Dell

Optiplex 5400 Firmware

36 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 12.09.2022 19:15:09
  • Zuletzt bearbeitet 21.11.2024 07:04:10

Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user could potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures.

  • EPSS 0.08%
  • Veröffentlicht 12.09.2022 19:15:09
  • Zuletzt bearbeitet 21.11.2024 07:04:10

Dell BIOS versions contain an Improper Protection Against Voltage and Clock Glitches vulnerability. An attacker with physical access to the system could potentially exploit this vulnerability by triggering a fault condition in order to change the beh...

  • EPSS 0.05%
  • Veröffentlicht 12.09.2022 19:15:09
  • Zuletzt bearbeitet 21.11.2024 07:04:10

Dell BIOS versions contain an Improper Neutralization of Null Byte vulnerability. A local authenticated administrator user could potentially exploit this vulnerability by sending unexpected null bytes in order to read memory on the system.

  • EPSS 0.04%
  • Veröffentlicht 12.09.2022 19:15:09
  • Zuletzt bearbeitet 21.11.2024 07:04:10

Dell BIOS versions contain a Missing Release of Resource after Effective Lifetime vulnerability. A local authenticated administrator user could potentially exploit this vulnerability by consuming excess memory in order to cause the application to cra...

  • EPSS 0.05%
  • Veröffentlicht 12.09.2022 19:15:09
  • Zuletzt bearbeitet 21.11.2024 07:04:09

Dell BIOS versions contain an Information Exposure vulnerability. A local authenticated administrator user could potentially exploit this vulnerability in order access sensitive state information on the system.

  • EPSS 0.05%
  • Veröffentlicht 12.09.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 07:04:09

Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user could potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures.