Vulnerabilities > Dell > Latitude 5288 Firmware > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-01-24 | CVE-2021-36342 | Improper Input Validation vulnerability in Dell products Dell BIOS contains an improper input validation vulnerability. | 6.7 |
2022-01-24 | CVE-2021-36343 | Improper Input Validation vulnerability in Dell products Dell BIOS contains an improper input validation vulnerability. | 6.7 |
2021-11-12 | CVE-2021-36323 | Improper Input Validation vulnerability in Dell products Dell BIOS contains an improper input validation vulnerability. | 6.7 |
2021-11-12 | CVE-2021-36324 | Improper Input Validation vulnerability in Dell products Dell BIOS contains an improper input validation vulnerability. | 6.7 |
2021-11-12 | CVE-2021-36325 | Improper Input Validation vulnerability in Dell products Dell BIOS contains an improper input validation vulnerability. | 6.7 |
2020-06-10 | CVE-2020-5362 | Missing Authorization vulnerability in Dell products Dell Client Consumer and Commercial platforms include an improper authorization vulnerability in the Dell Manageability interface for which an unauthorized actor, with local system access with OS administrator privileges, could bypass the BIOS Administrator authentication to restore BIOS Setup configuration to default values. | 4.4 |
2020-02-21 | CVE-2020-5326 | Missing Authentication for Critical Function vulnerability in Dell products Affected Dell Client platforms contain a BIOS Setup configuration authentication bypass vulnerability in the pre-boot Intel Rapid Storage Response Technology (iRST) Manager menu. | 5.3 |
2019-08-05 | CVE-2019-3717 | Unspecified vulnerability in Dell products Select Dell Client Commercial and Consumer platforms contain an Improper Access Vulnerability. low complexity dell | 6.8 |