Dell Latitude 7275 2-in-1

CPE Details

Dell Latitude 7275 2-in-1
-
2022-02-02
14h39 +00:00
2022-03-03
15h16 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:dell:latitude_7275_2-in-1:-:*:*:*:*:*:*:*

Informations

Vendor

dell

Product

latitude_7275_2-in-1

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-34398 2023-02-01 05h28 +00:00 Dell BIOS contains a Time-of-check Time-of-use vulnerability. A local authenticated malicious user could\u00a0potentially exploit this vulnerability by using a specifically timed DMA transaction during an SMI to gain arbitrary code execution on the system.
7.5
High
CVE-2022-32493 2022-10-12 19h25 +00:00 Dell BIOS contains an Stack-Based Buffer Overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
7.8
High
CVE-2022-32491 2022-10-12 19h25 +00:00 Dell Client BIOS contains a Buffer Overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by manipulating an SMI to cause an arbitrary write during SMM.
7.8
High
CVE-2022-32489 2022-10-12 19h25 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
8.2
High
CVE-2022-32488 2022-10-12 19h25 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
8.2
High
CVE-2022-32487 2022-10-12 19h25 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
7.8
High
CVE-2022-32485 2022-10-12 19h25 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
7.8
High
CVE-2022-32484 2022-10-12 19h25 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
5.6
Medium
CVE-2022-32483 2022-10-12 19h25 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
5.6
Medium
CVE-2022-26861 2022-09-06 20h15 +00:00 Dell BIOS versions contain an Insecure Automated Optimization vulnerability. A local authenticated malicious user could exploit this vulnerability by sending malicious input via SMI to obtain arbitrary code execution during SMM.
7.9
High
CVE-2022-26860 2022-09-06 20h15 +00:00 Dell BIOS versions contain a stack-based buffer overflow vulnerability. A local attacker could exploit this vulnerability by sending malicious input via SMI to bypass security checks resulting in arbitrary code execution in SMM.
7.8
High
CVE-2022-26859 2022-09-06 20h15 +00:00 Dell BIOS contains a race condition vulnerability. A local attacker could exploit this vulnerability by sending malicious input via SMI in order to bypass security checks during SMM.
7
High
CVE-2022-26858 2022-09-06 20h15 +00:00 Dell BIOS versions contain an Improper Authentication vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls.
7.8
High
CVE-2021-36343 2022-01-24 20h10 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
7.5
High
CVE-2021-36342 2022-01-24 20h10 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
7.5
High