Dell Inspiron 15 3573

CPE Details

Dell Inspiron 15 3573
-
2022-02-02
14h39 +00:00
2022-03-03
15h16 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:h:dell:inspiron_15_3573:-:*:*:*:*:*:*:*

Informations

Vendor

dell

Product

inspiron_15_3573

Version

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-24421 2022-03-11 21h45 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution during SMM.
8.2
Haute
CVE-2022-24420 2022-03-11 21h45 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution during SMM.
8.2
Haute
CVE-2022-24419 2022-03-11 21h45 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution during SMM.
8.2
Haute
CVE-2022-24416 2022-03-11 21h45 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution during SMM.
8.2
Haute
CVE-2022-24415 2022-03-11 21h45 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution during SMM.
8.2
Haute
CVE-2021-36343 2022-01-24 20h10 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
7.5
Haute
CVE-2021-36342 2022-01-24 20h10 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
7.5
Haute