Vulnerabilities > Dell > Latitude 5501 Firmware > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-10-12 | CVE-2022-32484 | Improper Input Validation vulnerability in Dell products Dell BIOS contains an improper input validation vulnerability. | 4.4 |
2022-02-09 | CVE-2022-22567 | Insufficient Verification of Data Authenticity vulnerability in Dell products Select Dell Client Commercial and Consumer platforms are vulnerable to an insufficient verification of data authenticity vulnerability. | 5.1 |
2022-01-24 | CVE-2021-36342 | Improper Input Validation vulnerability in Dell products Dell BIOS contains an improper input validation vulnerability. | 6.7 |
2022-01-24 | CVE-2021-36343 | Improper Input Validation vulnerability in Dell products Dell BIOS contains an improper input validation vulnerability. | 6.7 |
2021-11-12 | CVE-2021-36323 | Improper Input Validation vulnerability in Dell products Dell BIOS contains an improper input validation vulnerability. | 6.7 |
2021-11-12 | CVE-2021-36324 | Improper Input Validation vulnerability in Dell products Dell BIOS contains an improper input validation vulnerability. | 6.7 |
2021-11-12 | CVE-2021-36325 | Improper Input Validation vulnerability in Dell products Dell BIOS contains an improper input validation vulnerability. | 6.7 |
2020-06-10 | CVE-2020-5363 | Unspecified vulnerability in Dell products Select Dell Client Consumer and Commercial platforms include an issue that allows the BIOS Admin password to be changed through Dell's manageability interface without knowledge of the current BIOS Admin password. | 6.7 |
2020-02-21 | CVE-2020-5326 | Missing Authentication for Critical Function vulnerability in Dell products Affected Dell Client platforms contain a BIOS Setup configuration authentication bypass vulnerability in the pre-boot Intel Rapid Storage Response Technology (iRST) Manager menu. | 5.3 |
2020-02-21 | CVE-2020-5324 | Link Following vulnerability in Dell products Dell Client Consumer and Commercial Platforms contain an Arbitrary File Overwrite Vulnerability. | 4.4 |