cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-39253,https://securityvulnerability.io/vulnerability/CVE-2023-39253,Improper Access Control in Dell OS Recovery Tool,"The Dell OS Recovery Tool has a vulnerability related to improper access controls, allowing local authenticated users to manipulate user privileges. This issue could enable these users to gain elevated access, potentially compromising the integrity and security of the system. It's crucial for those using affected versions to apply the available security update to mitigate this risk.",Dell,Dell OS Recovery Tool,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-11-23T07:15:00.000Z,0 CVE-2023-39259,https://securityvulnerability.io/vulnerability/CVE-2023-39259,Improper Access Control Vulnerability in Dell OS Recovery Tool,"The Dell OS Recovery Tool versions 2.2.4013, 2.3.7012.0, and 2.3.7515.0 contain a vulnerability that allows local authenticated non-administrator users to potentially exploit improper access controls. This could lead to unauthorized elevation of privileges on the affected systems, compromising their security integrity.",Dell,Dell Os Recovery Tool,7.3,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-11-16T09:15:00.000Z,0 CVE-2023-28066,https://securityvulnerability.io/vulnerability/CVE-2023-28066,Improper Access Control in Dell OS Recovery Tool,The Dell OS Recovery Tool versions 2.2.4013 and 2.3.7012.0 are affected by an Improper Access Control vulnerability. This flaw allows a local authenticated non-administrator user the potential to exploit the system and elevate their privileges. Organizations using these versions should take appropriate measures to secure their systems against unauthorized access attempts.,Dell,Dell OS Recovery Tool,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-06-01T16:15:00.000Z,0 CVE-2022-26865,https://securityvulnerability.io/vulnerability/CVE-2022-26865,Authentication Bypass in Dell Support Assist OS Recovery,"An authentication bypass vulnerability exists in Dell Support Assist OS Recovery prior to version 5.5.2. This flaw allows an unauthenticated attacker with physical access to the system to bypass OS Recovery authentication, potentially enabling the execution of arbitrary code on the system as an Administrator. This vulnerability could lead to serious security implications if exploited.",Dell,Dell Os Recovery Tool,6.8,MEDIUM,0.000590000010561198,false,,false,false,false,,,false,false,,2022-05-26T16:15:00.000Z,0