Show filters
24 Total Results
Displaying 1-10 of 24
Sort by:
Attacker Value
Unknown

CVE-2025-21106

Disclosure Date: February 20, 2025 (last updated February 21, 2025)
Dell Recover Point for Virtual Machines 6.0.X contains a Weak file system permission vulnerability. A low privileged Local attacker could potentially exploit this vulnerability, leading to impacting only non-sensitive resources in the system.
0
Attacker Value
Unknown

CVE-2025-21105

Disclosure Date: February 20, 2025 (last updated February 21, 2025)
Dell RecoverPoint for Virtual Machines 6.0.X contains a command execution vulnerability. A Low privileged malicious user with local access could potentially exploit this vulnerability by running the specific binary and perform any administrative action permitted by it resulting in shutting down the server, modifying the configuration leading to gain access to unauthorized data.
0
Attacker Value
Unknown

CVE-2024-47984

Disclosure Date: December 13, 2024 (last updated February 05, 2025)
Dell RecoverPoint for Virtual Machines 6.0.x contains Denial of Service vulnerability. A User with Remote access could potentially exploit this vulnerability, leading to the disruption of most functionalities of the RPA persistent after reboot, resulting in need of technical support intervention in getting system back to stable state.
Attacker Value
Unknown

CVE-2024-28980

Disclosure Date: December 13, 2024 (last updated February 05, 2025)
Dell RecoverPoint for VMs, version(s) 6.0.x contain(s) a Use of a Broken or Risky Cryptographic Algorithm vulnerability in the SSH. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Remote execution.
Attacker Value
Unknown

CVE-2024-24902

Disclosure Date: December 13, 2024 (last updated February 05, 2025)
Dell RecoverPoint for Virtual Machines 6.0.x contains an Improper access control vulnerability. A low privileged local attacker could potentially exploit this vulnerability leading to gaining access to unauthorized data for a limited time.
Attacker Value
Unknown

CVE-2024-48008

Disclosure Date: December 13, 2024 (last updated February 05, 2025)
Dell RecoverPoint for Virtual Machines 6.0.x contains a OS Command Injection vulnerability. An Low privileged remote attacker could potentially exploit this vulnerability leading to information disclosure ,allowing of unintended actions like reading files that may contain sensitive information
Attacker Value
Unknown

CVE-2024-48007

Disclosure Date: December 13, 2024 (last updated February 05, 2025)
Dell RecoverPoint for Virtual Machines 6.0.x contains use of hard-coded credentials vulnerability. A Remote unauthenticated attacker could potentially exploit this vulnerability by gaining access to the source code, easily retrieving these secrets and reusing them to access the system leading to gaining access to unauthorized data.
Attacker Value
Unknown

CVE-2024-38488

Disclosure Date: December 13, 2024 (last updated February 05, 2025)
Dell RecoverPoint for Virtual Machines 6.0.x contains a vulnerability. An improper Restriction of Excessive Authentication vulnerability where a Network attacker could potentially exploit this vulnerability, leading to a brute force attack or a dictionary attack against the RecoverPoint login form and a complete system compromise. This allows attackers to brute-force the password of valid users in an automated manner.
Attacker Value
Unknown

CVE-2024-22461

Disclosure Date: December 13, 2024 (last updated February 05, 2025)
Dell RecoverPoint for Virtual Machines 6.0.x contains an OS Command injection vulnerability. A low privileged remote attacker could potentially exploit this vulnerability by running any command as root, leading to gaining of root-level access and compromise of complete system.
Attacker Value
Unknown

CVE-2024-22426

Disclosure Date: February 16, 2024 (last updated January 24, 2025)
Dell RecoverPoint for Virtual Machines 5.3.x, 6.0.SP1 contains an OS Command injection vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to execute arbitrary operating system commands, which will get executed in the context of the root user, resulting in a complete system compromise.