Dell Optiplex 3090 Ultra Firmware

CPE Details

Dell Optiplex 3090 Ultra Firmware
-
2022-02-10
17h08 +00:00
2022-02-10
19h01 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:dell:optiplex_3090_ultra_firmware:-:*:*:*:*:*:*:*

Informations

Vendor

dell

Product

optiplex_3090_ultra_firmware

Version

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-43078 2024-08-28 05h33 +00:00 Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service.
7.3
Haute
CVE-2024-0158 2024-07-02 06h20 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges
6.7
Moyen
CVE-2024-22448 2024-04-10 07h30 +00:00 Dell BIOS contains an Out-of-Bounds Write vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.
4.7
Moyen
CVE-2023-28063 2024-02-06 07h38 +00:00 Dell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.
6.7
Moyen
CVE-2023-28058 2023-06-23 10h30 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28050 2023-06-23 10h25 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28026 2023-06-23 10h23 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28044 2023-06-23 10h20 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28060 2023-06-23 10h17 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-25938 2023-06-23 10h13 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28031 2023-06-23 10h11 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28034 2023-06-23 10h08 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28027 2023-06-23 10h04 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28036 2023-06-23 10h01 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28032 2023-06-23 09h59 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28028 2023-06-23 09h56 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28039 2023-06-23 09h51 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28040 2023-06-23 09h48 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28056 2023-06-23 09h46 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28030 2023-06-23 09h43 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-25937 2023-06-23 09h40 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28033 2023-06-23 09h37 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28035 2023-06-23 09h34 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28041 2023-06-23 09h25 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28042 2023-06-23 09h22 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28061 2023-06-23 09h19 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28059 2023-06-23 09h16 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28029 2023-06-23 09h12 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable
6.7
Moyen
CVE-2023-28054 2023-06-23 09h06 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-28052 2023-06-23 09h02 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2023-25936 2023-06-23 08h56 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
6.7
Moyen
CVE-2022-32482 2023-02-01 05h15 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
5.6
Moyen
CVE-2022-26861 2022-09-06 20h15 +00:00 Dell BIOS versions contain an Insecure Automated Optimization vulnerability. A local authenticated malicious user could exploit this vulnerability by sending malicious input via SMI to obtain arbitrary code execution during SMM.
7.9
Haute
CVE-2022-26860 2022-09-06 20h15 +00:00 Dell BIOS versions contain a stack-based buffer overflow vulnerability. A local attacker could exploit this vulnerability by sending malicious input via SMI to bypass security checks resulting in arbitrary code execution in SMM.
7.8
Haute
CVE-2022-26859 2022-09-06 20h15 +00:00 Dell BIOS contains a race condition vulnerability. A local attacker could exploit this vulnerability by sending malicious input via SMI in order to bypass security checks during SMM.
7
Haute
CVE-2022-26858 2022-09-06 20h15 +00:00 Dell BIOS versions contain an Improper Authentication vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls.
7.8
Haute
CVE-2022-22567 2022-02-09 20h00 +00:00 Select Dell Client Commercial and Consumer platforms are vulnerable to an insufficient verification of data authenticity vulnerability. An authenticated malicious user may exploit this vulnerability in order to install modified BIOS firmware.
5.1
Moyen
CVE-2022-22566 2022-02-09 20h00 +00:00 Select Dell Client Commercial and Consumer platforms contain a pre-boot direct memory access (DMA) vulnerability. An authenticated attacker with physical access to the system may potentially exploit this vulnerability in order to execute arbitrary code on the device.
7.2
Haute