Vulnerabilities (CVE)

Filtered by vendor Dell Subscribe
Filtered by product Emc Appsync
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-39586 1 Dell 1 Emc Appsync 2024-10-17 N/A 4.3 MEDIUM
Dell AppSync Server, version 4.3 through 4.6, contains an XML External Entity Injection vulnerability. An adjacent high privileged attacker could potentially exploit this vulnerability, leading to information disclosure.
CVE-2024-22464 1 Dell 1 Emc Appsync 2024-02-15 N/A 6.8 MEDIUM
Dell EMC AppSync, versions from 4.2.0.0 to 4.6.0.0 including all Service Pack releases, contain an exposure of sensitive information vulnerability in AppSync server logs. A high privileged remote attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable system with privileges of the compromised account.
CVE-2022-24424 1 Dell 1 Emc Appsync 2024-02-04 5.0 MEDIUM 7.5 HIGH
Dell EMC AppSync versions from 3.9 to 4.3 contain a path traversal vulnerability in AppSync server. A remote unauthenticated attacker may potentially exploit this vulnerability to gain unauthorized read access to the files stored on the server filesystem, with the privileges of the running web application.
CVE-2022-22552 1 Dell 1 Emc Appsync 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
Dell EMC AppSync versions 3.9 to 4.3 contain a clickjacking vulnerability in AppSync. A remote unauthenticated attacker could potentially exploit this vulnerability to trick the victim into executing state changing operations.
CVE-2022-22551 1 Dell 1 Emc Appsync 2024-02-04 5.8 MEDIUM 8.8 HIGH
DELL EMC AppSync versions 3.9 to 4.3 use GET request method with sensitive query strings. An Adjacent, unauthenticated attacker could potentially exploit this vulnerability, and hijack the victim session.
CVE-2022-22553 1 Dell 1 Emc Appsync 2024-02-04 7.5 HIGH 9.8 CRITICAL
Dell EMC AppSync versions 3.9 to 4.3 contain an Improper Restriction of Excessive Authentication Attempts Vulnerability that can be exploited from UI and CLI. An adjacent unauthenticated attacker could potentially exploit this vulnerability, leading to password brute-forcing. Account takeover is possible if weak passwords are used by users.