Show filters
1,219 Total Results
Displaying 321-330 of 1,219
Sort by:
Attacker Value
Unknown

CVE-2023-44302

Disclosure Date: December 04, 2023 (last updated February 25, 2025)
Dell DM5500 5.14.0.0 and prior contain an improper authentication vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to gain access of resources or functionality that could possibly lead to execute arbitrary code.
Attacker Value
Unknown

CVE-2023-44301

Disclosure Date: December 04, 2023 (last updated February 25, 2025)
Dell DM5500 5.14.0.0 and prior contain a Reflected Cross-Site Scripting Vulnerability. A network attacker with low privileges could potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user's web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.
Attacker Value
Unknown

CVE-2023-44300

Disclosure Date: December 04, 2023 (last updated February 25, 2025)
Dell DM5500 5.14.0.0, contain a Plain-text Password Storage Vulnerability in the appliance. A local attacker with privileges could potentially exploit this vulnerability, leading to the disclosure of certain service credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.
Attacker Value
Unknown

CVE-2023-44291

Disclosure Date: December 04, 2023 (last updated February 25, 2025)
Dell DM5500 5.14.0.0 contains an OS command injection vulnerability in the appliance. A remote attacker with high privileges could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
Attacker Value
Unknown

CVE-2023-39257

Disclosure Date: December 02, 2023 (last updated February 25, 2025)
Dell Rugged Control Center, version prior to 4.7, contains an Improper Access Control vulnerability. A local malicious standard user could potentially exploit this vulnerability to modify the content in an unsecured folder when product installation repair is performed, leading to privilege escalation on the system.
Attacker Value
Unknown

CVE-2023-39256

Disclosure Date: December 02, 2023 (last updated February 25, 2025)
Dell Rugged Control Center, version prior to 4.7, contains an improper access control vulnerability. A local malicious standard user could potentially exploit this vulnerability to modify the content in an unsecured folder during product installation and upgrade, leading to privilege escalation on the system.
Attacker Value
Unknown

CVE-2023-43089

Disclosure Date: December 01, 2023 (last updated February 25, 2025)
Dell Rugged Control Center, version prior to 4.7, contains insufficient protection for the Policy folder. A local malicious standard user could potentially exploit this vulnerability to modify the content of the policy file, leading to unauthorized access to resources.
Attacker Value
Unknown

CVE-2023-44290

Disclosure Date: November 23, 2023 (last updated February 25, 2025)
Dell Command | Monitor versions prior to 10.10.0, contain an improper access control vulnerability. A local malicious standard user could potentially exploit this vulnerability while repairing/changing installation, leading to privilege escalation.
Attacker Value
Unknown

CVE-2023-44289

Disclosure Date: November 23, 2023 (last updated February 25, 2025)
Dell Command | Configure versions prior to 4.11.0, contain an improper access control vulnerability. A local malicious standard user could potentially exploit this vulnerability while repairing/changing installation, leading to privilege escalation.
Attacker Value
Unknown

CVE-2023-43086

Disclosure Date: November 23, 2023 (last updated February 25, 2025)
Dell Command | Configure, versions prior to 4.11.0, contains an improper access control vulnerability. A local malicious user could potentially modify files inside installation folder during application upgrade, leading to privilege escalation.