Dell Alienware Aurora R15 AMD

CPE Details

Dell Alienware Aurora R15 AMD
-
2024-12-19
13h30 +00:00
2024-12-19
13h30 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:h:dell:alienware_aurora_r15_amd:-:*:*:*:*:*:*:*

Informations

Vendor

dell

Product

alienware_aurora_r15_amd

Version

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-39584 2024-08-28 05h46 +00:00 Dell Client Platform BIOS contains a Use of Default Cryptographic Key Vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Secure Boot bypass and arbitrary code execution.
8.2
Haute
CVE-2024-32860 2024-06-13 13h00 +00:00 Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.
8.2
Haute
CVE-2024-32858 2024-06-13 12h48 +00:00 Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.
8.2
Haute
CVE-2024-32859 2024-06-13 12h39 +00:00 Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.
8.2
Haute
CVE-2024-32856 2024-06-13 11h51 +00:00 Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure.
6
Moyen
CVE-2023-32475 2024-06-07 02h13 +00:00 Dell BIOS contains a missing support for integrity check vulnerability. An attacker with physical access to the system could potentially bypass security mechanisms to run arbitrary code on the system.
7.6
Haute