false,,,false,false,,2013-09-24T10:35:00.000Z,0 CVE-2013-4783,https://securityvulnerability.io/vulnerability/CVE-2013-4783,,"The Dell iDRAC6 with firmware 1.x before 1.92 and 2.x and 3.x before 3.42, and iDRAC7 with firmware before 1.23.23, allows remote attackers to bypass authentication and execute arbitrary IPMI commands by using cipher suite 0 (aka cipher zero) and an arbitrary password. NOTE: the vendor disputes the significance of this issue, stating ""DRAC's are intended to be on a separate management network; they are not designed nor intended to be placed on or connected to the Internet.""",Dell,Idrac6 Bmc,,,0.02266000024974346,false,,false,false,false,,,false,false,,2013-07-08T22:00:00.000Z,0 CVE-2013-4785,https://securityvulnerability.io/vulnerability/CVE-2013-4785,,"The web interface on the Dell iDRAC6 with firmware before 1.95 allows remote attackers to modify the CLP interface for arbitrary users and possibly have other impact via a request to an unspecified form that is accessible from testurls.html. NOTE: the vendor disputes the significance of this issue, stating ""DRAC's are intended to be on a separate management network; they are not designed nor intended to be placed on or connected to the Internet.""",Dell,Idrac6 Firmware,,,0.006819999776780605,false,,false,false,false,,,false,false,,2013-07-08T22:00:00.000Z,0