Dell

Repository Manager

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Published 29.09.2025 21:15:37
  • Last modified 02.10.2025 19:12:42

Dell Repository Manager (DRM), versions 3.4.7 and 3.4.8, contains an Improper Handling of Insufficient Permissions or Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Eleva...

  • EPSS 0.04%
  • Published 21.08.2024 10:15:04
  • Last modified 23.08.2024 16:56:09

Dell Repository Manager version 3.4.2 and earlier, contain a Local Privilege Escalation Vulnerability in Installation module. A local low privileged attacker may potentially exploit this vulnerability leading to the execution of arbitrary executable ...

  • EPSS 0.06%
  • Published 24.04.2024 08:15:37
  • Last modified 21.01.2025 18:50:59

Dell Repository Manager, versions prior to 3.4.5, contains a Path Traversal vulnerability in API module. A local attacker with low privileges could potentially exploit this vulnerability to gain unauthorized write access to the files stored on the se...

  • EPSS 0.08%
  • Published 24.04.2024 08:15:37
  • Last modified 21.01.2025 18:47:57

Dell Repository Manager, versions 3.4.2 through 3.4.4,contains a Path Traversal vulnerability in logger module. A local attacker with low privileges could potentially exploit this vulnerability to gain unauthorized read access to the files stored on ...

  • EPSS 0.04%
  • Published 16.11.2023 10:15:08
  • Last modified 21.11.2024 08:25:36

Dell Repository Manager, 3.4.3 and prior, contains an Improper Access Control vulnerability in its installation module. A local low-privileged attacker could potentially exploit this vulnerability, leading to gaining escalated privileges.

  • EPSS 0.04%
  • Published 16.11.2023 10:15:07
  • Last modified 21.11.2024 08:25:34

Dell Repository Manager, 3.4.3 and prior, contains an Improper Access Control vulnerability in its installation module. A local low-privileged attacker could potentially exploit this vulnerability, leading to gaining escalated privileges.