PRIOn Logo

Search KB


Search our pre-analyzed vulnerability database

Total Results: 891

of 45

Published:   Updated:

Vulnerability Type: Improper access control

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Dell Rugged Control Center, version prior to 4.7, contains an Improper Access Control vulnerability. A local malicious standard user could potentially exploit this vulnerability to modify the content in an unsecured folder when product installation repair is performed, leading to privilege escalation on the system.

Published:   Updated:

Vulnerability Type: Improper access control

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Dell Rugged Control Center, version prior to 4.7, contains an improper access control vulnerability. A local malicious standard user could potentially exploit this vulnerability to modify the content in an unsecured folder during product installation and upgrade, leading to privilege escalation on the system.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v33.3

Dell Rugged Control Center, version prior to 4.7, contains insufficient protection for the Policy folder. A local malicious standard user could potentially exploit this vulnerability to modify the content of the policy file, leading to unauthorized access to resources.

Published:   Updated:

Vulnerability Type: Improper access control

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Dell Command | Monitor versions prior to 10.10.0, contain an improper access control vulnerability. A local malicious standard user could potentially exploit this vulnerability while repairing/changing installation, leading to privilege escalation.

Published:   Updated:

Vulnerability Type: Improper access control

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Dell Command | Configure versions prior to 4.11.0, contain an improper access control vulnerability. A local malicious standard user could potentially exploit this vulnerability while repairing/changing installation, leading to privilege escalation.

Published:   Updated:

Vulnerability Type: Improper access control

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Dell Command | Configure, versions prior to 4.11.0, contains an improper access control vulnerability. A local malicious user could potentially modify files inside installation folder during application upgrade, leading to privilege escalation.

Published:   Updated:

Vulnerability Type: Improper access control

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Dell OS Recovery Tool, versions 2.2.4013, 2.3.7012.0, and 2.3.7515.0 contain an Improper Access Control Vulnerability. A local authenticated non-administrator user could potentially exploit this vulnerability, leading to the elevation of privilege on the system.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.9

Dell Unity prior to 5.3 contains a 'man in the middle' vulnerability in the vmadapter component. If a customer has a certificate signed by a third-party public Certificate Authority, the vCenter CA could be spoofed by an attacker who can obtain a CA-signed certificate.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v33.3

PowerProtect Agent for File System Version 19.14 and prior, contains an incorrect default permissions vulnerability in ddfscon component. A low Privileged local attacker could potentially exploit this vulnerability, leading to overwriting of log files.

Published:   Updated:

Vulnerability Type: Improper access control

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Dell Repository Manager, 3.4.3 and prior, contains an Improper Access Control vulnerability in its installation module. A local low-privileged attacker could potentially exploit this vulnerability, leading to gaining escalated privileges.

Published:   Updated:

Vulnerability Type: Improper access control

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Dell Repository Manager, 3.4.3 and prior, contains an Improper Access Control vulnerability in its installation module. A local low-privileged attacker could potentially exploit this vulnerability, leading to gaining escalated privileges.

Published:   Updated:

Vulnerability Type: Improper access control

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Dell OS Recovery Tool, versions 2.2.4013, 2.3.7012.0, and 2.3.7515.0 contain an Improper Access Control Vulnerability. A local authenticated non-administrator user could potentially exploit this vulnerability, leading to the elevation of privilege on the system.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.3

Dell Encryption, Dell Endpoint Security Suite Enterprise, and Dell Security Management Server version prior to 11.8.1 contain an Insecure Operation on Windows Junction Vulnerability during installation. A local malicious user could potentially exploit this vulnerability to create an arbitrary folder inside a restricted directory, leading to Privilege Escalation

Published:   Updated:

Vulnerability Type: Input validation

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.7

Dell Precision Tower BIOS contains an Improper Input Validation vulnerability. A locally authenticated malicious user with admin privileges could potentially exploit this vulnerability to perform arbitrary code execution.

Published:   Updated:

Vulnerability Type: Hardcoded credentials

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

Dell ELab-Navigator, version 3.1.9 contains a hard-coded credential vulnerability. A local attacker could potentially exploit this vulnerability, leading to unauthorized access to sensitive data. Successful exploitation may result in the compromise of confidential user information.

Published:   Updated:

Vulnerability Type: Input validation

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

Dell PowerScale OneFS 8.2.x, 9.0.0.x-9.5.0.x contains an improper handling of insufficient permissions. A low privileged remote attacker could potentially exploit this vulnerability to cause information disclosure.

Published:   Updated:

Vulnerability Type: Race condition

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

Dell PowerScale OneFS 8.2.x,9.0.0.x-9.5.0.x contains a denial-of-service vulnerability. A low privilege remote attacker could potentially exploit this vulnerability to cause an out of memory (OOM) condition.

Published:   Updated:

Vulnerability Type: Xxe

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

Dell Unity prior to 5.3 contains an XML External Entity injection vulnerability. An XXE attack could potentially exploit this vulnerability disclosing local files in the file system.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Dell Unity prior to 5.3 contains a Restricted Shell Bypass vulnerability. This could allow an authenticated, local attacker to exploit this vulnerability by authenticating to the device CLI and issuing certain commands.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Dell
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

Dell Unity 5.3 contain(s) an Arbitrary File Creation vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by crafting arbitrary files through a request to the server.

of 45