Show filters
222 Total Results
Displaying 91-100 of 222
Sort by:
Attacker Value
Unknown

CVE-2022-32491

Disclosure Date: September 29, 2022 (last updated February 24, 2025)
Dell Client BIOS contains a Buffer Overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by manipulating an SMI to cause an arbitrary write during SMM.
Attacker Value
Unknown

CVE-2022-32488

Disclosure Date: September 29, 2022 (last updated February 24, 2025)
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
Attacker Value
Unknown

CVE-2022-26861

Disclosure Date: August 04, 2022 (last updated February 24, 2025)
Dell BIOS versions contain an Insecure Automated Optimization vulnerability. A local authenticated malicious user could exploit this vulnerability by sending malicious input via SMI to obtain arbitrary code execution during SMM.
Attacker Value
Unknown

CVE-2022-26860

Disclosure Date: August 04, 2022 (last updated February 24, 2025)
Dell BIOS versions contain a stack-based buffer overflow vulnerability. A local attacker could exploit this vulnerability by sending malicious input via SMI to bypass security checks resulting in arbitrary code execution in SMM.
Attacker Value
Unknown

CVE-2022-26859

Disclosure Date: August 04, 2022 (last updated February 24, 2025)
Dell BIOS contains a race condition vulnerability. A local attacker could exploit this vulnerability by sending malicious input via SMI in order to bypass security checks during SMM.
Attacker Value
Unknown

CVE-2022-26858

Disclosure Date: August 04, 2022 (last updated February 24, 2025)
Dell BIOS versions contain an Improper Authentication vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls.
Attacker Value
Unknown

CVE-2021-22650

Disclosure Date: July 28, 2022 (last updated February 24, 2025)
An attacker may use TWinSoft and a malicious source project file (TPG) to extract files on machine executing Ovarro TWinSoft, which could lead to code execution.
Attacker Value
Unknown

CVE-2021-22648

Disclosure Date: July 28, 2022 (last updated February 24, 2025)
Ovarro TBox proprietary Modbus file access functions allow attackers to read, alter, or delete the configuration file.
Attacker Value
Unknown

CVE-2021-22646

Disclosure Date: July 28, 2022 (last updated October 08, 2023)
The “ipk” package containing the configuration created by TWinSoft can be uploaded, extracted, and executed in Ovarro TBox, allowing malicious code execution.
Attacker Value
Unknown

CVE-2021-22644

Disclosure Date: July 28, 2022 (last updated February 24, 2025)
Ovarro TBox TWinSoft uses the custom hardcoded user “TWinSoft” with a hardcoded key.