Dell

Dm5500 Firmware

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 31.07.2024 14:15:06
  • Zuletzt bearbeitet 22.11.2024 18:15:40

DM5500 5.16.0.0, contains an information disclosure vulnerability. A local attacker with high privileges could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed ...

  • EPSS 1.38%
  • Veröffentlicht 08.05.2024 16:15:08
  • Zuletzt bearbeitet 04.02.2025 17:16:56

Dell PowerProtect DM5500 version 5.15.0.0 and prior contain an Arbitrary File Delete via Path Traversal vulnerability. A remote attacker with high privileges could potentially exploit this vulnerability to deletion of arbitrary files stored on the se...

  • EPSS 1.2%
  • Veröffentlicht 08.05.2024 16:15:07
  • Zuletzt bearbeitet 04.02.2025 17:15:26

Dell PowerProtect DM5500 version 5.15.0.0 and prior contains an insecure deserialization Vulnerability. A remote attacker with high privileges could potentially exploit this vulnerability, leading to arbitrary code execution on the vulnerable applica...

  • EPSS 1.7%
  • Veröffentlicht 04.12.2023 09:15:37
  • Zuletzt bearbeitet 21.11.2024 08:25:38

Dell DM5500 contains a path traversal vulnerability in the appliance. A remote attacker with high privileges could potentially exploit this vulnerability to overwrite configuration files stored on the server filesystem.

  • EPSS 2.3%
  • Veröffentlicht 04.12.2023 09:15:36
  • Zuletzt bearbeitet 21.11.2024 08:25:37

Dell DM5500 contains a privilege escalation vulnerability in the appliance. A remote attacker with low privileges could potentially exploit this vulnerability to escape the restricted shell and gain root access to the appliance.

  • EPSS 5.16%
  • Veröffentlicht 04.12.2023 09:15:36
  • Zuletzt bearbeitet 21.11.2024 08:25:37

Dell DM5500 5.14.0.0, contains a Stack-based Buffer Overflow Vulnerability in the appliance. An unauthenticated remote attacker may exploit this vulnerability to crash the affected process or execute arbitrary code on the system by sending special...