Acer Altos T110 F3 UEFI DXE Driver stack-based overflow

A vulnerability was found in Acer Altos T110 F3, AP130 F2, Aspire 1600X, Aspire 1602M, Aspire 7600U, Aspire MC605, Aspire TC-105, Aspire TC-120, Aspire U5-620, Aspire X1935, Aspire X3475, Aspire X3995, Aspire XC100, Aspire XC600, Aspire Z3-615, Veriton E430G, Veriton B630_49, Veriton E430 and Veriton M2110G. It has been declared as critical. Affected by this vulnerability is an unknown code block of the component UEFI DXE Driver. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

116

Field

exploit_price_0day1
vulnerability_cvss3_meta_tempscore1
vulnerability_cvss3_meta_basescore1
vulnerability_cvss3_vuldb_tempscore1
vulnerability_cvss3_vuldb_basescore1

Commit Conf

90%24
50%13

Approve Conf

90%24
80%13
IDCommitedUserFieldChangeRemarksAcceptedReasonC
1302344309/23/2022VulD...price_0day$0-$5ksee exploit price documentation09/23/2022accepted
90
1302344209/23/2022VulD...cvss3_meta_tempscore7.7see CVSS documentation09/23/2022accepted
90
1302344109/23/2022VulD...cvss3_meta_basescore8.0see CVSS documentation09/23/2022accepted
90
1302344009/23/2022VulD...cvss3_vuldb_tempscore7.7see CVSS documentation09/23/2022accepted
90
1302343909/23/2022VulD...cvss3_vuldb_basescore8.0see CVSS documentation09/23/2022accepted
90
1302343809/23/2022VulD...cvss2_vuldb_tempscore7.3see CVSS documentation09/23/2022accepted
90
1302343709/23/2022VulD...cvss2_vuldb_basescore7.7see CVSS documentation09/23/2022accepted
90
1302343609/23/2022VulD...cvss3_vuldb_rlXderived from historical data09/23/2022accepted
80
1302343509/23/2022VulD...cvss3_vuldb_eXderived from historical data09/23/2022accepted
80
1302343409/23/2022VulD...cvss3_vuldb_prLderived from historical data09/23/2022accepted
80
1302343309/23/2022VulD...cvss3_vuldb_avAderived from historical data09/23/2022accepted
80
1302343209/23/2022VulD...cvss2_vuldb_rlNDderived from historical data09/23/2022accepted
80
1302343109/23/2022VulD...cvss2_vuldb_eNDderived from historical data09/23/2022accepted
80
1302343009/23/2022VulD...cvss2_vuldb_auSderived from historical data09/23/2022accepted
80
1302342909/23/2022VulD...cvss2_vuldb_avAderived from historical data09/23/2022accepted
80
1302342809/23/2022VulD...cvss2_vuldb_rcURderived from vuldb v3 vector09/23/2022accepted
80
1302342709/23/2022VulD...cvss2_vuldb_aiCderived from vuldb v3 vector09/23/2022accepted
80
1302342609/23/2022VulD...cvss2_vuldb_iiCderived from vuldb v3 vector09/23/2022accepted
80
1302342509/23/2022VulD...cvss2_vuldb_ciCderived from vuldb v3 vector09/23/2022accepted
80
1302342409/23/2022VulD...cvss2_vuldb_acLderived from vuldb v3 vector09/23/2022accepted
80

17 more entries are not shown

Might our Artificial Intelligence support you?

Check our Alexa App!