DELL ECS before 3.8.0.2 contains an improper verification of cryptographic signature vulnerability. A network attacker with an ability to intercept the request could potentially exploit this vulnerability to modify the body data of the request.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
dell elastic cloud storage |