Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2018-3610

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-09 Jan, 2018 | 21:00
Updated At-17 Sep, 2024 | 03:38
Rejected At-
Credits

SEMA driver in Intel Driver and Support Assistant before version 3.1.1 allows a local attacker the ability to read and writing to Memory Status registers potentially allowing information disclosure or a denial of service condition.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:09 Jan, 2018 | 21:00
Updated At:17 Sep, 2024 | 03:38
Rejected At:
▼CVE Numbering Authority (CNA)

SEMA driver in Intel Driver and Support Assistant before version 3.1.1 allows a local attacker the ability to read and writing to Memory Status registers potentially allowing information disclosure or a denial of service condition.

Affected Products
Vendor
Intel CorporationIntel Corporation
Product
Intel Driver and Support Assistant
Versions
Affected
  • before 3.1.1
Problem Types
TypeCWE IDDescription
textN/AInformation Disclosure/Denial of Service
Type: text
CWE ID: N/A
Description: Information Disclosure/Denial of Service
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00108&languageid=en-fr
x_refsource_CONFIRM
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00108&languageid=en-fr
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00108&languageid=en-fr
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00108&languageid=en-fr
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:09 Jan, 2018 | 21:29
Updated At:03 Oct, 2019 | 00:03

SEMA driver in Intel Driver and Support Assistant before version 3.1.1 allows a local attacker the ability to read and writing to Memory Status registers potentially allowing information disclosure or a denial of service condition.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.06.0MEDIUM
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
Primary2.03.6LOW
AV:L/AC:L/Au:N/C:P/I:N/A:P
Type: Primary
Version: 3.0
Base score: 6.0
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
Type: Primary
Version: 2.0
Base score: 3.6
Base severity: LOW
Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:P
CPE Matches

Intel Corporation
intel
>>driver_\&_support_assistant>>Versions before 3.1.1(exclusive)
cpe:2.3:a:intel:driver_\&_support_assistant:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
CWE ID: CWE-119
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00108&languageid=en-frsecure@intel.com
Vendor Advisory
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00108&languageid=en-fr
Source: secure@intel.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

94Records found

CVE-2020-0505
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.06% / 18.24%
||
7 Day CHG~0.00%
Published-12 Mar, 2020 | 17:43
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper conditions check in Intel(R) Graphics Drivers before versions 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103, and 26.20.100.7212 may allow an authenticated user to potentially enable information disclosure and denial of service via local

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Drivers
CVE-2019-11173
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.1||HIGH
EPSS-0.24% / 47.32%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 16:37
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-hpcr1304wftysrbbs2600bpbhns2600bpb24rhpcr2208wf0zsrr1304wftysrhpcr2208wftzsrr2208wftzsrr2208wf0zsrr1208wftysr1304wf0ysr2224wfqzshns2600bpqbbs2600stqhpcr2312wftzsrhns2600bpbrhpcr2224wftzsrhns2600bpblchpcr2208wftzsrxbbs2600stbr2208wf0zsr2208wftzshns2600bpsrr1208wftysrr2208wftzsrxbbs2600stbrhns2600bpbrxr2312wf0nphns2600bpblcrs2600stbr2224wftzsrr2208wfqzsrr2224wftzsbbs2600bpqrbbs2600stqrr2208wfqzsbbs2600bpshns2600bpshpcr2312wf0nprhns2600bpq24rhns2600bpb24hns2600bps24hns2600bpq24hns2600bpblc24r2312wfqzshpcr1208wftysrs9256wk1hlchpchns2600bpsrbbs2600bpsrr2312wf0nprs2600stbrs2600wftrhns2600bpbhpcr2208wfqzsrs9248wk2hlcr1304wftysbbs2600bpbrs9248wk2hachpcr1208wfqysrhns2600bpblc24rs2600wf0rs2600stqrs9232wk1hlcs2600stqs9232wk2hacr2308wftzss9248wk1hlcs2600wfqrhpcr2308wftzsrr1208wfqysrhpchns2600bpbrr2312wftzsrr2308wftzsrhpcr1304wf0ysrhpchns2600bpqrs2600wf0hns2600bps24rs9232wk2hlchns2600bpqrs2600wfqbbs2600bpqr1304wf0ysrbaseboard_management_controller_firmwares2600wfthns2600bpb24rxr2312wftzsIntel(R) BMC
CVE-2019-11154
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.1||HIGH
EPSS-0.08% / 24.31%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 16:53
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-wireless-ac_9461wireless-ac_9560wi-fi_6_ax201dual_band_wireless-ac_3165dual_band_wireless-ac_7265_\(rev_d\)dual_band_wireless-ac_8260wireless-ac_9260dual_band_wireless-ac_3168wireless_7265_\(rev_d\)wi-fi_6_ax200wireless-ac_9462dual_band_wireless-n_7265_\(rev_d\)dual_band_wireless-ac_8265proset\/wireless_wifiIntel(R) PROSet/Wireless WiFi Software Security
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2019-11155
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.1||HIGH
EPSS-0.08% / 24.31%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 16:54
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-wireless-ac_9461wireless-ac_9560wi-fi_6_ax201dual_band_wireless-ac_3165dual_band_wireless-ac_7265_\(rev_d\)dual_band_wireless-ac_8260wireless-ac_9260dual_band_wireless-ac_3168wireless_7265_\(rev_d\)wi-fi_6_ax200wireless-ac_9462dual_band_wireless-n_7265_\(rev_d\)dual_band_wireless-ac_8265proset\/wireless_wifiIntel(R) PROSet/Wireless WiFi Software Security
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2019-0122
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.1||HIGH
EPSS-0.05% / 16.88%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Double free in Intel(R) SGX SDK for Linux before version 2.2 and Intel(R) SGX SDK for Windows before version 2.1 may allow an authenticated user to potentially enable information disclosure or denial of service via local access.

Action-Not Available
Vendor-Linux Kernel Organization, IncIntel CorporationMicrosoft Corporation
Product-windowssoftware_guard_extensions_sdklinux_kernelIntel(R) Software Guard Extensions SDK
CWE ID-CWE-415
Double Free
CVE-2021-0002
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.1||HIGH
EPSS-0.07% / 21.14%
||
7 Day CHG~0.00%
Published-11 Aug, 2021 | 12:48
Updated-03 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper conditions check in some Intel(R) Ethernet Controllers 800 series Linux drivers before version 1.4.11 may allow an authenticated user to potentially enable information disclosure or denial of service via local access.

Action-Not Available
Vendor-n/aIntel CorporationFedora Project
Product-ethernet_controller_e810ethernet_controller_e810_firmwarefedoraIntel(R) Ethernet Controllers 800 series Linux drivers
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2018-12158
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6||MEDIUM
EPSS-0.04% / 13.36%
||
7 Day CHG~0.00%
Published-10 Oct, 2018 | 18:00
Updated-17 Sep, 2024 | 04:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in BIOS update utility in Intel NUC FW kits downloaded before May 24, 2018 may allow a privileged user to potentially trigger a denial of service or information disclosure via local access.

Action-Not Available
Vendor-Intel Corporation
Product-next_unit_of_computing_firmwareIntel NUC Firmware Kits
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-29510
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.08% / 24.73%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:05
Updated-03 Aug, 2024 | 06:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in some Intel(R) Server Board M10JNP2SB BIOS firmware before version 7.219 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bps24compute_module_hns2600bpblc24rserver_board_s2600bpsserver_board_s2600bpqrcompute_module_hns2600bps_firmwarecompute_module_hns2600bpcompute_module_hns2600bpq24_firmwarecompute_module_hns2600bpb24rcompute_module_hns2600bpq_firmwarecompute_module_hns2600bpblc24_firmwareserver_board_s2600bpqr_firmwareserver_system_vrn2224bphy6compute_module_hns2600bpq24r_firmwarecompute_module_hns2600bps24rcompute_module_hns2600bpbserver_board_s2600bpb_firmwarecompute_module_hns2600bpsrserver_system_m70klp4s2uhhserver_system_vrn2224bphy6_firmwarecompute_module_hns2600bpblc_firmwarecompute_module_hns2600bpbrctcompute_module_hns2600bpblcrcompute_module_hns2600bpbr_firmwareserver_system_m20ntp1ur304server_system_vrn2224bpaf6compute_module_hns2600bpqrcompute_module_hns2600bpbrserver_system_vrn2224bpaf6_firmwarecompute_module_hns2600bpb_firmwarecompute_module_hns2600bpr_firmwareserver_board_m20ntp2sbserver_board_m10jnp2sb_firmwareserver_board_s2600bpbrserver_system_m70klp4s2uhh_firmwarecompute_module_hns2600bps24_firmwareserver_board_m70klp2sbcompute_module_hns2600bps24r_firmwareserver_system_zsb2224bpaf2compute_module_hns2600bprcompute_module_hns2600bp_firmwarecompute_module_hns2600bpsr_firmwarecompute_module_hns2600bpb24_firmwareserver_system_mcb2208wfaf5_firmwareserver_board_s2600bpbr_firmwarecompute_module_hns2600bpqcompute_module_hns2600bpblcr_firmwarecompute_module_hns2600bpblc24server_board_s2600bpbserver_system_zsb2224bphy1_firmwareserver_system_m20ntp1ur304_firmwarecompute_module_hns2600bpblc24r_firmwareserver_board_m70klp2sb_firmwareserver_board_s2600bpqserver_board_m10jnp2sbserver_system_zsb2224bpaf1server_board_s2600bpq_firmwarecompute_module_hns2600bpblcserver_system_zsb2224bpaf1_firmwareserver_board_s2600bpsrcompute_module_hns2600bpqr_firmwareserver_board_s2600bps_firmwarecompute_module_hns2600bpb24r_firmwarecompute_module_hns2600bpsserver_board_s2600bpsr_firmwarecompute_module_hns2600bpb24server_system_zsb2224bphy1compute_module_hns2600bpbrct_firmwareserver_system_zsb2224bpaf2_firmwarecompute_module_hns2600bpq24rcompute_module_hns2600bpq24server_board_m20ntp2sb_firmwareserver_system_mcb2208wfaf5Intel(R) Server Board M10JNP2SB BIOS firmware
CWE ID-CWE-92
DEPRECATED: Improper Sanitization of Custom Special Characters
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-46748
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.08% / 23.28%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 18:50
Updated-13 Feb, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.

Action-Not Available
Vendor-Intel CorporationAdvanced Micro Devices, Inc.
Product-radeon_rx_7700sryzen_5_pro_3200geradeon_pro_w6900xryzen_3_5300uradeon_rx_5700mradeon_rx_vega_m_firmwareradeon_pro_w6500mradeon_rx_7900_greradeon_rx_vega_56core_i5-8305gradeon_pro_vega_56_firmwareryzen_5_4600hsradeon_rx_5600ryzen_7_4980uradeon_rx_5300mradeon_rx_7900mryzen_3_3015ceradeon_rx_7900_xtradeon_rx_5500_xtradeon_rx_6600sradeon_rx_6650mnuc_8_enthusiast_nuc8i7hvkvawradeon_rx_6650_xtradeon_pro_w6800xradeon_rx_6700_xtryzen_5_pro_3400gradeon_rx_7600m_xtryzen_5_pro_3350geryzen_5_5600gryzen_5_pro_3400geradeon_pro_w6600radeon_pro_vega_64radeon_rx_6700mryzen_5_4680uryzen_5_5500unuc_8_enthusiast_nuc8i7hvkvaradeon_pro_w7600radeon_rx_6650m_xtradeon_rx_6700radeon_rx_7700_xtradeon_rx_7600sradeon_rx_6550mradeon_rx_5600_xtradeon_rx_6850m_xtradeon_rx_6550sradeon_pro_w5700radeon_rx_6800ryzen_7_4800hryzen_3_3015eradeon_softwareradeon_rx_6600mradeon_rx_5500mradeon_rx_7900_xtxryzen_7_5700gnuc_8_enthusiast_nuc8i7hnkqcradeon_rx_6900_xtradeon_rx_5600mradeon_rx_6950_xtryzen_3_4300geryzen_5_pro_3200gradeon_rx_vega_64_firmwareryzen_7_4700gryzen_3_4300gryzen_9_4900hsradeon_rx_5700_xtradeon_rx_6500mcore_i7-8706gradeon_rx_6800_xtradeon_pro_w6400radeon_rx_6500_xtradeon_rx_5700radeon_rx_6450mradeon_rx_7800_xtryzen_5_4500uradeon_rx_5300radeon_pro_w5500xradeon_pro_w6300mryzen_5_4600uradeon_pro_w6800x_duoradeon_pro_vega_64_firmwareradeon_rx_5500ryzen_7_4700geryzen_9_4900hradeon_rx_6400radeon_rx_6600_xtradeon_pro_vega_56ryzen_7_5700uradeon_rx_6800mradeon_rx_6300mryzen_5_4600geradeon_rx_7600radeon_pro_w6300radeon_pro_w6600xryzen_5_5500hradeon_pro_w7500radeon_rx_vega_56_firmwareradeon_rx_7600mcore_i7-8709gryzen_7_4700uradeon_pro_w6600mryzen_5_5600gecore_i7-8705gryzen_3_4300uradeon_pro_w5500ryzen_3_5300geryzen_5_4500ryzen_3_4100ryzen_7_4800hsradeon_pro_w5700xradeon_pro_w6800ryzen_7_5700geradeon_rx_6600radeon_rx_vega_64ryzen_3_5300gryzen_5_4600gnuc_kit_nuc8i7hnknuc_kit_nuc8i7hvkryzen_5_pro_3350gryzen_5_4600hradeon_pro_w7800radeon_rx_6700sradeon_rx_5300_xtradeon_rx_6800sRadeon™ RX Vega Series Graphics CardsRadeon™ PRO WX Vega Series Graphics CardsRadeon™ RX 5000/6000/7000 Series Graphics CardsRadeon™ PRO W5000/W6000/W7000 Series Graphics Cards
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-28858
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.14% / 34.96%
||
7 Day CHG~0.00%
Published-18 Aug, 2022 | 20:03
Updated-18 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restriction in the firmware for some Intel(R) NUC Laptop Kits before version BC0076 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-lapbc510lapbc710_firmwarelapbc510_firmwarelapbc710Intel(R) NUC Laptop Kits
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-5706
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 26.93%
||
7 Day CHG~0.00%
Published-21 Nov, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in kernel in Intel Server Platform Services Firmware 4.0 allow attacker with local access to the system to execute arbitrary code.

Action-Not Available
Vendor-Intel Corporation
Product-server_platform_services_firmwareServer Platform Services
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-33867
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.04% / 11.56%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-03 Oct, 2024 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in some Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA in version 0.25.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-realsense_450_fa_firmwarerealsense_450_faIntel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA
CWE ID-CWE-92
DEPRECATED: Improper Sanitization of Custom Special Characters
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-32656
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 18.20%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-04 Oct, 2024 | 13:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in some Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA in version 0.25.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-realsense_450_fa_firmwarerealsense_450_faIntel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA
CWE ID-CWE-92
DEPRECATED: Improper Sanitization of Custom Special Characters
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-30767
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 21.17%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 13:37
Updated-14 Jan, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in Intel(R) Optimization for TensorFlow before version 2.13.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-optimization_for_tensorflowTensorFlow
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-92
DEPRECATED: Improper Sanitization of Custom Special Characters
CVE-2022-21237
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 16.39%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:35
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer access in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_11_pro_kit_nuc11tnhi30l_firmwarenuc11dbbi7_firmwarenuc_9_pro_compute_element_nuc9vxqnb_firmwarenuc_11_pro_kit_nuc11tnki7nuc11pa_firmwarenuc8i3cysnnuc_9_pro_kit_nuc9vxqnx_firmwarenuc_11_compute_element_cm11ebi58w_firmwarenuc_11_pro_board_nuc11tnbi50znuc_11_pro_kit_nuc11tnki30z_firmwarenuc_8_compute_element_cm8pcbnuc_8_compute_element_cm8pcb_firmwarelapkc71fnuc_11_pro_board_nuc11tnbi70z_firmwarenuc_11_pro_board_nuc11tnbi7nuc_11_compute_element_cm11ebc4w_firmwarenuc_11_pro_kit_nuc11tnki50znuc_11_pro_kit_nuc11tnki5nuc_kit_nuc8i5benuc8i3cysmlapbc710nuc_11_pro_kit_nuc11tnhi50znuc_8_compute_element_cm8i3cbnuc8i3cysn_firmwarenuc_kit_nuc8i5be_firmwarenuc11pahnuc_11_pro_board_nuc11tnbi30z_firmwarenuc_9_pro_kit_nuc9v7qnx_firmwarenuc_8_compute_element_cm8ccbnuc11dbbi9_firmwarenuc_11_pro_board_nuc11tnbi5nuc_9_pro_compute_element_nuc9v7qnblapbc710_firmwarelapkc51enuc_11_pro_kit_nuc11tnki3nuc_11_pro_kit_nuc11tnki70znuc_8_compute_element_cm8i7cblapkc71f_firmwarenuc_11_enthusiast_kit_nuc11phki7cnuc11panuc_11_pro_kit_nuc11tnhi70lnuc_11_pro_kit_nuc11tnhi50lnuc_8_compute_element_cm8i7cb_firmwarenuc9i9qnnuc_11_pro_board_nuc11tnbi70znuc_11_pro_kit_nuc11tnhi30znuc_11_pro_kit_nuc11tnhi50w_firmwarelapbc510_firmwarenuc_11_compute_element_cm11ebi716wnuc_11_pro_kit_nuc11tnki30znuc_kit_nuc8i3b_firmwarenuc11btmi9nuc11btmi7nuc9i7qnnuc9i7qn_firmwarenuc_8_compute_element_cm8i5cb_firmwarenuc_11_compute_element_cm11ebi38w_firmwarenuc_11_pro_kit_nuc11tnhi70l_firmwarenuc_11_pro_kit_nuc11tnhi70qnuc_11_pro_kit_nuc11tnhi70znuc9i5qn_firmwarenuc_kit_nuc8i7be_firmwarenuc_11_pro_kit_nuc11tnhi30lnuc8i3cysm_firmwarelapkc71e_firmwarenuc_11_pro_kit_nuc11tnhi30z_firmwarenuc_11_pro_board_nuc11tnbi5_firmwarenuc_11_pro_kit_nuc11tnki50z_firmwarenuc11paq_firmwarenuc_11_pro_board_nuc11tnbi3_firmwarenuc_11_pro_kit_nuc11tnhi5_firmwarenuc_11_pro_kit_nuc11tnhi7_firmwarenuc_kit_nuc8i3bnuc_11_pro_kit_nuc11tnhi50l_firmwarenuc_11_enthusiast_mini_pc_nuc11phki7caanuc11btmi9_firmwarenuc_9_pro_kit_nuc9vxqnxnuc_11_pro_board_nuc11tnbi30znuc_11_pro_kit_nuc11tnhi3nuc_11_enthusiast_kit_nuc11phki7c_firmwarenuc_11_pro_board_nuc11tnbi3nuc_11_pro_kit_nuc11tnhi7nuc_11_pro_board_nuc11tnbi7_firmwarenuc_11_pro_kit_nuc11tnki5_firmwarelapbc510nuc_11_pro_kit_nuc11tnki3_firmwarenuc_8_compute_element_cm8i5cbnuc_11_pro_kit_nuc11tnhi70q_firmwarenuc11pah_firmwarenuc_8_compute_element_cm8i3cb_firmwarelapkc51e_firmwarenuc_11_compute_element_cm11ebi716w_firmwarenuc11paqnuc_9_pro_compute_element_nuc9v7qnb_firmwarenuc_11_pro_kit_nuc11tnki70z_firmwarenuc_9_pro_kit_nuc9v7qnxnuc_11_compute_element_cm11ebi58wnuc_11_pro_kit_nuc11tnhi5nuc_11_pro_kit_nuc11tnhi3_firmwarenuc_11_pro_board_nuc11tnbi50z_firmwarenuc_11_compute_element_cm11ebc4wnuc11dbbi9nuc11btmi7_firmwarenuc_11_pro_kit_nuc11tnhi50wnuc_kit_nuc8i7benuc_11_pro_kit_nuc11tnki7_firmwarenuc_11_pro_kit_nuc11tnhi30p_firmwarenuc_11_pro_kit_nuc11tnhi30pnuc_11_pro_kit_nuc11tnhi70z_firmwarenuc_8_compute_element_cm8ccb_firmwarenuc_11_enthusiast_mini_pc_nuc11phki7caa_firmwarenuc9i5qnnuc11dbbi7nuc9i9qn_firmwarenuc_11_pro_kit_nuc11tnhi50z_firmwarenuc_9_pro_compute_element_nuc9vxqnblapkc71enuc_11_compute_element_cm11ebi38wIntel(R) NUCs
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-21160
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-1.35% / 79.85%
||
7 Day CHG~0.00%
Published-18 Aug, 2022 | 19:41
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions for some Intel(R) PROSet/Wireless WiFi products may allow an unauthenticated user to potentially enable denial of service via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-wi-fi_6e_ax411_firmwarewireless-ac_9461wireless-ac_9560_firmwarewireless-ac_9260_firmwarewireless-ac_9260wi-fi_6e_ax211_firmwarewi-fi_6_ax200_firmwarewi-fi_6_ax201_firmwarewi-fi_6e_ax411proset_wi-fi_6e_ax210proset_wi-fi_6e_ax210_firmwarewireless-ac_9462wireless-ac_9462_firmwarewi-fi_6_ax200wi-fi_6_ax201wireless-ac_9461_firmwarewireless-ac_9560wi-fi_6e_ax211Intel(R) PROSet/Wireless WiFi products
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-28383
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.06% / 17.72%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:47
Updated-21 Aug, 2024 | 16:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper conditions check in some Intel(R) BIOS PPAM firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) BIOS PPAM firmwarealder_lakecomet_laketiger_lakerocket_lake
CWE ID-CWE-92
DEPRECATED: Improper Sanitization of Custom Special Characters
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-28410
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.07% / 22.48%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-18 Mar, 2025 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers for linux before kernel version 6.2.10 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-i915_graphicsIntel(R) i915 Graphics drivers for linux
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-12213
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6||MEDIUM
EPSS-0.16% / 36.64%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 22:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Driver for Windows
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-27506
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.20%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-02 Oct, 2024 | 13:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in the Intel(R) Optimization for Tensorflow software before version 2.12 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-optimization_for_tensorflowIntel(R) Optimization for Tensorflow software
CWE ID-CWE-92
DEPRECATED: Improper Sanitization of Custom Special Characters
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2020-12373
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 18.44%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:54
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Expired pointer dereference in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-hns2600bpb24rr1304wftysrr2208wf0zsrr1208wftysr2208wftzsrr1304wf0ysr2312wf0nprhns2600bpbr1304wftyshns2600bpqr2224wfqzsr1000wfhns2600bpblc24rs2600bpqrhns2600bpbrs2600stqhns2600bpblcr2308wftzshns2600bpsrr1208wftysrr2208wf0zsr2208wftzsr2312wf0npr1208wfqysrr2224wftzsrr2208wfqzsrs2600stbr2224wftzsr2312wftzsrr2308wftzsrs2600wf0bmc_firmwarehns2600bps24rhns2600bpqrs2600wfqr2208wfqzshns2600bpshns2600bpq24rhns2600bpb24hns2600bps24r1304wf0ysrhns2600bpq24s2600wfts2600bpbrhns2600bpblc24s2600bpsrr2312wfqzsr2312wftzsIntel(R) Graphics Drivers
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2020-12365
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.69%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 14:03
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Untrusted pointer dereference in some Intel(R) Graphics Drivers before versions 15.33.51.5146, 15.45.32.5145, 15.36.39.5144 and 15.40.46.5143 may allow an authenticated user to potentially denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driversIntel(R) Graphics Drivers
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2020-12370
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.69%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:53
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Untrusted pointer dereference in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driversIntel(R) Graphics Drivers
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-12865
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.76% / 87.79%
||
7 Day CHG~0.00%
Published-29 Aug, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the "name" variable.

Action-Not Available
Vendor-n/aDebian GNU/LinuxIntel Corporation
Product-debian_linuxconnmann/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-25545
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.10% / 26.92%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-27 Jan, 2025 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_system_d50tnp1mhcpacserver_system_d50tnp2mhsvac_firmwareserver_system_m50cyp2ur312_firmwareserver_system_d50tnp2mhsvacserver_system_d50tnp1mhcrac_firmwareserver_system_d50tnp2mhstacserver_system_m50cyp2ur208server_system_d50tnp2mfalacserver_system_d50tnp1mhcrlc_firmwareserver_system_m50cyp1ur212_firmwareserver_system_m50cyp2ur208_firmwareserver_system_m50cyp2ur312server_system_m50cyp1ur204_firmwareserver_system_d50tnp1mhcracserver_system_d50tnp1mhcrlcserver_system_d50tnp2mhstac_firmwareserver_system_m50cyp1ur204server_system_d50tnp1mhcpac_firmwareserver_system_d50tnp2mfalac_firmwareserver_system_m50cyp1ur212Intel(R) Server Board BMC firmware
CWE ID-CWE-92
DEPRECATED: Improper Sanitization of Custom Special Characters
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-8104
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.18%
||
7 Day CHG~0.00%
Published-08 Dec, 2016 | 17:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Intel PROSet/Wireless Software and Drivers in versions before 19.20.3 allows a local user to crash iframewrk.exe causing a potential denial of service.

Action-Not Available
Vendor-Intel Corporation
Product-proset\/wireless_software_and_driversIntel PROSet/Wireless Software and Drivers
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2014-3735
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.45% / 63.21%
||
7 Day CHG~0.00%
Published-19 May, 2014 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ir41_32.ax 4.51.16.3 for Intel Indeo Video 4.5 allows remote attackers to cause a denial of service (crash) via a crafted .avi file.

Action-Not Available
Vendor-n/aIntel Corporation
Product-indeo_videon/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-22313
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-2.3||LOW
EPSS-0.07% / 21.30%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:05
Updated-02 Aug, 2024 | 10:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in some Intel(R) QAT Library software before version 22.07.1 may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-quickassist_technology_libraryqat_driverquickassist_technology_driverquickassist_technology_driver_firmwareqat_driver_firmwareIntel(R) QAT Library software
CWE ID-CWE-92
DEPRECATED: Improper Sanitization of Custom Special Characters
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-22297
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.08% / 24.65%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-27 Jan, 2025 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Access of memory location after end of buffer in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_system_d50tnp1mhcpacserver_system_d50tnp2mhsvac_firmwareserver_system_m50cyp2ur312_firmwareserver_system_d50tnp2mhsvacserver_system_d50tnp1mhcrac_firmwareserver_system_d50tnp2mhstacserver_system_d50tnp2mfalacserver_system_m50cyp2ur208server_system_d50tnp1mhcrlc_firmwareserver_system_m50cyp1ur212_firmwareserver_system_m50cyp2ur208_firmwareserver_system_m50cyp2ur312server_system_m50cyp1ur204_firmwareserver_system_d50tnp1mhcracserver_system_d50tnp1mhcrlcserver_system_d50tnp2mhstac_firmwareserver_system_m50cyp1ur204server_system_d50tnp1mhcpac_firmwareserver_system_d50tnp2mfalac_firmwareserver_system_m50cyp1ur212Intel(R) Server Board BMC firmware
CWE ID-CWE-788
Access of Memory Location After End of Buffer
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2024-23980
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.10% / 26.70%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:46
Updated-20 Aug, 2024 | 15:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in PlatformPfrDxe driver in UEFI firmware for some Intel(R) Server D50FCP Family products may allow a privileged user to enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-UEFI firmware for some Intel(R) Server D50FCP Family productsserver_system_d50tnp2mhsvac_firmware
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2008-3635
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-2.41% / 84.81%
||
7 Day CHG~0.00%
Published-10 Sep, 2008 | 16:00
Updated-07 Aug, 2024 | 09:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in QuickTimeInternetExtras.qtx in an unspecified third-party Indeo v3.2 (aka IV32) codec for QuickTime, when used with Apple QuickTime before 7.5.5 on Windows, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file.

Action-Not Available
Vendor-n/aApple Inc.Microsoft CorporationIntel Corporation
Product-windows_vistawindows-ntwindows_xpquicktimeindeon/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-5174
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 16.11%
||
7 Day CHG~0.00%
Published-15 Sep, 2012 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) in Intel Q67 Express, C202, C204, C206 Chipsets, and Mobile Intel QM67, and QS67 Chipset before 2nd_gen_i5_i7_SINIT_51.BIN Express; Intel Q57, 3450 Chipsets and Mobile Intel QM57 and QS57 Express Chipset before i5_i7_DUAL_SINIT_51.BIN and i7_QUAD_SINIT_51.BIN; Mobile Intel GM45, GS45, and PM45 Express Chipset before GM45_GS45_PM45_SINIT_51.BIN; Intel Q35 Express Chipsets before Q35_SINIT_51.BIN; and Intel 5520, 5500, X58, and 7500 Chipsets before SINIT ACM 1.1 allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors.

Action-Not Available
Vendor-n/aIntel Corporation
Product-7500_chipsetc206_chipsetmobile_intel_gm45_chipset3450_chipsetmobile_intel_qm57_chipsetx58_chipsetmobile_intel_qs67_chipsetmobile_intel_qm67_chipset5520_chipsetq35_express_chipsetmobile_intel_pm45_express_chipset5500_chipsetsinit_authenticated_code_modulec204_chipsetmobile_intel_qs57_express_chipsetc202_chipsetq67_express_chipsetq57_chipsetmobile_intel_qs57_chipsetmobile_intel_gs45_chipsetn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-41808
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-3.3||LOW
EPSS-0.06% / 19.63%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-27 Jan, 2025 | 18:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restriction in software for the Intel QAT Driver for Linux before version 1.7.l.4.12 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-quickassist_technologyIntel QAT Driver for Linux
CWE ID-CWE-92
DEPRECATED: Improper Sanitization of Custom Special Characters
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-0189
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.14% / 34.47%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of out-of-range pointer offset in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1565l_v5xeon_e7-4820_v4xeon_e-2286gxeon_gold_5215xeon_e3-1240_v6_firmwarexeon_e3-1220_v5xeon_e-2174g_firmwarexeon_platinum_8260yxeon_e-2276ml_firmwarexeon_e3-1505m_v5_firmwarexeon_e3-1578l_v5_firmwarexeon_e-2246gxeon_e3-1230_v6xeon_platinum_8260y_firmwarexeon_e-2374gxeon_gold_5218txeon_e3-1501l_v6xeon_e-2254ml_firmwarexeon_e7-4809_v4_firmwarexeon_e7-8867_v4xeon_e-2378xeon_e-2236xeon_e3-1220_v5_firmwarexeon_platinum_8280_firmwarexeon_e-2374g_firmwarexeon_gold_5218nxeon_silver_4209t_firmwarexeon_e-2386g_firmwarexeon_e-2176m_firmwarexeon_gold_6250lxeon_gold_6209uxeon_e7-8891_v4xeon_e-2278g_firmwarexeon_e3-1240_v6xeon_e3-1230_v5xeon_e3-1240_v5_firmwarexeon_e-2278gexeon_platinum_8253xeon_e3-1545m_v5_firmwarexeon_silver_4214yxeon_gold_6252nxeon_e3-1275_v5_firmwarexeon_e-2278gel_firmwarexeon_e7-8894_v4xeon_platinum_8270_firmwarexeon_gold_6230txeon_silver_4210rxeon_e3-1505l_v6xeon_e-2254me_firmwarexeon_e-2236_firmwarexeon_e-2244g_firmwarexeon_platinum_8280xeon_gold_6238l_firmwarexeon_e-2126gxeon_e7-8893_v4_firmwarexeon_gold_5220t_firmwarexeon_gold_6252xeon_gold_5220rxeon_e3-1285_v6xeon_e3-1505l_v6_firmwarexeon_gold_6246xeon_gold_6226r_firmwarexeon_e-2276mlxeon_e3-1235l_v5xeon_e3-1225_v5_firmwarexeon_silver_4214rxeon_e3-1245_v6_firmwarexeon_silver_4210r_firmwarexeon_e3-1270_v6xeon_e3-1545m_v5xeon_gold_6256_firmwarexeon_platinum_9221xeon_e3-1515m_v5_firmwarexeon_e-2334_firmwarexeon_gold_6230rxeon_e-2276me_firmwarexeon_platinum_9222_firmwarexeon_e7-8891_v4_firmwarexeon_silver_4208xeon_e-2136_firmwarexeon_gold_6210u_firmwarexeon_e-2276mexeon_silver_4210t_firmwarexeon_e-2146gxeon_gold_5218t_firmwarexeon_e7-8870_v4xeon_e-2356g_firmwarexeon_e7-8880_v4_firmwarexeon_gold_5215lxeon_e-2146g_firmwarexeon_e-2286g_firmwarexeon_e3-1515m_v5xeon_platinum_8253_firmwarexeon_gold_6238xeon_e-2126g_firmwarexeon_gold_6240lxeon_e3-1260l_v5_firmwarexeon_gold_6248xeon_e3-1240l_v5xeon_e-2136xeon_e-2378_firmwarexeon_gold_6258rxeon_platinum_8256xeon_gold_6240l_firmwarexeon_e-2288g_firmwarexeon_platinum_9282xeon_e-2276mxeon_e-2224gxeon_silver_4215_firmwarexeon_gold_6254_firmwarexeon_gold_5220_firmwarexeon_e3-1505m_v5xeon_gold_6252_firmwarexeon_e3-1535m_v6_firmwarexeon_gold_6230n_firmwarexeon_bronze_3206rxeon_silver_4208_firmwarexeon_e7-4820_v4_firmwarexeon_gold_6240xeon_e-2144g_firmwarexeon_e3-1585l_v5xeon_gold_5220xeon_e-2378g_firmwarexeon_platinum_8256_firmwarexeon_e3-1275_v5xeon_e-2246g_firmwarexeon_gold_5218r_firmwarexeon_e3-1558l_v5_firmwarexeon_e-2388gxeon_platinum_8268xeon_e-2226gxeon_silver_4214y_firmwarexeon_gold_6240rxeon_gold_6238_firmwarexeon_e-2226ge_firmwarexeon_silver_4209txeon_e-2226gexeon_e3-1225_v6_firmwarexeon_e-2278gxeon_silver_4215rxeon_gold_6212uxeon_e7-8890_v4_firmwarexeon_e-2124xeon_e-2186g_firmwarexeon_silver_4215xeon_gold_6230nxeon_e3-1270_v5_firmwarexeon_platinum_8280l_firmwarexeon_e3-1240l_v5_firmwarexeon_e7-8860_v4_firmwarexeon_e3-1501l_v6_firmwarexeon_e3-1260l_v5xeon_e-2386gxeon_gold_6208uxeon_gold_6242_firmwarexeon_e-2134xeon_e-2388g_firmwarexeon_gold_6230r_firmwarexeon_gold_6242xeon_e-2336xeon_e3-1575m_v5_firmwarexeon_e3-1225_v5xeon_e-2186mxeon_gold_6246_firmwarexeon_e3-1558l_v5xeon_platinum_8260_firmwarexeon_e-2176mxeon_gold_6230t_firmwarexeon_e-2286mxeon_gold_6250_firmwarexeon_gold_5218_firmwarexeon_silver_4210txeon_gold_6244_firmwarexeon_e-2274gxeon_e7-8893_v4xeon_e7-4830_v4xeon_e-2134_firmwarexeon_platinum_8276_firmwarexeon_e3-1268l_v5xeon_e-2226g_firmwarexeon_platinum_8276xeon_gold_6240_firmwarexeon_gold_5220txeon_e-2324g_firmwarexeon_gold_6244xeon_gold_6242rxeon_e-2278ge_firmwarexeon_platinum_9242_firmwarexeon_e-2174gxeon_gold_6226rxeon_e3-1535m_v6xeon_e3-1585_v5_firmwarexeon_e3-1220_v6xeon_gold_6258r_firmwarexeon_bronze_3204xeon_e-2276m_firmwarexeon_e7-4850_v4xeon_e3-1220_v6_firmwarexeon_e7-4850_v4_firmwarexeon_gold_5218bxeon_gold_6230_firmwarexeon_e-2286m_firmwarexeon_gold_5218b_firmwarexeon_gold_6248_firmwarexeon_e3-1245_v5xeon_e3-1501m_v6_firmwarexeon_e-2176gxeon_e-2288gxeon_e-2274g_firmwarexeon_silver_4214r_firmwarexeon_e3-1225_v6xeon_gold_6254xeon_e3-1280_v6xeon_e7-8880_v4xeon_gold_5218rxeon_e-2176g_firmwarexeon_e-2254mlxeon_e-2124g_firmwarexeon_gold_6240yxeon_e-2224_firmwarexeon_gold_6238lxeon_gold_5218n_firmwarexeon_e7-8890_v4xeon_gold_6246r_firmwarexeon_gold_6246rxeon_e3-1275_v6_firmwarexeon_gold_6234_firmwarexeon_e-2224g_firmwarexeon_e3-1505m_v6xeon_e7-8860_v4xeon_e3-1535m_v5xeon_gold_5220r_firmwarexeon_e3-1505m_v6_firmwarexeon_gold_5222xeon_e7-8870_v4_firmwarexeon_e-2254mexeon_gold_6256xeon_e3-1505l_v5xeon_platinum_8260l_firmwarexeon_e7-4830_v4_firmwarexeon_gold_6248rxeon_silver_4214xeon_platinum_9222xeon_e3-1280_v6_firmwarexeon_gold_5220sxeon_platinum_8260xeon_platinum_8280lxeon_e-2144gxeon_e3-1270_v6_firmwarexeon_e-2244gxeon_e7-8867_v4_firmwarexeon_e3-1245_v5_firmwarexeon_gold_5222_firmwarexeon_silver_4216xeon_platinum_9242xeon_e3-1235l_v5_firmwarexeon_platinum_8276lxeon_e3-1575m_v5xeon_e-2124gxeon_gold_6238txeon_platinum_9221_firmwarexeon_gold_6240r_firmwarexeon_gold_6212u_firmwarexeon_e3-1285_v6_firmwarexeon_gold_6208u_firmwarexeon_gold_6209u_firmwarexeon_e-2356gxeon_platinum_9282_firmwarexeon_e3-1240_v5xeon_e3-1585l_v5_firmwarexeon_platinum_8276l_firmwarexeon_e-2336_firmwarexeon_gold_6250xeon_platinum_8260lxeon_e3-1585_v5xeon_platinum_8270xeon_gold_6248r_firmwarexeon_gold_6262v_firmwarexeon_gold_6226xeon_e-2334xeon_e3-1501m_v6xeon_silver_4214_firmwarexeon_platinum_8268_firmwarexeon_e3-1535m_v5_firmwarexeon_e3-1505l_v5_firmwarexeon_e-2314xeon_e3-1280_v5_firmwarexeon_e-2186gxeon_e-2314_firmwarexeon_gold_6226_firmwarexeon_silver_4210xeon_gold_6250l_firmwarexeon_gold_6234xeon_e3-1280_v5xeon_gold_6252n_firmwarexeon_gold_6262vxeon_gold_6240y_firmwarexeon_e7-4809_v4xeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_e3-1230_v6_firmwarexeon_e3-1565l_v5_firmwarexeon_e3-1275_v6xeon_silver_4210_firmwarexeon_e-2276g_firmwarexeon_e-2224xeon_gold_5218xeon_e-2124_firmwarexeon_gold_6238rxeon_bronze_3204_firmwarexeon_e3-1230_v5_firmwarexeon_e-2278gelxeon_e3-1578l_v5xeon_e3-1245_v6xeon_gold_6222v_firmwarexeon_e-2378gxeon_e-2234_firmwarexeon_bronze_3206r_firmwarexeon_gold_6238r_firmwarexeon_silver_4215r_firmwarexeon_gold_6242r_firmwarexeon_gold_5217xeon_e-2324gxeon_e3-1268l_v5_firmwarexeon_e7-8894_v4_firmwarexeon_e-2276gxeon_gold_6210uxeon_gold_6222vxeon_silver_4216_firmwarexeon_e3-1270_v5xeon_e-2186m_firmwarexeon_gold_5215l_firmwarexeon_gold_6238t_firmwarexeon_e-2234xeon_gold_5217_firmwarexeon_gold_6230Intel(R) Processors
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-0004
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.06% / 17.41%
||
7 Day CHG~0.00%
Published-11 Aug, 2021 | 12:47
Updated-03 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in the firmware of Intel(R) Ethernet Adapters 800 Series Controllers and associated adapters before version 1.5.3.0 may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel CorporationFedora Project
Product-ethernet_controller_e810ethernet_controller_e810_firmwarefedoraIntel(R) Ethernet Adapters 800 Series Controllers and associated adapters
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-0054
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 17.40%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 19:07
Updated-03 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_8_compute_element_cm8pcbnuc_10_performance_kit_nuc10i5fnhf_firmwarenuc_11_pro_kit_nuc11tnhi5_firmwarenuc_8_mainstream-g_kit_nuc8i7inh_firmwarenuc_8_pro_board_nuc8i3pnb_firmwarenuc_11_performance_kit_nuc11pahi3nuc_8_business\,_a_mini_pc_with_windows_10_nuc8i7hnkqcnuc_m15_laptop_kit_lapbc710_firmwarenuc_8_mainstream-g_kit_nuc8i5inhnuc_10_performance_mini_pc_nuc10i5fnkpanuc_11_pro_kit_nuc11tnhi30lnuc_8_enthusiast\,_a_mini_pc_with_windows_10_nuc8i7hvkvanuc_11_pro_kit_nuc11tnhi70qnuc_10_performance_kit_nuc10i5fnh_firmwarenuc_11_pro_kit_nuc11tnhi50l_firmwarenuc_11_pro_kit_nuc11tnki5_firmwarenuc_9_pro_compute_element_nuc9v7qnbnuc_10_performance_mini_pc_nuc10i7fnkpanuc_10_performance_mini_pc_nuc10i5fnhca_firmwarenuc_11_pro_kit_nuc11tnhi70q_firmwarenuc_8_mainstream-g_mini_pc_nuc8i5inh_firmwarenuc_11_pro_board_nuc11tnbi5_firmwarenuc_11_pro_kit_nuc11tnhi7nuc_11_pro_kit_nuc11tnhi50lnuc_11_pro_board_nuc11tnbi7nuc_10_performance_kit_nuc10i7fnhcnuc_10_performance_mini_pc_nuc10i3fnhfa_firmwarenuc_10_performance_kit_nuc10i7fnknuc_10_performance_mini_pc_nuc10i5fnhjanuc_kit_nuc8i7hvk_firmwarenuc_9_pro_kit_nuc9v7qnx_firmwarenuc_m15_laptop_kit_lapbc710nuc_11_performance_kit_nuc11paki5_firmwarenuc_10_performance_mini_pc_nuc10i5fnhja_firmwarenuc_11_pro_board_nuc11tnbi3_firmwarenuc_10_performance_mini_pc_nuc10i3fnhja_firmwarenuc_10_performance_kit_nuc10i3fnhfnuc_10_performance_kit_nuc10i3fnk_firmwarenuc_10_performance_kit_nuc10i5fnhj_firmwarenuc_11_pro_kit_nuc11tnhi3_firmwarenuc_10_performance_kit_nuc10i7fnh_firmwarenuc_8_pro_kit_nuc8i3pnknuc_8_pro_board_nuc8i3pnbnuc_11_pro_board_nuc11tnbi5nuc_7_essential\,_a_mini_pc_with_windows_10_nuc7cjysal_firmwarenuc_11_enthusiast_mini_pc_nuc11phki7caanuc_10_performance_mini_pc_nuc10i5fnhcanuc_10_performance_kit_nuc10i5fnhnuc_8_compute_element_cm8pcb_firmwarenuc_9_pro_compute_element_nuc9vxqnbnuc_10_performance_kit_nuc10i7fnk_firmwarenuc_8_mainstream-g_mini_pc_nuc8i5inhnuc_11_performance_kit_nuc11pahi5_firmwarenuc_8_compute_element_cm8i5cb_firmwarenuc_11_pro_kit_nuc11tnhi30p_firmwarenuc_8_compute_element_cm8ccbnuc_8_mainstream-g_kit_nuc8i5inh_firmwarenuc_11_performance_kit_nuc11paki3nuc_11_pro_kit_nuc11tnhi30pnuc_11_enthusiast_mini_pc_nuc11phki7caa_firmwarenuc_11_pro_kit_nuc11tnhi7_firmwarenuc_8_rugged_kit_nuc8cchkr_firmwarenuc_10_performance_kit_nuc10i5fnkp_firmwarenuc_10_performance_kit_nuc10i5fnkpnuc_11_performance_mini_pc_nuc11paqi70qanuc_10_performance_mini_pc_nuc10i7fnkpa_firmwarenuc_m15_laptop_kit_lapbc510nuc_8_enthusiast\,_a_mini_pc_with_windows_10_nuc8i7hvkva_firmwarenuc_10_performance_kit_nuc10i5fnknuc_10_performance_kit_nuc10i7fnkpnuc_10_performance_mini_pc_nuc10i7fnhjanuc_11_pro_kit_nuc11tnki7_firmwarenuc_11_enthusiast_kit_nuc11phki7c_firmwarenuc_10_performance_kit_nuc10i3fnhf_firmwarenuc_8_compute_element_cm8ccb_firmwarenuc_10_performance_mini_pc_nuc10i3fnhfanuc_8_enthusiast\,_a_mini_pc_with_windows_10_nuc8i7hvkvaw_firmwarenuc_11_pro_kit_nuc11tnhi70lnuc_8_mainstream-g_mini_pc_nuc8i7inh_firmwarenuc_8_compute_element_cm8i5cbnuc_kit_nuc7pjyhnuc_11_enthusiast_kit_nuc11phki7cnuc_11_pro_kit_nuc11tnki3_firmwarenuc_11_pro_board_nuc11tnbi7_firmwarenuc_11_pro_kit_nuc11tnhi3nuc_8_pro_kit_nuc8i3pnhnuc_11_performance_kit_nuc11pahi3_firmwarenuc_8_enthusiast\,_a_mini_pc_with_windows_10_nuc8i7hvkvawnuc_10_performance_kit_nuc10i7fnhnuc_8_compute_element_cm8i3cb_firmwarenuc_8_business\,_a_mini_pc_with_windows_10_nuc8i7hnkqc_firmwarenuc_8_mainstream-g_mini_pc_nuc8i7inhnuc_11_pro_kit_nuc11tnhi70l_firmwarenuc_board_nuc8cchbnuc_kit_nuc8i7hnknuc_11_pro_board_nuc11tnbi3nuc_11_compute_element_cm11ebi58wnuc_11_performance_mini_pc_nuc11paqi50wanuc_10_performance_kit_nuc10i3fnknuc_kit_nuc8i7hvknuc_11_performance_kit_nuc11paki7_firmwarenuc_11_performance_mini_pc_nuc11paqi50wa_firmwarenuc_board_nuc8cchb_firmwarenuc_11_performance_kit_nuc11pahi7nuc_10_performance_kit_nuc10i5fnhjnuc_kit_nuc8i7hnk_firmwarenuc_11_performance_mini_pc_nuc11paqi70qa_firmwarenuc_10_performance_mini_pc_nuc10i7fnhaanuc_8_compute_element_cm8i3cbnuc_10_performance_kit_nuc10i5fnhfnuc_11_pro_kit_nuc11tnhi5nuc_10_performance_kit_nuc10i3fnhnuc_10_performance_mini_pc_nuc10i7fnhja_firmwarenuc_kit_nuc7cjyhnuc_11_compute_element_cm11ebc4nuc_10_performance_kit_nuc10i7fnkp_firmwarenuc_8_pro_kit_nuc8i3pnh_firmwarenuc_11_pro_kit_nuc11tnki7nuc_10_performance_mini_pc_nuc10i7fnhaa_firmwarenuc_9_pro_kit_nuc9vxqnxnuc_10_performance_kit_nuc10i3fnh_firmwarenuc_11_performance_kit_nuc11paki5nuc_10_performance_mini_pc_nuc10i5fnkpa_firmwarenuc_11_compute_element_cm11ebi38w_firmwarenuc_11_performance_kit_nuc11paki3_firmwarenuc_11_compute_element_cm11ebi716w_firmwarenuc_8_pro_kit_nuc8i3pnk_firmwarenuc_11_compute_element_cm11ebc4_firmwarenuc_8_mainstream-g_kit_nuc8i7inhnuc_9_pro_compute_element_nuc9vxqnb_firmwarenuc_10_performance_kit_nuc10i7fnhc_firmwarenuc_11_compute_element_cm11ebi38wnuc_9_pro_compute_element_nuc9v7qnb_firmwarenuc_10_performance_kit_nuc10i5fnk_firmwarenuc_11_compute_element_cm11ebi58w_firmwarenuc_11_performance_kit_nuc11paki7nuc_8_rugged_kit_nuc8cchkrnuc_kit_nuc7cjyh_firmwarenuc_kit_nuc7pjyh_firmwarenuc_11_performance_kit_nuc11pahi5nuc_11_performance_kit_nuc11pahi7_firmwarenuc_8_compute_element_cm8i7cb_firmwarenuc_11_compute_element_cm11ebi716wnuc_10_performance_mini_pc_nuc10i3fnhjanuc_11_pro_kit_nuc11tnki5nuc_9_pro_kit_nuc9v7qnxnuc_9_pro_kit_nuc9vxqnx_firmwarenuc_11_pro_kit_nuc11tnhi30l_firmwarenuc_11_pro_kit_nuc11tnhi50w_firmwarenuc_11_pro_kit_nuc11tnki3nuc_7_essential\,_a_mini_pc_with_windows_10_nuc7cjysalnuc_8_compute_element_cm8i7cbnuc_11_pro_kit_nuc11tnhi50wnuc_m15_laptop_kit_lapbc510_firmwareIntel(R) NUCs
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-41342
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6||MEDIUM
EPSS-0.04% / 11.57%
||
7 Day CHG-0.03%
Published-06 Feb, 2023 | 18:58
Updated-23 Jan, 2026 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in the Intel(R) C++ Compiler Classic before version 2021.7.1 for some Intel(R) oneAPI Toolkits before version 2022.3.1 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-c\+\+_compilerIntel(R) C++ Compiler Classic before version 2021.7.1 for some Intel(R) oneAPI Toolkits
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-14569
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.88%
||
7 Day CHG~0.00%
Published-11 Oct, 2019 | 17:57
Updated-05 Aug, 2024 | 00:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pointer corruption in system firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.

Action-Not Available
Vendor-Intel Corporation
Product-nuc_kit_dn2820fykhnuc_board_de3815tybe_firmwarenuc_8_mainstream_game_kitnuc_kit_de3815tykhe_firmwarenuc_8_mainstream_game_mini_computer_firmwarenuc_8_mainstream_game_kit_firmwarenuc_kit_de3815tykhenuc_kit_dn2820fykh_firmwarenuc_board_de3815tybenuc_8_mainstream_game_mini_computerNUC Advisory
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-14608
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.19% / 40.45%
||
7 Day CHG~0.00%
Published-16 Dec, 2019 | 19:10
Updated-05 Aug, 2024 | 00:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc7i7dnke_firmwarenuc8i3cysmnuc7i5dnke_firmwarenuc6i5syh_firmwarestk2mv64cc_firmwarestk2m3w64ccd34010wybnuc7cjyhnuc_8_mainstream_game_kitstk2m3w64cc_firmwarenuc8i7hnknuc_8_mainstream_game_mini_computer_firmwarenuc6i5syhcd1iv128mknuc8i7bek_firmwarenuc7i3dnhenuc8i7hnk_firmwarecd1iv128mk_firmwarenuc6i7kykcd1m3128mk_firmwared34010wyb_firmwarecd1m3128mknuc7cjyh_firmwarecd1p64gknuc7i3dnhe_firmwarenuc_8_mainstream_game_mini_computerde3815tybe_firmwarenuc7i5dnkenuc6cayscd1p64gk_firmwarenuc_8_mainstream_game_kit_firmwarede3815tybenuc7i7dnkestk2mv64ccnuc6i7kyk_firmwarenuc6cays_firmwarenuc8i7beknuc8i3cysm_firmwareIntel(R) NUC(R)
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2020-8703
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.26% / 48.95%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:48
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32 and 15.0.22 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aNetApp, Inc.Intel CorporationSiemens AG
Product-core_i7-7700kcore_i7-8705gcore_i7-8665uz270c627core_i3-8300tcore_i7-7660ucore_i7-8706gcore_i7-1068ng7core_i7-11700fcore_i7-1160g7core_i5-1035g7pentium_gold_g5420core_i7-10850hcore_i7-1185grecore_i7-11375hcore_i5-8400hcore_i7-8700core_i5-10400fc621acore_i5-8400core_i5-7y54core_i3-10300core_i3-7100tcore_i7-7700tcore_i7-10700tcore_i3-1110g4core_i7-8086kceleron_4305ucore_i5-10210usimatic_ipc547g_firmwarecore_i5-8257ucore_i7-8700kcore_i5-10200hpentium_gold_g5400tpentium_gold_g6405tq150core_i5-1035g4core_i3-8145ucore_i5-10400hceleron_4205ucore_i7-11700core_i5-7442eqcore_i3-10100ycore_i3-7020ucore_i5-10400tcore_i3-8109ucore_i7-11370hcore_i5-10310ucore_i7-7600ucore_i9-11900tcore_i9-11900kbcore_i5-10505c246core_i5-1030g7xeon_w-1270core_i3-1000ng4core_i3-7100ecore_i5-11600tcore_i3-7300pentium_gold_4417ucore_i7-11850hcore_i9-11900core_i3-1000g1core_i7-10510ycore_i3-10110ucore_i7-11800hcore_i5_l16g7simatic_field_pg_m6_firmwarec625simatic_ipc477ecore_i5-10400simatic_ipc427e_firmwarexeon_w-1270tecore_i5-8400bcore_i7-7700hqcore_i5-1155g7core_i5-10500tecore_i3-10105fcore_i7-7820hkcore_i3-8100hpentium_gold_4415ypentium_gold_g5620core_i9-11950hxeon_w-1290tcore_i5-11600h110core_i5-10300hpentium_gold_g6505tcore_i5-8350ucore_i9-10980hkcore_i5-7300uq270core_i7-11700tcore_i5-8600xeon_w-11855mcore_i5-8500tcore_i7-10510ucore_i5-7500core_i3-10100ecore_i5-1030ng7core_i3-8100core_i7-1060g7simatic_ipc527gcore_i9-11900hcore_i9-10900h410pentium_gold_g6500txeon_w-10855mcore_i5-7200ucore_i9-11900kcore_i3-10100tsimatic_ipc847e_firmwarecore_i9-8950hksimatic_ipc527g_firmwarecore_i9-10900ecore_i7-7700simatic_field_pg_m5core_i9-10850kcore_i9-10900kcore_i7-7920hqcore_i3-7102eh270core_i5-8600ksimatic_ipc477e_firmwareq470core_i9-10900fpentium_gold_g6400tcore_i5-8400tpentium_gold_g5600tsimatic_field_pg_m6xeon_w-1270pcore_i7-8750hcore_i7-10700simatic_ipc477e_procore_i5-8365ub150core_i3-10100tecore_i9-10910core_i5-7600simatic_ipc647ecore_i3-10105txeon_w-1250ecore_i7-10700fcore_i9-10885hcore_i5-11400tcore_i5-11300hcore_i9-11900kfcore_i3-10325core_i5-1145g7core_i3-1125g4core_i7-10750hq470ecore_i3-7100hcore_i3-8300core_i3-1000g4core_i5-7400tcore_i7-10875hq370core_i3-7100core_i7-8809gcore_i3-8145uecore_i5-7260ucore_i7-8700bcore_i7-8709gsimatic_ipc627ecore_i3-10100pentium_gold_g6505core_i5-7267uxeon_w-1250pcore_i3-1115g4celeron_6305core_i3-8100tcore_i3-8121uh170core_i5-10210yh310core_i5-1140g7core_i7-8557ucore_i5-10500esimatic_ipc547gcore_i7-8700tsimatic_ipc477e_pro_firmwarecore_i5-8300hcore_i5-10600tcore_m3-7y32core_i3-10110ycore_i5-7400core_i5-10600kfcore_i7-8650ucore_i5-11400fc629acore_i7-10700ecore_i5-1145grecore_i3-7320core_i7-1180g7c242pentium_gold_4410ycore_i5-11600kfz370pentium_gold_g5500tcore_i7-11700kfcloud_backupcore_i7-10870hpentium_gold_4415uw480core_i5-1035g1core_i5-1038ng7h420ecore_i5-11500bz170c624mobile_cm246simatic_ipc647e_firmwarex299pentium_gold_6405usimatic_ipc627e_firmwarecore_i5-8500bc627acore_i7-10700kcore_i5-11500tc622core_i7-1185g7core_i7-1165g7core_i7-1195g7core_i5-8269ucore_i5-11600kcore_i7-11390hcore_i5-1030g4core_i7-10700tecore_i5-10500core_i7-11700kcore_i7-10710ucore_i5-7287ucore_i7-10700kfcore_i5-7440eqh370xeon_w-1250texeon_w-1250core_i5-8279uw480exeon_w-1290ecore_i3-7100ucore_i7-8565ucore_i3-7101tecore_i3-7350kcore_i5-11400hcore_i7-11700bcore_i5-7600kcore_i5-8250ucore_i3-10305b365core_i5-7300hqcore_i7-7560uxeon_w-1270epentium_gold_g5420tcore_i7-7820eqcore_i9-11900fcore_i5-8259ucore_i5-7360ucore_i9-11980hkpentium_gold_g5500core_i5-10600kceleron_4305uesimatic_ipc847ecore_i3-8140usimatic_ipc427ecore_m3-8100ycore_i9-10900kfcore_i3-10105core_i3-11100bq170b460simatic_itp1000_firmwarecore_i5-1130g7core_i3-1120g4core_i5-7600tcore_i7-1060ng7core_i7-7500ucore_i7-8550ucore_i5-10310yxeon_w-1290pcore_i5-10500hcore_i5-8260ucore_i5-11320hpentium_gold_4425yb250core_i7-10810upentium_gold_g6500core_i3-1115grecore_i7-8850hcore_i5-11500hcore_i3-7130ucore_i7-10610usimatic_itp1000xeon_w-11955mcore_i3-10100fcore_i3-7167upentium_gold_g6400ecore_i7-8500ycore_i7-7567uc629pentium_gold_7505b360core_i5-10600c621core_i5-11260hsimatic_field_pg_m5_firmwarecore_i3-1115g4epentium_gold_g6400core_i7-7820hqcore_i5-8210ycore_m3-7y30core_i3-7300tcore_i5-8365uecore_i7-8665uexeon_w-1290celeron_6305ecore_i5-1145g7exeon_w-10885mcore_i3-10320core_i9-10900tcore_i5-8200ypentium_gold_g5400simatic_ipc677ecore_i3-10300tcore_i3-7101ecore_i5-8310yxeon_w-1290tecore_i5-1135g7core_i5-11500core_i5-8500c626core_i5-7440hqpentium_gold_g6600core_i7-8569uq250z490core_i5-8265ucore_i5-10500tpentium_gold_g6605core_i7-1185g7econverged_security_and_manageability_enginecore_i3_l13g4pentium_gold_5405ucore_i7-7y75core_i3-1005g1pentium_gold_g6405core_i3-8100bcore_i5-7y57simatic_ipc677e_firmwarecore_i3-10305tcore_i3-8350kcore_i5-11400core_i5-8600tcore_i5-7500tcore_i5-8305gcore_i7-1065g7core_i7-8559ucore_i9-10900tepentium_gold_g6400tez390core_i3-8130uc420h470pentium_gold_6500yc628pentium_gold_g5600Intel(R) CSME versions
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-11127
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 21.45%
||
7 Day CHG~0.00%
Published-13 Jun, 2019 | 15:36
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_stick_stk2mv64cccompute_stick_stck1a32wfccompute_stick_firmwarecompute_card_cd1iv128mkcompute_card_firmwarenuc_kit_nuc8i3bexnuc_kit_firmwarecompute_card_cd1c64gkcompute_stick_stck1a8lfccompute_card_cd1m3128mkcompute_stick_stk2m364cccompute_card_cd1p64gkcompute_stick_stk2m3w64ccIntel(R) NUC Firmware
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-11126
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 20.84%
||
7 Day CHG~0.00%
Published-13 Jun, 2019 | 15:36
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pointer corruption in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_stick_stk2mv64cccompute_stick_stck1a32wfccompute_stick_firmwarecompute_card_cd1iv128mkcompute_card_firmwarenuc_kit_nuc8i3bexnuc_kit_firmwarecompute_card_cd1c64gkcompute_stick_stck1a8lfccompute_card_cd1m3128mkcompute_stick_stk2m364cccompute_card_cd1p64gkcompute_stick_stk2m3w64ccIntel(R) NUC Firmware
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-33847
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.70%
||
7 Day CHG~0.00%
Published-18 Aug, 2022 | 19:43
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-wi-fi_6_ax210wireless-ac_9461wireless-ac_9560_firmwarewireless-ac_9260_firmwaredual_band_wireless-ac_3168killer_wi-fi_6_ax1650dual_band_wireless-ac_3165_firmwarewi-fi_6_ax211wi-fi_6_ax200_firmwarewi-fi_6_ax210_firmwarewi-fi_6_ax201_firmwarewi-fi_6_ax411_firmwaredual_band_wireless-ac_8265killer_wi-fi_6_ax1650_firmwarewireless-ac_9462wi-fi_6_ax411dual_band_wireless-ac_3165wireless-ac_9462_firmwarewi-fi_6_ax211_firmwarewi-fi_6_ax200dual_band_wireless-ac_3168_firmwarekiller_wi-fi_6e_ax1690_firmwarewireless-ac_9260killer_wireless-ac_1550dual_band_wireless-ac_8260_firmwarekiller_wi-fi_6e_ax1675_firmwarewireless_7265killer_wi-fi_6e_ax1675killer_wireless-ac_1550_firmwarekiller_wi-fi_6e_ax1690dual_band_wireless-ac_8260wireless_7265_firmwaredual_band_wireless-ac_8265_firmwarewi-fi_6_ax201wireless-ac_9461_firmwarewireless-ac_9560Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-0113
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.07%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient bounds checking in Intel(R) Graphics Drivers before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driverIntel(R) Graphics Drivers
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-0151
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.15% / 36.00%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 19:07
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient memory protection in Intel(R) TXT for certain Intel(R) Core Processors and Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e5-2687w_v2_firmwarexeon_platinum_8153xeon_e3-1230_v5xeon_e5-1620_v2_firmwarexeon_e7-8893_v3xeon_e5-1630_v3_firmwarexeon_e3-1558l_v5xeon_bronze_3104_firmwarexeon_e5-4610_v4xeon_e7-8894_v4xeon_e5-2608l_v4_firmwarexeon_e3-1226_v3_firmwarexeon_gold_6146xeon_e5-2660_v3xeon_gold_6126f_firmwarexeon_e3-1240_v3_firmwarexeon_e5-2450_v2xeon_e7-8880l_v2xeon_platinum_8168_firmwarexeon_e3-1501l_v6_firmwarexeon_silver_4108_firmwarexeon_e5-2670_v2xeon_e5-1680_v3xeon_e-2124g_firmwarexeon_e5-2697_v4xeon_d-1527xeon_e5-2608l_v3_firmwarexeon_gold_5115xeon_platinum_8170xeon_gold_6136xeon_gold_6138f_firmwarexeon_e-2254me_firmwarexeon_w-2125core_i5-8400hcore_m-5y71_firmwarexeon_e5-2690_v2xeon_e3-1220_v2_firmwarexeon_e5-2648l_v2xeon_e5-4610_v3xeon_e7-8890_v3_firmwarexeon_e3-1220_v5_firmwarexeon_e7-8870_v3xeon_e-2276me_firmwarexeon_e5-4650_v4xeon_e7-8880_v4xeon_gold_6138xeon_e5-2448l_v2_firmwarexeon_e5-2620_v2_firmwarexeon_e3-1275l_v3_firmwarexeon_d-2163it_firmwarexeon_e5-1660_v4xeon_e5-2699r_v4_firmwarexeon_e7-8891_v4xeon_platinum_8164core_i7-9700xeon_d-1521_firmwarexeon_e5-1620_v2core_i7-6650u_firmwarexeon_e3-1280_v5xeon_e-2226gxeon_e3-1226_v3xeon_e5-2699r_v4xeon_e3-1265l_v2xeon_e5-2658a_v3_firmwarexeon_silver_4116t_firmwarexeon_d-1557_firmwarexeon_e7-4820_v2_firmwarexeon_e5-1680_v3_firmwarexeon_d-1518xeon_e3-1285l_v4_firmwarexeon_e5-1620_v3_firmwarexeon_e-2276m_firmwarecore_i5-9600_firmwarecore_i5-9600t_firmwarecore_i7-6700texeon_e7-4830_v2xeon_e7-4830_v3_firmwarexeon_e3-1501l_v6xeon_e5-2609_v4_firmwarexeon_platinum_8168xeon_e5-2683_v4core_i7-7600uxeon_e5-1660_v3_firmwarexeon_e5-2640_v3xeon_e5-2608l_v4xeon_e-2224xeon_e-2186m_firmwarecore_i5-7y57_firmwarexeon_e5-2418l_v3_firmwarexeon_e3-1280_v3_firmwarexeon_e5-1620_v4xeon_e7-8880l_v3xeon_d-1567_firmwarexeon_e3-1230_v2_firmwarexeon_d-1567xeon_e5-2630l_v3xeon_e3-1505l_v6xeon_e-2278gexeon_e5-4640_v4xeon_e5-4655_v4_firmwarexeon_gold_6138t_firmwarexeon_e-2134_firmwarexeon_silver_4116_firmwarexeon_d-2173it_firmwarexeon_gold_5122xeon_platinum_8180_firmwarexeon_e5-2699_v3core_i7-7600u_firmwarexeon_gold_6126_firmwarexeon_e5-4624l_v2_firmwarexeon_e3-1240_v5_firmwarexeon_e5-4640_v2xeon_e3-1285_v3_firmwarexeon_e5-2618l_v2_firmwarexeon_e5-4657l_v2core_i5-9500_firmwarexeon_e7-8870_v4_firmwarexeon_e5-4627_v4_firmwarexeon_e3-1558l_v5_firmwarexeon_e7-8870_v4xeon_e5-2609_v2_firmwarecore_i5-8400h_firmwarexeon_gold_6150_firmwarexeon_e3-1265l_v4xeon_platinum_8156core_i5-8600xeon_e5-2450l_v2_firmwarexeon_e-2136core_i7-9700kxeon_bronze_3106_firmwarexeon_e7-8893_v4_firmwarexeon_gold_6138_firmwarexeon_d-2177nt_firmwarexeon_d-1533n_firmwarexeon_e7-4860_v2_firmwarexeon_e5-2667_v4_firmwarexeon_e7-8893_v2xeon_e5-2667_v4core_m7-6y75xeon_e3-1285l_v4xeon_gold_6126fxeon_e5-2628l_v2xeon_e7-8870_v2xeon_d-1539xeon_silver_4109t_firmwarexeon_e3-1275_v5_firmwarexeon_e3-1535m_v5xeon_e5-1680_v4xeon_silver_4114_firmwarexeon_e7-4809_v3xeon_d-2146ntxeon_e3-1575m_v5_firmwarexeon_e5-2609_v2xeon_e3-1268l_v5core_i5-8600kxeon_platinum_8160fxeon_e7-4820_v3_firmwarexeon_d-1577_firmwarecore_i7-8700k_firmwarexeon_e-2124_firmwarecore_i7-8700_firmwarexeon_e3-1290_v2_firmwarexeon_e3-1260l_v5_firmwarexeon_e3-1240_v6_firmwarexeon_e5-2658_v3xeon_e5-4660_v4xeon_e3-1501m_v6core_i5-8365uxeon_e3-1105c_v2_firmwarexeon_e3-1505m_v5_firmwarexeon_e-2226ge_firmwarexeon_d-2187ntxeon_e5-2643_v3_firmwarexeon_e5-4669_v4_firmwarexeon_platinum_8158_firmwarexeon_e5-2680_v2xeon_e5-2698_v3_firmwarexeon_e3-1270_v6xeon_gold_5120_firmwarexeon_e-2286mxeon_d-2166ntxeon_e3-1505m_v5xeon_e3-1280_v2_firmwarexeon_silver_4114t_firmwarexeon_w-2195xeon_e5-2403_v2_firmwarexeon_e5-2630l_v4xeon_gold_6134_firmwarexeon_e5-4667_v4core_i7-5650uxeon_e5-2628l_v4xeon_gold_6130t_firmwarexeon_e-2276gxeon_e5-2658_v2xeon_e-2186gxeon_d-2183itxeon_silver_4116txeon_e5-2690_v4_firmwarexeon_e-2174gxeon_e5-2630_v4xeon_e5-2687w_v2xeon_e5-4610_v3_firmwarexeon_e5-4667_v3xeon_e5-2609_v3_firmwarexeon_e7-4809_v2_firmwarecore_m-5y70xeon_e3-1280_v2xeon_w-2145_firmwarexeon_e3-1230_v6_firmwarexeon_e5-2643_v3xeon_e3-1220_v2xeon_e5-1650_v4xeon_d-2145ntxeon_e5-2630_v3xeon_gold_6126t_firmwarexeon_e5-4627_v2_firmwarexeon_e3-1275_v6_firmwarecore_i5-5300uxeon_e3-1585_v5xeon_e3-1225_v6_firmwarexeon_e5-2667_v2_firmwarexeon_e5-2623_v4xeon_e5-4620_v4_firmwarexeon_w-2123xeon_e7-8890_v4_firmwarecore_i5-8600t_firmwarexeon_gold_5119t_firmwarexeon_e3-1220_v6_firmwarexeon_d-1513n_firmwarexeon_e5-2683_v3xeon_e5-2637_v2_firmwarexeon_gold_6142_firmwarexeon_e3-1535m_v6_firmwarexeon_e3-1265l_v4_firmwarecore_i7-5600uxeon_e5-2428l_v3_firmwarexeon_e5-1620_v4_firmwarexeon_gold_6130txeon_silver_4108xeon_e3-1280_v3core_i5-9600xeon_e3-1285_v3xeon_e5-2618l_v4_firmwarexeon_e5-2650_v3_firmwarexeon_e5-2637_v4_firmwarexeon_e3-1585l_v5_firmwarexeon_e3-1240l_v5_firmwarexeon_e5-2428l_v2xeon_e7-8867_v4xeon_e3-1225_v2_firmwarexeon_e5-2660_v3_firmwarecore_i5-7300u_firmwarecore_i5-8600_firmwarexeon_e3-1281_v3xeon_bronze_3106xeon_e-2224_firmwarexeon_e3-1240l_v3xeon_e-2274gxeon_e7-8880_v3core_i5-9500xeon_e-2278gelxeon_e3-1270_v2xeon_d-1540xeon_e3-1280_v6xeon_e3-1225_v3xeon_e7-8891_v3_firmwarecore_i7-6700t_firmwarexeon_e5-1650_v2xeon_e3-1245_v5_firmwarexeon_e5-2650l_v3_firmwarexeon_e5-2698_v4xeon_e7-4890_v2_firmwarexeon_platinum_8160txeon_d-1528xeon_e5-2697_v3xeon_e5-4603_v2xeon_e5-4627_v4xeon_e5-4620_v2_firmwarexeon_e3-1280_v6_firmwarexeon_e-2124core_i9-9880hxeon_e5-2620_v3_firmwarexeon_e5-2660_v4xeon_d-2141icore_i5-8500t_firmwarexeon_e3-1275_v3xeon_e7-4809_v2xeon_e7-4830_v4xeon_d-1541xeon_e5-2650_v4_firmwarexeon_e-2136_firmwarexeon_e-2276g_firmwarexeon_e3-1235l_v5_firmwarecore_i5-6300uxeon_e5-1660_v2xeon_e5-2690_v2_firmwarexeon_e-2276mexeon_e5-4620_v3_firmwarexeon_e5-2687w_v4xeon_e5-2630_v4_firmwarexeon_e-2274g_firmwarexeon_e5-4607_v2xeon_e3-1271_v3xeon_e5-2695_v2_firmwarexeon_w-2133_firmwarexeon_e5-4667_v3_firmwarexeon_e3-1220l_v3_firmwarexeon_e3-1275_v2_firmwarexeon_e3-1535m_v6xeon_e5-4667_v4_firmwarexeon_e3-1278l_v4_firmwarexeon_e5-2699a_v4_firmwarexeon_d-1548xeon_e3-1265l_v3xeon_d-1529core_i9-9900xeon_e5-2603_v4_firmwarexeon_e3-1220_v5xeon_platinum_8160xeon_gold_5115_firmwarexeon_platinum_8156_firmwarexeon_e5-4660_v4_firmwarexeon_e-2146g_firmwarexeon_e5-2403_v2xeon_e5-2428l_v3core_i7-8850h_firmwarecore_m7-6y75_firmwarexeon_gold_5118_firmwarexeon_e5-2667_v3_firmwarexeon_e5-4648_v3xeon_e7-4809_v4core_i7-9850h_firmwarexeon_gold_6146_firmwarexeon_gold_6148fxeon_e5-2630l_v4_firmwarexeon_e5-2640_v2xeon_e5-2407_v2_firmwarexeon_gold_6132xeon_e5-2618l_v3_firmwarecore_i7-6660u_firmwarexeon_e5-2618l_v4xeon_e7-8891_v4_firmwarexeon_e3-1258l_v4xeon_w-2155xeon_e-2278g_firmwarexeon_e-2276ml_firmwarexeon_e5-2623_v3_firmwarexeon_e5-2650l_v4_firmwarexeon_e-2224gxeon_w-2135xeon_platinum_8160_firmwarexeon_w-2145xeon_e7-8894_v4_firmwarexeon_e3-1231_v3_firmwarexeon_e5-2648l_v2_firmwarexeon_e-2226gecore_i7-6650uxeon_gold_6142xeon_e5-4650_v3_firmwarecore_m-5y71xeon_gold_6148_firmwarexeon_e5-4610_v4_firmwarecore_i7-8665u_firmwarexeon_e3-1585_v5_firmwarexeon_e-2176g_firmwarecore_i5-9400hxeon_e5-2620_v2xeon_e5-4640_v3_firmwarecore_i9-9900txeon_e5-2680_v4_firmwarexeon_e5-1428l_v2_firmwarexeon_e3-1286l_v3_firmwarexeon_e5-1630_v4_firmwarexeon_e3-1286_v3xeon_e7-8890_v2xeon_e3-1230_v3xeon_d-2161ixeon_e5-4603_v2_firmwarexeon_e3-1225_v3_firmwarexeon_e5-2640_v2_firmwarexeon_platinum_8164_firmwarexeon_d-2141i_firmwarexeon_e3-1585l_v5xeon_e5-2620_v3xeon_e5-2670_v3xeon_e7-2880_v2_firmwarexeon_e5-4640_v4_firmwarexeon_e5-2648l_v3xeon_e5-1680_v4_firmwarexeon_e3-1271_v3_firmwarexeon_e5-2609_v3xeon_e3-1275_v5core_i7-9700k_firmwarexeon_e3-1270_v2_firmwarexeon_e5-2438l_v3xeon_e3-1240_v5xeon_e-2288g_firmwarexeon_e5-2430_v2_firmwarexeon_e5-2450_v2_firmwarexeon_e5-2440_v2_firmwarexeon_e3-1230l_v3xeon_e3-1286_v3_firmwarexeon_e5-2660_v2_firmwarexeon_e5-2650_v3xeon_e-2246g_firmwarexeon_e5-2648l_v4xeon_e5-1650_v4_firmwarexeon_e-2176m_firmwarexeon_e-2174g_firmwarexeon_e5-4620_v4xeon_d-1513nxeon_d-1537xeon_e5-2683_v3_firmwarexeon_e3-1515m_v5xeon_d-2187nt_firmwarexeon_e3-1225_v5xeon_e7-8880_v4_firmwarexeon_e5-2630l_v2core_i5-8500xeon_d-1539_firmwarexeon_silver_4112xeon_d-1559xeon_gold_6130_firmwarexeon_e5-2667_v2xeon_e3-1515m_v5_firmwarexeon_e5-2618l_v2xeon_e7-4890_v2xeon_gold_5120txeon_e5-2630_v3_firmwarexeon_e7-4830_v2_firmwarexeon_w-3175xxeon_e3-1230l_v3_firmwarexeon_gold_6134xeon_e5-2628l_v3xeon_e-2254mexeon_platinum_8160f_firmwarexeon_e5-2448l_v2core_i5-6440hqxeon_e3-1258l_v4_firmwarecore_i7-7y75xeon_e5-2648l_v4_firmwarexeon_e5-4669_v3xeon_e7-8893_v2_firmwarexeon_e5-1660_v2_firmwarexeon_e-2286g_firmwarecore_i7-6700xeon_e3-1220_v3xeon_d-2183it_firmwarexeon_w-2133core_i5-7y57xeon_e5-4627_v3xeon_e7-2890_v2_firmwarexeon_e7-4850_v4xeon_gold_6148xeon_d-1557xeon_e3-1505m_v6xeon_gold_6144core_i5-9600k_firmwarecore_i9-9900t_firmwarexeon_e7-2870_v2_firmwarexeon_e7-4880_v2_firmwarexeon_e-2224g_firmwarexeon_e5-2670_v2_firmwarexeon_e7-8860_v3_firmwarexeon_d-1553n_firmwarexeon_gold_6128_firmwarexeon_e3-1578l_v5_firmwarexeon_e5-2687w_v3_firmwarexeon_e5-4627_v2xeon_platinum_8170_firmwarexeon_e-2276mxeon_e7-4860_v2core_i7-8665uxeon_e5-4620_v2xeon_e5-2470_v2_firmwarecore_i7-6600uxeon_e3-1220l_v2xeon_gold_6126txeon_gold_6140_firmwarexeon_e3-1565l_v5_firmwarexeon_e5-2630_v2_firmwarexeon_e3-1565l_v5xeon_e-2236core_i9-9880h_firmwarexeon_e5-4610_v2_firmwarecore_i7-8700t_firmwarexeon_e-2236_firmwarexeon_e5-2408l_v3xeon_e5-2643_v2_firmwarexeon_e-2126g_firmwarexeon_e3-1240_v6core_i7-8700xeon_w-2155_firmwarexeon_e7-4850_v3_firmwarexeon_e3-1285l_v3_firmwarexeon_e5-2640_v4_firmwarexeon_e5-1630_v4xeon_e5-4660_v3xeon_e7-2850_v2_firmwarexeon_e5-1428l_v2xeon_e5-2603_v2core_i7-6600u_firmwarexeon_e5-2603_v3_firmwarexeon_d-1527_firmwarexeon_e5-2697_v3_firmwarecore_i7-8700kxeon_e5-2407_v2xeon_e5-2683_v4_firmwarexeon_e3-1268l_v3xeon_e5-4628l_v4_firmwarexeon_e5-2628l_v4_firmwarexeon_e5-2603_v3xeon_e7-4850_v4_firmwarexeon_e3-1270_v6_firmwarexeon_e5-2658_v3_firmwarecore_i5-8600k_firmwarexeon_e7-8870_v3_firmwarexeon_e3-1285_v6_firmwarexeon_e-2134xeon_e5-2667_v3xeon_e5-4655_v3xeon_e5-2650_v2xeon_e7-4820_v3xeon_e5-2620_v4_firmwarexeon_d-2143itxeon_e-2226g_firmwarexeon_d-2163itxeon_e5-2699_v4xeon_e3-1285_v6xeon_d-2161i_firmwarexeon_e3-1278l_v4xeon_e3-1225_v6xeon_e3-1220l_v3xeon_e5-2699_v3_firmwarexeon_e-2144g_firmwarexeon_silver_4109txeon_e5-2650l_v2_firmwarexeon_e5-2643_v4_firmwarexeon_e3-1240l_v5xeon_e3-1225_v5_firmwarexeon_e5-2690_v3xeon_e5-4655_v4xeon_gold_5122_firmwarexeon_e5-2658_v4xeon_gold_6138fxeon_e5-2440_v2xeon_e5-1630_v3xeon_gold_6132_firmwarexeon_gold_6136_firmwarexeon_e5-4650_v2_firmwarecore_i5-9600kxeon_e7-8893_v3_firmwarexeon_e3-1290_v2xeon_e3-1286l_v3xeon_e5-2418l_v2_firmwarexeon_e5-2680_v3xeon_e3-1125c_v2xeon_d-1531_firmwarexeon_e5-2697_v4_firmwarexeon_e7-4830_v3xeon_e5-2420_v2_firmwarexeon_silver_4114xeon_e5-4655_v3_firmwarexeon_d-2123it_firmwarexeon_e3-1245_v3xeon_e5-2698_v3xeon_e3-1245_v5xeon_e7-8880_v3_firmwarexeon_e3-1230_v2xeon_e5-2648l_v3_firmwarexeon_e7-8857_v2_firmwarexeon_bronze_3104xeon_d-1571xeon_e3-1265l_v2_firmwarexeon_e5-2699_v4_firmwarexeon_e5-2637_v3xeon_e7-8890_v2_firmwarexeon_e5-1620_v3core_i5-8350uxeon_e7-8880l_v3_firmwarecore_i5-7300ucore_i5-6440hq_firmwarexeon_e3-1505l_v6_firmwarexeon_e3-1240_v2xeon_e7-8850_v2_firmwarexeon_d-2173itxeon_d-2123itcore_i7-5600u_firmwarecore_i5-8500txeon_e-2246gxeon_e5-2670_v3_firmwarexeon_e5-2637_v4xeon_e3-1241_v3xeon_gold_6144_firmwarexeon_e5-2687w_v3xeon_e5-2695_v4_firmwarexeon_e5-1428l_v3_firmwarexeon_e3-1270_v5_firmwarexeon_e7-8890_v4xeon_e5-2680_v4core_i5-8350u_firmwarexeon_e5-4607_v2_firmwarexeon_e5-2630l_v3_firmwarexeon_e5-2697a_v4xeon_gold_6150xeon_e3-1535m_v5_firmwarexeon_e7-4809_v3_firmwarexeon_gold_6140xeon_e5-2690_v4core_i7-6820hq_firmwarexeon_e5-2609_v4xeon_e7-8891_v2xeon_e3-1220_v3_firmwarexeon_e5-2658_v4_firmwarexeon_e7-4850_v2xeon_e-2254mlxeon_e5-2660_v2xeon_e3-1545m_v5xeon_e5-1650_v2_firmwarexeon_gold_6148f_firmwarexeon_w-2123_firmwarexeon_d-2145nt_firmwarexeon_e3-1501m_v6_firmwarexeon_e-2254ml_firmwarexeon_e7-4870_v2xeon_e3-1578l_v5core_i7-6660uxeon_e3-1270_v5xeon_d-1537_firmwarexeon_gold_6126xeon_d-1541_firmwarexeon_e3-1245_v3_firmwarexeon_d-2166nt_firmwarexeon_e3-1260l_v5xeon_e3-1246_v3core_i5-6500_firmwarexeon_e5-2699a_v4xeon_e5-2643_v4xeon_d-1548_firmwarexeon_e-2276mlxeon_gold_6130f_firmwarexeon_e5-2690_v3_firmwarexeon_e7-2870_v2xeon_e7-8860_v3xeon_e-2244gcore_i9-9900kxeon_d-1559_firmwarexeon_e-2176gxeon_e3-1125c_v2_firmwarexeon_e3-1275l_v3xeon_e5-4648_v3_firmwarexeon_e5-2698_v4_firmwarexeon_gold_6142fxeon_e5-2637_v2xeon_e7-4809_v4_firmwarecore_i7-7y75_firmwarexeon_e7-4870_v2_firmwarexeon_platinum_8153_firmwarexeon_e5-2697a_v4_firmwarexeon_e5-4650_v3xeon_e5-2650l_v4xeon_gold_6130xeon_d-1529_firmwarexeon_d-1540_firmwarexeon_e5-1650_v3_firmwarexeon_e7-8850_v2xeon_e5-2695_v2xeon_platinum_8160t_firmwarexeon_e5-4640_v2_firmwarecore_i7-5650u_firmwarexeon_e3-1245_v2xeon_d-2142it_firmwarexeon_e-2278ge_firmwarecore_i5-9500txeon_e5-2470_v2core_i7-8700txeon_d-2143it_firmwarexeon_e3-1280_v5_firmwarexeon_e5-2420_v2core_i7-6820hqxeon_e3-1270_v3_firmwarexeon_e7-4850_v3xeon_silver_4110core_i7-8650uxeon_d-1523n_firmwarexeon_e5-2697_v2xeon_e5-2430_v2xeon_e5-4627_v3_firmwarexeon_gold_5119txeon_e-2286m_firmwarecore_i7-6700txeon_e7-8880l_v2_firmwarecore_i7-6920hqxeon_e5-4669_v3_firmwarexeon_e5-2408l_v3_firmwarexeon_e7-8870_v2_firmwarexeon_e3-1230_v6xeon_e5-2687w_v4_firmwarexeon_e7-8867_v3_firmwarecore_i7-6700_firmwarexeon_e-2234_firmwarexeon_e5-2430l_v2xeon_e5-2628l_v2_firmwarexeon_e3-1245_v2_firmwarexeon_e7-2850_v2xeon_e5-2620_v4xeon_e7-4820_v4_firmwarexeon_gold_6138txeon_e-2186g_firmwarexeon_e3-1276_v3xeon_gold_5120xeon_e-2124gxeon_e5-2618l_v3xeon_e3-1230_v3_firmwarexeon_e3-1270_v3xeon_d-1523nxeon_e5-2608l_v3xeon_e3-1231_v3xeon_e5-4660_v3_firmwarexeon_e-2288gxeon_e7-8880_v2xeon_e7-8891_v2_firmwarexeon_gold_6154_firmwarexeon_e-2234xeon_e7-8860_v4_firmwarexeon_e5-4650_v2xeon_d-1577xeon_silver_4114tcore_i7-9850hcore_i7-9700t_firmwarexeon_e5-4669_v4xeon_platinum_8176_firmwarexeon_gold_6154xeon_d-1543n_firmwarexeon_e5-2640_v4xeon_w-2195_firmwarexeon_e7-8893_v4xeon_gold_5120t_firmwarexeon_e3-1240_v2_firmwarexeon_e5-1650_v3xeon_e5-2630_v2xeon_e3-1276_v3_firmwarexeon_e3-1105c_v2xeon_e7-8891_v3xeon_e5-2640_v3_firmwarecore_m5-6y57xeon_d-1553nxeon_e-2126gxeon_d-1571_firmwarecore_i7-6920hq_firmwarexeon_e5-4620_v3core_i7-9700txeon_silver_4116xeon_e7-4820_v4xeon_e3-1268l_v3_firmwarexeon_e3-1240_v3xeon_e3-1220l_v2_firmwarexeon_e5-2650_v2_firmwarexeon_e5-2695_v3core_i5-6500core_i7-8650u_firmwarexeon_e5-2658_v2_firmwarexeon_d-1518_firmwarexeon_e3-1220_v6core_i9-9900k_firmwarecore_m-5y70_firmwarexeon_w-2135_firmwarexeon_e3-1246_v3_firmwarexeon_e3-1225_v2xeon_e-2186mxeon_e5-2438l_v3_firmwarexeon_gold_6152_firmwarexeon_e5-2603_v2_firmwarexeon_e5-1660_v3xeon_platinum_8176f_firmwarexeon_d-1520xeon_e-2176mxeon_e3-1285_v4xeon_e5-4657l_v2_firmwarexeon_e3-1265l_v3_firmwarexeon_d-2146nt_firmwarexeon_gold_6152xeon_e3-1230_v5_firmwarexeon_e5-2623_v3xeon_e7-4830_v4_firmwarexeon_platinum_8158xeon_e3-1275_v3_firmwarexeon_e5-2418l_v3xeon_e5-2658a_v3xeon_e7-8857_v2xeon_e-2286gxeon_e5-2680_v2_firmwarexeon_e7-2890_v2xeon_w-2125_firmwarexeon_d-1520_firmwarexeon_e3-1268l_v5_firmwarecore_i5-8365u_firmwarexeon_platinum_8176xeon_w-2175_firmwarecore_i7-6700te_firmwarexeon_silver_4112_firmwarexeon_e3-1241_v3_firmwarexeon_e3-1275_v6xeon_e5-4610_v2xeon_e7-4820_v2xeon_d-1531xeon_e-2244g_firmwarexeon_e3-1575m_v5core_i5-6360u_firmwarexeon_e5-2660_v4_firmwarexeon_e-2278gxeon_e5-2650_v4xeon_e3-1505l_v5xeon_d-1533nxeon_e7-8867_v3xeon_e7-8880_v2_firmwarexeon_e5-2450l_v2xeon_e3-1245_v6xeon_gold_6128xeon_w-3175x_firmwarexeon_d-2142itcore_i7-8850hxeon_gold_5118xeon_e5-2695_v4xeon_gold_6130fcore_i5-5350uxeon_e3-1281_v3_firmwarexeon_e5-4624l_v2core_i9-9900_firmwarexeon_e3-1505m_v6_firmwarexeon_e3-1545m_v5_firmwarexeon_gold_6142f_firmwarexeon_e3-1235l_v5xeon_e5-2603_v4xeon_e5-2643_v2xeon_e5-2695_v3_firmwarexeon_e5-1660_v4_firmwarexeon_e5-4628l_v4xeon_e5-2630l_v2_firmwarexeon_e5-2418l_v2xeon_e7-8860_v4core_i5-8500_firmwarexeon_e3-1285l_v3xeon_e5-2650l_v2xeon_e5-2680_v3_firmwarexeon_gold_6138pcore_i5-5300u_firmwarexeon_e5-2430l_v2_firmwarexeon_gold_6138p_firmwarecore_i5-6300u_firmwarexeon_platinum_8176fxeon_e7-4880_v2xeon_e7-8867_v4_firmwarexeon_e3-1240l_v3_firmwarexeon_e7-4850_v2_firmwarecore_i5-9400h_firmwarexeon_e7-8890_v3xeon_e3-1275_v2xeon_e5-2623_v4_firmwarexeon_e3-1285_v4_firmwarexeon_e3-1505l_v5_firmwarexeon_e5-2697_v2_firmwarexeon_d-1543nxeon_d-1528_firmwarexeon_e-2278gel_firmwarecore_i5-5350u_firmwarecore_i5-6360uxeon_e3-1245_v6_firmwarexeon_d-1521xeon_e-2144gcore_i5-9500t_firmwarecore_m5-6y57_firmwarexeon_e5-2637_v3_firmwarexeon_e5-2428l_v2_firmwarexeon_e5-4640_v3xeon_e5-4650_v4_firmwarecore_i5-9600txeon_silver_4110_firmwarecore_i5-8600txeon_e5-1428l_v3core_i7-9700_firmwarexeon_platinum_8180xeon_d-2177ntxeon_e-2146gxeon_e5-2628l_v3_firmwarexeon_e5-2650l_v3xeon_w-2175xeon_e7-2880_v22019.2 IPU – Intel(R) Processor Security
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-0170
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 21.44%
||
7 Day CHG-0.09%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in subsystem in Intel(R) DAL before version 12.0.35 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwareIntel(R) Dynamic Application Loader (DAL)
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-0152
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.34% / 55.86%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 19:06
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient memory protection in System Management Mode (SMM) and Intel(R) TXT for certain Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_platinum_8276lxeon_platinum_8153xeon_platinum_8170_firmwarexeon_bronze_3104_firmwarexeon_gold_6146xeon_gold_6126txeon_gold_6126f_firmwarexeon_gold_6140_firmwarexeon_platinum_8168_firmwarexeon_silver_4108_firmwarexeon_gold_5115xeon_gold_6238_firmwarexeon_platinum_8170xeon_gold_6136xeon_gold_6138f_firmwarexeon_w-2125xeon_w-2155_firmwarexeon_gold_5217_firmwarexeon_gold_6138xeon_gold_6246xeon_d-2163it_firmwarexeon_platinum_8164xeon_gold_6240_firmwarexeon_gold_5215mxeon_gold_5215xeon_platinum_8268_firmwarexeon_gold_6248_firmwarexeon_gold_6262vxeon_d-2143itxeon_d-2163itxeon_platinum_8168xeon_gold_6244_firmwarexeon_d-2161i_firmwarexeon_gold_5218xeon_gold_6238m_firmwarexeon_platinum_8284xeon_silver_4109txeon_gold_5215lxeon_silver_4215_firmwarexeon_gold_5122_firmwarexeon_gold_6138t_firmwarexeon_silver_4116_firmwarexeon_d-2173it_firmwarexeon_gold_6138fxeon_gold_5122xeon_platinum_8180_firmwarexeon_silver_4210_firmwarexeon_gold_6132_firmwarexeon_gold_6136_firmwarexeon_gold_6212u_firmwarexeon_gold_6212uxeon_gold_6126_firmwarexeon_platinum_8280mxeon_gold_6240l_firmwarexeon_silver_4114xeon_d-2123it_firmwarexeon_platinum_8276_firmwarexeon_bronze_3104xeon_gold_6240xeon_gold_6238lxeon_gold_6240lxeon_gold_6150_firmwarexeon_d-2173itxeon_platinum_8156xeon_d-2123itxeon_bronze_3106_firmwarexeon_d-2177nt_firmwarexeon_gold_6138_firmwarexeon_gold_5218n_firmwarexeon_gold_5220s_firmwarexeon_gold_5215_firmwarexeon_platinum_8260y_firmwarexeon_gold_6144_firmwarexeon_platinum_8274xeon_gold_6126fxeon_silver_4109t_firmwarexeon_gold_5218txeon_gold_6240y_firmwarexeon_gold_6150xeon_gold_6242_firmwarexeon_gold_6140xeon_silver_4114_firmwarexeon_gold_6230_firmwarexeon_d-2146ntxeon_platinum_8280l_firmwarexeon_platinum_8160fxeon_gold_6148f_firmwarexeon_w-2123_firmwarexeon_d-2145nt_firmwarexeon_gold_6210uxeon_d-2187ntxeon_gold_6126xeon_platinum_8158_firmwarexeon_d-2166nt_firmwarexeon_d-2166ntxeon_gold_5120_firmwarexeon_gold_6140m_firmwarexeon_silver_4216xeon_platinum_8253xeon_gold_6230xeon_w-2195xeon_gold_6134_firmwarexeon_gold_6130t_firmwarexeon_gold_6130f_firmwarexeon_d-2183itxeon_gold_6142fxeon_w-2145_firmwarexeon_d-2145ntxeon_platinum_8153_firmwarexeon_gold_6238xeon_gold_6126t_firmwarexeon_gold_6130xeon_platinum_8260mxeon_silver_4214y_firmwarexeon_silver_4208xeon_platinum_8260xeon_platinum_8160t_firmwarexeon_bronze_3204_firmwarexeon_silver_4214_firmwarexeon_d-2142it_firmwarexeon_w-2123xeon_gold_5220sxeon_platinum_8280m_firmwarexeon_d-2143it_firmwarexeon_platinum_9242xeon_platinum_9282xeon_platinum_8280lxeon_silver_4110xeon_platinum_9242_firmwarexeon_bronze_3204xeon_platinum_8280_firmwarexeon_silver_4108xeon_gold_6130txeon_silver_4210xeon_platinum_8256_firmwarexeon_gold_5217xeon_platinum_8276mxeon_gold_5218nxeon_gold_6246_firmwarexeon_gold_5222_firmwarexeon_gold_6138txeon_bronze_3106xeon_gold_6238mxeon_gold_5120xeon_gold_5220xeon_gold_6154_firmwarexeon_platinum_8160txeon_gold_6254xeon_silver_4209t_firmwarexeon_gold_6240yxeon_platinum_8176_firmwarexeon_gold_6154xeon_d-2141ixeon_gold_5215l_firmwarexeon_silver_4208_firmwarexeon_w-2195_firmwarexeon_platinum_8268xeon_gold_6252n_firmwarexeon_gold_5120t_firmwarexeon_gold_5222xeon_platinum_8270_firmwarexeon_silver_4209txeon_w-2133_firmwarexeon_silver_4116xeon_gold_6240mxeon_gold_6210u_firmwarexeon_gold_6252nxeon_gold_6244xeon_platinum_8160xeon_gold_5218t_firmwarexeon_gold_6248xeon_gold_5115_firmwarexeon_platinum_8260l_firmwarexeon_platinum_8156_firmwarexeon_gold_6226_firmwarexeon_platinum_8274_firmwarexeon_gold_5118_firmwarexeon_platinum_8280xeon_w-2135_firmwarexeon_gold_6152_firmwarexeon_gold_6146_firmwarexeon_platinum_8176f_firmwarexeon_gold_6148fxeon_gold_5218_firmwarexeon_gold_6132xeon_gold_6238t_firmwarexeon_platinum_8256xeon_gold_6152xeon_d-2146nt_firmwarexeon_platinum_8158xeon_gold_6238l_firmwarexeon_w-2155xeon_gold_5218b_firmwarexeon_w-2135xeon_gold_6222vxeon_w-2125_firmwarexeon_platinum_8176xeon_platinum_8160_firmwarexeon_gold_6242xeon_w-2175_firmwarexeon_silver_4112_firmwarexeon_w-2145xeon_gold_6262v_firmwarexeon_platinum_8260yxeon_platinum_8270xeon_platinum_8260m_firmwarexeon_gold_6148_firmwarexeon_gold_6128xeon_w-3175x_firmwarexeon_silver_4215xeon_gold_5220t_firmwarexeon_d-2142itxeon_platinum_8253_firmwarexeon_gold_5118xeon_gold_6130fxeon_gold_5220_firmwarexeon_gold_6240m_firmwarexeon_gold_5215m_firmwarexeon_silver_4214xeon_platinum_8276xeon_gold_6142f_firmwarexeon_gold_6238txeon_d-2161ixeon_platinum_8164_firmwarexeon_silver_4214yxeon_d-2141i_firmwarexeon_gold_5218bxeon_silver_4216_firmwarexeon_gold_6254_firmwarexeon_platinum_8276m_firmwarexeon_platinum_8176fxeon_platinum_8284_firmwarexeon_d-2187nt_firmwarexeon_gold_6209uxeon_silver_4112xeon_gold_6226xeon_gold_6130_firmwarexeon_gold_5120txeon_w-3175xxeon_gold_6252xeon_gold_6134xeon_gold_6222v_firmwarexeon_platinum_8160f_firmwarexeon_platinum_8260_firmwarexeon_w-2133xeon_gold_6252_firmwarexeon_d-2183it_firmwarexeon_gold_6148xeon_gold_6209u_firmwarexeon_silver_4110_firmwarexeon_platinum_8260lxeon_gold_6144xeon_gold_6140mxeon_platinum_9282_firmwarexeon_platinum_8180xeon_d-2177ntxeon_platinum_8276l_firmwarexeon_gold_6128_firmwarexeon_w-2175xeon_gold_5220t2019.2 IPU – Intel(R) Processor Security
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-0119
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 15.38%
||
7 Day CHG-0.09%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_board_s7200aphns2600kp_firmwarexeon_d-1627_firmwarehns2600tpnr_firmwarexeon_d-1527xeon_gold_processors_firmwarexeon_silver_processorsxeon_d-1523nserver_board_s2600kphns2600jff_firmwarexeon_d-1540xeon_d-1653nxeon_d-2163it_firmwareserver_board_s2600cw_firmwarexeon_d-1528xeon_d-1637xeon_d-1577xeon_d-1521_firmwarexeon_d-1527_firmwarexeon_d-2141ixeon_d-1557_firmwarexeon_d-1541hns2600bpq24_firmwarexeon_d-1543n_firmwarexeon_d-1518xeon_d-1633n_firmwarehns2600bpb24hns2600tpfrhns2600bpblc24xeon_d-2143ithns7200ap_firmwarexeon_d-2163itxeon_d-1653n_firmwareserver_board_s1200sphns2600kpr_firmwarexeon_d-2161i_firmwarehns2600tpfr_firmwarehns2600jf_firmwarexeon_d-1553nserver_board_s2600st_firmwarehns2600tpfxeon_d-1567_firmwaremfs5000si_firmwarexeon_d-1571_firmwarehns2600tp_firmwarexeon_d-1567server_board_s2600tpxeon_d-1633nhns2600bpbxeon_d-1548xeon_d-2173it_firmwarexeon_d-1649nxeon_d-1529hns7200aprlhns2600tp24str_firmwarehns2600wpq_firmwarexeon_bronze_processorsxeon_d-2191xeon_d-1531_firmwarexeon_d-1518_firmwarexeon_d-2123it_firmwarexeon_platinum_processorsxeon_silver_processors_firmwarehns2600kphns2600kpfxeon_platinum_processors_firmwarehns7200aplhns2400lpxeon_d-1520xeon_d-1571mfs5000sixeon_d-2146nt_firmwareserver_board_s2600sthns2600bpb24_firmwarexeon_d-2173itserver_board_s1200sp_firmwaremfs2600kixeon_d-2123ithns2600tp24strxeon_d-2177nt_firmwarexeon_gold_processorsxeon_d-1627xeon_d-1533n_firmwarexeon_d-1520_firmwareserver_board_s2600wt_firmwarehns2600bpblc24_firmwarexeon_d-1623nxeon_d-1531xeon_d-1602hns7200aphns2600tprserver_board_s2600tp_firmwaremfs5520vir_firmwarehns2600wp_firmwarexeon_d-1539xeon_d-1533nhns2600tpf_firmwareserver_board_s2600cwhns2600bpq_firmwarehns2600bpqmfs5520virxeon_d-2142itserver_board_s2600wthns2600bps_firmwarexeon_d-1622_firmwarexeon_d-1649n_firmwarehns2600bpblcxeon_d-2146ntxeon_d-1577_firmwarexeon_d-2145nt_firmwarehns2600jffhns2600wpqxeon_d-2161ixeon_d-2141i_firmwarehns2600wpxeon_d-2187nthns2600kpfrhns2600kprhns7200apl_firmwarexeon_d-1537_firmwarexeon_bronze_processors_firmwareserver_board_s2600bpxeon_d-1541_firmwarehns2600bpsserver_board_s2600bp_firmwarehns2600bpblc_firmwarexeon_d-2166nt_firmwarehns2600bps24xeon_d-2166nthns2600bpq24xeon_d-1623n_firmwarehns2600tpxeon_d-1548_firmwarehns7200apr_firmwarehns2600tpnrxeon_d-2183ithns2600tpr_firmwarehns2600jfq_firmwarexeon_d-1513nxeon_d-1537xeon_d-2187nt_firmwarexeon_d-1622xeon_d-1559_firmwarexeon_d-1543nxeon_d-1528_firmwarexeon_d-1539_firmwaremfs2600ki_firmwarexeon_d-1559xeon_d-1521hns2600kpfr_firmwareserver_board_s2600wfxeon_d-2145ntxeon_d-2191_firmwarehns7200aprl_firmwarexeon_d-1529_firmwarexeon_d-1540_firmwarexeon_d-1637_firmwarehns2600jfserver_board_s7200ap_firmwarehns7200aprhns2600tp24srserver_board_s2600kp_firmwarehns2400lp_firmwarehns2600wpf_firmwarexeon_d-2142it_firmwarexeon_d-2183it_firmwarehns2600bpb_firmwarehns2600jfqxeon_d-2143it_firmwareserver_system_s9200wkxeon_d-1557server_system_s9200wk_firmwarehns2600tp24rhns2600kpf_firmwarehns2600wpfxeon_d-1513n_firmwarexeon_d-1602_firmwarexeon_d-1523n_firmwareserver_board_s2600wf_firmwarehns2600bps24_firmwarexeon_d-2177ntxeon_d-1553n_firmwarehns2600tp24sr_firmwarehns2600tp24r_firmwareIntel(R) Unified Extensible Firmware Interface (UEFI)
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-0153
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.57% / 67.99%
||
7 Day CHG+0.07%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in subsystem in Intel(R) CSME 12.0.0 through 12.0.34 may allow an unauthenticated user to potentially enable escalation of privilege via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwareIntel(R) Converged Security & Management Engine (CSME)
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-26257
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 16.80%
||
7 Day CHG~0.00%
Published-18 Aug, 2022 | 19:44
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-wi-fi_6_ax210wireless-ac_9461wireless-ac_9560_firmwarewireless-ac_9260_firmwaredual_band_wireless-ac_3168killer_wi-fi_6_ax1650dual_band_wireless-ac_3165_firmwarewi-fi_6_ax211wi-fi_6_ax200_firmwarewi-fi_6_ax210_firmwarewi-fi_6_ax201_firmwarewi-fi_6_ax411_firmwaredual_band_wireless-ac_8265killer_wi-fi_6_ax1650_firmwarewireless-ac_9462wi-fi_6_ax411dual_band_wireless-ac_3165wireless-ac_9462_firmwarewi-fi_6_ax211_firmwarewi-fi_6_ax200dual_band_wireless-ac_3168_firmwarekiller_wi-fi_6e_ax1690_firmwarewireless-ac_9260killer_wireless-ac_1550dual_band_wireless-ac_8260_firmwarekiller_wi-fi_6e_ax1675_firmwarewireless_7265killer_wi-fi_6e_ax1675killer_wireless-ac_1550_firmwarekiller_wi-fi_6e_ax1690dual_band_wireless-ac_8260wireless_7265_firmwaredual_band_wireless-ac_8265_firmwarewi-fi_6_ax201wireless-ac_9461_firmwarewireless-ac_9560Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
  • Previous
  • 1
  • 2
  • Next
Details not found