cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-52535,https://securityvulnerability.io/vulnerability/CVE-2024-52535,Privilege Escalation Vulnerability in Dell SupportAssist Software,"Dell SupportAssist for Home PCs and Business PCs contains a vulnerability related to symbolic link attacks in the software's remediation component. This issue allows low-privileged, authenticated users to exploit the vulnerability, potentially escalating their privileges. Such exploitation may result in unauthorized deletion of files and folders from affected systems, posing significant risks to data integrity. Users are urged to update to the latest versions to mitigate potential threats and enhance security.",Dell,"Supportassist For Home Pcs,Supportassist For Business Pcs",8.8,HIGH,0.0005000000237487257,false,,false,false,false,,,false,false,,2024-12-25T14:41:36.996Z,0 CVE-2023-44283,https://securityvulnerability.io/vulnerability/CVE-2023-44283,Dell SupportAssist Security Concern Affects Locally Authenticated Users,"A security concern has been identified in Dell SupportAssist for Home PCs versions 3.0 to 3.14.1 and for Business PCs versions 3.0 to 3.4.1. This vulnerability affects locally authenticated users, potentially allowing them to escalate privileges and execute arbitrary code within the Windows system context, limited to the specific local PC. It is imperative for users of these affected products to assess their systems and apply necessary updates to mitigate associated risks.",Dell,"Supportassist For Home Pcs,Supportassist For Business Pcs",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T07:49:13.074Z,0 CVE-2019-3735,https://securityvulnerability.io/vulnerability/CVE-2019-3735,,"Dell SupportAssist for Business PCs version 2.0 and Dell SupportAssist for Home PCs version 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2, and 3.2.1 contain an Improper Privilege Management Vulnerability. A malicious local user can exploit this vulnerability by inheriting a system thread using a leaked thread handle to gain system privileges on the affected machine.",Dell,"Dell Supportassist For Business Pcs,Dell Supportassist For Home Pcs",7,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2019-06-20T22:15:00.000Z,0