Show filters
222 Total Results
Displaying 91-100 of 222
Sort by:
Attacker Value
Unknown
CVE-2022-32491
Disclosure Date: September 29, 2022 (last updated February 24, 2025)
Dell Client BIOS contains a Buffer Overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by manipulating an SMI to cause an arbitrary write during SMM.
0
Attacker Value
Unknown
CVE-2022-32488
Disclosure Date: September 29, 2022 (last updated February 24, 2025)
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
0
Attacker Value
Unknown
CVE-2022-26861
Disclosure Date: August 04, 2022 (last updated February 24, 2025)
Dell BIOS versions contain an Insecure Automated Optimization vulnerability. A local authenticated malicious user could exploit this vulnerability by sending malicious input via SMI to obtain arbitrary code execution during SMM.
0
Attacker Value
Unknown
CVE-2022-26860
Disclosure Date: August 04, 2022 (last updated February 24, 2025)
Dell BIOS versions contain a stack-based buffer overflow vulnerability. A local attacker could exploit this vulnerability by sending malicious input via SMI to bypass security checks resulting in arbitrary code execution in SMM.
0
Attacker Value
Unknown
CVE-2022-26859
Disclosure Date: August 04, 2022 (last updated February 24, 2025)
Dell BIOS contains a race condition vulnerability. A local attacker could exploit this vulnerability by sending malicious input via SMI in order to bypass security checks during SMM.
0
Attacker Value
Unknown
CVE-2022-26858
Disclosure Date: August 04, 2022 (last updated February 24, 2025)
Dell BIOS versions contain an Improper Authentication vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls.
0
Attacker Value
Unknown
CVE-2021-22650
Disclosure Date: July 28, 2022 (last updated February 24, 2025)
An attacker may use TWinSoft and a malicious source project file (TPG) to extract files on machine executing Ovarro TWinSoft, which could lead to code execution.
0
Attacker Value
Unknown
CVE-2021-22648
Disclosure Date: July 28, 2022 (last updated February 24, 2025)
Ovarro TBox proprietary Modbus file access functions allow attackers to read, alter, or delete the configuration file.
0
Attacker Value
Unknown
CVE-2021-22646
Disclosure Date: July 28, 2022 (last updated October 08, 2023)
The “ipk” package containing the configuration created by TWinSoft can be uploaded, extracted, and executed in Ovarro TBox, allowing malicious code execution.
0
Attacker Value
Unknown
CVE-2021-22644
Disclosure Date: July 28, 2022 (last updated February 24, 2025)
Ovarro TBox TWinSoft uses the custom hardcoded user “TWinSoft” with a hardcoded key.
0