Cpe Name:
cpe:2.3:a:dell:emc_streaming_data_platform:*:*:*:*:*:*:*:*
# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2021-36330 |
613 |
|
|
2021-11-30 |
2021-12-02 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Dell EMC Streaming Data Platform versions before 1.3 contain an Insufficient Session Expiration Vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to reuse old session artifacts to impersonate a legitimate user. |
2 |
CVE-2021-36329 |
639 |
|
|
2021-11-30 |
2021-12-02 |
4.0 |
None |
Remote |
Low |
??? |
Partial |
None |
None |
Dell EMC Streaming Data Platform versions before 1.3 contain an Indirect Object Reference Vulnerability. A remote malicious user may potentially exploit this vulnerability to gain sensitive information. |
3 |
CVE-2021-36328 |
89 |
|
Exec Code Sql |
2021-11-30 |
2021-12-01 |
6.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
Partial |
Dell EMC Streaming Data Platform versions before 1.3 contain a SQL Injection Vulnerability. A remote malicious user may potentially exploit this vulnerability to execute SQL commands to perform unauthorized actions and retrieve sensitive information from the database. |
4 |
CVE-2021-36327 |
918 |
|
|
2021-11-30 |
2021-12-01 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Dell EMC Streaming Data Platform versions before 1.3 contain a Server Side Request Forgery Vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to perform port scanning of internal networks and make HTTP requests to an arbitrary domain of the attacker's choice. |
5 |
CVE-2021-36326 |
757 |
|
|
2021-11-30 |
2021-12-01 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
Dell EMC Streaming Data Platform, versions prior to 1.3 contain an SSL Strip Vulnerability in the User Interface (UI). A remote unauthenticated attacker could potentially exploit this vulnerability, leading to a downgrade in the communications between the client and server into an unencrypted format. |
Total number of vulnerabilities :
5
Page :
1
(This Page)