cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-34446,https://securityvulnerability.io/vulnerability/CVE-2022-34446,Authorization Bypass in PowerPath Management Appliance by Dell,"The PowerPath Management Appliance versions 3.3 and 3.2 from Dell contains a vulnerability that allows an authenticated remote user with limited privileges, such as that of the Monitoring role, to exploit the system. This exploitation can result in unauthorized access to sensitive information and unauthorized modifications to system configuration, posing significant risks to the integrity and confidentiality of the data managed by the appliance.",Dell,Powerpath Management Appliance,8.8,HIGH,0.0012499999720603228,false,,false,false,false,,,false,false,,2023-02-11T01:23:00.000Z,0 CVE-2022-34447,https://securityvulnerability.io/vulnerability/CVE-2022-34447,OS Command Injection in PowerPath Management Appliance by Dell,"The PowerPath Management Appliance versions 3.0, 3.1, 3.2, and 3.3 have an OS Command Injection flaw that can be exploited by an authenticated remote attacker with administrative access. This vulnerability allows the attacker to execute arbitrary commands on the system with root privileges, posing a serious risk to system integrity and security.",Dell,Powerpath Management Appliance,7.2,HIGH,0.0013299999991431832,false,,false,false,false,,,false,false,,2023-02-11T01:23:00.000Z,0 CVE-2022-34448,https://securityvulnerability.io/vulnerability/CVE-2022-34448,Cross-site Request Forgery Exploit in PowerPath Management Appliance by Dell,"The PowerPath Management Appliance versions 3.3, 3.2*, 3.1, and 3.0* are susceptible to a Cross-site Request Forgery vulnerability. This allows an unauthenticated non-privileged user to exploit the vulnerability and perform privileged state-changing actions without proper authorization, posing significant security risks to system integrity and user data.",Dell,Powerpath Management Appliance,8.8,HIGH,0.000750000006519258,false,,false,false,false,,,false,false,,2023-02-11T01:23:00.000Z,0 CVE-2022-34449,https://securityvulnerability.io/vulnerability/CVE-2022-34449,Hardcoded Cryptographic Keys Vulnerability in PowerPath Management Appliance by Dell,"The PowerPath Management Appliance, specifically versions 3.3 and 3.2*, contains a vulnerability that stems from hardcoded cryptographic keys. Authenticated admin users can exploit this issue, allowing unauthorized access to view and potentially modify sensitive information stored within the application. This vulnerability poses significant risks to data integrity and confidentiality, potentially leading to unauthorized data exposure.",Dell,Powerpath Management Appliance,6,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-11T01:23:00.000Z,0 CVE-2022-34450,https://securityvulnerability.io/vulnerability/CVE-2022-34450,Privilege Escalation Vulnerability in PowerPath Management Appliance by Dell,"The PowerPath Management Appliance, specifically version 3.3, is susceptible to a privilege escalation vulnerability that could allow an authenticated admin user to gain unauthorized access. If exploited, this flaw may enable the attacker to achieve root-level control and execute arbitrary code, posing significant risks to system integrity and security management.",Dell,Powerpath Management Appliance,6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-11T01:23:00.000Z,0 CVE-2022-34451,https://securityvulnerability.io/vulnerability/CVE-2022-34451,Stored Cross-site Scripting in PowerPath Management Appliance by Dell,"The PowerPath Management Appliance from Dell is susceptible to a stored cross-site scripting vulnerability. This issue allows an authenticated admin user to exploit the system, potentially leading to user session hijacking or tricking legitimate users into sending arbitrary requests to the server. It is crucial for administrators to apply the necessary patches or mitigations to protect against potential exploits.",Dell,Powerpath Management Appliance,4.8,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2023-02-11T01:23:00.000Z,0 CVE-2022-34452,https://securityvulnerability.io/vulnerability/CVE-2022-34452,Sensitive Information Disclosure in PowerPath Management Appliance by Dell,"The PowerPath Management Appliance, developed by Dell, has a vulnerability that allows authenticated admin users to access sensitive information stored within the logs. This can lead to unauthorized exposure of critical data, making it imperative for organizations using affected versions to apply necessary security updates to mitigate the risk.",Dell,Powerpath Management Appliance,2.7,LOW,0.000539999979082495,false,,false,false,false,,,false,false,,2023-02-10T09:33:05.272Z,0 CVE-2021-43587,https://securityvulnerability.io/vulnerability/CVE-2021-43587,Hard-Coded Cryptographic Key Vulnerability in Dell PowerPath Management Appliance,"Dell PowerPath Management Appliance versions 3.2, 3.1, 3.0 P01, 3.0, and 2.6 contain a hard-coded cryptographic key, which may allow a local high-privileged user to exploit this vulnerability. By gaining access to sensitive information, the user could potentially escalate their privileges and compromise the application.",Dell,Powerpath Management Appliance,8.2,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-12-21T17:15:00.000Z,0