Dell BSAFE Micro Edition Suite 3.1

CPE Details

Dell BSAFE Micro Edition Suite 3.1
3.1
2022-01-11
19h01 +00:00
2022-01-12
12h51 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:dell:bsafe_micro-edition-suite:3.1:*:*:*:*:*:*:*

Informations

Vendor

dell

Product

bsafe_micro-edition-suite

Version

3.1

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-35165 2024-05-22 05h56 +00:00 Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.6, contain an Observable Timing Discrepancy Vulnerability.
5.1
Moyen
CVE-2020-29504 2024-02-02 15h58 +00:00 Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.5.2, contain a Missing Required Cryptographic Step Vulnerability.
9.8
Critique
CVE-2021-21575 2024-02-02 15h53 +00:00 Dell BSAFE Micro Edition Suite, versions before 4.5.2, contain an Observable Timing Discrepancy Vulnerability.
9.8
Critique
CVE-2020-35169 2022-07-11 19h26 +00:00 Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.5.2, contain an Improper Input Validation Vulnerability.
9.8
Critique
CVE-2020-35168 2022-07-11 19h25 +00:00 Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.6, contain an Observable Timing Discrepancy Vulnerability.
9.8
Critique
CVE-2020-35167 2022-07-11 19h25 +00:00 Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.6, contain an Observable Timing Discrepancy Vulnerability.
9.8
Critique
CVE-2020-35166 2022-07-11 19h25 +00:00 Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.6, contain an Observable Timing Discrepancy Vulnerability.
9.8
Critique
CVE-2020-35164 2022-07-11 19h25 +00:00 Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.6, contain an Observable Timing Discrepancy Vulnerability.
8.1
Haute
CVE-2020-35163 2022-07-11 19h25 +00:00 Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.6, contain a Use of Insufficiently Random Values Vulnerability.
9.8
Critique
CVE-2020-29508 2022-07-11 19h25 +00:00 Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.6, contain an Improper Input Validation Vulnerability.
9.8
Critique
CVE-2020-29507 2022-07-11 19h25 +00:00 Dell BSAFE Crypto-C Micro Edition, versions before 4.1.4, and Dell BSAFE Micro Edition Suite, versions before 4.4, contain an Improper Input Validation Vulnerability.
9.8
Critique
CVE-2020-29506 2022-07-11 19h25 +00:00 Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.5.2, contain an Observable Timing Discrepancy Vulnerability.
9.8
Critique
CVE-2020-29505 2022-07-11 19h25 +00:00 Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.5.2, contain a Key Management Error Vulnerability.
7.5
Haute
CVE-2020-26185 2022-06-01 14h25 +00:00 Dell BSAFE Micro Edition Suite, versions prior to 4.5.1, contain a Buffer Over-Read Vulnerability.
7.5
Haute
CVE-2020-26184 2022-06-01 14h25 +00:00 Dell BSAFE Micro Edition Suite, versions prior to 4.5.1, contain an Improper Certificate Validation vulnerability.
7.5
Haute
CVE-2020-5360 2020-12-16 15h50 +00:00 Dell BSAFE Micro Edition Suite, versions prior to 4.5, are vulnerable to a Buffer Under-Read Vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability resulting in undefined behaviour, or a crash of the affected systems.
7.5
Haute
CVE-2020-5359 2020-12-16 15h50 +00:00 Dell BSAFE Micro Edition Suite, versions prior to 4.5, are vulnerable to an Unchecked Return Value Vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability to modify and corrupt the encrypted data.
5.8
Moyen