CVE-2025-45376
- EPSS 0.01%
- Veröffentlicht 29.09.2025 21:15:37
- Zuletzt bearbeitet 02.10.2025 19:12:42
Dell Repository Manager (DRM), versions 3.4.7 and 3.4.8, contains an Improper Handling of Insufficient Permissions or Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Eleva...
CVE-2023-22576
- EPSS 0.04%
- Veröffentlicht 21.08.2024 10:15:04
- Zuletzt bearbeitet 23.08.2024 16:56:09
Dell Repository Manager version 3.4.2 and earlier, contain a Local Privilege Escalation Vulnerability in Installation module. A local low privileged attacker may potentially exploit this vulnerability leading to the execution of arbitrary executable ...
CVE-2024-28976
- EPSS 0.06%
- Veröffentlicht 24.04.2024 08:15:37
- Zuletzt bearbeitet 21.01.2025 18:50:59
Dell Repository Manager, versions prior to 3.4.5, contains a Path Traversal vulnerability in API module. A local attacker with low privileges could potentially exploit this vulnerability to gain unauthorized write access to the files stored on the se...
CVE-2024-28977
- EPSS 0.08%
- Veröffentlicht 24.04.2024 08:15:37
- Zuletzt bearbeitet 21.01.2025 18:47:57
Dell Repository Manager, versions 3.4.2 through 3.4.4,contains a Path Traversal vulnerability in logger module. A local attacker with low privileges could potentially exploit this vulnerability to gain unauthorized read access to the files stored on ...
CVE-2023-44292
- EPSS 0.04%
- Veröffentlicht 16.11.2023 10:15:08
- Zuletzt bearbeitet 21.11.2024 08:25:36
Dell Repository Manager, 3.4.3 and prior, contains an Improper Access Control vulnerability in its installation module. A local low-privileged attacker could potentially exploit this vulnerability, leading to gaining escalated privileges.
CVE-2023-44282
- EPSS 0.04%
- Veröffentlicht 16.11.2023 10:15:07
- Zuletzt bearbeitet 21.11.2024 08:25:34
Dell Repository Manager, 3.4.3 and prior, contains an Improper Access Control vulnerability in its installation module. A local low-privileged attacker could potentially exploit this vulnerability, leading to gaining escalated privileges.