cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-43086,https://securityvulnerability.io/vulnerability/CVE-2023-43086,Improper Access Control in Dell Command | Configure,"Dell Command | Configure prior to version 4.11.0 exhibits an improper access control flaw that enables a local malicious user to manipulate files within the installation directory during application upgrades. This weakness could result in privilege escalation, allowing unauthorized actions that compromise system integrity.",Dell,Dell Command Configure (DCC),7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2023-11-23T07:15:00.000Z,0 CVE-2023-44289,https://securityvulnerability.io/vulnerability/CVE-2023-44289,Improper Access Control in Dell Command | Configure Affects User Privileges,"The Dell Command | Configure software is susceptible to an improper access control vulnerability. This flaw allows a local, malicious standard user to exploit the system during installation or repair processes. By leveraging this vulnerability, attackers could escalate their privileges, potentially compromising system integrity and security. Users of affected versions prior to 4.11.0 are advised to update their software to mitigate risks associated with this vulnerability.",Dell,Dell Command Configure (DCC),7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2023-11-23T07:15:00.000Z,0 CVE-2022-34457,https://securityvulnerability.io/vulnerability/CVE-2022-34457,Privilege Escalation Vulnerability in Dell Command Configuration Software,"Dell Command Configuration versions prior to 4.8 are susceptible to a privilege escalation vulnerability due to improper folder permissions assigned when the software is installed in non-default paths. This flaw enables unauthorized users to alter files in the installed directory, potentially rendering the application unusable for all users and compromising system integrity.",Dell,Dell Command Configure (dcc),7.3,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-01-18T11:38:57.154Z,0 CVE-2019-18575,https://securityvulnerability.io/vulnerability/CVE-2019-18575,,"Dell Command Configure versions prior to 4.2.1 contain an uncontrolled search path vulnerability. A locally authenticated malicious user could exploit this vulnerability by creating a symlink to a target file, allowing the attacker to overwrite or corrupt a specified file on the system.",Dell,Dell Command Configure (dcc),7.1,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-12-06T21:15:00.000Z,0