Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-5692

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-01 Aug, 2018 | 15:00
Updated At-17 Sep, 2024 | 03:48
Rejected At-
Credits

Out-of-bounds read condition in older versions of some Intel Graphics Driver for Windows code branches allows local users to perform a denial of service attack.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:01 Aug, 2018 | 15:00
Updated At:17 Sep, 2024 | 03:48
Rejected At:
▼CVE Numbering Authority (CNA)

Out-of-bounds read condition in older versions of some Intel Graphics Driver for Windows code branches allows local users to perform a denial of service attack.

Affected Products
Vendor
Intel CorporationIntel Corporation
Product
Mobile, Desktop, Server, Workstation, and Embedded processors based on Intel Core and Atom Processors using an affected driver.
Versions
Affected
  • Multiple
Problem Types
TypeCWE IDDescription
textN/ADenial of Service
Type: text
CWE ID: N/A
Description: Denial of Service
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/104957
vdb-entry
x_refsource_BID
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00077.html
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/104957
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00077.html
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/104957
vdb-entry
x_refsource_BID
x_transferred
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00077.html
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/104957
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00077.html
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:01 Aug, 2018 | 15:29
Updated At:11 Oct, 2018 | 13:10

Out-of-bounds read condition in older versions of some Intel Graphics Driver for Windows code branches allows local users to perform a denial of service attack.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.05.5MEDIUM
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Primary2.02.1LOW
AV:L/AC:L/Au:N/C:N/I:N/A:P
Type: Primary
Version: 3.0
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 2.0
Base score: 2.1
Base severity: LOW
Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

Intel Corporation
intel
>>graphics_driver>>15.36.19.64.4170
cpe:2.3:a:intel:graphics_driver:15.36.19.64.4170:*:*:*:*:*:*:*
Intel Corporation
intel
>>graphics_driver>>15.36.19.4170
cpe:2.3:a:intel:graphics_driver:15.36.19.4170:*:*:*:*:*:*:*
Intel Corporation
intel
>>graphics_driver>>15.36.21.64.4223
cpe:2.3:a:intel:graphics_driver:15.36.21.64.4223:*:*:*:*:*:*:*
Intel Corporation
intel
>>graphics_driver>>15.36.21.4222
cpe:2.3:a:intel:graphics_driver:15.36.21.4222:*:*:*:*:*:*:*
Intel Corporation
intel
>>graphics_driver>>15.36.23.64.4251
cpe:2.3:a:intel:graphics_driver:15.36.23.64.4251:*:*:*:*:*:*:*
Intel Corporation
intel
>>graphics_driver>>15.36.23.4251
cpe:2.3:a:intel:graphics_driver:15.36.23.4251:*:*:*:*:*:*:*
Intel Corporation
intel
>>graphics_driver>>15.36.24.64.4264
cpe:2.3:a:intel:graphics_driver:15.36.24.64.4264:*:*:*:*:*:*:*
Intel Corporation
intel
>>graphics_driver>>15.36.24.4264
cpe:2.3:a:intel:graphics_driver:15.36.24.4264:*:*:*:*:*:*:*
Intel Corporation
intel
>>graphics_driver>>15.36.26.4294
cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:*:*:*
Intel Corporation
intel
>>graphics_driver>>15.36.28.4332
cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:*:*:*
Intel Corporation
intel
>>graphics_driver>>15.36.29.64.4371
cpe:2.3:a:intel:graphics_driver:15.36.29.64.4371:*:*:*:*:*:*:*
Intel Corporation
intel
>>graphics_driver>>15.36.31.4414
cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:*:*:*
Intel Corporation
intel
>>graphics_driver>>15.36.33.4578
cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:*:*:*
Intel Corporation
intel
>>graphics_driver>>15.36.34.4889
cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:*:*:*
Intel Corporation
intel
>>graphics_driver>>15.36.35.5057
cpe:2.3:a:intel:graphics_driver:15.36.35.5057:*:*:*:*:*:*:*
Intel Corporation
intel
>>graphics_driver>>15.40.0.64.4279
cpe:2.3:a:intel:graphics_driver:15.40.0.64.4279:*:*:*:*:*:*:*
Intel Corporation
intel
>>graphics_driver>>15.40.10.4300
cpe:2.3:a:intel:graphics_driver:15.40.10.4300:*:*:*:*:*:*:*
Intel Corporation
intel
>>graphics_driver>>15.40.28.64.4501
cpe:2.3:a:intel:graphics_driver:15.40.28.64.4501:*:*:*:*:*:*:*
Intel Corporation
intel
>>graphics_driver>>15.40.34.4624
cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:*:*:*
Intel Corporation
intel
>>graphics_driver>>15.45.9.64.4534
cpe:2.3:a:intel:graphics_driver:15.45.9.64.4534:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-125Primarynvd@nist.gov
CWE ID: CWE-125
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/104957secure@intel.com
Third Party Advisory
VDB Entry
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00077.htmlsecure@intel.com
Issue Tracking
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/104957
Source: secure@intel.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00077.html
Source: secure@intel.com
Resource:
Issue Tracking
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

257Records found

CVE-2020-8749
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.54% / 66.48%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:09
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.
Product-cloud_backupactive_management_technology_firmwareIntel(R) AMT
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-8672
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.07%
||
7 Day CHG~0.00%
Published-02 Feb, 2021 | 21:16
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bound read in BIOS firmware for 8th, 9th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 Series Processors may allow an unauthenticated user to potentially enable elevation of privilege or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i7_9700kfcore_i7_9700core_i5_9600core_i5_9400tcore_i5_9400fcore_i3_8350kcore_i5_8400tcore_i3_9100fcore_i3_8300core_i3_9300tcore_i5_9600tcore_i9_9900kcore_i3_9100tcore_i7_9700fcore_i5_9600kcore_i3_9300core_i5_8600tcore_i7_8086kcore_i5_8500core_i7_8700kcore_i5_8500tcore_i9_9900kfcore_i9_9900tcore_i5_8600core_i5_9500fcore_i3_9320core_i7_8700tcore_i5_8400core_i5_9400celeron_4305uecore_i3_8100tcore_i9_9900celeron_4305ucore_i3_8300tcore_i9_9900kscore_i7_9700kcore_i3_9350kfcore_i5_9500celeron_4205ucore_i5_8600kcore_i5_9500tcore_i5_9600kfbioscore_i3_9100core_i7_8700core_i3_8100core_i7_9700tcore_i3_9350kcore_i3_8100fIntel BIOS Advisory
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-8674
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.3||MEDIUM
EPSS-1.25% / 78.50%
||
7 Day CHG~0.00%
Published-15 Jun, 2020 | 14:00
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in DHCPv6 subsystem in Intel(R) AMT and Intel(R)ISM versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64 and 14.0.33 may allow an unauthenticated user to potentially enable information disclosure via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-service_manageractive_management_technology_firmwareIntel(R) AMT and Intel(R) ISM
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-24506
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.15% / 36.64%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:48
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bound read in a subsystem in the Intel(R) CSME versions before 12.0.81, 13.0.47, 13.30.17, 14.1.53 and 14.5.32 may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationSiemens AG
Product-pentium_gold_4410yz370core_i7-8705gpentium_gold_g5500tcore_i7-8665ucore_i7-10870hcore_i3-8300tpentium_gold_4415uw480core_i7-8706gcore_i5-1035g1core_i7-1068ng7core_i5-1038ng7h420ecore_i5-1035g7mobile_cm246pentium_gold_g5420core_i7-10850hsimatic_ipc647e_firmwarepentium_gold_6405usimatic_ipc627e_firmwarecore_i5-8500bcore_i7-10700kcore_i5-8400hcore_i5-8269ucore_i7-8700core_i5-10400fcore_i5-8400core_i5-1030g4core_i7-10700tecore_i3-10300core_i7-10700tcore_i7-8086kceleron_4305ucore_i5-10210ucore_i5-10500core_i5-8257ucore_i7-8700kcore_i5-10200hcore_i7-10710upentium_gold_g5400tcore_i7-10700kfh370pentium_gold_g6405tcore_i5-1035g4xeon_w-1250core_i3-8145uxeon_w-1250teceleron_4205ucore_i5-10400hcore_i5-8279ucore_i3-10100yxeon_w-1290ew480ecore_i5-10400tcore_i3-8109ucore_i7-8565ucore_i5-10310ucore_i5-10505c246core_i5-1030g7xeon_w-1270core_i5-8250ucore_i3-10305core_i3-1000ng4b365pentium_gold_4417uxeon_w-1270ecore_i3-1000g1pentium_gold_g5420tcore_i7-10510ycore_i5-8259ucore_i3-10110ucore_i5_l16g7simatic_field_pg_m6_firmwarepentium_gold_g5500core_i5-10600kcore_i5-10400celeron_4305uexeon_w-1270tecore_i5-8400bsimatic_ipc847ecore_i3-8140ucore_i3-10105fcore_i5-10500tecore_i3-8100hcore_i9-10900kfcore_i3-10105pentium_gold_4415ypentium_gold_g5620b460xeon_w-1290tcore_i5-10300hpentium_gold_g6505tcore_i5-8350ucore_i9-10980hkcore_i7-1060ng7core_i5-8600xeon_w-11855mcore_i7-8550ucore_i5-10310yxeon_w-1290pcore_i5-8500tcore_i7-10510ucore_i5-10500hcore_i3-10100ecore_i5-8260ucore_i3-8100core_i5-1030ng7core_i7-1060g7core_i9-10900h410pentium_gold_4425ypentium_gold_g6500txeon_w-10855mcore_i7-10810upentium_gold_g6500core_i3-10100tsimatic_ipc847e_firmwarecore_i9-8950hkcore_i7-8850hcore_i9-10900ecore_i9-10850kcore_i7-10610uxeon_w-11955mcore_i3-10100fcore_i9-10900kpentium_gold_g6400ecore_i7-8500ycore_i5-8600kpentium_gold_7505b360core_i5-10600core_i9-10900fpentium_gold_g6400tcore_i5-8400tq470pentium_gold_g5600tsimatic_field_pg_m6xeon_w-1270pcore_i7-8750hcore_i7-10700core_i5-8365ucore_i5-8210ycore_i3-10100tecore_i9-10910simatic_ipc647ecore_i3-10105tcore_i5-8365uecore_i7-8665uexeon_w-1250exeon_w-1290core_i7-10700fcore_i9-10885hcore_i3-10325core_i7-10750hxeon_w-10885mq470ecore_i3-10320core_i9-10900tcore_i3-8300core_i5-8200ycore_i3-1000g4pentium_gold_g5400core_i7-10875hsimatic_ipc677ecore_i3-10300tcore_i5-8310yxeon_w-1290teq370core_i7-8809gcore_i3-8145uecore_i5-8500core_i7-8700bcore_i7-8709gpentium_gold_g6600core_i3-10100simatic_ipc627ecore_i7-8569upentium_gold_g6505xeon_w-1250pz490core_i5-8265ucore_i5-10500tcore_i3-8100tpentium_gold_g6605core_i3-8121uconverged_security_and_manageability_enginepentium_gold_5405ucore_i5-10210yh310core_i3_l13g4core_i3-1005g1core_i7-8557upentium_gold_g6405core_i5-10500ecore_i3-8100bcore_i7-8700tsimatic_ipc677e_firmwarecore_i3-10305tcore_i3-8350kcore_i5-8300hcore_i5-10600tcore_i5-8600tcore_i5-8305gcore_i3-10110ycore_i7-1065g7core_i7-8559ucore_i5-10600kfcore_i7-8650ucore_i9-10900tepentium_gold_g6400tecore_i7-10700ez390core_i3-8130uh470pentium_gold_6500ypentium_gold_g6400pentium_gold_g5600c242Intel(R) CSME versions
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-33105
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.91%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in some Intel(R) Core(TM) processors with Radeon(TM) RX Vega M GL integrated graphics before version 21.10 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i5-8305gcore_i5-8305g_firmwarecore_i7-8706g_firmwarecore_i7-8706gIntel® Core™ Processors with Radeon™ RX Vega M GL Graphics Advisory
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-12360
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.17% / 39.18%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:53
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds read in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aNetApp, Inc.Intel CorporationSiemens AG
Product-xeon_platinum_8153xeon_e3-1230_v5xeon_e3-1558l_v5xeon_w-3245mxeon_e5-4610_v4xeon_e7-8894_v4xeon_gold_6146xeon_e5-2660_v3core_i7-1068ng7e-series_bioscore_i7-1160g7xeon_e5-1680_v3xeon_d-1527xeon_e5-2697_v4xeon_gold_5115xeon_platinum_8170xeon_gold_6136xeon_w-2125core_i9-10940xxeon_e5-4610_v3xeon_e5-4650_v4xeon_e7-8880_v4xeon_gold_6138xeon_e5-1660_v4simatic_ipc547g_firmwarexeon_e7-8891_v4xeon_platinum_8164xeon_e-2226gxeon_e3-1280_v5xeon_gold_6234xeon_e5-2699r_v4xeon_w-2255xeon_d-1518core_i7-11700core_i7-6822eqcore_i7-6700texeon_e3-1501l_v6xeon_gold_6262vcore_i7-11370hxeon_e5-2683_v4xeon_platinum_8168core_i7-7600uxeon_e5-2608l_v4xeon_e5-2640_v3xeon_e-2224xeon_gold_5218xeon_e5-1620_v4core_i7-11850hxeon_d-1567simatic_cpu_1518f-4_firmwarexeon_e5-2630l_v3xeon_e3-1505l_v6xeon_e-2278gexeon_e5-1607_v3xeon_e5-4640_v4xeon_gold_5117xeon_gold_5122xeon_w-2245xeon_d-1587xeon_e5-2699_v3xeon_d-2191xeon_gold_6248rcore_i7-7820hkxeon_e5-2689_v4xeon_e7-8870_v4xeon_w-1290tcore_i5-l16g7xeon_gold_6240core_i7-6970hqxeon_gold_6262xeon_platinum_8156xeon_e-2136core_i7-10510ucore_i7-1060g7xeon_w-2265xeon_e5-2667_v4xeon_platinum_8274xeon_w-10855mxeon_gold_6126fxeon_d-1539xeon_e3-1535m_v5xeon_e5-1680_v4core_i7-7700xeon_gold_5220rxeon_d-2146ntxeon_e3-1268l_v5xeon_platinum_8160fxeon_e5-2658_v3xeon_e5-4660_v4core_i7-8750hxeon_e3-1501m_v6xeon_gold_6250lxeon_gold_6210uxeon_d-2187ntxeon_platinum_8160mcore_i7-10700fxeon_d-2166ntxeon_e3-1270_v6xeon_e-2286mxeon_e3-1505m_v5core_i7-10750hxeon_silver_4216xeon_gold_6230xeon_platinum_8253xeon_e5-2630l_v4xeon_w-2195xeon_e5-4667_v4xeon_e5-2628l_v4xeon_e-2276gxeon_e5-2685_v3xeon_w-1390xeon_e-2186gxeon_d-2183itxeon_silver_4116txeon_e-2174gxeon_e5-2630_v4xeon_d-1622core_i7-8809gxeon_e5-4667_v3xeon_platinum_8160hcore_i7-8700bxeon_e5-2643_v3xeon_d-2145ntxeon_d-1581xeon_e5-1650_v4xeon_gold_6238xeon_e5-2630_v3xeon_w-1250pxeon_silver_4208xeon_e3-1585_v5xeon_w-2104xeon_e5-2623_v4core_i7-6560uxeon_w-2123xeon_gold_5220sxeon_w-3275mxeon_platinum_9282xeon_e5-2683_v3core_i7-10700exeon_silver_4108xeon_gold_6130txeon_silver_4210core_i7-11700kfcloud_backupcore_i7-10870hxeon_e7-8867_v4xeon_bronze_3106xeon_w-2102xeon_e-2274gcore_i7-10700kxeon_e-2278gelxeon_d-1540xeon_e3-1280_v6hci_compute_node_biosxeon_e5-2698_v4xeon_platinum_8160tcore_i7-11700kxeon_d-1528xeon_silver_4214rcore_i7-6500uxeon_e5-2697_v3xeon_e5-4627_v4xeon_e-2124core_i7-10710uxeon_d-2141icore_i7-10700kfxeon_d-1541xeon_e5-2660_v4xeon_e7-4830_v4xeon_w-1250texeon_platinum_8268xeon_platinum_8176mxeon_e-2276mecore_i7-8565uxeon_gold_5222xeon_e5-2687w_v4xeon_e5-1603_v3core_i7-7560uxeon_gold_5117fxeon_e3-1535m_v6xeon_d-1548xeon_d-1649nxeon_d-1529xeon_platinum_9221xeon_e3-1220_v5xeon_platinum_8160xeon_e5-2428l_v3core_i7-6700hqxeon_e7-4809_v4xeon_e5-4648_v3xeon_gold_6122xeon_silver_4123xeon_gold_6148fxeon_gold_6132biosxeon_e5-2618l_v4xeon_w-2155xeon_gold_6137core_i7-7500ucore_i7-8550uxeon_e-2224gxeon_w-2135xeon_d-1623nxeon_w-2145xeon_e-2226gecore_i7-6650uxeon_gold_6142core_i7-10610ucore_i7-8500ycore_i7-7567uxeon_silver_4214xeon_w-1390pxeon_d-2161ixeon_silver_4210rxeon_d-1632core_i7-7820hqxeon_e3-1585l_v5xeon_e5-2620_v3xeon_e5-2670_v3xeon_gold_5218bxeon_e5-2648l_v3xeon_gold_6142mxeon_e5-2609_v3xeon_e3-1275_v5xeon_e5-2438l_v3xeon_e3-1240_v5xeon_e5-2650_v3xeon_gold_6222core_i7-6567uxeon_e5-2648l_v4xeon_e5-4620_v4xeon_e7-8855_v4xeon_d-1513nxeon_d-1537xeon_e3-1515m_v5xeon_w-1290texeon_e3-1225_v5xeon_gold_6209uxeon_silver_4112xeon_d-1559xeon_w-3223xeon_gold_5120txeon_w-3175xxeon_gold_6134xeon_gold_6162xeon_e5-2628l_v3xeon_e-2254mexeon_w-3235core_i7-7y75xeon_e5-4669_v3xeon_w-2225xeon_gold_6130hxeon_w-2133core_i7-6700xeon_d-1557xeon_e5-4627_v3xeon_e7-4850_v4xeon_gold_6148xeon_e3-1505m_v6xeon_gold_6144xeon_gold_6140msimatic_cpu_1518f-4xeon_gold_5220txeon_platinum_8276lxeon_w-2223xeon_e5-2679_v4core_i7-7700kcore_i7-8705gxeon_e-2276mcore_i7-8665uxeon_gold_6129xeon_platinum_9222xeon_gold_6230tcore_i7-7660ucore_i7-6600ucore_i7-8706gxeon_gold_6126tcore_i7-11700fxeon_platinum_8165xeon_w-3225xeon_gold_6135xeon_e3-1565l_v5xeon_e-2236xeon_w-1370core_i7-10850hxeon_e5-1603_v4core_i7-1185grexeon_e5-2408l_v3core_i7-11375hxeon_e3-1240_v6xeon_d-1573ncore_i7-8700core_i7-7700tcore_i7-10700txeon_e5-1630_v4xeon_e5-4660_v3xeon_gold_6246core_i7-8086kxeon_w-2295core_i7-6770hqcore_i7-8700kxeon_e5-2603_v3fas_biosxeon_e-2134xeon_e5-2667_v3xeon_gold_5215xeon_e5-4655_v3xeon_d-2143itxeon_d-2163itxeon_e5-2699_v4xeon_e3-1285_v6xeon_w-1390tsimatic_cpu_1518-4xeon_w-1270xeon_e3-1225_v6xeon_platinum_8284xeon_silver_4109tcore_i7-10510yxeon_e3-1240l_v5xeon_e5-2690_v3xeon_e5-4655_v4xeon_gold_5215lxeon_silver_4215rxeon_e5-2658_v4xeon_gold_6138fcore_i7-11800hxeon_e5-1630_v3xeon_silver_4210txeon_e5-2680_v3xeon_gold_6212uxeon_e3-1205_v6core_i7-7700hqxeon_w-1270texeon_silver_4114xeon_e5-2698_v3core_i7-6498duxeon_e3-1245_v5core_i7-6870hqxeon_gold_6258rxeon_bronze_3104xeon_d-1571xeon_gold_6240lxeon_gold_6238lxeon_e5-2637_v3xeon_e5-1620_v3xeon_gold_6250xeon_d-2173itcore_i7-11700txeon_w-11855mxeon_d-2123itxeon_gold_5219yxeon_e-2246gxeon_w-3265mxeon_d-1627xeon_e5-2637_v4xeon_e5-2687w_v3xeon_d-1602xeon_e7-8890_v4xeon_e5-2680_v4xeon_gold_5218txeon_e5-2697a_v4xeon_gold_6150xeon_gold_6140xeon_e5-2690_v4xeon_e5-2609_v4core_i7-7920hqxeon_platinum_8174xeon_d-1612xeon_e-2254mlxeon_e3-1545m_v5core_i7-10700core_i9-10920xxeon_e3-1578l_v5core_i7-6660uxeon_e3-1270_v5xeon_gold_6126xeon_e3-1260l_v5xeon_w-1250exeon_e5-2643_v4xeon_d-1563nxeon_e5-2699a_v4simatic_cpu_1518-4_firmwarecore_i7-10875hxeon_e-2276mlxeon_e-2244gxeon_e-2176gxeon_gold_6142fcore_i3-l13g4core_i7-8709gxeon_e5-4650_v3xeon_e5-2650l_v4xeon_gold_6130xeon_e-2104gxeon_platinum_8260core_i7-8557usimatic_ipc547gcore_i7-8700txeon_platinum_9242core_i7-6820hqxeon_platinum_8280lxeon_silver_4110core_i7-8650uxeon_bronze_3204xeon_gold_5119tcore_i7-1180g7core_i7-6700tcore_i7-6920hqxeon_gold_6246rxeon_e3-1230_v6xeon_gold_5217xeon_gold_6230nxeon_gold_6143xeon_w-3265xeon_gold_5218nxeon_e5-2620_v4xeon_gold_6138txeon_w-3245xeon_gold_5120core_i7-1185g7core_i7-1195g7xeon_e-2124gcore_i7-1165g7xeon_e5-2618l_v3xeon_d-1523nxeon_e5-2608l_v3core_i7-10700texeon_e-2288gxeon_d-1653nxeon_gold_5220xeon_e-2234xeon_d-1577xeon_d-1637xeon_gold_6254xeon_gold_6269yxeon_silver_4114tcore_i7-6700kxeon_gold_6240yxeon_e5-4669_v4aff_biosxeon_gold_6154xeon_w-1250xeon_e5-2640_v4hci_storage_node_biosxeon_gold_6208uxeon_e7-8893_v4xeon_w-1290exeon_e5-1650_v3xeon_w-3275core_i7-11700bxeon_d-1553nxeon_e-2126gxeon_silver_4209txeon_e5-4620_v3xeon_silver_4116xeon_w-1270exeon_d-1633ncore_i7-7820eqxeon_gold_6252nxeon_e7-4820_v4xeon_gold_6244xeon_e5-2695_v3xeon_gold_6248xeon_e3-1220_v6xeon_w-1370pxeon_platinum_8280xeon_e-2186mxeon_e5-1660_v3xeon_d-1520xeon_e-2176mcore_i7-6785rcore_i7-6820hkxeon_platinum_8256xeon_gold_6152core_i7-1060ng7xeon_e5-2623_v3xeon_platinum_8158xeon_e5-2658a_v3xeon_e5-2418l_v3xeon_w-1290pxeon_e-2286gxeon_gold_6222vxeon_platinum_8176xeon_gold_6242xeon_e3-1275_v6xeon_d-1531core_i7-10810uxeon_e3-1575m_v5xeon_e-2278gxeon_e5-2650_v4xeon_platinum_8260yxeon_e3-1505l_v5xeon_platinum_8270xeon_d-1533nxeon_gold_6242rxeon_e3-1245_v6xeon_gold_6128xeon_silver_4215xeon_d-2142itxeon_platinum_8180mcore_i7-8850hxeon_gold_5118xeon_w-2235xeon_e5-2695_v4xeon_gold_6130fxeon_w-11955mcore_i7-6820eqxeon_gold_6134mcore_i9-10900xxeon_platinum_8276xeon_gold_6238txeon_e3-1235l_v5xeon_silver_4214yxeon_e5-2603_v4core_i9-10980xexeon_e5-4628l_v4xeon_e7-8860_v4xeon_w-1350xeon_silver_4106hxeon_gold_6138pcore_i7-8665uexeon_w-1290xeon_platinum_8176fxeon_d-1524nsolidfire_biosxeon_gold_6240rxeon_w-10885mxeon_w-2275xeon_d-1543nxeon_gold_6226xeon_e-2144gxeon_gold_6256xeon_d-1521xeon_w-1350pxeon_gold_6230rcore_i7-8569uxeon_gold_6252xeon_e5-4640_v3core_i7-1185g7exeon_gold_5218rxeon_gold_6226rxeon_bronze_3206rxeon_e5-1607_v4core_i7-1065g7xeon_platinum_8260lxeon_e5-1428l_v3core_i7-8559uxeon_platinum_8170mxeon_e-2146gxeon_platinum_8180xeon_d-2177ntxeon_e5-2650l_v3xeon_w-2175Intel(R) Processors
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-12380
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.93%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:55
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds read in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-hns2600bpb24rr1304wftysrr2208wf0zsrr1208wftysr2208wftzsrr1304wf0ysr2312wf0nprhns2600bpbr1304wftyshns2600bpqr2224wfqzsr1000wfhns2600bpblc24rs2600bpqrhns2600bpbrs2600stqhns2600bpblcr2308wftzshns2600bpsrr1208wftysrr2208wf0zsr2208wftzsr2312wf0npr1208wfqysrr2224wftzsrr2208wfqzsrs2600stbr2224wftzsr2312wftzsrr2308wftzsrs2600wf0bmc_firmwarehns2600bps24rhns2600bpqrs2600wfqr2208wfqzshns2600bpshns2600bpq24rhns2600bpb24hns2600bps24r1304wf0ysrhns2600bpq24s2600wfts2600bpbrhns2600bpblc24s2600bpsrr2312wfqzsr2312wftzsIntel(R) Server Boards, Server Systems and Compute Modules
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-23179
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.1||HIGH
EPSS-0.06% / 17.60%
||
7 Day CHG-0.09%
Published-18 Aug, 2022 | 19:44
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-wi-fi_6_ax210wireless-ac_9461wireless-ac_9560_firmwarewireless-ac_9260_firmwaredual_band_wireless-ac_3168killer_wi-fi_6_ax1650dual_band_wireless-ac_3165_firmwarewi-fi_6_ax211wi-fi_6_ax200_firmwarewi-fi_6_ax210_firmwarewi-fi_6_ax201_firmwarewi-fi_6_ax411_firmwaredual_band_wireless-ac_8265killer_wi-fi_6_ax1650_firmwarewireless-ac_9462wi-fi_6_ax411dual_band_wireless-ac_3165wireless-ac_9462_firmwarewi-fi_6_ax211_firmwarewi-fi_6_ax200dual_band_wireless-ac_3168_firmwarekiller_wi-fi_6e_ax1690_firmwarewireless-ac_9260killer_wireless-ac_1550dual_band_wireless-ac_8260_firmwarekiller_wi-fi_6e_ax1675_firmwarewireless_7265killer_wi-fi_6e_ax1675killer_wireless-ac_1550_firmwarekiller_wi-fi_6e_ax1690dual_band_wireless-ac_8260wireless_7265_firmwaredual_band_wireless-ac_8265_firmwarewi-fi_6_ax201wireless-ac_9461_firmwarewireless-ac_9560Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-0597
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-2.73% / 85.38%
||
7 Day CHG~0.00%
Published-15 Jun, 2020 | 13:59
Updated-04 Aug, 2024 | 06:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 14.0.33 may allow an unauthenticated user to potentially enable denial of service via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-software_manageractive_management_technology_firmwareIntel(R) AMT and Intel(R) ISM
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-23168
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.20% / 42.21%
||
7 Day CHG~0.00%
Published-18 Aug, 2022 | 00:00
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-wireless_7265_\(rev_d\)_firmwarewi-fi_6e_ax411_firmwarewireless-ac_9461wireless-ac_9560_firmwarewireless-ac_9260_firmwarewi-fi_6e_ax211_firmwaredual_band_wireless-ac_3168killer_wi-fi_6_ax1650dual_band_wireless-ac_3165_firmwarewi-fi_6_ax200_firmwarewi-fi_6_ax201_firmwareproset_wi-fi_6e_ax210dual_band_wireless-ac_8265killer_wi-fi_6_ax1650_firmwarewireless-ac_9462dual_band_wireless-ac_3165wireless-ac_9462_firmwarewireless_7265_\(rev_d\)wi-fi_6_ax200dual_band_wireless-ac_3168_firmwarekiller_wi-fi_6e_ax1690_firmwarewireless-ac_9260killer_ac_1550_firmwaredual_band_wireless-ac_8260_firmwarewi-fi_6e_ax411killer_wi-fi_6e_ax1675_firmwareproset_wi-fi_6e_ax210_firmwarekiller_wi-fi_6e_ax1675killer_wi-fi_6e_ax1690dual_band_wireless-ac_8260dual_band_wireless-ac_8265_firmwarewi-fi_6_ax201wireless-ac_9461_firmwarewireless-ac_9560killer_ac_1550wi-fi_6e_ax211Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-30760
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-3.3||LOW
EPSS-0.08% / 24.62%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-03 Oct, 2024 | 20:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in some Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA in version 0.25.0 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-realsense_450_fa_firmwarerealsense_450_faIntel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-28404
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-3.8||LOW
EPSS-0.09% / 26.79%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-02 Aug, 2024 | 12:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in the Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers before version 31.0.101.4255 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-windowsarc_a_graphicsiris_xe_graphicsIntel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-12356
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.14% / 35.43%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:09
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.
Product-cloud_backupactive_management_technology_firmwareIntel(R) AMT
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-25756
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.06% / 17.35%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:05
Updated-13 Feb, 2025 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i7-1365u_firmwarepentium_gold_g4600core_i7-11850he_firmwarecore_i5-12600hecore_i7-1280pcore_i7-1068ng7core_i5-1035g7core_i5-12600tcore_i5-13600kcore_i3-8350k_firmwarecore_i3-9350k_firmwareceleron_5305upentium_gold_g6600_firmwareceleron_g3940pentium_gold_g6400t_firmwarepentium_n6415_firmwarecore_i9-12900te_firmwarecore_i5-11600_firmwareceleron_g1610t_firmwareceleron_4305uceleron_b800_firmwarecore_i7-1060g7_firmwareceleron_n2815core_i7-9700core_i7-1370pcore_i5-12500hl_firmwarecore_i9-9900kfceleron_2961ypentium_gold_g5400tcore_i5-1035g4core_i5-10400hceleron_4205uceleron_n5105core_i7-10700k_firmwareceleron_2002e_firmwareceleron_n3000_firmwarecore_i5-9600t_firmwarecore_i3-10100ycore_i5-1345ucore_i7-9700tecore_i5-10400tcore_i5-13500hcore_i7-11370hcore_i5-10310ucore_i5-9400f_firmwarecore_i7-1270pcore_i7-10700t_firmwarecore_i7-1270p_firmwareceleron_g1830core_i5-11600tcore_i5-1235ul_firmwarecore_i5-8269u_firmwarecore_i7-13700core_i5-12500te_firmwareceleron_b720core_i7-13800h_firmwareceleron_n4100celeron_g6900celeron_g3940_firmwareceleron_n3060core_i5-10400celeron_1020ecore_i5-12600k_firmwarepentium_gold_g6605_firmwareceleron_g5920core_i7-10710u_firmwareceleron_1020mcore_i5-10500teceleron_g5305ucore_i5-11600core_i7-12800hl_firmwareceleron_5305u_firmwarecore_i5-13505h_firmwarepentium_gold_g6405t_firmwarecore_i9-13980hx_firmwareceleron_g1820te_firmwareceleron_3865u_firmwarecore_i5-8600core_i7-12800he_firmwarecore_i5-1345ue_firmwarecore_i5-9400_firmwareceleron_5205ucore_i7-8500y_firmwareceleron_3865ucore_i5-1245ulceleron_g4930e_firmwarecore_i3-10100ecore_i5-13600hxcore_i7-1060g7core_i5-13500tecore_i9-10900celeron_n2930celeron_n2840_firmwarecore_i5-11600k_firmwareceleron_g4900tcore_i3-10100tceleron_g3900te_firmwarepentium_gold_g7400ecore_i9-10900kceleron_797_firmwarecore_i3-10325_firmwareceleron_g4932ecore_i5-8600kpentium_gold_g7400tcore_i7-10700te_firmwarecore_i9-10900fcore_i5-12600he_firmwarecore_i7-8700k_firmwarecore_i5-11500t_firmwarecore_i5-13400tcore_i7-8750hcore_i3-10105t_firmwarecore_i9-13900tceleron_927ueceleron_g465core_i5-10400_firmwarecore_i3-1115gre_firmwareceleron_2002eceleron_n4505_firmwarecore_i7-1180g7_firmwarecore_i7-9850he_firmwarecore_i3-1125g4core_i5-13600h_firmwarecore_i3-1000g4core_i3-12300_firmwareceleron_6600he_firmwareceleron_j6413_firmwarecore_i7-13700tcore_i7-8809gcore_i3-8145ueceleron_j4105celeron_887core_i5-10400h_firmwareceleron_807_firmwarecore_i9-12900h_firmwarecore_i5-10500_firmwarepentium_gold_g6505celeron_j6412_firmwareceleron_g5900t_firmwarecore_i9-13900kscore_i5-1245ul_firmwarecore_i7-1260u_firmwarecore_i7-13700_firmwarecore_i7-1370pe_firmwarecore_i7-1265uecore_i9-13900kf_firmwarepentium_gold_g6400te_firmwarecore_i5-10500eceleron_2970mcore_i5-9400tceleron_j3355core_i5-8600t_firmwarecore_i5-8300hcore_i7-12700e_firmwarecore_i9-13905h_firmwarecore_i3-10110yatom_x6414re_firmwarecore_i5-10600kfceleron_1005m_firmwareceleron_j3355eceleron_1047ue_firmwarecore_i7-12650h_firmwarecore_i5-11600kfceleron_j4125_firmwarecore_i7-11700kfpentium_gold_g5500tcore_i7-10870hcore_i5-12600t_firmwareceleron_3205ucore_i5-8600_firmwarecore_i5-1245u_firmwarecore_i3-13300hre_firmwarecore_i5-9600kf_firmwareatom_x6212re_firmwarecore_i7-1250uceleron_g4920celeron_3215u_firmwarecore_i7-13620h_firmwarecore_i5-11500tpentium_gold_g6405uceleron_n4504core_i5-9500core_i3-8145ue_firmwarecore_i5-1250pecore_i5-10500te_firmwarecore_i7-1366ure_firmwareceleron_n2807celeron_g540t_firmwarecore_i5-1130g7_firmwareceleron_g3902ecore_i7-1366urepentium_gold_7505_firmwarecore_i5-8300h_firmwarecore_i3-1220pepentium_gold_8505_firmwarecore_i7-8565ucore_i7-1365ureceleron_n3350_firmwarepentium_gold_g6400e_firmwareceleron_1019yceleron_n2820core_i3-10300_firmwareceleron_b815pentium_gold_g5420tcore_i3-8100t_firmwarecore_i5-8259ucore_i9-11900fceleron_787_firmwareceleron_g5900tcore_i7-11600hcore_i9-12900f_firmwarecore_i9-12900hk_firmwarepentium_gold_g5500core_i7-1370pecore_i7-13700kf_firmwarecore_i7-8850h_firmwareceleron_2980u_firmwarecore_i7-9700kf_firmwareceleron_g460_firmwarecore_i3-10105core_i7-9850h_firmwarepentium_gold_g6405_firmwareceleron_b830core_i3-13100celeron_b810e_firmwarepentium_gold_6500y_firmwarepentium_gold_g6500_firmwareceleron_g1630_firmwareceleron_n3700_firmwarecore_i9-10900k_firmwarecore_i9-12900e_firmwarecore_i7-1280p_firmwarecore_i5-1350p_firmwareceleron_g540atom_x6211ecore_i7-1185g7_firmwareceleron_g530t_firmwarecore_i5-11320hceleron_b810celeron_j4115_firmwarecore_i3-10300t_firmwarecore_i7-13700hxcore_i5-9300hpentium_gold_g6500core_i5-13450hx_firmwareceleron_n4000c_firmwarecore_i7-8559u_firmwarecore_i7-8086k_firmwarecore_i7-10610uceleron_g540tcore_i5-1035g1_firmwarecore_i7-12850hx_firmwarecore_i7-8665u_firmwareceleron_g1620core_i5-9400hcore_i7-8500ycore_i9-9900tcore_i9-13900hxceleron_1037u_firmwarecore_i7-9700e_firmwarecore_i3-13100f_firmwarecore_i9-12900tecore_i7-12700kf_firmwarecore_i5-11300h_firmwarecore_i3-8300t_firmwarecore_i3-8109u_firmwareceleron_n3060_firmwareceleron_3955ucore_i7-9700k_firmwareceleron_n4000celeron_n2830core_i5-13500hxceleron_7300core_i5-1145g7e_firmwarecore_i3-12100te_firmwarecore_i7-12800hcore_i3-10300tcore_i3-8100b_firmwareceleron_n3450celeron_n5100celeron_n2805_firmwarecore_i9-8950hk_firmwareceleron_g3930_firmwarecore_i7-1265ue_firmwarecore_i5-13600k_firmwareceleron_j6412pentium_j6425_firmwarepentium_gold_g6600celeron_n2810atom_x6200feceleron_g1610tcore_i5-8265ucore_i9-13905hcore_i5-13400t_firmwarecore_i7-13700k_firmwarepentium_gold_g6605celeron_g470_firmwareceleron_g5925atom_x6413e_firmwarepentium_gold_g5400t_firmwarepentium_gold_4410y_firmwarecore_i5-13600hceleron_g3920_firmwarecore_i7-10700_firmwareceleron_g530tcore_i3-8350kcore_i5-13500_firmwarecore_i7-1365ue_firmwarecore_i3-9100core_i9-12900hxcore_i5-9600k_firmwarecore_i5-1250pcore_i7-12700h_firmwarepentium_gold_g5600celeron_j4125core_i5-1145gre_firmwarecore_i3-1215ue_firmwareceleron_g4950_firmwareceleron_j1750core_i7-8705gcore_i5-9500eceleron_7305lcore_i5-12450h_firmwarecore_i7-8706gcore_i7-12700hcore_i5-12500t_firmwarecore_i9-9880h_firmwarecore_i7-8700t_firmwarecore_i7-1185grepentium_gold_4415u_firmwarecore_i7-11375hcore_i3-13300hrecore_i5-12600hx_firmwareceleron_n6210core_i5-10400fcore_i5-8259u_firmwarecore_i7-8665ue_firmwarecore_i7-13800hre_firmwarecore_i7-8700atom_x6200fe_firmwarecore_i5-1245ue_firmwarecore_i7-8705g_firmwareceleron_b840_firmwarecore_i9-10900te_firmwarepentium_gold_8500core_i7-10700tceleron_g5205u_firmwarecore_i5-10210ucore_i5-12450hcore_i5-8257ucore_i7-8700kcore_i5-12500tecore_i7-1260pcore_i5-1345urepentium_gold_g6405tcore_i5-1155g7_firmwareceleron_n2830_firmwarecore_i7-10510u_firmwarecore_i5-13600he_firmwareceleron_g1610_firmwareceleron_3867u_firmwareceleron_g440_firmwarecore_i3-10100_firmwareceleron_2000ecore_i5-10505celeron_725ccore_i5-1030g7pentium_gold_g7400e_firmwarecore_i5-1345ure_firmwarecore_i7-8569u_firmwarepentium_n6415core_i7\+8700_firmwarecore_i3-13300hecore_i7-1185g7e_firmwareceleron_g1620t_firmwareceleron_g1820_firmwarecore_i3-10110ucore_i5-10600kf_firmwarecore_i9-12900fcore_i7-11800hceleron_1000m_firmwarecore_i5-12400celeron_867_firmwarecore_i5-10310u_firmwareceleron_g465_firmwareceleron_g4900t_firmwarecore_i3-10105fcore_i3-9100hl_firmwarecore_i3-8100hceleron_n4020c_firmwarepentium_gold_4415ycore_i5-13600t_firmwarecore_i9-11950hceleron_g5900tecore_i5-10300hcore_i7-13850hxcore_i5-1345ueceleron_n3050_firmwarecore_i3-1005g1_firmwareceleron_j3455_firmwarecore_i3-12300he_firmwareceleron_g550_firmwarecore_i5-8500tceleron_1017u_firmwarecore_i7-12700hl_firmwareceleron_n2910celeron_j1800_firmwarepentium_gold_g7400_firmwarepentium_gold_g6500tcore_i5-11500h_firmwarecore_i9-11900kceleron_877core_i5-8350u_firmwareceleron_g1820tceleron_g3930ecore_i9-10850kpentium_gold_8505pentium_gold_g5600_firmwareceleron_g5905_firmwarecore_i9-9900ks_firmwarecore_i7-12700tepentium_gold_g6400tceleron_1019y_firmwarecore_i3-9300_firmwarecore_i5-8400tpentium_gold_g5600tceleron_g3930tcore_i7-10700core_i7-11600h_firmwarecore_i3-9100te_firmwareceleron_g550tceleron_j4105_firmwarecore_i7-10750h_firmwareceleron_847_firmwareceleron_3965uceleron_g4920_firmwarecore_i5-1240p_firmwarecore_i3-10105tatom_x6211e_firmwarecore_i5-11400tcore_i5-11300hcore_i9-11900kfcore_i3-10325core_i7-13700hcore_i9-12950hxcore_i3-12100ecore_i9-12900kscore_i7-10875hcore_i5-13500t_firmwarecore_i5-1340peceleron_n3350e_firmwarecore_i7-1370prepentium_gold_g5400_firmwarecore_i7-12700te_firmwarecore_i9-11900k_firmwareceleron_6305_firmwarecore_i3-10100core_i5-8200y_firmwarecore_i7-8550u_firmwarecore_i5-1035g7_firmwarecore_i7-10700f_firmwareceleron_j1900celeron_6305core_i5-9400core_i3-8100tceleron_n4505core_i3-13100t_firmwarecore_i5-13400_firmwarecore_i7-12700fcore_i3-1210u_firmwareceleron_g4930t_firmwarecore_i5-13600hecore_i9-12900core_i7-8650ucore_i5-13500tcore_i9-13900_firmwarecore_i9-10900e_firmwarecore_i5-1145greatom_x6414recore_i5-1340pcore_i7-9750h_firmwarecore_i7-12700t_firmwarecore_i5-1345u_firmwareatom_x6425re_firmwarepentium_gold_g4620_firmwarecore_i7-13700te_firmwareceleron_j1850_firmwarepentium_gold_4415ucore_i5-1038ng7core_i9-13900h_firmwarecore_i5-11260h_firmwarecore_i7-10700e_firmwareceleron_g1850_firmwarecore_i3-10110y_firmwareceleron_n2920_firmwarecore_i5-1035g4_firmwarecore_i5-8500bcore_i7-1185g7core_i7-1195g7core_i7-12700_firmwarecore_i7-13850hx_firmwarecore_i7-13800hrecore_i5-8269uceleron_927ue_firmwarecore_i5-12400f_firmwareceleron_n3520celeron_b810ecore_i7-10700tecore_i5-1350peceleron_n3000core_i7-1355u_firmwarecore_i9-13900fcore_i7-8709g_firmwarecore_i3-13100tcore_i7-11700_firmwarecore_i9-13900hx_firmwarecore_i7-1265ulceleron_n4100_firmwarecore_i5-10500e_firmwareceleron_1007uceleron_867celeron_g3900tcore_i5-11500he_firmwarecore_i5-8279u_firmwarecore_i5-1145g7_firmwarecore_i5-9500f_firmwarecore_i5-10600t_firmwarecore_i5-10210y_firmwarecore_i5-13400e_firmwarecore_i7-1250u_firmwarecore_i5-13600kfcore_i5-8250uatom_x6425recore_i3-10305celeron_g5900_firmwareceleron_g5920_firmwarecore_i7-9700tcore_i5-12600hl_firmwarecore_i9-12900ks_firmwarecore_i5-1230u_firmwareceleron_n3450_firmwarecore_i3-1215u_firmwarecore_i3-1315u_firmwarecore_i5-13500hx_firmwareceleron_n2805core_i7-8650u_firmwarecore_i7-1365ure_firmwareceleron_j1750_firmwareceleron_4305uecore_i3-9350kfcore_i9-9900k_firmwareceleron_b820_firmwareceleron_g3902e_firmwarecore_i3-1115g4e_firmwareceleron_g530core_i5-1130g7core_i5-12400t_firmwarecore_i5-13500eceleron_1020m_firmwareceleron_4205u_firmwarecore_i5-1245ucore_i5-8365u_firmwarecore_i5-10500hceleron_2950mcore_i3-9300tcore_i3-8100h_firmwarecore_i3-1115g4_firmwareceleron_j6413core_i3-1320pre_firmwarecore_i7-10875h_firmwarecore_i5-10500t_firmwareceleron_j4005_firmwarecore_i5-8265u_firmwarecore_i7-12800h_firmwareceleron_j3060_firmwarecore_i7-1375pre_firmwarecore_i9-13900kpentium_gold_g6400eceleron_g5305u_firmwareceleron_n2920atom_x6413epentium_gold_7505core_i5-10600celeron_g3930te_firmwarecore_i3-12100tecore_i3-1115g4ecore_i7\+8700celeron_3755u_firmwarecore_i9-12900hcore_i5-13500core_i3-9350kceleron_7300_firmwarecore_i5-8500_firmwarecore_i5-13600kf_firmwarecore_i7-13700hx_firmwarecore_i9-11980hk_firmwarecore_i7-8665ueceleron_g4950celeron_6305eceleron_j3455ecore_i5-1145g7ecore_i7-1265u_firmwarecore_i5-11500heceleron_g5900e_firmwarecore_i3-10320core_i5-8200yceleron_g3900t_firmwareceleron_g470core_i5-12600kfceleron_n4020celeron_g4900_firmwareceleron_g1620tpentium_gold_g6405u_firmwarecore_i7-8569ucore_i5-13500te_firmwareceleron_g3900eceleron_g1820teceleron_g3950_firmwarecore_i5-10500tcore_i7-13700t_firmwarecore_i7-12850hxcore_i5-1350pcore_i7-1185g7ecore_i7-1265ul_firmwarecore_i9-13900ks_firmwareceleron_j3355_firmwarecore_i5-12600hxcore_i3-8100bcore_i5-9600tcore_i5-12600_firmwarecore_i3-9320core_i5-11400celeron_n2910_firmwarecore_i7-1065g7core_i5-13500h_firmwareceleron_g440core_i9-10900tecore_i9-10980hk_firmwarepentium_gold_g6400tecore_i5-1230ucore_i3-8130ucore_i7-13700f_firmwareceleron_2957ucore_i5-13600hx_firmwarecore_i3-9100_firmwareceleron_847eceleron_3955u_firmwareceleron_n4504_firmwareceleron_g1620_firmwareceleron_g550core_i7-11370h_firmwareceleron_j1900_firmwarecore_i3-13300he_firmwarecore_i7-1160g7core_i3-10105f_firmwarecore_i9-13900k_firmwarepentium_gold_g5420core_i7-9700kfcore_i7-13700kfpentium_gold_g5420t_firmwarecore_i5-8305g_firmwarecore_i3-13100e_firmwarecore_i7-10870h_firmwarecore_i5-8400hceleron_j1850core_i7-1260uceleron_b815_firmwarepentium_gold_g5420_firmwarecore_i3-1110g4_firmwarecore_i3-1110g4core_i5-12500tcore_i5-10200hcore_i9-13900eceleron_g3920t_firmwarecore_i3-10100f_firmwarepentium_gold_g4560_firmwarecore_i5-12500hcore_i3-8145ucore_i7-11700core_i3-1220pcore_i5-9600_firmwarecore_i3-8109ucore_i5-1250pe_firmwarecore_i3-12300t_firmwarecore_i9-11900tcore_i7-9700f_firmwareceleron_n4500core_i7-1195g7_firmwarecore_i5-9500e_firmwarecore_i7-11850hcore_i5-12600hcore_i9-11900core_i7-12800hxcore_i5-10600_firmwarecore_i3-9100hlceleron_g550t_firmwareceleron_n3150core_i7-12700eceleron_n5100_firmwarecore_i3-12100tcore_i5-8400bcore_i7-13800he_firmwarecore_i3-9300t_firmwarecore_i7-10610u_firmwarecore_i9-13900hkcore_i5-9500_firmwarecore_i5-1240pcore_i5-12500pentium_gold_g5620core_i5-13600hre_firmwareceleron_1020e_firmwarecore_i7-11850hecore_i7-13650hxcore_i5-8400h_firmwareceleron_n4120pentium_gold_g7400te_firmwarecore_i3-9100tepentium_gold_g6505tcore_i7-9700fcore_i9-10980hkcore_i5-1350pe_firmwarecore_i5-13420h_firmwareceleron_g3930tepentium_gold_6405u_firmwarecore_i7-10510ucore_i7-9700kceleron_n2840core_i5-10400t_firmwarecore_i3-8100core_i9-13900kfcore_i9-11900hcore_i3-11100hecore_i7-1370pre_firmwarecore_i7-12700core_i5-1235u_firmwareceleron_3855u_firmwarecore_i7-11700k_firmwarepentium_gold_g6505t_firmwarecore_i9-13950hxcore_i5-13500e_firmwareceleron_2955uceleron_5205u_firmwarecore_i7-1160g7_firmwareceleron_6305e_firmwarecore_i7-8700_firmwareceleron_g3900_firmwarecore_i5-8365uceleron_g6900t_firmwareceleron_j3060core_i5-9600kfcore_i9-13900f_firmwarecore_i5-8500b_firmwareceleron_n3160core_i3-10100teceleron_7305core_i7-1255ul_firmwareceleron_g6900_firmwareceleron_g4930core_i7-10700fcore_i5-12400tcore_i5-1030g4_firmwareceleron_725c_firmwarecore_i5-12400_firmwarecore_i7-8557u_firmwarepentium_gold_g4600_firmwareceleron_n4000ccore_i5-1145g7core_i7-1068ng7_firmwarecore_i7-10750hceleron_3867ucore_i3-8300atom_x6427fecore_i9-13980hxcore_i3-1220pe_firmwareceleron_g4932e_firmwarecore_i5-13420hcore_i7-1360pcore_i5-12500e_firmwarecore_i7-8700bcore_i9-12950hx_firmwareceleron_j1800core_i5-11400t_firmwarecore_i3-1115g4core_i7-11700f_firmwarecore_i7-12650hcore_i3-1215ucore_i5-10210ycore_i5-1140g7core_i7-13650hx_firmwarecore_i5-12500hlcore_i3-1215ul_firmwarecore_i9-9900kf_firmwarecore_i5-9500fcore_i5-10210u_firmwareceleron_807uecore_i5-10600tcore_i7-9850hecore_i7-1375precore_i7-10700ecore_i5-1245uecore_i5-12600hlceleron_g4930epentium_gold_4410ycore_i5-10500h_firmwarecore_i9-9900kscore_i5-9600pentium_gold_g6500t_firmwarecore_i3-1315upentium_gold_g7400tecore_i3-9100fceleron_827e_firmwarecore_i9-11900_firmwarepentium_gold_g5600t_firmwarecore_i3-12300hl_firmwarecore_i7-9750hfpentium_gold_6405uceleron_n3350core_i5-9300h_firmwarecore_i7-12700k_firmwarecore_i7-10700kceleron_g1820core_i9-12900k_firmwareceleron_g5925_firmwarecore_i9-12900kcore_i3-9320_firmwarecore_i3-13100fcore_i5-8400b_firmwarecore_i3-8100_firmwarecore_i7-11700kceleron_g555_firmwarecore_i3-1215ulcore_i3-12100_firmwarecore_i9-9880hcore_i3-13100ecore_i7-10710ucore_i5-8500t_firmwarecore_i7-10700kfcore_i3-11100he_firmwarecore_i7-1255u_firmwareceleron_g6900tcore_i7-13700teceleron_1047ueceleron_877_firmwarepentium_gold_g4560core_i9-13900tecore_i7-12800hecore_i9-13900hk_firmwarecore_i7-8706g_firmwarecore_i9-13900e_firmwarecore_i9-11900t_firmwareceleron_n4500_firmwareceleron_827epentium_gold_4415y_firmwarecore_i9-9900celeron_j3355e_firmwarecore_i7-10510y_firmwarecore_i5-12600core_i3-10100e_firmwarecore_i7-9850hl_firmwarecore_i7-11390h_firmwareceleron_n2806core_i3-13100_firmwareceleron_3765ucore_i3-8140ucore_i5-1038ng7_firmwareceleron_g5905tceleron_797core_i3-10100te_firmwarecore_i5-12400fcore_i5-1340pe_firmwarecore_i3-1120g4_firmwarecore_i5-13600tceleron_g1840_firmwarecore_i7-8550ucore_i7-13705hceleron_n3010core_i3-9100tceleron_j4025celeron_b820core_i5-8310y_firmwareceleron_g460core_i5-12600h_firmwareceleron_857core_i5-1235ulpentium_gold_4425yceleron_3205u_firmwarecore_i3-1320precore_i7-11375h_firmwarecore_i5-1335ueceleron_847core_i9-10900_firmwarecore_i5-10505_firmwarecore_i5-1334u_firmwareceleron_g6900tecore_i3-12300tcore_i9-12900t_firmwareceleron_g3900e_firmwarecore_i3-8145u_firmwarecore_i9-12900kfceleron_n3160_firmwareceleron_3755ucore_i3-1305ucore_i5-11260hcore_i3-1315urecore_i3-12100f_firmwarecore_i5-10300h_firmwarecore_i7-11850h_firmwareceleron_n2820_firmwareceleron_g3920tcore_i5-8210yceleron_n6211core_i7-8750h_firmwarecore_i5-10200h_firmwareceleron_1007u_firmwarecore_i9-11900f_firmwareceleron_2955u_firmwareceleron_2980uceleron_n6210_firmwarecore_i7-11700t_firmwareceleron_n6211_firmwareceleron_857_firmwareceleron_n3010_firmwarecore_i5-12600kf_firmwarecore_i5-13400fcore_i3-9100f_firmwarecore_i7-1185gre_firmwarepentium_gold_g6400_firmwarecore_i5-1350pre_firmwarecore_i5-11500core_i5-1135g7core_i5-8500core_i5-9500te_firmwarecore_i7-13800heceleron_n2808_firmwarecore_i7-1260p_firmwarecore_i7-10700kf_firmwarecore_i7-9750hceleron_n4020ccore_i7-12700f_firmwarepentium_gold_g6405core_i7-13700fceleron_787core_i3-10305tcore_i9-9900t_firmwarepentium_gold_g7400t_firmwarepentium_gold_g5500_firmwarecore_i5-13450hxcore_i7-13620hatom_x6212recore_i7-8665uceleron_n2940_firmwarecore_i3-8300tcore_i7-11700fcore_i7-12650hxceleron_b810_firmwarepentium_gold_g5620_firmwarecore_i7-10850hcore_i3-1210ucore_i3-1125g4_firmwareceleron_g1820t_firmwarecore_i7-11800h_firmwareceleron_g5905celeron_g3950celeron_2981ucore_i5-8400celeron_j4115celeron_7305l_firmwarecore_i3-10300core_i7-13705h_firmwarecore_i5-1140g7_firmwareceleron_n2930_firmwarecore_i7-8086kcore_i3-1320pe_firmwarepentium_gold_g5500t_firmwarepentium_gold_5405u_firmwareceleron_807core_i5-8365ue_firmwarecore_i5-1240u_firmwarecore_i5-12500h_firmwarecore_i9-11900kf_firmwareceleron_b710celeron_n2940core_i5-1335ucore_i5-8600k_firmwareceleron_b710_firmwarecore_i7-13800hceleron_j3455celeron_n5095_firmwareceleron_887_firmwareceleron_n2807_firmwarecore_i5-10310y_firmwarecore_i7-13700h_firmwarepentium_gold_4417ucore_i7-12700hlcore_i3-1000g1core_i7-10510yceleron_j3160core_i7-12700kcore_i5-8210y_firmwarecore_i9-13900te_firmwareceleron_n3150_firmwarecore_i3-9100e_firmwarecore_i7-1255ulceleron_g3900core_i5-9600kceleron_g5905t_firmwarecore_i3-10305t_firmwareceleron_n3520_firmwarecore_i3-12300hlceleron_7305e_firmwareceleron_n5105_firmwarecore_i5-1335ue_firmwarecore_i9-10900f_firmwarecore_i3-13100te_firmwarecore_i7-1270pecore_i9-12900hkcore_i9-12900ecore_i5-1155g7core_i3-9100t_firmwarecore_i5-11320h_firmwarecore_i9-12900_firmwareceleron_3215ucore_i3-1220p_firmwareceleron_g5900celeron_1005mcore_i5-8350uceleron_n4000_firmwareceleron_2950m_firmwareceleron_g1830_firmwarecore_i7-11700tcore_i3-13100teceleron_g3930celeron_g3930t_firmwarecore_i3-10100y_firmwareceleron_3965y_firmwareceleron_n2806_firmwarecore_i5-11400h_firmwarecore_i9-12900hx_firmwareceleron_g5900ecore_i5-13400ecore_i3-12100e_firmwarecore_i7-8700b_firmwarecore_i5-13600core_i9-8950hkcore_i9-10900ecore_i5-9300hf_firmwarecore_i7-12800hx_firmwarecore_i3-12100fceleron_g555celeron_b720_firmwarecore_i9-10885hpentium_j6425core_i3-1320peceleron_g1840t_firmwareceleron_g1840core_i3-12300hecore_i5-12500ecore_i3-9300celeron_1037ucore_i3-9350kf_firmwarecore_i9-9900kceleron_4305ue_firmwarecore_i9-12900tceleron_g1630core_i7-8709gceleron_j4025_firmwarepentium_gold_4417u_firmwarecore_m3-8100y_firmwarecore_i7-1355ucore_i3-12100core_i5-1335u_firmwarecore_i7-8557uceleron_g4930_firmwarecore_i5-9500tceleron_g1610core_i5-8260u_firmwarecore_i7-8700tcore_i3-10305_firmwareceleron_n2810_firmwarecore_i5-11400fcore_i5-11500_firmwarecore_i7-13700ecore_i7-1180g7celeron_2970m_firmwarecore_i5-13505hcore_i3-1215ueceleron_6600heceleron_n3700pentium_gold_g7400core_i9-11950h_firmwarecore_i9-13900core_i9-13900hceleron_2961y_firmwarecore_i5-1035g1core_i7-1370p_firmwarecore_i7-8565u_firmwareceleron_7305_firmwarepentium_gold_4425y_firmwarecore_i5-11400f_firmwarecore_i9-12900kf_firmwarecore_i7-12800hlceleron_b830_firmwarecore_i5-1250p_firmwarecore_i7-1165g7celeron_n3050celeron_n5095core_i5-11600katom_x6427fe_firmwarecore_i7-11390hcore_i9-11900h_firmwarecore_i5-1030g4pentium_gold_8500_firmwarecore_i3-9100ecore_i3-12100t_firmwarecore_i5-10500celeron_b800atom_x6425eceleron_3965u_firmwareceleron_g3930e_firmwarecore_i5-1350precore_i7-9850hcore_i5-9400fcore_i7-9700t_firmwarecore_i5-13400f_firmwarecore_i7-1265uceleron_2981u_firmwarecore_i5-8279ucore_i3-8130u_firmwareceleron_g3920core_i5-13400core_i5-9300hfceleron_g1850pentium_gold_g6505_firmwarecore_i5-11400hcore_i7-13700e_firmwarecore_i3-8140u_firmwarecore_i3-1000g4_firmwarecore_i5-11400_firmwarecore_i7-1360p_firmwarecore_i7-9850hlceleron_g1840tcore_i7-13700kcore_i7-1255ucore_i5-13600_firmwarecore_i3-1315ueceleron_1017ucore_i9-11980hkcore_i5-10600kceleron_g5205uceleron_847e_firmwarecore_i3-1315ue_firmwarecore_m3-8100ycore_i7-1165g7_firmwarecore_i5-8250u_firmwarecore_i9-10900kfceleron_n4120_firmwarecore_i7-9700epentium_gold_g4620core_i5-8400_firmwareceleron_n3350ecore_i3-1120g4core_i3-1000g1_firmwarecore_i5-10600k_firmwarecore_i7-9750hf_firmwarecore_i5-10310ycore_i5-8400t_firmwareceleron_4305u_firmwarecore_i7-12700tceleron_g540_firmwarecore_i5-8260ucore_i9-13900t_firmwareceleron_n2808celeron_b840core_i3-10100t_firmwarecore_i7-10810u_firmwarecore_i9-10900t_firmwarecore_i3-12300core_i5-11600kf_firmwarecore_i5-12450hx_firmwarecore_i5-1340p_firmwarecore_i7-10810ucore_i5-10400f_firmwarecore_i7-11700kf_firmwarecore_i5-12600kcore_i3-10105_firmwareceleron_j3160_firmwarecore_i3-1115greceleron_g5900te_firmwarecore_i7-8850hceleron_807ue_firmwareceleron_j3455e_firmwarecore_i5-11500hcore_i3-10100fcore_i3-8300_firmwareceleron_g4930tatom_x6425e_firmwarecore_i7-1365uecore_i7-12700kfcore_i7-1065g7_firmwarecore_i9-9900_firmwarecore_i5-1135g7_firmwarecore_i5-12500_firmwareceleron_n2815_firmwarecore_i5-8257u_firmwarecore_i9-10900kf_firmwareceleron_7305ecore_i5-11600t_firmwarecore_i5-12450hxceleron_g530_firmwarecore_i9-10850k_firmwareceleron_n4020_firmwarecore_i5-8365uecore_i7-8809g_firmwarecore_i9-10885h_firmwarecore_i5-1235uceleron_1000mcore_i7-12650hx_firmwarecore_i9-9980hk_firmwarecore_i5-1240uceleron_g4900core_i5-1030g7_firmwarecore_i5-9400h_firmwarecore_i9-10900tpentium_gold_g5400core_i7-1365ucore_i3-1305u_firmwarecore_i5-8310ycore_i3-1315ure_firmwarecore_i3-10110u_firmwarecore_i5-9500teceleron_2957u_firmwareceleron_2000e_firmwarecore_i5-9500t_firmwarecore_i7-9700te_firmwareceleron_3765u_firmwarecore_i3-10320_firmwareceleron_3965ypentium_gold_5405uceleron_g3900tecore_i3-1005g1celeron_j4005core_i9-13950hx_firmwareceleron_3855ucore_i5-8600tcore_i5-8305gcore_i7-10850h_firmwarecore_i5-9400t_firmwareceleron_g6900ecore_i7-8559ucore_i9-9980hkcore_i5-13600hreceleron_g6900te_firmwareceleron_g6900e_firmwarecore_i7-9700_firmwarepentium_gold_6500ypentium_gold_g6400core_i5-1334ucore_i7-1270pe_firmwareIntel(R) Processors
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-34864
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.2||MEDIUM
EPSS-0.06% / 18.26%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 20:00
Updated-27 Jan, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in the Intel(R) Trace Analyzer and Collector software before version 2021.5 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-trace_analyzer_and_collectorIntel(R) Trace Analyzer and Collector software
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-34346
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.8||MEDIUM
EPSS-0.08% / 24.28%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 20:00
Updated-27 Jan, 2025 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in the Intel(R) Media SDK software before version 22.2.2 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-media_software_development_kitIntel(R) Media SDK software
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-30339
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6||MEDIUM
EPSS-0.07% / 21.62%
||
7 Day CHG+0.01%
Published-16 Feb, 2023 | 20:00
Updated-27 Jan, 2025 | 18:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in firmware for the Intel(R) Integrated Sensor Solution before versions 5.4.2.4579v3, 5.4.1.4479 and 5.0.0.4143 may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-integrated_sensor_solutionIntel(R) Integrated Sensor Solution
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-30531
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.08% / 23.66%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 20:00
Updated-27 Jan, 2025 | 18:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in the Intel(R) Iris(R) Xe MAX drivers for Windows before version 100.0.5.1474 may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-windowsiris_xe_max_dedicated_graphicsIntel(R) Iris(R) Xe MAX drivers for Windows
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-26369
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.2||MEDIUM
EPSS-0.07% / 21.61%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in some Intel(R) XMM(TM) 7560 Modem software before version M2_7560_R_01.2146.00 may allow a privileged user to potentially enable escalation of privilege via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xmm_7560_firmwarexmm_7560Intel(R) XMM(TM) 7560 Modem software
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-23097
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.09% / 27.21%
||
7 Day CHG~0.00%
Published-28 Jan, 2022 | 00:00
Updated-19 Nov, 2024 | 19:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the DNS proxy in Connman through 1.40. forward_dns_reply mishandles a strnlen call, leading to an out-of-bounds read.

Action-Not Available
Vendor-n/aIntel CorporationDebian GNU/Linux
Product-connmandebian_linuxn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-23096
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.08% / 24.76%
||
7 Day CHG~0.00%
Published-28 Jan, 2022 | 00:00
Updated-15 Oct, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.

Action-Not Available
Vendor-n/aIntel CorporationDebian GNU/Linux
Product-connmandebian_linuxn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-21226
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.91%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in the Intel(R) Trace Analyzer and Collector before version 2021.5 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-trace_analyzer_and_collectorIntel(R) Trace Analyzer and Collector
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-21240
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.15% / 35.80%
||
7 Day CHG+0.03%
Published-18 Aug, 2022 | 19:40
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds read for some Intel(R) PROSet/Wireless WiFi products may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-proset_wi-fi_6e_ax210_firmwarewi-fi_6e_ax411_firmwarewi-fi_6e_ax211_firmwarewi-fi_6e_ax411wi-fi_6e_ax211proset_wi-fi_6e_ax210Intel(R) PROSet/Wireless WiFi products
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-21239
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.6||MEDIUM
EPSS-0.11% / 30.24%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-27 Jan, 2025 | 18:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in software for the Intel QAT Driver for Windows before version 1.9.0-0008 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-quickassist_technologyIntel QAT Driver for Windows
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-41252
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.06% / 18.48%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 13:38
Updated-24 Oct, 2024 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in some Intel(R) QAT software drivers for Windows before version QAT1.7-W-1.11.0 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-quickassist_technology_driverIntel(R) QAT software drivers for Windows
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-0573
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.91%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:54
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds read in the Intel CSI2 Host Controller driver may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-csi2_host_controllerIntel CSI2 Host Controller driver
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-0510
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.93%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 03:17
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds read in some Intel(R) Graphics Drivers before versions 15.45.31.5127 and 15.40.45.5126 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driversIntel(R) Graphics Drivers Advisory
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-0594
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.78% / 85.50%
||
7 Day CHG~0.00%
Published-15 Jun, 2020 | 13:55
Updated-04 Aug, 2024 | 06:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-service_manageractive_management_technology_firmwareIntel(R) AMT and Intel(R) ISM
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-28376
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.08% / 24.52%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-13 Feb, 2025 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in the firmware for some Intel(R) E810 Ethernet Controllers and Adapters before version 1.7.1 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_network_adapter_e810-cqda1_for_ocp_3.0ethernet_network_adapter_e810-cqda1_for_ocp_3.0_firmwareethernet_network_adapter_e810-cqda1_for_ocpethernet_network_adapter_e810-cqda1_firmwareethernet_network_adapter_e810-cqda2ethernet_network_adapter_e810-cqda2t_firmwareethernet_network_adapter_e810-cqda1_for_ocp_firmwareethernet_network_adapter_e810-2cqda2ethernet_network_adapter_e810-cqda1ethernet_network_adapter_e810-cqda2tethernet_network_adapter_e810-2cqda2_firmwareethernet_network_adapter_e810-cqda2_firmwareethernet_network_adapter_e810-cqda2_for_ocp_3.0_firmwareethernet_network_adapter_e810-cqda2_for_ocp_3.0Intel(R) E810 Ethernet Controllers and Adapters
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-24475
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6||MEDIUM
EPSS-0.09% / 25.82%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-27 Jan, 2025 | 18:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds read in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_system_d50tnp1mhcpacserver_system_d50tnp2mhsvac_firmwareserver_system_m50cyp2ur312_firmwareserver_system_d50tnp2mhsvacserver_system_d50tnp1mhcrac_firmwareserver_system_d50tnp2mhstacserver_system_d50tnp2mfalacserver_system_m50cyp2ur208server_system_d50tnp1mhcrlc_firmwareserver_system_m50cyp1ur212_firmwareserver_system_m50cyp2ur208_firmwareserver_system_m50cyp2ur312server_system_m50cyp1ur204_firmwareserver_system_d50tnp1mhcracserver_system_d50tnp1mhcrlcserver_system_d50tnp2mhstac_firmwareserver_system_m50cyp1ur204server_system_d50tnp1mhcpac_firmwareserver_system_d50tnp2mfalac_firmwareserver_system_m50cyp1ur212Intel(R) Server Board BMC firmware
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-35729
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.27% / 49.86%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 20:00
Updated-27 Jan, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds read in firmware for OpenBMC in some Intel(R) platforms before version 0.72 may allow unauthenticated user to potentially enable denial of service via network access.

Action-Not Available
Vendor-openbmc-projectn/aIntel Corporation
Product-xeon_gold_6330hxeon_platinum_8368qopenbmcxeon_platinum_8358xeon_gold_5318hxeon_gold_5315yxeon_silver_4310xeon_platinum_8376hlxeon_gold_5317xeon_gold_5320hxeon_platinum_8362xeon_gold_5320xeon_gold_6334xeon_platinum_8360yxeon_platinum_8354hxeon_platinum_8356hxeon_platinum_8380hxeon_gold_6338xeon_platinum_8360hlxeon_gold_6338txeon_gold_6346c627axeon_gold_6342xeon_platinum_8376hc621axeon_gold_5318sxeon_gold_6330xeon_platinum_8352yxeon_silver_4309yxeon_gold_6338nxeon_platinum_8368xeon_gold_5320tc624axeon_gold_6314uxeon_platinum_8352sxeon_gold_5318yxeon_gold_6326xeon_platinum_8360hxeon_silver_4310txeon_gold_6312uxeon_gold_6328hxeon_platinum_8380xeon_gold_6348xeon_gold_6354xeon_gold_6330nxeon_silver_4316xeon_platinum_8351nxeon_gold_6328hlxeon_platinum_8352mc629axeon_gold_5318nxeon_platinum_8353hxeon_platinum_8358pxeon_platinum_8380hlxeon_silver_4314xeon_gold_6348hxeon_platinum_8352vxeon_gold_6336yOpenBMC
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-0553
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.05% / 15.85%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 03:29
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in kernel mode driver for some Intel(R) Wireless Bluetooth(R) products on Windows* 10, may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-ac_9461_firmwareac_9462_firmwareac_3165_firmwareac_9560_firmwareax200_firmwareac_8265_firmwareac_7265_firmwareac_3168_firmwareax201_firmwareac_9260_firmwarewindows_10ac_8260_firmwareIntel(R) Wireless Bluetooth(R) Advisory
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-0009
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.43% / 61.95%
||
7 Day CHG~0.00%
Published-11 Aug, 2021 | 12:47
Updated-03 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in the firmware for Intel(R) Ethernet Adapters 800 Series Controllers and associated adapters before version 1.5.3.0 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_controller_e810ethernet_controller_e810_firmwareIntel(R) Ethernet Adapters 800 Series Controllers and associated adapters
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-8754
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.96% / 75.64%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:08
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.
Product-cloud_backupactive_management_technology_firmwarestandard_manageabilityIntel(R) AMT, Intel(R) ISM
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-8757
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.14% / 34.04%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:07
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.
Product-cloud_backupactive_management_technology_firmwareIntel(R) AMT
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-8747
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.80% / 73.17%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:09
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.
Product-cloud_backupactive_management_technology_firmwareIntel(R) AMT
CWE ID-CWE-125
Out-of-bounds Read
CVE-2019-17263
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-3.3||LOW
EPSS-0.15% / 36.64%
||
7 Day CHG~0.00%
Published-06 Oct, 2019 | 21:16
Updated-05 Aug, 2024 | 01:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In libyal libfwsi before 20191006, libfwsi_extension_block_copy_from_byte_stream in libfwsi_extension_block.c has a heap-based buffer over-read because rejection of an unsupported size only considers values less than 6, even though values of 6 and 7 are also unsupported. NOTE: the vendor has disputed this as described in the GitHub issue

Action-Not Available
Vendor-libfwsi_projectn/a
Product-libfwsin/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-35071
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.11% / 29.80%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 10:11
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer over read due to lack of size validation while copying data from DBR buffer to RX buffer and can lead to Denial of Service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055sa6150p_firmwareqcs610ipq4028_firmwareqcn5550qca8337ar9380ipq8173_firmwarewcd9360_firmwaresdx65qcn5124qca4024_firmwarewcn3950_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qcn5064qcs6125_firmwaresa415mwcn3998qca6554a_firmwareqam8295pwcn3950qcn6024_firmwareipq8076asd_8_gen1_5g_firmwaresm6375_firmwaresd460_firmwareqca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwarewcd9360qca6438_firmwareipq8070_firmwareipq8065ipq8078a_firmwareqrb5165_firmwareipq5028qca7500ipq8072_firmwareipq4029_firmwareqcs6125qrb5165m_firmwaresa8155_firmwaresa4155p_firmwareipq6010sd662_firmwareipq8068qcn6132sd765gsw5100fsm10056_firmwareqca6436wcn6851sa6155pqca9888_firmwareqcn6122wcd9341ipq8068_firmwareqca6696_firmwaresd870_firmwareqcn5154_firmwarewcn3910_firmwaresa8150pwsa8830_firmwareqca9992_firmwaresd865_5g_firmwaresd855_firmwarewcn3988qca6438sa8195p_firmwaresm8475qcn5022_firmwarewcn6750_firmwareqca9898sa8295p_firmwareipq4028qca6428_firmwareipq5018_firmwaresm6375qca9985_firmwarewcn3991ipq4018_firmwareqca8337_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwaresw5100pipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164qca6574csr8811_firmwarewcd9380qcn5054_firmwareqcn5024ipq4019_firmwareqca8072_firmwareqca9985qcn9012_firmwarewcn3980qcn5052_firmwareipq6018_firmwarewsa8815wcn6850pmp8074_firmwareqcn6112wcn3910qca6426_firmwareqca9984ipq6028ipq8064qcn9024pmp8074wcn3980_firmwareqcn5550_firmwaresdx55mipq8064_firmwaresa8295pwcn6740_firmwareqcn5064_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareipq8070qca9994qca9980qcn9024_firmwareipq8174_firmwareqca9880qcm4290_firmwaresd480sd870wcn6855sw5100p_firmwareqcs610_firmwaresa6145pipq6018qca9886_firmwaresdxr1qca6595_firmwaresa8145pqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresd780g_firmwaresdx55qcn5021_firmwaresa8155psa4155par8035_firmwareqcm2290qcn5024_firmwarewcn3991_firmwarewsa8830qcn9070sa8145p_firmwareqcs2290_firmwarefsm10056csrb31024fsm10055_firmwareqcn9072qca9880_firmwareqca9992qcs4290sd765g_firmwareqca6390_firmwareipq6000wcd9370ipq8072qcn5152_firmwareqca6426qca6584au_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareipq5018wcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwareipq8074asd662qcn5124_firmwareqam8295p_firmwareqcn6102_firmwareqcn9011_firmwareqcn6100_firmwaresa8155qcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwaresm7250p_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwareqca6584ausd778gsa6155p_firmwareipq8174sa515m_firmwareqca9990qcs6490sdxr2_5gqcn5052qcn6112_firmwaresa415m_firmwarewcn3988_firmwareqcn9074sa6145p_firmwaresd778g_firmwaresa8195pwsa8810_firmwaresd765_firmwarewcd9326qca8081qcn6023ipq8071aipq8071a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwareqca6390qca9898_firmwarewcd9375aqt1000ar8035csr8811ipq4019qcn9100_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwarewsa8815_firmwareqcm6490wcn6850_firmwarewsa8835_firmwareqcx315sa4150pqcm6125_firmwareqca8072qcm2290_firmwareqcn9000sd780gqca6554asd865_5gqca6595ar9380_firmwareqcn9012qcn6122_firmwareipq8065_firmwareqcx315_firmwarewsa8835sd888_5gqcn5154qca8075_firmwareipq4018qca6574awcn6855_firmwareqca9889sm7325pqcn6132_firmwareqca9888ipq8074qca9994_firmwarewcn6750ipq8070a_firmwareipq8076_firmwaresa515mqca6574_firmwareqca9886sd855sm7325p_firmwareipq8076qca6175asd765qca6574a_firmwareqcn5021qcn5152sd768g_firmwareqrb5165msd460qca6391sdxr1_firmwareaqt1000_firmwareqcn6102qcn9100sdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwareqcn9011ipq8074_firmwareqca6574auqca9889_firmwaresa8155p_firmwareqcn5122wcd9341_firmwareqcm6125wsa8810wcn6856qcn5022sd768gipq6010_firmwarewcn6740qca6696sa6150pqca8075qcn9022_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn6100qcn9072_firmwaresm7250pipq6000_firmwareipq8071_firmwareqcn9074_firmwaresw5100_firmwareipq4029qca6175a_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-35119
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 10.59%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 09:40
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential out of Bounds read in FIPS event processing due to improper validation of the length from the firmware in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830qcs610qca8337csrb31024wcd9360_firmwaresdx65qcs4290wcn3950_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresa6155sd690_5gwcd9370qca6426wcn3990_firmwaresa415mwcn3998wcd9385_firmwaresdxr2_5g_firmwarewcn3950sd_8_gen1_5g_firmwaresd662sd460_firmwaresa8155qca6320_firmwarewcn7850qca6574au_firmwaresdx55_firmwareqca6595auqca8081_firmwaresa6155_firmwarewcd9375_firmwaresm7250p_firmwarewcn3998_firmwareqca6420qca6436_firmwarewcd9360sm7450_firmwareqca6564au_firmwaresd680_firmwaresa6155p_firmwareqca6310sa515m_firmwareqcs6490wcn7851sdxr2_5gsa8155_firmwaresd662_firmwaresa415m_firmwarewcn3988_firmwareqca6430wcd9340wsa8810_firmwaresd765gsd765_firmwareqca6436sd680wcd9335sa6155pwcn6851qca8081wcn7851_firmwareqcs4290_firmwarewcd9385wcd9341qca6696_firmwareqcs6490_firmwaresd750gsd870_firmwareqca6390ar8035sd750g_firmwareaqt1000wcd9375wsa8830_firmwaresd855_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3988wcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwaresm7450sm8475wcn6750_firmwarewcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd780gsd865_5gqca6595qca6564ausdx55m_firmwarewcn6856_firmwarewsa8835qca6574wcd9380sd888_5gqca6574asd690_5g_firmwarewcn6855_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwarewcn3980wcn6750sa515mqca6574_firmwarewcd9340_firmwaresd855wsa8815wcn6850qca6320qca6175asd765qca6426_firmwareqca6574a_firmwaresd768g_firmwaresd835wcn3980_firmwaresd460qca6391sdx55msm8475_firmwareaqt1000_firmwarewcn6740_firmwaresdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwarewsa8832_firmwaresd480_firmwarewcn6851_firmwareqca6574ausa8155p_firmwarewcd9341_firmwareqcm4290_firmwaresd480sd870wcn6855wsa8810wsa8832qcs610_firmwarewcn6856sd835_firmwaresd768gqca6595_firmwarewcn6740qca6696qca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sa8155psm7250psm8475p_firmwareqca6175a_firmwarear8035_firmwaresm8475pSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-29551
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-2.5||LOW
EPSS-0.02% / 2.82%
||
7 Day CHG~0.00%
Published-14 May, 2021 | 19:10
Updated-03 Aug, 2024 | 22:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OOB read in `MatrixTriangularSolve`

TensorFlow is an end-to-end open source platform for machine learning. The implementation of `MatrixTriangularSolve`(https://github.com/tensorflow/tensorflow/blob/8cae746d8449c7dda5298327353d68613f16e798/tensorflow/core/kernels/linalg/matrix_triangular_solve_op_impl.h#L160-L240) fails to terminate kernel execution if one validation condition fails. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-29547
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-2.5||LOW
EPSS-0.01% / 1.90%
||
7 Day CHG~0.00%
Published-14 May, 2021 | 19:10
Updated-03 Aug, 2024 | 22:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap out of bounds in `QuantizedBatchNormWithGlobalNormalization`

TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a segfault and denial of service via accessing data outside of bounds in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/55a97caa9e99c7f37a0bbbeb414dc55553d3ae7f/tensorflow/core/kernels/quantized_batch_norm_op.cc#L176-L189) assumes the inputs are not empty. If any of these inputs is empty, `.flat<T>()` is an empty buffer, so accessing the element at index 0 is accessing data outside of bounds. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-125
Out-of-bounds Read
CVE-2016-3178
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 20.52%
||
7 Day CHG~0.00%
Published-24 Mar, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The processRequest function in minissdpd.c in MiniSSDPd 1.2.20130907-3 allows local users to cause a denial of service (out-of-bounds memory access and daemon crash) via vectors involving a negative length value.

Action-Not Available
Vendor-miniupnp_projectn/a
Product-minissdpdn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-22453
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-3.3||LOW
EPSS-0.02% / 4.37%
||
7 Day CHG~0.00%
Published-28 Oct, 2021 | 12:33
Updated-03 Aug, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosHarmonyOS
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-22306
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-4.6||MEDIUM
EPSS-0.03% / 5.17%
||
7 Day CHG~0.00%
Published-06 Feb, 2021 | 00:48
Updated-03 Aug, 2024 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an out-of-bound read vulnerability in Mate 30 10.0.0.182(C00E180R6P2). A module does not verify the some input when dealing with messages. Attackers can exploit this vulnerability by sending malicious input through specific module. This could cause out-of-bound, compromising normal service.

Action-Not Available
Vendor-n/aHuawei Technologies Co., Ltd.
Product-mate_30mate_30_firmwareHUAWEI Mate 30
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-22365
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-3.3||LOW
EPSS-0.02% / 4.37%
||
7 Day CHG~0.00%
Published-22 Jun, 2021 | 17:46
Updated-03 Aug, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an out of bounds read vulnerability in eSE620X vESS V100R001C10SPC200, V100R001C20SPC200, V200R001C00SPC300. A local attacker can exploit this vulnerability by sending specific message to the target device. Due to insufficient validation of internal message, successful exploit may cause the process and the service abnormal.

Action-Not Available
Vendor-n/aHuawei Technologies Co., Ltd.
Product-ese620x_vess_firmwareese620x_vesseSE620X vESS
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-20221
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6||MEDIUM
EPSS-0.01% / 1.79%
||
7 Day CHG~0.00%
Published-13 May, 2021 | 15:34
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.

Action-Not Available
Vendor-n/aQEMUDebian GNU/LinuxRed Hat, Inc.
Product-debian_linuxqemuenterprise_linuxqemu
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-20177
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.04% / 10.93%
||
7 Day CHG~0.00%
Published-26 May, 2021 | 20:48
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the Linux kernel's implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kernelkernel
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-1898
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.05% / 13.60%
||
7 Day CHG~0.00%
Published-13 Jul, 2021 | 05:30
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer over-read due to incorrect overflow check when loading splash image in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwarewcn3991sda429w_firmwaresd678wcd9380_firmwaresd_675wcd9330sdx55m_firmwarewcn3950_firmwarewcd9380qca6420_firmwarequalcomm215apq8009_firmwaresd730_firmwarewcd9370sd_675_firmwaresd675_firmwaresdx50m_firmwaremdm9206qca6430_firmwareqca9377wcn3980wcn3998wcn3950wcd9326_firmwaresd720gwcn3615_firmwaremdm9206_firmwarewcd9340_firmwarewcn3660bsd855wsa8815wcn3660b_firmwarewcn3680wcn3680b_firmwaresdx55_firmwarewcd9375_firmwarewcn3615wcn3998_firmwarewcn3980_firmwaresd730apq8009wcn3610_firmwareqca6420apq8053_firmwarewcd9330_firmwaresdx55maqt1000_firmwareqca9367_firmwaresd678_firmwarewcn3680_firmwaresdx50mqca9367wcn3988_firmwareqca6430sd205sm6250sd205_firmwarewcd9340wsa8810_firmwarequalcomm215_firmwarewcd9341_firmwarewsa8810wcd9326sd210_firmwarewcn3680bwcd9341wcd9375wcd9370_firmwareaqt1000sm6250_firmwaresdx55apq8053sd675sda429wsd210sd855_firmwarewcn3620_firmwarewcn3988wsa8815_firmwarewcn3620sd720g_firmwarewcn3610Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-125
Out-of-bounds Read
CVE-2016-10029
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 21.90%
||
7 Day CHG~0.00%
Published-27 Feb, 2017 | 22:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The virtio_gpu_set_scanout function in QEMU (aka Quick Emulator) built with Virtio GPU Device emulator support allows local guest OS users to cause a denial of service (out-of-bounds read and process crash) via a scanout id in a VIRTIO_GPU_CMD_SET_SCANOUT command larger than num_scanouts.

Action-Not Available
Vendor-n/aQEMU
Product-qemun/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-16885
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.04% / 12.80%
||
7 Day CHG~0.00%
Published-03 Jan, 2019 | 16:00
Updated-05 Aug, 2024 | 10:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and similar functions with a zero offset and buffer length which causes the read beyond the buffer boundaries, in certain cases causing a memory access fault and a system halt by accessing invalid memory address. This issue only affects kernel version 3.10.x as shipped with Red Hat Enterprise Linux 7.

Action-Not Available
Vendor-Linux Kernel Organization, IncRed Hat, Inc.The Linux Foundation
Product-enterprise_linux_serverlinux_kernelkernel
CWE ID-CWE-125
Out-of-bounds Read
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
Details not found