Vulnerabilities > Dell > Inspiron 5580 Firmware
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-09-06 | CVE-2022-26860 | Out-of-bounds Write vulnerability in Dell products Dell BIOS versions contain a stack-based buffer overflow vulnerability. | 7.8 |
2022-09-06 | CVE-2022-26861 | Unspecified vulnerability in Dell products Dell BIOS versions contain an Insecure Automated Optimization vulnerability. | 7.8 |
2022-01-24 | CVE-2021-36342 | Improper Input Validation vulnerability in Dell products Dell BIOS contains an improper input validation vulnerability. | 6.7 |
2022-01-24 | CVE-2021-36343 | Improper Input Validation vulnerability in Dell products Dell BIOS contains an improper input validation vulnerability. | 6.7 |
2021-11-12 | CVE-2021-36323 | Improper Input Validation vulnerability in Dell products Dell BIOS contains an improper input validation vulnerability. | 6.7 |
2021-11-12 | CVE-2021-36324 | Improper Input Validation vulnerability in Dell products Dell BIOS contains an improper input validation vulnerability. | 6.7 |
2021-11-12 | CVE-2021-36325 | Improper Input Validation vulnerability in Dell products Dell BIOS contains an improper input validation vulnerability. | 6.7 |
2020-06-10 | CVE-2020-5362 | Missing Authorization vulnerability in Dell products Dell Client Consumer and Commercial platforms include an improper authorization vulnerability in the Dell Manageability interface for which an unauthorized actor, with local system access with OS administrator privileges, could bypass the BIOS Administrator authentication to restore BIOS Setup configuration to default values. | 4.4 |
2020-02-21 | CVE-2020-5326 | Missing Authentication for Critical Function vulnerability in Dell products Affected Dell Client platforms contain a BIOS Setup configuration authentication bypass vulnerability in the pre-boot Intel Rapid Storage Response Technology (iRST) Manager menu. | 5.3 |
2020-02-21 | CVE-2020-5324 | Link Following vulnerability in Dell products Dell Client Consumer and Commercial Platforms contain an Arbitrary File Overwrite Vulnerability. | 4.4 |