Kace K2000 Systems Deployment Appliance
Sign in to watchby Dell
CVEs (5)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2011-4436 | 0.00 | — | 0.01 | Nov 12, 2011 | Multiple cross-site scripting (XSS) vulnerabilities in the administrative web interface on the Dell KACE K2000 System Deployment Appliance allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | ||
| CVE-2011-4048 | 0.00 | — | 0.01 | Nov 12, 2011 | The Dell KACE K2000 System Deployment Appliance has a default username and password for the read-only reporting account, which makes it easier for remote attackers to obtain sensitive information from the database by leveraging the default credentials. | ||
| CVE-2011-4047 | 0.00 | — | 0.01 | Nov 12, 2011 | The Dell KACE K2000 System Deployment Appliance allows remote attackers to execute arbitrary commands by leveraging database write access. | ||
| CVE-2011-4046 | 0.00 | — | 0.00 | Nov 12, 2011 | The Dell KACE K2000 System Deployment Appliance stores the recovery account password in cleartext within a PHP script, which allows context-dependent attackers to obtain sensitive information by examining script source code. | ||
| CVE-2011-1672 | 0.00 | — | 0.01 | Apr 10, 2011 | The Dell KACE K2000 Systems Deployment Appliance 3.3.36822 and earlier contains a peinst CIFS share, which allows remote attackers to obtain sensitive information by reading the (1) unattend.xml or (2) sysprep.inf file, as demonstrated by reading a password. |