|ID||CVSS||Summary||Last (major) update||Published|
The NFS service in EMC Isilon OneFS 188.8.131.52, 184.108.40.206 - 220.127.116.11, and 18.104.22.168 - 22.214.171.124 maintains default NFS export settings (including the NFS export security flavor for authentication) that can be leveraged by current and future NFS exports. This NF
|20-12-2017 - 18:29||20-12-2017 - 18:29|
In EMC Isilon OneFS 126.96.36.199, 188.8.131.52 - 184.108.40.206, 220.127.116.11 - 18.104.22.168, 22.214.171.124 - 126.96.36.199, 7.2.0.x, and 7.1.1.x, a malicious compliance admin (compadmin) account user could exploit a vulnerability in isi_get_itrace or isi_get_profile maintenance scripts t
|13-12-2017 - 15:29||13-12-2017 - 15:29|
EMC Isilon OneFS (versions prior to 188.8.131.52, versions prior to 184.108.40.206, versions prior to 220.127.116.11, version 7.2.1.x) is impacted by a reflected cross-site scripting vulnerability that may potentially be exploited by malicious users to compromise the a
|18-10-2017 - 05:29||18-10-2017 - 05:29|
EMC Isilon OneFS 18.104.22.168, 8.0.0 - 22.214.171.124, 7.2.0 - 126.96.36.199, 7.1.x is affected by a privilege escalation vulnerability that could potentially be exploited by attackers to compromise the affected system.
|21-06-2017 - 16:29||21-06-2017 - 16:29|
EMC Isilon OneFS 188.8.131.52, OneFS 184.108.40.206 - 220.127.116.11, OneFS 18.104.22.168 - 22.214.171.124, and OneFS 7.2.0.x is affected by an NFS export vulnerability. Under certain conditions, after upgrading a cluster from OneFS 7.1.1.x or earlier, users may have unexpected lev
|19-05-2017 - 11:29||19-05-2017 - 11:29|
EMC Isilon OneFS is affected by a path traversal vulnerability that may potentially be exploited by attackers to compromise the affected system. Affected versions are 7.1.0 - 126.96.36.199, 7.2.0 - 188.8.131.52, and 8.0.0 - 184.108.40.206.
|10-04-2017 - 12:47||29-03-2017 - 17:59|
EMC Isilon OneFS 220.127.116.11 - 18.104.22.168, EMC Isilon OneFS 7.2.0.x, EMC Isilon OneFS 22.214.171.124 - 126.96.36.199, EMC Isilon OneFS 7.1.0.x is affected by a privilege escalation vulnerability that could potentially be exploited by attackers to compromise the affecte
|14-03-2017 - 10:07||03-02-2017 - 02:59|
EMC Isilon OneFS 188.8.131.52, EMC Isilon OneFS 184.108.40.206 - 220.127.116.11, EMC Isilon OneFS 7.2.0.x, EMC Isilon OneFS 18.104.22.168 - 22.214.171.124, and EMC Isilon OneFS 7.1.0.x is affected by an LDAP injection vulnerability that could potentially be exploited by a maliciou
|23-01-2017 - 21:59||23-01-2017 - 02:59|
EMC Isilon OneFS 7.1.x and 7.2.x before 126.96.36.199 and 8.0.x before 188.8.131.52, and IsilonSD Edge OneFS 8.0.x before 184.108.40.206, does not require SMB signing within a DCERPC session over ncacn_np, which allows man-in-the-middle attackers to spoof SMB clients
|10-01-2017 - 23:12||29-05-2016 - 21:59|
EMC Isilon OneFS 7.1.x before 220.127.116.11 and 7.2.x before 18.104.22.168 allows local users to obtain root shell access by leveraging administrative privileges.
|10-01-2017 - 21:59||03-06-2016 - 21:59|
EMC Isilon OneFS 7.1 before 22.214.171.124, 7.2.0 before 126.96.36.199, and 7.2.1 before 188.8.131.52 allows remote authenticated administrators to bypass a SmartLock root-login restriction by creating a root account and establishing a login session.
|28-11-2016 - 14:29||21-12-2015 - 12:13|
The RPC daemon in EMC Isilon OneFS 6.5.x and 7.0.x before 184.108.40.206, 7.1.0 before 220.127.116.11, 7.1.1 before 18.104.22.168, and 7.2.0 before 22.214.171.124 allows local users to gain privileges by leveraging an ability to modify system files.
|24-08-2016 - 15:28||29-03-2015 - 06:59|
EMC Isilon OneFS 7.1.x before 126.96.36.199, 7.2.0.x before 188.8.131.52, and 7.2.1.x before 184.108.40.206, when the RFC 2307 feature is configured but SFU is not universally present, allows remote authenticated AD users to obtain root privileges via unspecified vect
|27-11-2015 - 14:35||26-11-2015 - 21:59|
The log-gather implementation in the web administration interface in EMC Isilon OneFS 6.5.x.x through 7.1.1.x before 220.127.116.11 and 7.2.0.x before 18.104.22.168 allows remote authenticated users to execute arbitrary commands with root privileges via unspecifi
|08-07-2015 - 14:55||04-07-2015 - 06:59|