Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-0091

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-17 May, 2019 | 15:41
Updated At-04 Aug, 2024 | 17:37
Rejected At-
Credits

Code injection vulnerability in installer for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:17 May, 2019 | 15:41
Updated At:04 Aug, 2024 | 17:37
Rejected At:
▼CVE Numbering Authority (CNA)

Code injection vulnerability in installer for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access.

Affected Products
Vendor
n/a
Product
Intel(R) Converged Security & Management Engine (CSME), Intel (R) Trusted Execution Engine Interface (TXE)
Versions
Affected
  • Versions before CSME 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15.
Problem Types
TypeCWE IDDescription
textN/AEscalation of Privilege
Type: text
CWE ID: N/A
Description: Escalation of Privilege
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html
x_refsource_MISC
https://support.f5.com/csp/article/K21423526
x_refsource_CONFIRM
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html
Resource:
x_refsource_MISC
Hyperlink: https://support.f5.com/csp/article/K21423526
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html
x_refsource_MISC
x_transferred
https://support.f5.com/csp/article/K21423526
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://support.f5.com/csp/article/K21423526
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:17 May, 2019 | 16:29
Updated At:20 Jun, 2019 | 01:15

Code injection vulnerability in installer for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.8HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.0
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.2
Base severity: HIGH
Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Intel Corporation
intel
>>converged_security_and_management_engine>>Versions from 11.8.0(inclusive) to 11.8.65(exclusive)
cpe:2.3:a:intel:converged_security_and_management_engine:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>converged_security_and_management_engine>>Versions from 11.11.0(inclusive) to 11.11.65(exclusive)
cpe:2.3:a:intel:converged_security_and_management_engine:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>converged_security_and_management_engine>>Versions from 11.22.0(inclusive) to 11.22.65(exclusive)
cpe:2.3:a:intel:converged_security_and_management_engine:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>converged_security_and_management_engine>>Versions from 12.0(inclusive) to 12.0.35(exclusive)
cpe:2.3:a:intel:converged_security_and_management_engine:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>trusted_execution_technology>>Versions from 3.1.0(inclusive) to 3.1.65(exclusive)
cpe:2.3:a:intel:trusted_execution_technology:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>trusted_execution_technology>>Versions from 4.0(inclusive) to 4.0.15(exclusive)
cpe:2.3:a:intel:trusted_execution_technology:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-94Primarynvd@nist.gov
CWE ID: CWE-94
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://support.f5.com/csp/article/K21423526secure@intel.com
N/A
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.htmlsecure@intel.com
Vendor Advisory
Hyperlink: https://support.f5.com/csp/article/K21423526
Source: secure@intel.com
Resource: N/A
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html
Source: secure@intel.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

150Records found

CVE-2018-3670
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.04% / 12.38%
||
7 Day CHG~0.00%
Published-01 Aug, 2018 | 15:00
Updated-17 Sep, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Driver module in Intel Smart Sound Technology before version 9.21.00.3541 potentially allows a local attacker to execute arbitrary code as administrator via a buffer overflow.

Action-Not Available
Vendor-Intel Corporation
Product-intel_smart_sound_technologySmart Sound Technology
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-12192
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.07% / 22.56%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Logic bug in Kernel subsystem in Intel CSME before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20, or Intel(R) Server Platform Services before version SPS_E5_04.00.04.393.0 may allow an unauthenticated user to potentially bypass MEBx authentication via physical access.

Action-Not Available
Vendor-Intel Corporation
Product-server_platform_services_firmwareconverged_security_management_engine_firmwareIntel(R) CSME, Server Platform Services, Trusted Execution Engine and Intel(R) Active Management Technology
CWE ID-CWE-287
Improper Authentication
CVE-2018-12131
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.80%
||
7 Day CHG~0.00%
Published-10 Oct, 2018 | 14:00
Updated-17 Sep, 2024 | 02:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Permissions in the driver pack installers for Intel NVMe before version 4.0.0.1007 and Intel RSTe before version 4.7.0.2083 may allow an authenticated user to potentially escalate privilege via local access.

Action-Not Available
Vendor-Intel Corporation
Product-client_nvmedatacenter_nvmerapid_storage_technologyIntel NVMe and Intel RSTe
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-12221
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.84%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause an integer overflow via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Driver for Windows
CWE ID-CWE-20
Improper Input Validation
CVE-2018-12216
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.18% / 39.55%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 23:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Driver for Windows
CWE ID-CWE-20
Improper Input Validation
CVE-2018-12220
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.05% / 16.75%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 18:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Logic bug in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Driver for Windows
CVE-2018-12174
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 25.11%
||
7 Day CHG~0.00%
Published-14 Nov, 2018 | 14:00
Updated-05 Aug, 2024 | 08:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap overflow in Intel Trace Analyzer 2018 in Intel Parallel Studio XE 2018 Update 3 may allow an authenticated user to potentially escalate privileges via local access.

Action-Not Available
Vendor-Intel Corporation
Product-parallel_studio_xeIntel Parallel Studio XE 2018
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-0159
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.76%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_gold_5215xeon_platinum_8260yxeon_platinum_8352vxeon_platinum_8352y_firmwarexeon_platinum_8260y_firmwarexeon_gold_5218txeon_platinum_8358xeon_platinum_8353hxeon_platinum_8360yxeon_platinum_8280_firmwarexeon_gold_5218nxeon_gold_5317_firmwarexeon_silver_4209t_firmwarexeon_gold_6336yxeon_gold_6250lxeon_gold_6209uxeon_silver_4314_firmwarexeon_platinum_8253xeon_gold_6252nxeon_silver_4214yxeon_platinum_8270_firmwarexeon_gold_6230txeon_platinum_8376h_firmwarexeon_silver_4210rxeon_platinum_8280xeon_gold_6238l_firmwarexeon_gold_5220t_firmwarexeon_gold_6252xeon_gold_5220rxeon_silver_4309y_firmwarexeon_gold_6246xeon_gold_6226r_firmwarexeon_silver_4214rxeon_silver_4210r_firmwarexeon_gold_6328hl_firmwarexeon_gold_6256_firmwarexeon_platinum_9221xeon_gold_6230rxeon_gold_6346_firmwarexeon_platinum_8360hlxeon_platinum_9222_firmwarexeon_gold_5315y_firmwarexeon_silver_4310txeon_silver_4208xeon_gold_5318hxeon_gold_6210u_firmwarexeon_platinum_8380_firmwarexeon_gold_5320_firmwarexeon_silver_4314xeon_silver_4210t_firmwarexeon_gold_5218t_firmwarexeon_gold_5215lxeon_silver_4316_firmwarexeon_platinum_8352sxeon_gold_5217_firmwarexeon_gold_6330n_firmwarexeon_platinum_8253_firmwarexeon_gold_6238xeon_platinum_8368_firmwarexeon_platinum_8376hxeon_gold_6240lxeon_gold_6248xeon_gold_6258rxeon_gold_6312u_firmwarexeon_gold_6240l_firmwarexeon_platinum_8256xeon_platinum_9282xeon_silver_4215_firmwarexeon_gold_6254_firmwarexeon_gold_5220_firmwarexeon_gold_6334_firmwarexeon_gold_6338nxeon_gold_6328hlxeon_gold_6252_firmwarexeon_gold_6230n_firmwarexeon_gold_6330xeon_bronze_3206rxeon_gold_6346xeon_silver_4208_firmwarexeon_gold_6240xeon_gold_5220xeon_platinum_8256_firmwarexeon_gold_5218r_firmwarexeon_gold_6348h_firmwarexeon_platinum_8268xeon_silver_4214y_firmwarexeon_gold_6240rxeon_gold_6238_firmwarexeon_gold_6330hxeon_silver_4209txeon_gold_6338xeon_gold_5315yxeon_platinum_8368q_firmwarexeon_silver_4215rxeon_gold_6212uxeon_platinum_8380xeon_silver_4215xeon_platinum_8368xeon_gold_6230nxeon_platinum_8280l_firmwarexeon_gold_6338txeon_platinum_8352mxeon_gold_6208uxeon_gold_6242_firmwarexeon_gold_6326_firmwarexeon_gold_6230r_firmwarexeon_gold_6242xeon_platinum_8360y_firmwarexeon_gold_6246_firmwarexeon_platinum_8260_firmwarexeon_platinum_8376hl_firmwarexeon_platinum_8360hxeon_gold_6230t_firmwarexeon_gold_6250_firmwarexeon_gold_5218_firmwarexeon_silver_4210txeon_gold_5320txeon_gold_6244_firmwarexeon_gold_6342xeon_gold_6330h_firmwarexeon_platinum_8276_firmwarexeon_platinum_8276xeon_silver_4316xeon_gold_6240_firmwarexeon_gold_5220txeon_gold_6336y_firmwarexeon_gold_6244xeon_gold_6242rxeon_gold_6330nxeon_platinum_9242_firmwarexeon_gold_6226rxeon_gold_6258r_firmwarexeon_bronze_3204xeon_gold_6230_firmwarexeon_gold_5218b_firmwarexeon_gold_5218bxeon_gold_6348hxeon_platinum_8354hxeon_gold_6248_firmwarexeon_gold_6328hxeon_platinum_8360hl_firmwarexeon_silver_4214r_firmwarexeon_gold_5318s_firmwarexeon_gold_6254xeon_gold_5218rxeon_gold_6334xeon_gold_6342_firmwarexeon_gold_6326xeon_gold_5320xeon_gold_6240yxeon_gold_6238lxeon_gold_5320h_firmwarexeon_gold_5218n_firmwarexeon_gold_6328h_firmwarexeon_platinum_8362_firmwarexeon_gold_5318h_firmwarexeon_gold_6348xeon_gold_6246r_firmwarexeon_gold_6354xeon_gold_6246rxeon_gold_6234_firmwarexeon_gold_5320hxeon_gold_6312uxeon_gold_5220r_firmwarexeon_gold_5222xeon_platinum_8380hlxeon_gold_6256xeon_platinum_8260l_firmwarexeon_gold_6338n_firmwarexeon_gold_6248rxeon_silver_4214xeon_gold_5318nxeon_platinum_9222xeon_platinum_8358_firmwarexeon_gold_5220sxeon_platinum_8260xeon_platinum_8280lxeon_silver_4309yxeon_platinum_8356hxeon_gold_6338t_firmwarexeon_gold_6314uxeon_gold_5320t_firmwarexeon_gold_5318y_firmwarexeon_gold_5222_firmwarexeon_platinum_9242xeon_silver_4216xeon_platinum_8358p_firmwarexeon_platinum_8362xeon_platinum_8276lxeon_platinum_8352v_firmwarexeon_platinum_8351n_firmwarexeon_gold_5318n_firmwarexeon_gold_6238txeon_gold_6314u_firmwarexeon_platinum_9221_firmwarexeon_silver_4310t_firmwarexeon_platinum_8368qxeon_gold_6240r_firmwarexeon_gold_5318yxeon_gold_6212u_firmwarexeon_gold_6208u_firmwarexeon_silver_4310xeon_gold_6209u_firmwarexeon_platinum_8352m_firmwarexeon_platinum_8356h_firmwarexeon_platinum_9282_firmwarexeon_platinum_8276l_firmwarexeon_gold_6250xeon_platinum_8260lxeon_platinum_8270xeon_gold_6248r_firmwarexeon_platinum_8380hxeon_gold_6262v_firmwarexeon_gold_6226xeon_gold_5318sxeon_silver_4214_firmwarexeon_platinum_8268_firmwarexeon_gold_6348_firmwarexeon_gold_6226_firmwarexeon_silver_4210xeon_gold_6250l_firmwarexeon_gold_6234xeon_silver_4310_firmwarexeon_platinum_8360h_firmwarexeon_gold_6252n_firmwarexeon_gold_6262vxeon_gold_6240y_firmwarexeon_platinum_8354h_firmwarexeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_platinum_8358pxeon_gold_6330_firmwarexeon_silver_4210_firmwarexeon_platinum_8380hl_firmwarexeon_gold_5218xeon_gold_6338_firmwarexeon_gold_6238rxeon_bronze_3204_firmwarexeon_gold_6222v_firmwarexeon_gold_6238r_firmwarexeon_bronze_3206r_firmwarexeon_platinum_8352yxeon_silver_4215r_firmwarexeon_gold_5317xeon_gold_6242r_firmwarexeon_gold_5217xeon_platinum_8376hlxeon_gold_6210uxeon_gold_6222vxeon_silver_4216_firmwarexeon_platinum_8352s_firmwarexeon_platinum_8380h_firmwarexeon_gold_5215l_firmwarexeon_gold_6238t_firmwarexeon_platinum_8353h_firmwarexeon_platinum_8351nxeon_gold_6354_firmwarexeon_gold_6230Intel(R) Processors
CWE ID-CWE-20
Improper Input Validation
CVE-2021-0189
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 29.22%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of out-of-range pointer offset in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1565l_v5xeon_e7-4820_v4xeon_e-2286gxeon_gold_5215xeon_e3-1240_v6_firmwarexeon_e3-1220_v5xeon_e-2174g_firmwarexeon_platinum_8260yxeon_e-2276ml_firmwarexeon_e3-1505m_v5_firmwarexeon_e3-1578l_v5_firmwarexeon_e-2246gxeon_e3-1230_v6xeon_platinum_8260y_firmwarexeon_e-2374gxeon_gold_5218txeon_e3-1501l_v6xeon_e-2254ml_firmwarexeon_e7-4809_v4_firmwarexeon_e7-8867_v4xeon_e-2378xeon_e-2236xeon_e3-1220_v5_firmwarexeon_platinum_8280_firmwarexeon_e-2374g_firmwarexeon_gold_5218nxeon_silver_4209t_firmwarexeon_e-2386g_firmwarexeon_e-2176m_firmwarexeon_gold_6250lxeon_gold_6209uxeon_e7-8891_v4xeon_e-2278g_firmwarexeon_e3-1240_v6xeon_e3-1230_v5xeon_e3-1240_v5_firmwarexeon_e-2278gexeon_platinum_8253xeon_e3-1545m_v5_firmwarexeon_silver_4214yxeon_gold_6252nxeon_e3-1275_v5_firmwarexeon_e-2278gel_firmwarexeon_e7-8894_v4xeon_platinum_8270_firmwarexeon_gold_6230txeon_silver_4210rxeon_e3-1505l_v6xeon_e-2254me_firmwarexeon_e-2236_firmwarexeon_e-2244g_firmwarexeon_platinum_8280xeon_gold_6238l_firmwarexeon_e-2126gxeon_e7-8893_v4_firmwarexeon_gold_5220t_firmwarexeon_gold_6252xeon_gold_5220rxeon_e3-1285_v6xeon_e3-1505l_v6_firmwarexeon_gold_6246xeon_gold_6226r_firmwarexeon_e-2276mlxeon_e3-1235l_v5xeon_e3-1225_v5_firmwarexeon_silver_4214rxeon_e3-1245_v6_firmwarexeon_silver_4210r_firmwarexeon_e3-1270_v6xeon_e3-1545m_v5xeon_gold_6256_firmwarexeon_platinum_9221xeon_e3-1515m_v5_firmwarexeon_e-2334_firmwarexeon_gold_6230rxeon_e-2276me_firmwarexeon_platinum_9222_firmwarexeon_e7-8891_v4_firmwarexeon_silver_4208xeon_e-2136_firmwarexeon_gold_6210u_firmwarexeon_e-2276mexeon_silver_4210t_firmwarexeon_e-2146gxeon_gold_5218t_firmwarexeon_e7-8870_v4xeon_e-2356g_firmwarexeon_e7-8880_v4_firmwarexeon_gold_5215lxeon_e-2146g_firmwarexeon_e-2286g_firmwarexeon_e3-1515m_v5xeon_platinum_8253_firmwarexeon_gold_6238xeon_e-2126g_firmwarexeon_gold_6240lxeon_e3-1260l_v5_firmwarexeon_gold_6248xeon_e3-1240l_v5xeon_e-2136xeon_e-2378_firmwarexeon_gold_6258rxeon_platinum_8256xeon_gold_6240l_firmwarexeon_e-2288g_firmwarexeon_platinum_9282xeon_e-2276mxeon_e-2224gxeon_silver_4215_firmwarexeon_gold_6254_firmwarexeon_gold_5220_firmwarexeon_e3-1505m_v5xeon_gold_6252_firmwarexeon_e3-1535m_v6_firmwarexeon_gold_6230n_firmwarexeon_bronze_3206rxeon_silver_4208_firmwarexeon_e7-4820_v4_firmwarexeon_gold_6240xeon_e-2144g_firmwarexeon_e3-1585l_v5xeon_gold_5220xeon_e-2378g_firmwarexeon_platinum_8256_firmwarexeon_e3-1275_v5xeon_e-2246g_firmwarexeon_gold_5218r_firmwarexeon_e3-1558l_v5_firmwarexeon_e-2388gxeon_platinum_8268xeon_e-2226gxeon_silver_4214y_firmwarexeon_gold_6240rxeon_gold_6238_firmwarexeon_e-2226ge_firmwarexeon_silver_4209txeon_e-2226gexeon_e3-1225_v6_firmwarexeon_e-2278gxeon_silver_4215rxeon_gold_6212uxeon_e7-8890_v4_firmwarexeon_e-2124xeon_e-2186g_firmwarexeon_silver_4215xeon_gold_6230nxeon_e3-1270_v5_firmwarexeon_platinum_8280l_firmwarexeon_e3-1240l_v5_firmwarexeon_e7-8860_v4_firmwarexeon_e3-1501l_v6_firmwarexeon_e3-1260l_v5xeon_e-2386gxeon_gold_6208uxeon_gold_6242_firmwarexeon_e-2134xeon_e-2388g_firmwarexeon_gold_6230r_firmwarexeon_gold_6242xeon_e-2336xeon_e3-1575m_v5_firmwarexeon_e3-1225_v5xeon_e-2186mxeon_gold_6246_firmwarexeon_e3-1558l_v5xeon_platinum_8260_firmwarexeon_e-2176mxeon_gold_6230t_firmwarexeon_e-2286mxeon_gold_6250_firmwarexeon_gold_5218_firmwarexeon_silver_4210txeon_gold_6244_firmwarexeon_e-2274gxeon_e7-8893_v4xeon_e7-4830_v4xeon_e-2134_firmwarexeon_platinum_8276_firmwarexeon_e3-1268l_v5xeon_e-2226g_firmwarexeon_platinum_8276xeon_gold_6240_firmwarexeon_gold_5220txeon_e-2324g_firmwarexeon_gold_6244xeon_gold_6242rxeon_e-2278ge_firmwarexeon_platinum_9242_firmwarexeon_e-2174gxeon_gold_6226rxeon_e3-1535m_v6xeon_e3-1585_v5_firmwarexeon_e3-1220_v6xeon_gold_6258r_firmwarexeon_bronze_3204xeon_e-2276m_firmwarexeon_e7-4850_v4xeon_e3-1220_v6_firmwarexeon_e7-4850_v4_firmwarexeon_gold_5218bxeon_gold_6230_firmwarexeon_e-2286m_firmwarexeon_gold_5218b_firmwarexeon_gold_6248_firmwarexeon_e3-1245_v5xeon_e3-1501m_v6_firmwarexeon_e-2176gxeon_e-2288gxeon_e-2274g_firmwarexeon_silver_4214r_firmwarexeon_e3-1225_v6xeon_gold_6254xeon_e3-1280_v6xeon_e7-8880_v4xeon_gold_5218rxeon_e-2176g_firmwarexeon_e-2254mlxeon_e-2124g_firmwarexeon_gold_6240yxeon_e-2224_firmwarexeon_gold_6238lxeon_gold_5218n_firmwarexeon_e7-8890_v4xeon_gold_6246r_firmwarexeon_gold_6246rxeon_e3-1275_v6_firmwarexeon_gold_6234_firmwarexeon_e-2224g_firmwarexeon_e3-1505m_v6xeon_e7-8860_v4xeon_e3-1535m_v5xeon_gold_5220r_firmwarexeon_e3-1505m_v6_firmwarexeon_gold_5222xeon_e7-8870_v4_firmwarexeon_e-2254mexeon_gold_6256xeon_e3-1505l_v5xeon_platinum_8260l_firmwarexeon_e7-4830_v4_firmwarexeon_gold_6248rxeon_silver_4214xeon_platinum_9222xeon_e3-1280_v6_firmwarexeon_gold_5220sxeon_platinum_8260xeon_platinum_8280lxeon_e-2144gxeon_e3-1270_v6_firmwarexeon_e-2244gxeon_e7-8867_v4_firmwarexeon_e3-1245_v5_firmwarexeon_gold_5222_firmwarexeon_silver_4216xeon_platinum_9242xeon_e3-1235l_v5_firmwarexeon_platinum_8276lxeon_e3-1575m_v5xeon_e-2124gxeon_gold_6238txeon_platinum_9221_firmwarexeon_gold_6240r_firmwarexeon_gold_6212u_firmwarexeon_e3-1285_v6_firmwarexeon_gold_6208u_firmwarexeon_gold_6209u_firmwarexeon_e-2356gxeon_platinum_9282_firmwarexeon_e3-1240_v5xeon_e3-1585l_v5_firmwarexeon_platinum_8276l_firmwarexeon_e-2336_firmwarexeon_gold_6250xeon_platinum_8260lxeon_e3-1585_v5xeon_platinum_8270xeon_gold_6248r_firmwarexeon_gold_6262v_firmwarexeon_gold_6226xeon_e-2334xeon_e3-1501m_v6xeon_silver_4214_firmwarexeon_platinum_8268_firmwarexeon_e3-1535m_v5_firmwarexeon_e3-1505l_v5_firmwarexeon_e-2314xeon_e3-1280_v5_firmwarexeon_e-2186gxeon_e-2314_firmwarexeon_gold_6226_firmwarexeon_silver_4210xeon_gold_6250l_firmwarexeon_gold_6234xeon_e3-1280_v5xeon_gold_6252n_firmwarexeon_gold_6262vxeon_gold_6240y_firmwarexeon_e7-4809_v4xeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_e3-1230_v6_firmwarexeon_e3-1565l_v5_firmwarexeon_e3-1275_v6xeon_silver_4210_firmwarexeon_e-2276g_firmwarexeon_e-2224xeon_gold_5218xeon_e-2124_firmwarexeon_gold_6238rxeon_bronze_3204_firmwarexeon_e3-1230_v5_firmwarexeon_e-2278gelxeon_e3-1578l_v5xeon_e3-1245_v6xeon_gold_6222v_firmwarexeon_e-2378gxeon_e-2234_firmwarexeon_bronze_3206r_firmwarexeon_gold_6238r_firmwarexeon_silver_4215r_firmwarexeon_gold_6242r_firmwarexeon_gold_5217xeon_e-2324gxeon_e3-1268l_v5_firmwarexeon_e7-8894_v4_firmwarexeon_e-2276gxeon_gold_6210uxeon_gold_6222vxeon_silver_4216_firmwarexeon_e3-1270_v5xeon_e-2186m_firmwarexeon_gold_5215l_firmwarexeon_gold_6238t_firmwarexeon_e-2234xeon_gold_5217_firmwarexeon_gold_6230Intel(R) Processors
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-0190
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 29.22%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Uncaught exception in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e5-2650l_v4xeon_e5-1607_v4_firmwarexeon_e5-2689_v4xeon_e5-1650_v4_firmwarexeon_e5-2630l_v4xeon_e5-2699_v4_firmwarexeon_e5-4640_v4_firmwarexeon_e5-2637_v4_firmwarexeon_e5-2660_v4_firmwarexeon_e5-4669_v4_firmwarexeon_e5-4667_v4xeon_e5-2603_v4_firmwarexeon_e5-2697a_v4xeon_e5-4628l_v4xeon_e5-2687w_v4xeon_e5-2637_v4core_i9-10980xe_firmwarexeon_e5-1650_v4xeon_e5-1620_v4xeon_e5-4669_v4xeon_e5-2689_v4_firmwarexeon_e5-2630_v4_firmwarexeon_e5-2609_v4_firmwarexeon_e5-4610a_v4xeon_e5-2623_v4xeon_e5-2699r_v4_firmwarexeon_e5-2679_v4xeon_e5-4640_v4xeon_e5-2628l_v4xeon_e5-2650_v4xeon_e5-2650_v4_firmwarexeon_e5-4660_v4_firmwarexeon_e5-2630l_v4_firmwarexeon_e5-2687w_v4_firmwarecore_i9-10980xexeon_e5-2690_v4_firmwarexeon_e5-2608l_v4xeon_e5-4650_v4xeon_e5-2697_v4xeon_e5-2660_v4xeon_e5-4610_v4xeon_e5-2680_v4_firmwarexeon_e5-2658_v4_firmwarexeon_e5-4627_v4_firmwarexeon_e5-2658_v4xeon_e5-2679_v4_firmwarexeon_e5-1630_v4_firmwarexeon_e5-2648l_v4_firmwarexeon_e5-4650_v4_firmwarexeon_e5-2667_v4xeon_e5-1680_v4_firmwarexeon_e5-2695_v4_firmwarexeon_e5-4620_v4_firmwarecore_i9-10900x_firmwarexeon_e5-4655_v4_firmwarexeon_e5-2608l_v4_firmwarexeon_e5-4627_v4xeon_e5-2630_v4xeon_e5-1603_v4_firmwarexeon_e5-1630_v4xeon_e5-4610_v4_firmwarexeon_e5-2620_v4core_i9-10920x_firmwarexeon_e5-2609_v4core_i9-10940xxeon_e5-1660_v4xeon_e5-4628l_v4_firmwarexeon_e5-1680_v4xeon_e5-2698_v4_firmwarexeon_e5-2683_v4_firmwarexeon_e5-2618l_v4_firmwarecore_i9-10900xxeon_e5-1607_v4xeon_e5-2643_v4_firmwarexeon_e5-2695_v4xeon_e5-2623_v4_firmwarexeon_e5-2690_v4xeon_e5-2650l_v4_firmwarexeon_e5-2699r_v4core_i9-10940x_firmwarecore_i9-10920xxeon_e5-2699a_v4_firmwarexeon_e5-2640_v4_firmwarexeon_e5-2667_v4_firmwarexeon_e5-2699a_v4xeon_e5-2618l_v4xeon_e5-4667_v4_firmwarexeon_e5-1660_v4_firmwarexeon_e5-2648l_v4xeon_e5-4620_v4xeon_e5-4610a_v4_firmwarexeon_e5-2643_v4xeon_e5-2683_v4xeon_e5-2699_v4xeon_e5-2628l_v4_firmwarexeon_e5-2603_v4xeon_e5-4660_v4xeon_e5-2697_v4_firmwarexeon_e5-2698_v4xeon_e5-1620_v4_firmwarexeon_e5-1603_v4xeon_e5-2620_v4_firmwarexeon_e5-2640_v4xeon_e5-2680_v4xeon_e5-4655_v4xeon_e5-2697a_v4_firmwareIntel(R) Processors
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
CVE-2021-0144
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.14% / 34.18%
||
7 Day CHG~0.00%
Published-14 Jul, 2021 | 13:23
Updated-03 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure default variable initialization for the Intel BSSA DFT feature may allow a privileged user to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1558l_v5xeon_e3-1235lxeon_e3_1240l_v5xeon_gold_6146xeon_e5-2660_v3core_i7-1068ng7core_i5-1035g7core_i5-6585ratom_c3758rcore_i7_9700fxeon_d-1527xeon_e5-2697_v4xeon_platinum_8170xeon_e-2314xeon_w-2125core_i9-10940xcore_i7_8500yxeon_e3_1246_v3xeon_platinum_8164core_i7-9700core_i7-3960xxeon_e3-1280_v5xeon_gold_6234xeon_e5-2699r_v4xeon_e3-1265l_v2xeon_gold_6238rcore_i7-8670core_i5-1035g4xeon_w-2255core_i5-10400hxeon_d-1518core_i7_10510ycore_i7-6822eqcore_i7-9700tecore_i5-10400tcore_i7-11370hcore_i5-10310ucore_i9-7920xcore_i7-7600uxeon_e3_1501l_v6xeon_e5-2608l_v4xeon_e-2224xeon_e5-2683_v4xeon_gold_5218core_i3-7100ecore_i5-11600txeon_d-1567xeon_e3-1505l_v6xeon_e-2278gecore_i3-6098pxeon_w-2245xeon_e3_1245xeon_d-1587xeon_e3_1275_v2xeon_e5-2699_v3core_i5-10400core_i5-8700bxeon_e3-1285core_i5-10500tecore_i7-7820hkcore_i7-6900kxeon_e5-2689_v4core_i9-9940xcore_i5-11600xeon_gold_6240core_i7-6970hqcore_i3-6120tcore_i5-8600xeon_e3_1268l_v5core_i7-3930kcore_i5-1030ng7core_i7-1060g7core_i9-10900xeon_platinum_8274xeon_d-1539xeon_e3_1285_v3xeon_e3-1535m_v5xeon_gold_5220rcore_i9-10900kxeon_e-2386gxeon_d-2146ntxeon_e3-1268l_v5core_i5-8600kxeon_e3110xeon_platinum_8160fcore_i9-10900fxeon_e3-1220core_i7-8750hcore_i7-6850kxeon_platinum_8160mxeon_d-2166ntxeon_e3-1270_v6core_i7-3920xmxeon_e-2286mxeon_e3-1505m_v5xeon_silver_4216xeon_gold_6230xeon_w-2195atom_c3336xeon_e5-2628l_v4xeon_e-2276gcore_i5_8400txeon_d-2183itxeon_e3-1535mcore_i3-7100core_i7-8809gcore_i3-8145uexeon_e5-4667_v3xeon_platinum_8160hxeon_e3-1280_v2xeon_e3-1220_v2core_i5-7267uxeon_e3_1260l_v5xeon_silver_4208core_i3-8121uxeon_e3_1225_v6xeon_e3-1585_v5xeon_w-2104core_i5-10500ecore_i5-9400tcore_i7-6560ucore_i9_9900ksxeon_gold_5220sxeon_w-2123core_i5-8300hxeon_platinum_9282xeon_e5-2683_v3core_i5-10600kfxeon_silver_4108xeon_gold_6130txeon_e3-1280_v3xeon_silver_4210core_i5-11600kfcore_i7-9800xcore_i7-11700kfcore_i7-10870hxeon_e3-1565lxeon_e3_1220_v6core_i7_8086kxeon_e3_1235core_i3-6167uxeon_e-2274gcore_i5-11500tcore_i5-9500xeon_e-2278gelxeon_e3-1270_v2xeon_d-1540xeon_e3-1290core_i5_9400xeon_e5-2698_v4xeon_platinum_8160tcore_i7-7740xxeon_d-1528core_i7-6500ucore_i3-7110ucore_i7xeon_e-1105cxeon_e5-2660_v4xeon_e3_1275l_v3core_i7-3940xmcore_i5_9500tcore_i7-4940mxxeon_platinum_8268core_i5-6300ucore_i7-4930kcore_i7-8565uxeon_e5-2687w_v4xeon_e5-1603_v3xeon_e3_1245_v6core_i5-7300hqcore_i7-7560uxeon_e3-1271_v3xeon_gold_5117fxeon_e3_1505m_v5core_i9-11900fcore_i5-8259ucore_i7-4820kxeon_d-1529xeon_e3-1265l_v3xeon_e3_1505l_v5xeon_e3_1230core_i7-11600hxeon_e3_1285l_v3xeon_e-2336core_i3-9130ucore_i5-6350hqxeon_e3_1125cxeon_gold_6132core_i5-7600txeon_e5-2618l_v4xeon_gold_6137xeon_e-2224gxeon_w-2135xeon_e3-1505mxeon_e3_1270_v5core_i5-11320hxeon_e-2226gecore_i5_9600txeon_gold_6142core_i5-9300hxeon_e3_1220_v5core_i7-10610ucore_i5-9400hcore_i7-8500yxeon_e3_1280_v2atom_c3436lxeon_e3-1286_v3core_i3-7367uxeon_w-1390pxeon_e3-1230_v3xeon_d-1632core_i7-7820hqxeon_e5-2620_v3xeon_e3_1290_v2xeon_e5-2648l_v3core_i3-6100exeon_gold_6142mxeon_e3-1280core_i7_8700xeon_e5-2609_v3xeon_e3-1275_v5xeon_e5-2438l_v3xeon_e3-1221_v3xeon_e3-1240_v5core_i7_9700kfxeon_e3-1230l_v3xeon_e3_1225_v2xeon_e5-2650_v3xeon_gold_6222core_i7-6567ucore_i3-7101ecore_i9-7900xxeon_gold_6209uxeon_silver_4112xeon_d-1559xeon_w-3223core_i7-7510ucore_i7-8510ycore_i5-8265ucore_i5-6300hqxeon_e-2254mecore_i7-4930mxatom_c3558core_i7-5930kcore_i7-7y75xeon_e3_1245_v2core_i7-6700atom_c3308xeon_e3-1220_v3core_i5-7y57xeon_e5-4627_v3core_i3-8350kxeon_e3_1240_v3xeon_gold_6148core_i5-7500txeon_e3-1505m_v6xeon_gold_6144core_i3-9100xeon_e3-1120atom_c3758atom_c3558ratom_c3830xeon_e3120xeon_gold_5220txeon_e3_1125c_v2xeon_platinum_8276latom_c3750xeon_e5-2679_v4core_i7-7700kcore_i7-8705gxeon_platinum_9222core_i5-9500exeon_gold_6129xeon_gold_6230tcore_i7-7660ucore_i7-8706gxeon_e3-1220l_v2xeon_gold_6126txeon_w-3225xeon_gold_6135xeon_e3-1565l_v5xeon_w-1370core_i7-1185grexeon_e5-2408l_v3core_i7-11375hxeon_e3-1240_v6xeon_d-1573ncore_i5-6310ucore_i7-8700core_i5-10400fxeon_e3-1501lcore_i3-6300tcore_i3-7100tcore_i7-7700txeon_e3_1240_v2core_i7-10700txeon_e5-1630_v4xeon_e5-4660_v3core_i5-10210uxeon_e3_1240xeon_w-2295core_i7-6770hqcore_i5-8257ucore_i5-10610ucore_i7-8700kxeon_e3-1268l_v3core_i7_8550ucore_i5-7442eqxeon_gold_5215xeon_e5-2667_v3xeon_d-2143itxeon_e5-2699_v4xeon_e3-1285_v6core_i5-10505core_i5-1030g7xeon_e3-1278l_v4xeon_e3-1225_v6xeon_e3-1220l_v3xeon_e3_1280_v5xeon_silver_4109txeon_e3-1240l_v5xeon_e5-2690_v3xeon_silver_4215rxeon_gold_6138fcore_i7-11800hxeon_e5-1630_v3xeon_e3_1245_v3core_i5-8420txeon_e3_1225xeon_silver_4210tcore_i5_9500fxeon_e3-1290_v2xeon_e3-1286l_v3xeon_e3_1241_v3xeon_e5-2680_v3xeon_gold_6212ucore_i9-7980xexeon_silver_4114core_i3-8100hcore_i7-6870hqxeon_e3-1230_v2xeon_e3_1285l_v4core_i9-11950hxeon_bronze_3104core_i5-10300hxeon_e3_1230_v6xeon_gold_6238lxeon_e5-2637_v3core_i9-10920x_x-seriesxeon_e3_1285_v6core_i7_1065g7core_i5-7300uxeon_e3_1286_v3core_i5-8500txeon_e3_1220xeon_w-3265mcore_i5-7500xeon_d-1627xeon_e3_1290core_i5-6400xeon_d-1602core_i5-7200ucore_i9-11900kxeon_gold_6150core_i9-10850kxeon_e5-2690_v4xeon_e3_1265l_v4xeon_d-1612xeon_e-2254mlxeon_e3-1545m_v5core_i5-8400txeon_w-1270pcore_i7-10700core_i7_9700kcore_i9-10920xcore_i5-8420core_i7-6660uxeon_e3-1260l_v5core_i5-11400txeon_w-1250ecore_i5-11300hcore_i9-11900kfcore_i3-7100hxeon_e3-1235_v2core_i7-10875hxeon_e-2276mlxeon_e3_1270_v2xeon_e3_1270_v3xeon_e3-1275l_v3core_i7_1060g7core_i5-6287uxeon_e5-4650_v3core_i5-9400core_i3-8100txeon_platinum_8260core_i3-7120txeon_e3-1245_v2core_i7-6820hqxeon_silver_4110core_i7-8650uxeon_bronze_3204core_i5-1145grexeon_gold_5119tcore_i7-6920hqxeon_gold_6246ratom_c3338rxeon_e3_12201core_i3-6100uxeon_gold_5217core_i5-1038ng7xeon_e3_1230_v2xeon_w-3245xeon_e3_1281_v3core_i5-8500bcore_i7-1185g7core_i7-1195g7core_i7_8700kxeon_e5-2618l_v3xeon_d-1523ncore_i5-8269uxeon_e3-1270_v3core_i3-6157ucore_i9_9900kfxeon_e3_1275xeon_e5-2608l_v3core_i5_8400core_i7-10700texeon_e-2288gxeon_d-1653nxeon_silver_4114tcore_i7-6700kxeon_gold_6240ycore_i3-8000xeon_e5-4669_v4core_i7-8560uxeon_gold_6208ucore_i9core_i3-8000txeon_w-1290exeon_e5-1650_v3core_i3-7350kxeon_e3_1226_v3core_i7-11700bxeon_e3-1105c_v2core_i5-8250ucore_i7-9700tcore_i7-7820eqatom_c3850xeon_gold_6252nxeon_e3_1235l_v5xeon_e3-1240_v3xeon_gold_6244xeon_e5-2695_v3core_i3-9350kfxeon_w-1370pcore_i5-6200uxeon_e3-1225_v2xeon_e5-1660_v3xeon_d-1520core_i5-1130g7core_i7-6785rxeon_e3_1220_v3xeon_platinum_8256xeon_e5-2623_v3xeon_platinum_8158xeon_e3_1275_v3xeon_e3_1505l_v6core_i9-9900xxeon_e5-2418l_v3xeon_e-2284gcore_i5-10500hxeon_e3-1275_v6core_i3-8020xeon_d-1531core_i3-9300tcore_i7-6510uxeon_e-2278gxeon_platinum_8260yxeon_e3-1505l_v5core_i9-9980xexeon_gold_6128xeon_d-2142itxeon_platinum_8180mcore_i3-7130uxeon_gold_6130fxeon_w-11955mxeon_e-2374gcore_i7-6800kcore_i5-10600xeon_platinum_8276core_i5-6500texeon_e3-1235l_v5core_i7\+8700core_i5_10210yxeon_e5-4628l_v4core_i3-9350kxeon_w-1350xeon_e3-1285l_v3xeon_silver_4106hxeon_gold_6138pcore_i7-8665uexeon_e3-1575mxeon_e3-1230xeon_d-1524ncore_i5-6685rcore_i5-1145g7ecore_i5-11500hexeon_e3-1275_v2core_i5-8200ycore_i9-10900x_x-seriesatom_c3808xeon_w-2275xeon_d-1543ncore_i5-7440hqcore_i5-6360uxeon_e-2144gxeon_d-1521core_i7-5960xxeon_w-1350pxeon_gold_6230rcore_i7-8569uatom_c3950core_i5-10500tcore_i7-1185g7exeon_gold_5218rxeon_gold_6226rxeon_bronze_3206rcore_i3-8100bcore_i5-9600tcore_i3-9320core_i5-11400core_i5-6440eqxeon_e5-1607_v4core_i7-1065g7xeon_platinum_8170mcore_i9-10900texeon_platinum_8180core_i3-6100tecore_i3-8130uxeon_e5-2650l_v3xeon_e3-1585lxeon_platinum_8153xeon_e3-1230_v5xeon_w-3245mxeon_e5-4610_v4xeon_e-2378gcore_i3-6300xeon_e3_1270xeon_e3_1230l_v3core_i7-1160g7xeon_e5-1680_v3core_i7-9700kfxeon_gold_5115core_i7-7640xxeon_e3_1220l_v3xeon_gold_6136core_i5-8400hxeon_e5-4610_v3core_i5-7y54core_i7_8700txeon_e5-4650_v4xeon_gold_6138core_i9_9900xeon_e5-1660_v4core_i5-10200hxeon_e-2226gxeon_e3-1226_v3xeon_e3-1268lcore_i3-8145ucore_i7-11700xeon_e3core_i7-6700tecore_i3-7020uxeon_e3-1501l_v6xeon_gold_6262vcore_i3-8109uxeon_platinum_8168core_i9-11900txeon_e5-2640_v3xeon_e3_1240_v5core_i5-10110yxeon_e5-1620_v4core_i3-7300xeon_e-2378core_i7-11850hcore_i9-11900core_i9_9900kxeon_e5-2630l_v3xeon_e5-1607_v3xeon_e5-4640_v4xeon_gold_5117xeon_gold_5122core_i3-9100hlcore_i5-6600kxeon_d-2191core_i5-8400bxeon_gold_6248rxeon_e3_1240l_v3core_i5-8550core_i7-11850hexeon_w-1290txeon_e-2184gcore_i3-9100tecore_i7-9700fcore_i9-10980hkxeon_e3-1265l_v4xeon_gold_6262core_i5-7500uxeon_platinum_8156xeon_e3-1225xeon_e3_1275_v5xeon_e-2136core_i7-10510ucore_i7-9700kcore_i5_9600core_i5-6402pcore_i3-8100xeon_w-2265core_i9-11900hxeon_e3-1545mxeon_e5-2667_v4xeon_e3-1285l_v4xeon_w-10855mxeon_gold_6126fxeon_e5-1680_v4core_i7-7700core_i3-7102exeon_e5-2658_v3xeon_e5-4660_v4xeon_e3-1501m_v6xeon_gold_6250lcore_i5-8365uxeon_gold_6210uxeon_d-2187ntcore_i5-9600kfcore_i9-10910core_i5-7600core_i9-7940xcore_i9-9960xcore_i7-10700fcore_i5-1145g7core_i7-10750hxeon_e3_1280_v3xeon_platinum_8253xeon_e5-2630l_v4xeon_e5-4667_v4atom_c3958core_i5_9400txeon_e5-2685_v3core_i3-8300xeon_w-1390xeon_e-2186gcore_i5-7400txeon_silver_4116txeon_e-2174gxeon_e5-2630_v4xeon_d-1622xeon_e3-1105ccore_i5-7260ucore_i7-8700bxeon_e5-2643_v3xeon_d-2145ntxeon_d-1581xeon_e5-1650_v4xeon_gold_6238xeon_e5-2630_v3xeon_w-1250pcore_i7-7800xcore_i7_1060ng7core_i5-10210ycore_i5-1140g7xeon_e5-2623_v4xeon_e3-1505lxeon_w-3275mcore_i5-9500fcore_i7-3820core_i5-10600tcore_i7-9850hexeon_e-2356gcore_i7-10700exeon_e3_1260lcore_i5-9600xeon_e3-1285_v3core_i7-4960xcore_i3-9100fcore_i5-11500bxeon_e3-1260lxeon_e3-1281_v3xeon_bronze_3106xeon_w-2102core_i5_8600tcore_i7-9750hfxeon_e3-1240l_v3atom_c3708core_i7-10700kcore_i9-10940x_x-seriesxeon_e3-1280_v6xeon_e3-1225_v3core_i7-11700kxeon_silver_4214rcore_i7-5820kxeon_e5-2697_v3core_i3-8120xeon_e5-4627_v4xeon_e-2124core_i5-7287ucore_i7-10710ucore_i7-10700kfxeon_d-1541xeon_d-2141ixeon_e3-1275_v3xeon_e3-1558lxeon_w-1250texeon_e3_1245_v5xeon_platinum_8176mxeon_e-2276mexeon_gold_5222xeon_e3-1125cxeon_e3-1245core_i3-6100hxeon_e3-1535m_v6xeon_d-1548xeon_d-1649nxeon_platinum_9221xeon_e3-1220_v5xeon_platinum_8160xeon_e3_1275_v6xeon_e5-2428l_v3core_i3-8140ucore_i7-6700hqxeon_e-2388gxeon_e5-4648_v3xeon_gold_6122xeon_silver_4123xeon_gold_6148fatom_c3338core_i9-9820xxeon_e3-1258l_v4xeon_w-2155core_i7-7500ucore_i7-8550ucore_i3-9100txeon_d-1623nxeon_w-2145core_i7-6650ucore_i7_8650ucore_i5-6210uxeon_e3-1240core_i3-7167ucore_i3-6100tcore_i7-7567uxeon_silver_4214core_i5-11260hxeon_d-2161iatom_c3858xeon_silver_4210rxeon_e3-1585l_v5core_i5-8210yxeon_e5-2670_v3xeon_gold_5218bcore_i3-7300tcore_i7-6850xeon_e3_1220_v2xeon_e3_1270_v6xeon_e3_1271_v3xeon_e5-2648l_v4xeon_e5-4620_v4xeon_d-1513nxeon_d-1537xeon_e3-1515m_v5core_i5-11500core_i5-1135g7xeon_e3-1225_v5xeon_w-1290tecore_i5-8500xeon_gold_5120txeon_w-3175xxeon_e3_1258l_v4core_i9_9900txeon_gold_6134xeon_gold_6162core_i5_8600xeon_e5-2628l_v3core_i3-6110ucore_i3-7007uxeon_w-3235core_i7-9750hcore_i7_1068ng7core_i5-6440hqxeon_e3-1235xeon_e5-4669_v3xeon_w-2225xeon_gold_6130hxeon_w-2133xeon_d-1557core_i7_8560uxeon_gold_6140mxeon_w-2223xeon_e-2276mcore_i7-8665uxeon_e3_1225_v3core_i3-8300tcore_i7-6600ucore_i7-11700fcore_i7-6950xxeon_platinum_8165xeon_e3_1225_v5xeon_e-2236core_i7-10850hcore_i3-6006uxeon_e5-1603_v4core_i3-6120core_i5-8400xeon_gold_6246xeon_e3_1265l_v2core_i7-8086kxeon_e3_1278l_v4xeon_e5-2603_v3core_i5_8600kxeon_e-2134xeon_e5-4655_v3xeon_d-2163itxeon_e3-1515mcore_i9-11900kbxeon_w-1390txeon_w-1270atom_c3538core_i7_8559uxeon_platinum_8284core_i7-10510yxeon_e5-4655_v4xeon_gold_5215lxeon_e5-2658_v4core_i5-6442eqcore_i9-7960xcore_i5-9600kcore_i7-7820xcore_i5_10110yxeon_e3-1125c_v2core_i7-7700hqxeon_w-1270texeon_e3-1245_v3core_i5-1155g7xeon_e5-2698_v3core_i7-6498duxeon_e3-1245_v5atom_c3508xeon_gold_6258rxeon_d-1571xeon_gold_6240lxeon_e5-1620_v3xeon_gold_6250core_i5-8350uxeon_d-2173itcore_i7-11700txeon_e3-1240_v2xeon_w-11855mxeon_d-2123itxeon_gold_5219yxeon_e-2246gxeon_e5-2637_v4xeon_e3-1241_v3xeon_e5-2687w_v3xeon_e5-2680_v4core_i5_9600kxeon_e3_1268l_v3xeon_gold_5218txeon_e5-2697a_v4core_i9-10900exeon_e3_1501m_v6xeon_gold_6140xeon_e5-2609_v4core_i7-7920hqxeon_platinum_8174xeon_e3-1578lcore_i7-8670txeon_e3-1578l_v5xeon_e3-1270_v5xeon_e-2334xeon_gold_6126xeon_e3-1240lcore_i9-10885hcore_i5_10310yxeon_e3-1246_v3xeon_e5-2643_v4xeon_d-1563nxeon_e5-2699a_v4xeon_e3-1265lcore_i5_9400fcore_i3-9300xeon_e3_12201_v2xeon_e-2244gxeon_e3_1280xeon_e-2176gxeon_e-2324gxeon_gold_6142fcore_i3-6320tcore_i7-8709gcore_i3-7120xeon_e3_1265l_v3core_i5_8500txeon_gold_6130xeon_e5-2650l_v4atom_c3000core_i9-9920xxeon_e-2104gcore_i5-6500tcore_i5-6260ucore_i7-8557ucore_i5-9500txeon_e3_1285_v4core_i7-8700txeon_platinum_9242core_i5-7400xeon_platinum_8280lxeon_e3-1501mcore_i5-11400fcore_i7_9700tcore_i5-6600core_i3-7320core_i7-1180g7core_i7-6700tcore_i7_9700xeon_e3-1585xeon_e3-1230_v6core_i5-1035g1xeon_gold_6230nxeon_gold_6143xeon_w-3265xeon_gold_5218nxeon_e5-2620_v4xeon_gold_6138txeon_e3-1276_v3xeon_gold_5120xeon_e-2124gcore_i7-1165g7core_i5-11600kxeon_e3-1231_v3core_i7-11390hcore_i5-1030g4xeon_e3_1276_v3core_i3-9100exeon_gold_5220xeon_e-2234core_i5-10500xeon_d-1577xeon_d-1637xeon_gold_6254xeon_gold_6269ycore_i3-6320core_i5-9400fcore_i7-9850hxeon_gold_6154core_i3-7320tcore_i5-7440eqxeon_e3-1120lxeon_w-1250xeon_e3_1105c_v2xeon_e5-2640_v4core_i5-8279uatom_c3558rccore_i5-6400tcore_i5-9300hfcore_i3-7100ucore_i3-7101texeon_e3_1230_v3core_i5-11400hxeon_w-3275core_i5-7600kxeon_d-1553nxeon_e-2126gatom_c3955xeon_silver_4209txeon_e5-4620_v3xeon_silver_4116xeon_w-1270exeon_d-1633nxeon_e3-1275core_i7-9850hlcore_i5core_i5-7360ucore_i7_8565ucore_i5-6500core_i3-7340xeon_gold_6248core_i9-11980hkcore_i5-10600kxeon_e3-1220_v6xeon_platinum_8280core_i9-10900kfxeon_e-2186mcore_i7-9700exeon_e-2176mcore_i5_9500xeon_e3-1285_v4core_i7-6820hkxeon_e3_1280_v6xeon_gold_6152core_i7-1060ng7xeon_e5-2658a_v3core_i5-10310yxeon_w-1290pxeon_e-2286gxeon_e3_1240_v6xeon_gold_6222vcore_i3-6102exeon_platinum_8176xeon_gold_6242core_i5-8260ucore_i5-6600tcore_i7-10810uxeon_e3-1575m_v5xeon_e5-2650_v4xeon_platinum_8270xeon_d-1533nxeon_gold_6242rxeon_e3-1245_v6xeon_silver_4215xeon_w-2235core_i7-8850hcore_i5-11500hcore_i5-7210uxeon_e5-2695_v4xeon_gold_5118xeon_e3_1231_v3core_i7-6820eqxeon_gold_6134mcore_i9-10900xcore_i5-8650xeon_gold_6238txeon_e3_1286l_v3xeon_silver_4214yxeon_e5-2603_v4core_i9-10980xecore_i7-3970xcore_i5-8365uexeon_w-1290xeon_platinum_8176fcore_i7-8750hfxeon_gold_6240rxeon_w-10885mcore_i9-10900tcore_i3-6100core_i5-8310ycore_i5-7640xxeon_e3_1230_v5core_i5-9500texeon_gold_6226xeon_gold_6256core_i5_8500core_i5-8650kxeon_gold_6252xeon_e5-4640_v3core_i5-6267ucore_i5-8600tcore_i5-8305gxeon_platinum_8260lxeon_e5-1428l_v3core_i7-8559uxeon_e-2146gcore_i5_9600kfxeon_d-2177ntxeon_e3-1270xeon_w-2175Intel BSSA DFTrs
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2017-5683
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.61%
||
7 Day CHG~0.00%
Published-04 Apr, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Privilege escalation in IntelHAXM.sys driver in the Intel Hardware Accelerated Execution Manager before version 6.0.6 allows a local user to gain system level access.

Action-Not Available
Vendor-Intel Corporation
Product-hardware_accelerated_execution_managerIntel Hardware Accelerated Execution Manager
CVE-2017-5727
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.69%
||
7 Day CHG~0.00%
Published-02 Feb, 2018 | 15:00
Updated-17 Sep, 2024 | 02:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pointer dereference in subsystem in Intel Graphics Driver 15.40.x.x, 15.45.x.x, 15.46.x.x allows unprivileged user to elevate privileges via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel Graphics Driver
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2017-5706
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.13% / 33.55%
||
7 Day CHG~0.00%
Published-21 Nov, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in kernel in Intel Server Platform Services Firmware 4.0 allow attacker with local access to the system to execute arbitrary code.

Action-Not Available
Vendor-Intel Corporation
Product-server_platform_services_firmwareServer Platform Services
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-5174
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 15.67%
||
7 Day CHG~0.00%
Published-15 Sep, 2012 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) in Intel Q67 Express, C202, C204, C206 Chipsets, and Mobile Intel QM67, and QS67 Chipset before 2nd_gen_i5_i7_SINIT_51.BIN Express; Intel Q57, 3450 Chipsets and Mobile Intel QM57 and QS57 Express Chipset before i5_i7_DUAL_SINIT_51.BIN and i7_QUAD_SINIT_51.BIN; Mobile Intel GM45, GS45, and PM45 Express Chipset before GM45_GS45_PM45_SINIT_51.BIN; Intel Q35 Express Chipsets before Q35_SINIT_51.BIN; and Intel 5520, 5500, X58, and 7500 Chipsets before SINIT ACM 1.1 allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors.

Action-Not Available
Vendor-n/aIntel Corporation
Product-7500_chipsetc206_chipsetmobile_intel_gm45_chipset3450_chipsetmobile_intel_qm57_chipsetx58_chipsetmobile_intel_qs67_chipsetmobile_intel_qm67_chipset5520_chipsetq35_express_chipsetmobile_intel_pm45_express_chipset5500_chipsetsinit_authenticated_code_modulec204_chipsetmobile_intel_qs57_express_chipsetc202_chipsetq67_express_chipsetq57_chipsetmobile_intel_qs57_chipsetmobile_intel_gs45_chipsetn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-42099
Matching Score-8
Assigner-Zero Day Initiative
ShareView Details
Matching Score-8
Assigner-Zero Day Initiative
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.60%
||
7 Day CHG~0.00%
Published-03 May, 2024 | 02:13
Updated-12 Aug, 2025 | 19:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability

Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver & Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21846.

Action-Not Available
Vendor-Intel Corporation
Product-driver_\&_support_assistantDriver & Support Assistantdriver\&support_assistant
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2022-0004
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.12% / 31.56%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Hardware debug modes and processor INIT setting that allow override of locks for some Intel(R) Processors in Intel(R) Boot Guard and Intel(R) TXT may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-celeron_j3355_firmwareceleron_n2815core_i7-8670t_firmwarepentium_gold_g5500tceleron_j4115core_i5-10610u_firmwarecore_i3-10100core_i9-10910_firmwarecore_i7-8850h_firmwarecore_i5-11400xeon_d-2733nt_firmwarecore_i7-10510yceleron_j4125core_i7-10710u_firmwareceleron_n3010_firmwarecore_i5-11500bcore_i9-11900_firmwarexeon_d-2173it_firmwarexeon_d-2145nt_firmwareceleron_n4120core_i9-10900_firmwarepentium_gold_g4560atom_p5942b_firmwarecore_i5-8500t_firmwarecore_i5-11260hcore_i7-8709g_firmwarepentium_gold_g6605c627pentium_gold_g6405u_firmwarepentium_gold_g5400tcore_i7-10875h_firmwarexeon_d-2163it_firmwarec627apentium_gold_4415u_firmwarecore_i7-8709gpentium_gold_g6505xeon_d-2177ntpentium_gold_g5600_firmwarecore_i9-11900kfcore_i5-10600t_firmwarexeon_d-2786nte_firmwarecore_i3-l13g4core_i7-11700k_firmwarecore_i5-10300h_firmwarepentium_gold_g6400xeon_d-2775te_firmwarecore_i9-10900tpentium_gold_g5400_firmwarecore_i5-8200ycore_i7-10700tecore_i9-10900kcore_i5-10600_firmwarecore_i5-10500t_firmwareatom_x6425repentium_gold_g4620_firmwarepentium_silver_j5040_firmwarecore_i7-8809g_firmwarec246_firmwarecore_i5-8260uxeon_d2700core_i7-12700kfcore_i9-12900_firmwarecore_i5-11400fcore_i5-12600h_firmwarecore_i5-10400txeon_d-2796teceleron_6600hec246c628_firmwarecore_i9-10900xcore_i5-12400fceleron_n3350ecore_i9-11980hk_firmwarecore_i3-8000txeon_d-2142itcore_i5-8305g_firmwareceleron_j4005_firmwarecore_i5-10110y_firmwarecore_i3-8100b_firmwarecore_i5-8650k_firmwarecore_i5-8700bcore_i9-10900te_firmwarec232c624_firmwarecore_i9-11900kcore_i5-10500hcore_i9-11900kb_firmwarecore_i9-12900hkcore_i3-8300t_firmwarecore_i5-12450hcore_i5-10600kfcore_i7-10700_firmwareceleron_n2840_firmwareatom_x6413e_firmwarepentium_gold_g6600_firmwareceleron_j3060c626core_i9-10850hxeon_d-2752nte_firmwarexeon_d-2796nt_firmwarecore_i5-11500he_firmwarecore_i5-8210y_firmwarecore_i3-10100ec236pentium_gold_g5420tcore_i9-12900hxcore_i5-11320h_firmwarecore_i7-10700kf_firmwarecore_i9-12900core_i7-12650h_firmwarepentium_gold_g6400te_firmwareatom_x6413ecore_i5-12500core_i5-11600kfcore_i7-8550u_firmwarec624acore_i5-8365uxeon_d-2799core_i7-12700xeon_d-2145ntc422celeron_j4105_firmwarecore_i7-12700t_firmwarecore_i5-8600_firmwarecore_i3-8100_firmwarecore_i5-8269uceleron_n2806_firmwarec621core_i3-11100he_firmwareatom_p5931b_firmwarepentium_gold_g7400xeon_d-2163itceleron_n4020c_firmwarepentium_gold_4417u_firmwarecore_i5-12500h_firmwarecore_i5-11400hcore_i9-11900hceleron_j3160_firmwarecore_i7-8665ue_firmwarecore_i3-12100tcore_i7-10810ucore_i3-10300tcore_i3-8100core_i3-8145uepentium_gold_4425ypentium_gold_g5500_firmwarepentium_gold_g5500t_firmwareceleron_j4025_firmwarecore_i9-11900pentium_gold_g4620core_i5-8265ucore_i7-10700tcore_i7-12700kf_firmwareatom_p5921bcore_i5-8650core_i3-12100f_firmwarepentium_gold_6500ycore_i5-10500ecore_i7-10750hcore_i9-10850kpentium_gold_g6405core_i5-8500bxeon_d-2143itxeon_d-2753ntcore_i5-8250u_firmwareceleron_n2840pentium_gold_g7400texeon_w-1390_firmwarecore_i3-8100hcore_i5-8400b_firmwarecore_i7-8706gceleron_n2810pentium_gold_g6400tcore_i7-11850h_firmwarecore_i7-12850hxceleron_j4115_firmwarecore_i3-8120core_i9-11900fxeon_d-2177nt_firmwareatom_x7-e3950_firmwarecore_i5-8365u_firmwarec242core_i9-10920xcore_i9-11950hceleron_n3450_firmwarexeon_w-1300_firmwarecore_i5-12450hxcore_i9-10885hcore_i5-10310ucore_i3-8130u_firmwareceleron_n4500core_i7-8557uceleron_n2910_firmwarecore_i5-11400_firmwarecore_i7-11850hecore_i3-8350k_firmwareceleron_6305celeron_n5105_firmwarepentium_gold_g6605_firmwarecore_i7-10750h_firmwarexeon_d-2142it_firmwarecore_i7-8557u_firmwarexeon_d-2779_firmwareceleron_j4025core_i9-10980hkxeon_d-2733ntcore_i7-12650hxceleron_n2808_firmwarecore_i7-10700k_firmwarecore_i9-10900t_firmwarepentium_gold_g6505_firmwarecore_i5-11400f_firmwarecore_i3-10305_firmwareceleron_n4100celeron_n3520core_i3-10325_firmwarecore_i7-10510y_firmwarecore_i9-11900k_firmwarecore_i7-11700b_firmwarecore_i7-11800h_firmwareceleron_6600he_firmwarexeon_d-2795ntceleron_4305ue_firmwarecore_i7-8500yxeon_d-2779core_i9-11900t_firmwarepentium_silver_n5030_firmwarepentium_silver_j5040celeron_j3060_firmwareceleron_n6211xeon_w-1370pentium_gold_6500y_firmwarecore_i5-8600tcore_i7-8510y_firmwarepentium_gold_g5420_firmwarecore_i5-12600tpentium_gold_g6405t_firmwareceleron_n6210_firmwarecore_i3-10320_firmwarecore_i5-12400xeon_w-1370pcore_i3-10320core_i3-8121uc625_firmwarecore_i5-8420t_firmwarexeon_d-2752ntecore_i3-12300t_firmwarepentium_gold_g5400core_i3-10105fceleron_n3700celeron_n5095_firmwarexeon_w-1390t_firmwareatom_x5-e3940core_i7-10875hceleron_n3060_firmwarecore_i3-8121u_firmwarecore_i3-11100hecore_i5-10400hceleron_n4000c_firmwarepentium_gold_7505core_i7-12700kxeon_d-2712t_firmwarecore_i5-10505_firmwareceleron_n3050_firmwarecore_i5-12600_firmwareceleron_n2810_firmwarepentium_gold_g6500_firmwarepentium_gold_g4600_firmwarepentium_gold_g5620_firmwareceleron_j3455_firmwarecore_i5-10110ycore_i5-12600hcore_i9-11900kf_firmwarecore_i7-8500y_firmwarecore_i7-12700hc627a_firmwareatom_p5962b_firmwarecore_i3-10105tcore_i5-11300hcore_i7-10510u_firmwarecore_i3-8100h_firmwarecore_i3-10105t_firmwarepentium_silver_n6000core_i5-10400h_firmwarecore_i9-12900kf_firmwarecore_i9-10900kfcore_i7-11390h_firmwarecore_i3-10100tpentium_gold_g6600xeon_d-2146ntceleron_n2805_firmwarecore_i5-8300h_firmwarexeon_d-2752terceleron_j4125_firmwarecore_i5-8279u_firmwarecore_i5-11500hecore_i5-8500b_firmwarecore_i5-12500hc622xeon_w-1390tcore_i7-12700k_firmwarecore_i7-11700kfpentium_gold_g5420xeon_d2700_firmwarecore_i7-11700_firmwarecore_i7-8706g__firmwarexeon_d-2795nt_firmwarecore_i7-11375hcore_i7-8559ucore_i9-10850h_firmwarecore_i5-8550_firmwarecore_i5-11500tpentium_gold_g7400_firmwareceleron_n3010core_i9-12900h_firmwarecore_i5-8700b_firmwarecore_i7-8670_firmwarecore_i7-8560ucore_i7-11600h_firmwarecore_i5-11400h_firmwarepentium_gold_g5600core_i3-10325core_i5-8500_firmwarecore_i7-8700core_i5-8400atom_x6200fe_firmwareceleron_n5100core_i3-10105f_firmwareceleron_n3000_firmwarecore_i5-12600xeon_d-2752ter_firmwareceleron_n2805core_i5-12600k_firmwarecore_i5-8650kcore_i3-10110u_firmwarexeon_w-1350core_i9-10980xecore_i7-8750hfceleron_n4505_firmwarecore_i7-11850hceleron_n2808core_i9-11900f_firmwarecore_i5-8310y_firmwarecore_i3-10110ucore_i7-8665u_firmwareceleron_n3060core_i9-10885h_firmwarecore_i7-8086k_firmwarepentium_gold_g7400te_firmwareceleron_n4500_firmwarecore_i3-10100y_firmwareceleron_n6211_firmwarecore_i5-11500_firmwarecore_i7-8569u_firmwareceleron_4305ucore_i5-12600hx_firmwarepentium_gold_6405ucore_i5-8420_firmwarexeon_w-1350pc629a_firmwarexeon_d-2143it_firmwarecore_i9-10900celeron_n5100_firmwarecore_i9-12900hatom_x6212re_firmwareatom_x5-e3930c627_firmwareatom_x6211ex299_firmwarecore_i7-11800hcore_i7-11370h_firmwarecore_i7-11375h_firmwarecore_i3-10300core_i3-8100t_firmwarepentium_gold_4417ucore_i5-10310u_firmwarecore_i7-8565ucore_i7-8670core_i9-10940x_firmwarecore_i5-8400_firmwarecore_i5-11500h_firmwarecore_i7-8510ycore_i7-10870hcore_i7-10510ucore_i3-10100fpentium_gold_4425y_firmwarepentium_gold_g5500celeron_n2940core_i5-12500tcore_i5-8310ycore_i9-12900tcore_i3-10300_firmwarecore_i5-10500h_firmwareceleron_6305_firmwarexeon_d-2183it_firmwarecore_i5-12600t_firmwareatom_x6200fecore_i5-12400_firmwarec236_firmwarecore_i3-8000t_firmwarecore_i5-8265u_firmwarecore_i3-8000_firmwarecore_i5-10210uceleron_n3000pentium_gold_g4600pentium_gold_g5400t_firmwarecore_i5-10500core_i5-11300h_firmwarecore_i5-8400bpentium_gold_g6405tcore_i7-12800h_firmwarecore_i7-8850hcore_i9-8950hk_firmwareceleron_n2930celeron_n2830core_i5-8400h_firmwarecore_i5-11600_firmwarecore_i5-10400t_firmwarecore_i7-12650hceleron_n4020_firmwarecore_i3-10100_firmwareceleron_4205u_firmwarecore_i5-11600kcore_i9-10900tecore_i9-8950hkcore_i3-10100ycore_i5-10600tcore_i5-10600kf_firmwareceleron_n3150_firmwarecore_i9-10900e_firmwareceleron_n4505c625celeron_n3520_firmwarexeon_d-2191_firmwarec621apentium_gold_g6505txeon_d-2146nt_firmwarecore_i9-10910core_i9-12900k_firmwarepentium_gold_g6500tcore_i7-10700f_firmwarecore_i3-10100t_firmwarepentium_gold_4415y_firmwarecore_i5-8269u_firmwarecore_i3-10105celeron_n6210celeron_j3455ecore_i3-12300_firmwarecore_i5-11400tceleron_n4020pentium_gold_6405u_firmwarecore_i7-11700kcore_i9-10900kf_firmwarecore_i7-8550ucore_i7-10810u_firmwarexeon_w-1350_firmwarecore_i9-10920x_firmwarecore_i9-10940xceleron_n2920_firmwarec629acore_i3-8300pentium_gold_g6400t_firmwarecore_i7-10700kfceleron_j4105core_i7-12850hx_firmwarecore_i5-8260u_firmwarecore_i5-8400tcore_i9-12900t_firmwarecore_i3-l13g4_firmwarecore_i5-12400t_firmwarecore_i7-12800hx_firmwarexeon_d-2187ntxeon_d-2775teceleron_4305u_firmwareceleron_n4100_firmwarecore_i5-11600kf_firmwarexeon_w-1370p_firmwarepentium_gold_4410y_firmwarepentium_gold_g7400tcore_i9-11900kbpentium_gold_7505_firmwarecore_i5-8257u_firmwarecore_i9-11900h_firmwarecore_i7-8700b_firmwareceleron_j3355eceleron_n2815_firmwareceleron_n4504core_i3-11100b_firmwarecore_i3-10305t_firmwarecore_i7-8706g_firmwarecore_i5-12400tcore_i7-12700tcore_i9-10850k_firmwarecore_i5-8365ue_firmwareceleron_n2910atom_x5-e3930_firmwarecore_i7-11600hcore_i7-10700core_i9-11950h_firmwarexeon_d-2753nt_firmwareceleron_n2940_firmwarexeon_w-1350p_firmwarecore_i5-10500e_firmwarepentium_gold_4410yc420_firmwarecore_i5-11600k_firmwareceleron_j3355core_i3-8145u_firmwarecore_i5-8600k_firmwarecore_i5-10400core_i3-8145uxeon_d-2173itceleron_j3355e_firmwarexeon_d-2161ixeon_d-2766ntcore_i7-8700kcore_i7-10870h_firmwarexeon_d-2123itcore_i7-11700kf_firmwarepentium_gold_g6405_firmwarecore_i5-8420tcore_i3-8109ucore_i5-8365uecore_i7-12650hx_firmwareceleron_j3455core_i9-12900hk_firmwarecore_i7-12700fcore_i3-12100fcore_i3-11100bpentium_silver_n6000_firmwareceleron_n3160xeon_d-2776ntcore_i5-8200y_firmwareceleron_n3160_firmwarec624a_firmwarecore_i7-10700te_firmwarecore_i7-10700eceleron_n2830_firmwarecore_i5-8350uatom_x6425e_firmwarepentium_gold_g7400exeon_d-2161i_firmwarecore_i7-8750h_firmwarecore_i3-10100teceleron_n4000_firmwareceleron_n2807pentium_gold_g5420t_firmwarecore_i5-10210u_firmwarecore_i7-11390hcore_i3-8140u_firmwarexeon_d-2786ntecore_i9-12900hx_firmwarexeon_d-2796te_firmwarexeon_d-2191pentium_silver_a1030_firmwarecore_i3-10100te_firmwarecore_i9-12900fcore_i5-10600k_firmwarepentium_gold_g5600tcore_i9-10900ecore_i5-8259u_firmwarecore_i5-10610uc624core_i3-10110y_firmwarecore_i5-8250ucore_i9-11980hkcore_i5-8600pentium_gold_g7400e_firmwarepentium_silver_n6005atom_p5931bcore_i5-l16g7_firmwarecore_i5-10500tecore_i7-12700f_firmwarecore_i7-12700_firmwarecore_i7-8559u_firmwarecore_i5-10210y_firmwarecore_i5-11500core_i3-8000core_i7-8700k_firmwareceleron_n4000ccore_i7-11700pentium_gold_g6400exeon_d-2798ntcore_i7-12800hxcore_i7-8700bcore_i5-10500tcore_i5-10600core_i5-10500_firmwareatom_x6425re_firmwarecore_i5-10310ycore_i3-12300core_i5-10310y_firmwarexeon_d-2738core_i5-12450hx_firmwarepentium_gold_g6500t_firmwarecore_i5-8259ucore_i5-11500t_firmwarepentium_gold_g6405ucore_i7-10700katom_x7-e3950pentium_gold_g5600t_firmwarecore_i3-12300tpentium_silver_a1030core_i3-8109u_firmwarecore_i5-12450h_firmwarecore_i5-11600t_firmwarecore_i7-8705g_firmwarecore_i7-11370hxeon_w-1300core_i7-8665uecore_i5-12500_firmwarecore_i3-8130ucore_i3-8300tcore_i5-11500hcore_i9-12900kcore_i5-l16g7core_i9-12950hx_firmwarecore_i5-11600tcore_i7-8650ucore_i5-10200hpentium_gold_g5620pentium_silver_n5030core_i7-8705gceleron_n2920c621a_firmwareceleron_n4000core_i5-10400fcore_i5-12600kfpentium_gold_g6400_firmwarecore_i3-12100t_firmwarecore_i9-12950hxcore_i7-8706g_core_i9-12900kfcore_i3-8145ue_firmwarecore_i5-8400t_firmwarepentium_silver_n5000_firmwarecore_i5-8400hceleron_n3150celeron_j4005atom_x5-e3940_firmwarepentium_silver_n5000core_i7-11850he_firmwarexeon_d-2141ipentium_gold_4415uceleron_6305e_firmwarexeon_d-2141i_firmwareatom_x6211e_firmwarecore_i3-10110yc422_firmwarepentium_gold_5405uxeon_d-2776nt_firmwareatom_p5921b_firmwareceleron_n3350core_i5-8305gatom_p5962bxeon_w-1390core_i7-11700t_firmwareceleron_n2820celeron_n2820_firmwarecore_i5-11600core_i7-11700fcore_i7-8750hatom_x6212recore_i7-8665uceleron_n5105core_i3-10305tcore_i3-10100e_firmwarexeon_d-2183itceleron_n2807_firmwarexeon_d-2123it_firmwarecore_i5-12500t_firmwarecore_i5-8300hxeon_w-1370_firmwarexeon_d-2712tceleron_n2806core_i5-8420pentium_silver_n6005_firmwarecore_i3-8140uceleron_n3350_firmwarecore_i3-8350kcore_i5-10600kcore_i7-8086kcore_i9-12900f_firmwarec628core_i7-10850hcore_i3-8120_firmwarecore_i3-12100_firmwarecore_i7-8560u_firmwarecore_i5-12600kf_firmwareatom_x6425ecore_i5-10500te_firmwarecore_i3-8020_firmwarecore_i3-10300t_firmwarex299xeon_d-2187nt_firmwarecore_i5-11500b_firmwarecore_i3-8100bxeon_w-1390p_firmwarecore_i5-8550core_i5-8279ucore_i9-10900f_firmwarecore_i5-12600hxcore_i3-10100f_firmwareatom_p5942bcore_i5-8600kcore_i7-12700h_firmwarecore_i7-8700tc242_firmwarexeon_d-2799_firmwarecore_i7-11700tceleron_n5095celeron_n2930_firmwarec232_firmwarecore_i7-8700t_firmwarecore_i7-10700e_firmwarec621_firmwarecore_i5-8600t_firmwarepentium_gold_g7400t_firmwarecore_i5-8500core_i9-11900tcore_i5-11260h_firmwarecore_i5-8210ycore_i5-10400f_firmwareceleron_n4120_firmwarepentium_silver_j5005_firmwarecore_i7-8565u_firmwarecore_i9-10980xe_firmwareatom_x6427fepentium_gold_5405u_firmwarecore_i5-8257ucore_i7-8569ucore_i5-11400t_firmwarecore_i7-10700t_firmwareceleron_4205upentium_gold_g4560_firmwarexeon_d-2796ntceleron_6305eceleron_n3350e_firmwareatom_x6427fe_firmwarecore_i5-8500tcore_i7-8809gcore_i3-10105_firmwarecore_i5-11320hcore_i7-8650u_firmwareceleron_n3700_firmwarecore_i7-11700bcore_i7-10850h_firmwarexeon_d-2766nt_firmwarecore_i3-10305xeon_d-2166ntcore_i7-8700_firmwarepentium_gold_4415yxeon_w-1390pcore_i3-8300_firmwarecore_i5-10505core_i5-8650_firmwarec629c626_firmwarecore_i3-12100core_i9-10900x_firmwarecore_i7-10710uc622_firmwarec420celeron_j3160core_i5-10300hcore_i5-10210ycore_i5-8350u_firmwarecore_i3-8020celeron_n4504_firmwarepentium_gold_g6500core_i5-12400f_firmwarecore_i7-11700f_firmwarecore_i9-10900fceleron_n4020cceleron_j3455e_firmwareceleron_n3450core_i5-10200h_firmwarecore_i3-8100txeon_d-2798nt_firmwarecore_i9-10980hk_firmwarecore_i5-12600kcore_i7-8670tpentium_gold_g6400texeon_d-2166nt_firmwarecore_i5-10400_firmwarecore_i7-12800hceleron_n3050c629_firmwarepentium_gold_g6400e_firmwarepentium_gold_g6505t_firmwarecore_i7-10700fcore_i9-10900k_firmwarecore_i7-8750hf_firmwareceleron_4305uexeon_d-2738_firmwarepentium_silver_j5005Intel(R) Processors in Intel(R) Boot Guard and Intel(R) TXT
CVE-2018-12203
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.18% / 39.81%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Denial of service vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel Core Processor, 7th Generation Intel Core Processor may allow privileged user to potentially execute arbitrary code via local access.

Action-Not Available
Vendor-Intel Corporation
Product-core_i5platform_sample_firmwaresilicon_reference_firmwarecore_i7core_i3Intel Platform Sample / Silicon Reference firmware
CVE-2021-33093
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.38%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 18:49
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure inherited permissions in the installer for the Intel(R) NUC M15 Laptop Kit Serial IO driver pack before version 30.100.2104.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_m15_laptop_kit_lapbc710nuc_m15_laptop_kit_lapbc510nuc_m15_laptop_kit_serial_io_driver_packIntel(R) NUC M15 Laptop Kit Serial IO driver pack
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2021-33124
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 15.61%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1565l_v5xeon_e-2286gcore_i7-7700t_firmwarecore_i3-10100core_i7-8850h_firmwarecore_i5-1038ng7xeon_e5-2603_v4_firmwarecore_i9-7900xxeon_d-2733nt_firmwarecore_i7-10710u_firmwarexeon_e-2174g_firmwarexeon_d-1633nxeon_w-1270p_firmwarexeon_d-2173it_firmwarexeon_d-2145nt_firmwarexeon_e-2246gxeon_e5-2637_v4core_i9-9960xxeon_w-2123xeon_platinum_8353hcore_i7-9700k_firmwarecore_i5-8500t_firmwarexeon_d-1749nt_firmwarecore_i3-9300t_firmwarexeon_e-2236xeon_platinum_8280_firmwarexeon_e3-1220_v5_firmwarexeon_e-2374g_firmwarexeon_e5-4640_v4xeon_w-1270exeon_silver_4209t_firmwarecore_i5-7500xeon_e5-2650_v4_firmwarecore_i9-9900kf_firmwarecore_i5-7440hqcore_i7-8709gxeon_d-2786nte_firmwarexeon_gold_6230txeon_silver_4210rxeon_w-1270xeon_e3-1505l_v6xeon_e-2254me_firmwarexeon_e5-4650_v4core_i5-8200ycore_i5-10500t_firmwarecore_i5-9400t_firmwarecore_i7-8809g_firmwarecore_i5-8260uxeon_gold_6226r_firmwarexeon_e3-1235l_v5core_i5-7287u_firmwarecore_i9-10900xxeon_gold_6256_firmwarexeon_w-3335xeon_e7-8891_v4_firmwarexeon_w-11555mrecore_i5-10500hcore_i7-6800k_firmwarecore_i5-10600kfxeon_e5-2648l_v4core_i5-1035g1_firmwarexeon_w-2123_firmwarexeon_e-2146gxeon_d-2752nte_firmwarecore_i5-8210y_firmwarecore_i3-10100exeon_silver_4316_firmwarexeon_w-3365_firmwarecore_i7-10700kf_firmwarexeon_e-2286g_firmwarecore_i7-9700txeon_gold_6238core_i5-7600tcore_i7-4820kxeon_e3-1260l_v5_firmwarexeon_w-2195_firmwarexeon_e3-1240l_v5xeon_platinum_8256xeon_w-2275_firmwarexeon_e-2276mxeon_d-2163itcore_i7-3930kxeon_gold_6334_firmwarexeon_e3-1505m_v5xeon_w-2235_firmwarexeon_gold_6328hlxeon_d-1623nxeon_e3-1535m_v6_firmwarexeon_gold_6230n_firmwarecore_i7-10810ucore_i3-10300txeon_e5-2628l_v4core_i3-8100xeon_e-2378g_firmwarecore_i5-9600kxeon_e5-2658_v4xeon_gold_5218r_firmwarecore_i3-7100xeon_e5-1630_v4_firmwarecore_i7-7600u_firmwarecore_i7-9700kf_firmwarecore_i5-9300hcore_i5-10500exeon_silver_4214y_firmwarecore_i9-10850kcore_i5-8500bcore_i3-7100e_firmwarexeon_d-2143itxeon_silver_4209txeon_e-2226gexeon_platinum_8368q_firmwarecore_i5-8250u_firmwarecore_i7-7820hk_firmwarexeon_w-1390_firmwarexeon_gold_6212uxeon_w-2175_firmwarecore_i3-8100hcore_i3-7300t_firmwarexeon_e5-2695_v4core_i7-9700f_firmwarexeon_d-2177nt_firmwarecore_i7-3930k_firmwarexeon_e3-1270_v5_firmwarecore_i9-10920xxeon_d-1712tr_firmwarecore_i3-8130u_firmwarecore_i5-10310ucore_i7-6950x_firmwarexeon_e7-8860_v4_firmwarecore_i7-8557ucore_i3-8350k_firmwarexeon_e5-2683_v4core_i9-9820x_firmwarexeon_d-2779_firmwarecore_i5-1030g7xeon_d-1602_firmwarexeon_platinum_8376hl_firmwarecore_i9-10980hkxeon_d-2733ntxeon_w-11155mlexeon_d-1559_firmwarecore_i7-10700k_firmwarexeon_gold_5320tcore_i3-10305_firmwarecore_i3-7100u_firmwarexeon_e-2274gcore_i3-10325_firmwarexeon_e5-2630l_v4core_i7-10510y_firmwarexeon_e7-8893_v4core_i7-1060g7_firmwarecore_i7-8500yxeon_w-3323xeon_gold_6330h_firmwarexeon_platinum_8276_firmwarecore_i7-1068ng7_firmwarecore_i5-7400_firmwarexeon_w-2133_firmwarecore_i5-9600xeon_w-3375core_i5-8600tcore_i5-7200u_firmwarexeon_e3-1585_v5_firmwarexeon_gold_6258r_firmwarecore_i3-10320_firmwarexeon_gold_5218bxeon_platinum_8360hl_firmwarexeon_gold_6328hxeon_d-1734nt_firmwarexeon_e-2288gxeon_w-1370pcore_i7-7500uxeon_e-2274g_firmwarexeon_gold_5318s_firmwarexeon_e3-1225_v6xeon_e3-1280_v6xeon_gold_5218rxeon_d-2752ntexeon_e-2124g_firmwarexeon_e5-2695_v4_firmwarexeon_w-2235xeon_e5-2608l_v4_firmwarexeon_w-3175xxeon_platinum_8362_firmwarexeon_w-3225core_i3-7101texeon_e5-2609_v4core_i7-7700xeon_d-1540xeon_gold_6246r_firmwarexeon_gold_6246rcore_i5-7300hqxeon_d-1513ncore_i5-10505_firmwarexeon_e5-2643_v4_firmwarexeon_e3-1505m_v6xeon_e7-8860_v4xeon_e5-2690_v4core_i9-9900xcore_i9-9900t_firmwarexeon_e5-2699a_v4_firmwarecore_i5-9600_firmwarexeon_e3-1505m_v6_firmwarecore_i7-9700exeon_e-2254mexeon_platinum_8260l_firmwarecore_i7-8500y_firmwarexeon_d-1748te_firmwarexeon_e5-4667_v4_firmwarexeon_e5-2618l_v4xeon_w-3235_firmwarexeon_platinum_9222xeon_gold_5318ncore_i3-10105tcore_i3-8100h_firmwarecore_i7-10510u_firmwarexeon_platinum_8358_firmwarecore_i7-7700_firmwarecore_i3-1000g4core_i3-7100t_firmwarecore_i9-10900kfcore_i3-9100hlcore_i9-9980hk_firmwarexeon_e-2144gxeon_gold_6314ucore_i5-8300h_firmwarexeon_e3-1270_v6_firmwarexeon_d-2752tercore_i5-8279u_firmwarecore_i5-8500b_firmwarexeon_w-11555mlexeon_w-1390txeon_silver_4216xeon_e5-2640_v4xeon_e5-2697a_v4_firmwarexeon_platinum_8362core_i7-10610uxeon_platinum_8276lxeon_platinum_8351n_firmwarecore_i7-7740xxeon_e5-2637_v4_firmwarecore_i7-7y75xeon_d-1713nte_firmwarexeon_e3-1575m_v5xeon_e-2124gxeon_platinum_9221_firmwarecore_i7-4930kcore_i5-9400core_i5-8500_firmwarexeon_d-1557xeon_e5-2623_v4core_i3-10105f_firmwarexeon_w-3245mxeon_d-2752ter_firmwarexeon_d-1637_firmwarexeon_gold_5318sxeon_w-11555mle_firmwarecore_i5-7300hq_firmwarexeon_w-1350core_i5-1035g1xeon_w-3345_firmwarexeon_w-1290xeon_e-2314_firmwarecore_i3-10110ucore_i7-8665u_firmwarecore_i7-8086k_firmwarexeon_w-2223_firmwarexeon_d-1718t_firmwarexeon_gold_6234core_i3-10100y_firmwarecore_i7-7567u_firmwarecore_i3-9100e_firmwarecore_i5-7442eq_firmwarexeon_gold_6252n_firmwarecore_i7-4930mxcore_i9-10900xeon_e3-1230_v6_firmwarexeon_w-1250core_i7-1065g7_firmwarexeon_e3-1565l_v5_firmwarecore_i5-7360uxeon_e3-1275_v6xeon_e5-1660_v4xeon_e5-4628l_v4_firmwarexeon_e5-1680_v4core_i5-7300uxeon_e5-2698_v4_firmwarexeon_e5-2618l_v4_firmwarexeon_e5-2623_v4_firmwarexeon_e3-1230_v5_firmwarexeon_d-1736ntcore_i3-7100h_firmwarecore_i7-8565uxeon_e3-1578l_v5core_i9-10940x_firmwarexeon_d-1747ntexeon_bronze_3206r_firmwarecore_i7-7700kxeon_w-3323_firmwarecore_i3-10100fcore_i9-9900_firmwarexeon_gold_5217core_i7-6850kcore_i7-9750hf_firmwarexeon_gold_6210ucore_i5-7200uxeon_d-1548_firmwarecore_i7-9700fcore_i5-8265u_firmwarexeon_platinum_8352s_firmwarexeon_platinum_8380h_firmwarecore_i5-10210ucore_i3-7300_firmwarecore_i7-7740x_firmwarexeon_w-11155mre_firmwarecore_i5-8400bcore_i3-7100hxeon_gold_5215core_i5-10400t_firmwarecore_i9-9900ksxeon_d-1531_firmwarexeon_d-1527_firmwarecore_i9-7920xxeon_d-1633n_firmwarexeon_platinum_8352vcore_i9-7960x_firmwarexeon_e3-1230_v6xeon_d-1513n_firmwarecore_i9-8950hkxeon_e7-4809_v4_firmwarexeon_platinum_8360ycore_i5-10600tcore_i5-10600kf_firmwarexeon_d-1747nte_firmwarecore_i5-7640xxeon_w-3275mcore_i5-9500te_firmwarecore_i7-7700k_firmwarexeon_w-1290_firmwarexeon_e-2386g_firmwarexeon_d-1726_firmwarexeon_gold_6336yxeon_gold_6209ucore_i9-10900e_firmwarexeon_gold_6250lxeon_e-2176m_firmwarexeon_e-2278g_firmwarexeon_e3-1240_v6core_i9-9920xxeon_e3-1230_v5xeon_d-2146nt_firmwarexeon_e3-1240_v5_firmwarecore_i7-7660uxeon_e3-1275_v5_firmwarexeon_e-2278gel_firmwarexeon_d-1518_firmwarexeon_platinum_8376h_firmwarecore_i7-7700hqxeon_e-2236_firmwarexeon_e-2244g_firmwarecore_i7-6900k_firmwarexeon_e5-2660_v4xeon_d-1715ter_firmwarexeon_gold_6238l_firmwarecore_m3-7y30core_i5-8269u_firmwarexeon_w-11155mrexeon_gold_6252xeon_w-2135xeon_e3-1505l_v6_firmwarexeon_e3-1285_v6xeon_e5-4627_v4xeon_e-2276mlxeon_e3-1225_v5_firmwarexeon_silver_4214rxeon_e3-1245_v6_firmwarecore_i9-10920x_firmwarecore_i3-7101e_firmwarecore_i9-9880h_firmwarexeon_silver_4210r_firmwarecore_i7-5820k_firmwarecore_i3-8300xeon_e3-1545m_v5core_i3-7102e_firmwarexeon_e3-1515m_v5_firmwarexeon_e-2334_firmwarexeon_gold_6230rxeon_gold_6346_firmwarexeon_e-2276me_firmwarecore_i5-8400txeon_d-2775texeon_w-1370p_firmwarecore_i7-1065g7core_i7-9800xxeon_silver_4208xeon_e-2136_firmwarexeon_w-1270_firmwarexeon_gold_6210u_firmwarexeon_w-1250ecore_i5-8257u_firmwarecore_i5-1038ng7_firmwarecore_i5-9400f_firmwarecore_i7-8706g_firmwarexeon_gold_5215lcore_i5-7287uxeon_e5-4660_v4xeon_e-2146g_firmwarecore_i7-3970xcore_i7-3960xxeon_gold_6330n_firmwarexeon_platinum_8253_firmwarexeon_e-2126g_firmwarecore_i5-9600t_firmwarexeon_d-2753nt_firmwarexeon_w-1350p_firmwarecore_i7-10610u_firmwarecore_i5-10500e_firmwarexeon_d-1529_firmwarexeon_gold_6240lxeon_w-3265mxeon_gold_6248xeon_e5-4640_v4_firmwarexeon_d-1712trxeon_e-2378_firmwarexeon_gold_6240l_firmwarexeon_d-1736_firmwarecore_i3-8145ucore_i3-9300xeon_d-2173itxeon_d-2766ntcore_i7-7567ucore_i7-10870h_firmwarecore_i3-9300tcore_i7-7820hqcore_i7-7820eqcore_i7-9700kxeon_gold_6252_firmwarexeon_e5-2650_v4xeon_d-2776ntcore_i7-3820xeon_e7-4820_v4_firmwarexeon_e-2144g_firmwarecore_i7-10700te_firmwarecore_i7-10700ecore_i3-7320xeon_e3-1585l_v5core_i7-3940xmxeon_gold_6348h_firmwarexeon_e-2388gcore_i7-9700te_firmwarexeon_platinum_8268xeon_d-2786ntexeon_e-2226gxeon_gold_6240rcore_i3-10100te_firmwarexeon_gold_6238_firmwarexeon_silver_4215rxeon_e-2278gcore_i9-10900ecore_i3-9100core_i5-8600core_i5-8250uxeon_platinum_8380xeon_w-3265core_m3-8100y_firmwarecore_i7-3940xm_firmwarecore_i5-10500tecore_i7-7500u_firmwarecore_i5-10210y_firmwarecore_i7-8700k_firmwarecore_i7-8700bcore_i5-10500txeon_e3-1501l_v6_firmwarexeon_e5-1660_v4_firmwarexeon_w-1250texeon_platinum_8352mxeon_gold_6208ucore_i3-9100tecore_i5-9300hf_firmwarexeon_d-1749ntxeon_gold_6242core_i7-10700kxeon_d-1627xeon_e3-1575m_v5_firmwarexeon_e-2186mcore_i3-8109u_firmwarexeon_e3-1558l_v5xeon_gold_6250_firmwarexeon_d-1623n_firmwarecore_i3-9350k_firmwarecore_i5-7442eqxeon_d-1702core_i7-8665uecore_i3-8130uxeon_e7-4830_v4core_i3-7167uxeon_e5-2699_v4_firmwarecore_i3-8300txeon_d-1528_firmwarexeon_gold_6342xeon_e5-4628l_v4xeon_d-1732te_firmwarexeon_e3-1268l_v5core_i9-9900kxeon_silver_4316xeon_gold_6240_firmwarecore_i7-5930kcore_i5-10400fxeon_w-2265_firmwarexeon_e-2278ge_firmwarexeon_gold_6330ncore_i5-9400_firmwarexeon_gold_6226rxeon_bronze_3204xeon_w-1270e_firmwarexeon_e-2276m_firmwarecore_i3-7350k_firmwarexeon_d-1567core_i5-8400t_firmwarexeon_w-3365core_i7-9850hlxeon_w-2135_firmwarexeon_e-2286m_firmwarecore_i5-8400hxeon_e3-1245_v5xeon_w-2175xeon_d-2141i_firmwarexeon_silver_4214r_firmwarexeon_w-3335_firmwarecore_i3-10110yxeon_d-2776nt_firmwarexeon_gold_6334core_i7-7820hkcore_i5-9300h_firmwarexeon_d-1734ntxeon_w-11855mxeon_gold_6240yxeon_e5-4655_v4_firmwarexeon_gold_6238lxeon_w-1390xeon_gold_5218n_firmwarexeon_gold_6328h_firmwarexeon_gold_5318h_firmwarexeon_gold_6354core_i7-8665ucore_i3-10305tcore_i3-9350kf_firmwarecore_i7-5960x_firmwarexeon_w-1370_firmwarecore_i5-7440eq_firmwarexeon_d-1649n_firmwarecore_i3-8140uxeon_gold_5320hcore_i7-8086kcore_i5-7360u_firmwarecore_i3-8350kcore_i5-10600kxeon_gold_5222xeon_e7-8870_v4_firmwarecore_i7-10850hxeon_gold_6256xeon_d-1523ncore_i3-1005g1_firmwarexeon_gold_6338n_firmwarecore_i3-9100hl_firmwarecore_i9-9900x_firmwarecore_i5-10500te_firmwarecore_i3-10300t_firmwarecore_i3-8100bcore_i5-8279ucore_i3-10100f_firmwarecore_i5-8600kcore_i7-8700tcore_i3-7100_firmwarecore_i3-9320_firmwarexeon_d-1541xeon_d-1543n_firmwarexeon_gold_5320t_firmwarexeon_d-2799_firmwarexeon_e3-1245_v5_firmwarexeon_d-1622xeon_gold_5222_firmwarecore_i7-8700t_firmwarecore_i5-1030g7_firmwarecore_i5-8600t_firmwarexeon_platinum_8352v_firmwarexeon_w-2223xeon_gold_5318n_firmwarexeon_gold_6238tcore_i5-8500xeon_silver_4310t_firmwarecore_i5-9400h_firmwarecore_i5-10400f_firmwarecore_i9-10980xe_firmwarexeon_gold_6240r_firmwarecore_i5-8257uxeon_gold_5318yxeon_gold_6212u_firmwarexeon_gold_6208u_firmwarecore_i7-8569uxeon_silver_4310core_i9-9900tcore_i7-10700t_firmwarexeon_d-2796ntxeon_e3-1240_v5xeon_w-2133xeon_platinum_8260lxeon_e-2336_firmwarexeon_platinum_8270xeon_gold_6248r_firmwarecore_i5-8500txeon_e3-1501m_v6core_i7-4930k_firmwarexeon_d-2766nt_firmwarexeon_w-11555mre_firmwarexeon_d-2166ntxeon_gold_6348_firmwarecore_i3-10305core_i7-9850he_firmwarexeon_e5-2608l_v4xeon_w-1390pcore_i3-9100_firmwarexeon_e5-2658_v4_firmwarecore_i7-7560u_firmwarexeon_gold_6262vxeon_platinum_8354h_firmwarecore_i7-10710uxeon_e5-2620_v4xeon_e7-4809_v4core_i5-10300hxeon_platinum_8358pcore_i5-10210yxeon_silver_4210_firmwarexeon_d-1702_firmwarexeon_platinum_8380hl_firmwarexeon_w-1270texeon_e-2224core_i9-9900ks_firmwarexeon_e-2124_firmwarexeon_gold_6238rxeon_e-2278gelxeon_d-1553ncore_i5-1030g4xeon_gold_6222v_firmwarexeon_d-2798nt_firmwarecore_i9-10980hk_firmwarexeon_d-2166nt_firmwarexeon_e5-2699a_v4core_i5-10400_firmwarexeon_gold_5317xeon_gold_6242r_firmwarexeon_w-2155core_i3-7102exeon_w-11155mle_firmwarexeon_platinum_8376hlxeon_e7-8894_v4_firmwarexeon_silver_4216_firmwarexeon_d-1746tercore_i9-10900k_firmwarexeon_gold_5215l_firmwarexeon_d-2738_firmwarexeon_w-2225_firmwarexeon_gold_6230xeon_d-1714_firmwarexeon_e5-2650l_v4xeon_e7-4820_v4core_i3-9100ecore_i3-7300xeon_d-1548core_i7-10510yxeon_e3-1220_v5core_i5-7y57_firmwarecore_i7-7820x_firmwarexeon_platinum_8260yxeon_d-1653nxeon_e-2276ml_firmwarexeon_e3-1505m_v5_firmwarexeon_e3-1578l_v5_firmwarecore_i9-10900_firmwarexeon_gold_5218txeon_e-2374gxeon_e-2254ml_firmwarexeon_d-1557_firmwarecore_i5-9500t_firmwarexeon_gold_5218ncore_i7-8709g_firmwarexeon_d-2163it_firmwarexeon_w-2295_firmwarexeon_d-1531core_i7-10875h_firmwarexeon_e7-8891_v4xeon_silver_4314_firmwarexeon_d-1533n_firmwarexeon_e-2278gexeon_e3-1545m_v5_firmwarexeon_silver_4214yxeon_w-10855mxeon_d-2177ntxeon_e5-2630l_v4_firmwarexeon_w-3275_firmwarecore_i5-10600t_firmwarexeon_platinum_8270_firmwarecore_i5-10300h_firmwarexeon_d-2775te_firmwarexeon_w-3235xeon_e5-2680_v4_firmwarecore_i9-10900txeon_d-1571_firmwarexeon_e-2126gxeon_e7-8893_v4_firmwarecore_i7-10700tecore_i9-10900kcore_i5-10600_firmwarexeon_e5-4650_v4_firmwarexeon_gold_5220rxeon_w-11955mcore_i5-10400txeon_w-1290ecore_i7-9700kfxeon_d-2796texeon_d-1541_firmwarexeon_w-1290te_firmwarexeon_gold_6328hl_firmwarexeon_platinum_9221xeon_d-2142itcore_i5-7600k_firmwarexeon_platinum_9222_firmwarecore_i5-8305g_firmwarexeon_e5-2699r_v4core_i3-8100b_firmwarecore_i9-10900te_firmwarexeon_e5-2640_v4_firmwarecore_i3-8300t_firmwarecore_i3-7167u_firmwarexeon_d-1726xeon_platinum_8380_firmwarecore_i7-10700_firmwarexeon_d-1735tr_firmwarexeon_silver_4314core_i3-1005g1core_i7-1068ng7xeon_d-2796nt_firmwarexeon_e7-8880_v4_firmwarecore_i7-7820eq_firmwarexeon_d-1637core_i5-9400fxeon_d-1539_firmwarexeon_e3-1515m_v5core_i5-9500f_firmwarecore_i7-6800kcore_i7-7560uxeon_platinum_8368_firmwarecore_i7-8550u_firmwarexeon_d-1602xeon_e5-4655_v4core_i5-8365uxeon_platinum_8376hxeon_w-2245xeon_d-2799xeon_gold_6312u_firmwarexeon_d-2145ntcore_i5-9600kfxeon_e5-2697a_v4xeon_e-2288g_firmwarexeon_w-1250te_firmwarexeon_e-2224gcore_i5-8600_firmwarecore_i3-8100_firmwarecore_i5-8269uxeon_gold_6254_firmwarexeon_e5-1620_v4xeon_e5-4669_v4xeon_gold_5220_firmwarexeon_e5-2609_v4_firmwarexeon_gold_6338ncore_i5-7600t_firmwarecore_i7-9700t_firmwarecore_i7-8665ue_firmwarecore_i7-4820k_firmwarexeon_gold_6330core_i7-7820hq_firmwarexeon_silver_4208_firmwarexeon_d-1521core_i3-8145uexeon_w-2155_firmwarexeon_e5-2687w_v4_firmwarexeon_d-1713nt_firmwarecore_i5-8265ucore_i7-10700txeon_e-2246g_firmwarecore_i9-9900kfxeon_e5-4620_v4_firmwarecore_i7-10750hxeon_e-2226ge_firmwarexeon_d-2753ntxeon_e3-1225_v6_firmwarexeon_gold_6338xeon_gold_5315ycore_i5-8400b_firmwarecore_i7-8706gcore_i7-5930k_firmwarecore_i5-7400t_firmwarexeon_silver_4215xeon_gold_6230ncore_i5-8365u_firmwarexeon_platinum_8280l_firmwarexeon_e5-2667_v4_firmwarecore_i9-10885hxeon_gold_6338tcore_i5-9500_firmwarecore_i5-7440eqxeon_d-1739_firmwarexeon_e-2386gcore_i3-9100t_firmwarecore_m3-7y32xeon_gold_6242_firmwarexeon_d-1733nt_firmwarecore_i7-10750h_firmwarexeon_e-2134xeon_w-1290texeon_w-3265_firmwarexeon_d-2142it_firmwarexeon_platinum_8360y_firmwarecore_i7-8557u_firmwarecore_m3-7y32_firmwarexeon_w-11865mre_firmwarexeon_platinum_8360hxeon_e-2176mxeon_gold_6230t_firmwarecore_i3-1000g1_firmwarexeon_gold_5218_firmwarecore_i9-10900t_firmwarexeon_silver_4210txeon_w-3275m_firmwarexeon_e-2134_firmwarexeon_e5-4669_v4_firmwarexeon_e5-4667_v4xeon_d-2795ntcore_i5-7267u_firmwarecore_i5-7640x_firmwarexeon_d-2779xeon_w-3245m_firmwarecore_i5-9600txeon_e-2226g_firmwarexeon_e5-1650_v4core_i9-7960xxeon_gold_6336y_firmwarexeon_w-1370xeon_d-1715terxeon_d-1559xeon_platinum_9242_firmwarexeon_e-2174gxeon_e3-1220_v6core_i7-7y75_firmwarexeon_d-1537xeon_e7-4850_v4xeon_e3-1220_v6_firmwarexeon_gold_6230_firmwarexeon_e7-4850_v4_firmwarexeon_e-2176gxeon_gold_6254xeon_e7-8880_v4core_i3-10320xeon_gold_6342_firmwarexeon_e5-2667_v4core_i3-10105fxeon_w-1390t_firmwarexeon_gold_5320xeon_e-2224_firmwarexeon_gold_5320h_firmwarexeon_d-1649nxeon_e7-8890_v4core_i7-10875hxeon_d-1736nt_firmwarecore_i5-10400hxeon_d-2712t_firmwarecore_i5-9600kf_firmwarecore_i7-9800x_firmwarexeon_w-10885mxeon_gold_6234_firmwarexeon_e-2224g_firmwarexeon_d-1527core_i9-9940xcore_i9-9980xe_firmwarexeon_gold_6312uxeon_e3-1535m_v5core_i9-7940xxeon_gold_5220r_firmwarexeon_platinum_8380hlxeon_e3-1505l_v5core_i7-9700texeon_e7-4830_v4_firmwarexeon_gold_6248rxeon_silver_4214xeon_w-2125core_i9-9900k_firmwarexeon_gold_5220sxeon_platinum_8260core_i7-7800x_firmwarecore_i3-10105t_firmwarecore_i5-10400h_firmwarexeon_silver_4309yxeon_e5-2699_v4xeon_e5-2603_v4xeon_d-2146ntcore_i3-10100txeon_d-1713ntcore_i3-9100f_firmwarecore_i7-7700hq_firmwarecore_i9-9980hkxeon_e-2244gcore_i3-7100txeon_w-2125_firmwarecore_i5-1035g4_firmwarexeon_platinum_8358p_firmwarexeon_e3-1235l_v5_firmwarecore_i7-9850h_firmwarexeon_d-2795nt_firmwarecore_i7-8559ucore_i5-9500exeon_gold_6314u_firmwarecore_i9-9920x_firmwarexeon_platinum_8368qxeon_w-1250e_firmwarecore_i7-4960xcore_i7-5960xxeon_d-1521_firmwarexeon_e3-1285_v6_firmwarexeon_w-1290t_firmwarecore_i7-9750h_firmwarexeon_gold_6209u_firmwarecore_i3-10325core_i9-7920x_firmwarexeon_e-2356gxeon_platinum_8356h_firmwarecore_i7-8700core_i3-7130ucore_i5-8400xeon_platinum_8276l_firmwarexeon_e3-1585l_v5_firmwarexeon_e3-1585_v5xeon_platinum_8380hxeon_gold_6262v_firmwarexeon_e-2334core_i7\+8700core_i5-7440hq_firmwarecore_i7-9850hcore_i3-10110u_firmwarecore_i5-7600core_i9-10980xexeon_e3-1505l_v5_firmwarexeon_w-11865mlexeon_e3-1280_v5_firmwarexeon_e5-2697_v4xeon_e-2186gxeon_gold_6226_firmwarecore_i5-8310y_firmwarexeon_silver_4210core_i9-10885h_firmwarexeon_gold_6250l_firmwarexeon_e3-1280_v5xeon_e5-1680_v4_firmwarecore_i3-7320_firmwarecore_i7-8569u_firmwarexeon_e5-2630_v4xeon_gold_6240y_firmwarexeon_w-1350pxeon_d-2143it_firmwarecore_i5-9400txeon_w-3245_firmwarecore_i3-10300xeon_w-1290p_firmwarexeon_w-1250p_firmwarexeon_bronze_3204_firmwarecore_i3-8100t_firmwarecore_i5-7600_firmwarecore_i9-9960x_firmwarecore_i5-10310u_firmwarecore_i5-8400_firmwarexeon_e-2234_firmwarecore_i7-10870hxeon_silver_4215r_firmwarecore_i7-10510uxeon_w-1290pcore_i7-7920hq_firmwarecore_i5-8310ycore_i5-10500h_firmwarexeon_d-1523n_firmwarecore_i3-10300_firmwarexeon_d-2183it_firmwarexeon_w-3245xeon_e-2324gxeon_e5-2628l_v4_firmwarecore_i9-7980xexeon_e5-2697_v4_firmwarexeon_e3-1270_v5xeon_w-3345xeon_e-2186m_firmwarexeon_d-1528xeon_w-2295xeon_e-2234core_i3-9100tcore_i5-10500xeon_platinum_8351nxeon_gold_6354_firmwarexeon_e5-1650_v4_firmwarecore_i7-8850hcore_i9-8950hk_firmwarecore_i5-8400h_firmwarexeon_e3-1240_v6_firmwarexeon_d-1622_firmwarexeon_w-11865mrecore_i3-10100_firmwarexeon_platinum_8352y_firmwarecore_i9-10900texeon_platinum_8260y_firmwarexeon_platinum_8358core_i5-1030g4_firmwarecore_i5-9500fxeon_e3-1501l_v6core_i3-10100yxeon_e7-8867_v4xeon_e-2378core_i7-7820xcore_i7-3970x_firmwarexeon_e5-2630_v4_firmwarexeon_e5-2699r_v4_firmwarexeon_gold_5317_firmwarecore_i7-7800xcore_i5-9400hxeon_platinum_8253xeon_gold_6252nxeon_e7-8894_v4core_i3-9320xeon_platinum_8280core_i7-10700f_firmwarecore_i3-10100t_firmwarexeon_w-2255_firmwarexeon_gold_5220t_firmwarecore_i3-10105xeon_silver_4309y_firmwarecore_i7-4940mxxeon_gold_6246core_i9-10900kf_firmwarexeon_e5-4610_v4_firmwarexeon_e5-1630_v4core_i7-8550uxeon_w-1350_firmwarecore_i7-10810u_firmwarecore_i9-10940xcore_i7-9700xeon_e3-1270_v6xeon_w-3265m_firmwarexeon_d-1577_firmwarecore_i7-9850hexeon_platinum_8360hlcore_i7-10700kfcore_i7-9850hl_firmwarecore_i5-8260u_firmwarexeon_d-1748texeon_gold_5315y_firmwarecore_i5-7500txeon_silver_4310txeon_d-2187ntxeon_d-1518xeon_gold_5318hcore_i3-1000g1xeon_w-2225xeon_gold_5320_firmwarecore_i7-3820_firmwarexeon_e-2276mexeon_silver_4210t_firmwarecore_i5-7y54xeon_gold_5218t_firmwarecore_i7-6950xxeon_e5-4620_v4core_i5-7400core_i7-8700b_firmwarexeon_e7-8870_v4xeon_e-2356g_firmwarecore_i3-10305t_firmwarexeon_w-10855m_firmwarecore_i9-10850k_firmwarecore_i7-7660u_firmwarecore_i5-8365ue_firmwarexeon_e5-2698_v4xeon_platinum_8352score_i7-7920hqxeon_d-1718tcore_i7-10700xeon_d-1533ncore_i3-7020uxeon_w-2195xeon_e-2136core_i5-9300hfcore_i3-8145u_firmwarexeon_w-1270pcore_i5-8600k_firmwarecore_i9-9940x_firmwarexeon_gold_6258rxeon_platinum_9282core_i5-10400core_i3-7020u_firmwarexeon_d-2161ixeon_w-1250pcore_i7-8700kcore_i3-7130u_firmwarexeon_silver_4215_firmwarexeon_d-2123itcore_i5-8365uecore_i3-8109ucore_i7-4960x_firmwarexeon_bronze_3206rxeon_gold_6346xeon_d-1722nexeon_w-3275xeon_gold_6240xeon_d-2161i_firmwarecore_i5-8200y_firmwarexeon_gold_5220core_i5-8350uxeon_platinum_8256_firmwarexeon_e3-1275_v5core_i7-8750h_firmwarexeon_e5-4610_v4core_i3-10100texeon_e3-1558l_v5_firmwarecore_i5-10210u_firmwarecore_i3-8140u_firmwarexeon_d-1537_firmwarexeon_d-2796te_firmwarecore_i5-7y57xeon_w-3375_firmwarecore_i3-9300_firmwarecore_i7-3920xmxeon_gold_6330hcore_i5-7260uxeon_d-1540_firmwarecore_i5-10600k_firmwarexeon_e7-8890_v4_firmwarecore_i5-8259u_firmwarexeon_e5-2683_v4_firmwarexeon_e-2124core_i7-9750hcore_i3-10110y_firmwarexeon_e-2186g_firmwarexeon_d-1553n_firmwarecore_i9-7980xe_firmwarexeon_platinum_8368xeon_w-1270te_firmwarecore_i7-8559u_firmwarecore_i5-7500_firmwarexeon_d-2798ntcore_i5-10600xeon_e3-1240l_v5_firmwarecore_i5-10500_firmwarexeon_w-2245_firmwarexeon_e3-1260l_v5core_i5-10310yxeon_d-1736core_i5-10310y_firmwarexeon_d-2738xeon_d-1567_firmwarecore_i5-8259uxeon_e-2388g_firmwarexeon_gold_6326_firmwarexeon_gold_6230r_firmwarexeon_e-2336xeon_gold_6246_firmwarexeon_e3-1225_v5xeon_platinum_8260_firmwarexeon_e-2286mcore_i9-9880hcore_i7-8705g_firmwarecore_i7-4930mx_firmwarexeon_gold_6244_firmwarexeon_d-1722ne_firmwarecore_i5-1035g4core_i7-8650ucore_i5-10200hcore_i7-8705gxeon_platinum_8276xeon_d-1529xeon_gold_5220txeon_e-2324g_firmwarecore_i7-7600uxeon_gold_6244xeon_w-3223_firmwarexeon_gold_6242rcore_i5-1035g7_firmwarecore_i3-7100exeon_w-2275xeon_w-3175x_firmwarecore_i7\+8700_firmwarexeon_w-2265core_i5-9500xeon_e3-1535m_v6core_i3-7101ecore_i9-9900xeon_w-10885m_firmwarecore_i3-8145ue_firmwarecore_i9-9820xxeon_d-1714xeon_gold_5218b_firmwarexeon_platinum_8354hxeon_gold_6348hxeon_gold_6248_firmwarecore_i7-9750hfxeon_e3-1501m_v6_firmwarexeon_d-2141icore_i7-3920xm_firmwarecore_i7-6850k_firmwarecore_i7-3960x_firmwarexeon_e-2176g_firmwarecore_i5-1035g7xeon_gold_6326xeon_e-2254mlcore_i5-8305gcore_i3-9350kcore_i5-7400txeon_gold_6348core_i7-8750hxeon_w-2145_firmwarecore_i3-10100e_firmwarexeon_d-2183itxeon_d-2123it_firmwarexeon_e3-1275_v6_firmwarecore_i5-8300hcore_i9-7940x_firmwarecore_i3-7101te_firmwarexeon_d-2712txeon_e5-2650l_v4_firmwarecore_i5-9500e_firmwarecore_i9-7900x_firmwarecore_i7-9700e_firmwarecore_i5-9500texeon_w-1290e_firmwarexeon_d-1520core_i5-7y54_firmwarexeon_d-2187nt_firmwarexeon_w-1390p_firmwarexeon_e3-1280_v6_firmwarecore_i9-10900f_firmwarexeon_w-11955m_firmwarexeon_platinum_8280lcore_m3-8100yxeon_platinum_8356hxeon_gold_6338t_firmwarecore_i5-7267ucore_i3-7100uxeon_d-1543ncore_i5-7260u_firmwarexeon_e7-8867_v4_firmwarexeon_gold_5318y_firmwarecore_i5-7300u_firmwarexeon_d-1732texeon_d-1520_firmwarexeon_platinum_9242xeon_e5-4660_v4_firmwarexeon_e5-2680_v4core_i7-10700e_firmwarecore_i3-9100te_firmwarexeon_e5-2660_v4_firmwarecore_i3-7300tcore_i5-8210yxeon_e5-2687w_v4core_i7-1060g7core_i7-8565u_firmwarexeon_w-11855m_firmwarecore_i7-5820kxeon_platinum_8352m_firmwarecore_i7-9700_firmwarecore_i7-7700tcore_i7-6900kcore_i9-9980xexeon_platinum_9282_firmwarexeon_gold_6250xeon_d-1713ntecore_i3-9350kfxeon_w-1290txeon_d-1739core_i7-8809gxeon_gold_6226core_i3-10105_firmwarecore_i7-8650u_firmwarexeon_d-1577xeon_d-1735trxeon_silver_4214_firmwarexeon_platinum_8268_firmwarecore_i7-10850h_firmwarexeon_e3-1535m_v5_firmwarexeon_e-2314xeon_e5-2690_v4_firmwarecore_i7-8700_firmwarecore_i3-7350kcore_i3-8300_firmwarecore_i5-10505xeon_d-1539xeon_e5-4627_v4_firmwarexeon_e5-2648l_v4_firmwarexeon_silver_4310_firmwarexeon_platinum_8360h_firmwarexeon_w-2255core_i9-10900x_firmwarecore_i5-7600kcore_m3-7y30_firmwarexeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_d-1746ter_firmwarexeon_w-11865mle_firmwarecore_i3-1000g4_firmwarexeon_gold_6330_firmwarecore_i5-8350u_firmwarexeon_e-2276g_firmwarexeon_d-1627_firmwarexeon_d-1733ntxeon_gold_5218xeon_w-2145xeon_gold_6338_firmwarecore_i7-4940mx_firmwarecore_i3-9100fxeon_w-1250_firmwarecore_i5-7500t_firmwarexeon_d-1653n_firmwarecore_i9-10900fxeon_w-3225_firmwarexeon_e3-1245_v6xeon_e-2378gcore_i5-10200h_firmwarecore_i3-8100txeon_gold_6238r_firmwarecore_i5-9500txeon_platinum_8352yxeon_w-3223xeon_e5-2643_v4xeon_e3-1268l_v5_firmwarexeon_e-2276gxeon_gold_6222vcore_i7-10700fxeon_e5-1620_v4_firmwarexeon_d-1571core_i5-9600k_firmwarexeon_gold_6238t_firmwarexeon_e5-2620_v4_firmwarexeon_platinum_8353h_firmwarexeon_gold_5217_firmwareIntel(R) Processors
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-33090
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.38%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 18:57
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissionsin the software installer for the Intel(R) NUC HDMI Firmware Update Tool for NUC10i3FN, NUC10i5FN, NUC10i7FN before version 1.78.2.0.7 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc10i5fnnuc10i3fnnuc_hdmi_firmware_update_toolnuc10i7fnIntel(R) NUC HDMI Firmware Update Tool for NUC10i3FN, NUC10i5FN, NUC10i7FN
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2018-3686
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.16% / 37.70%
||
7 Day CHG~0.00%
Published-12 Sep, 2018 | 19:00
Updated-16 Sep, 2024 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Code injection vulnerability in INTEL-SA-00086 Detection Tool before version 1.2.7.0 may allow a privileged user to potentially execute arbitrary code via local access.

Action-Not Available
Vendor-Intel Corporation
Product-sa-00086_detection_toolINTEL-SA-00086 Detection Tool
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2018-3700
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.14% / 34.19%
||
7 Day CHG~0.00%
Published-18 Feb, 2019 | 17:00
Updated-16 Sep, 2024 | 22:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Code injection vulnerability in the installer for Intel(R) USB 3.0 eXtensible Host Controller Driver for Microsoft Windows 7 before version 5.0.4.43v2 may allow a user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-windows_7usb_3.0_extensible_host_controller_drivern/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2011-1760
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.2||HIGH
EPSS-0.35% / 56.70%
||
7 Day CHG~0.00%
Published-09 Jun, 2011 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

utils/opcontrol in OProfile 0.9.6 and earlier might allow local users to conduct eval injection attacks and gain privileges via shell metacharacters in the -e argument.

Action-Not Available
Vendor-maynard_johnsonn/a
Product-oprofilen/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2017-6186
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.16% / 36.97%
||
7 Day CHG~0.00%
Published-21 Mar, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Code injection vulnerability in Bitdefender Total Security 12.0 (and earlier), Internet Security 12.0 (and earlier), and Antivirus Plus 12.0 (and earlier) allows a local attacker to bypass a self-protection mechanism, inject arbitrary code, and take full control of any Bitdefender process via a "DoubleAgent" attack. One perspective on this issue is that (1) these products do not use the Protected Processes feature, and therefore an attacker can enter an arbitrary Application Verifier Provider DLL under Image File Execution Options in the registry; (2) the self-protection mechanism is intended to block all local processes (regardless of privileges) from modifying Image File Execution Options for these products; and (3) this mechanism can be bypassed by an attacker who temporarily renames Image File Execution Options during the attack.

Action-Not Available
Vendor-n/aBitdefender
Product-total_securityinternet_securityantivirus_plusn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2017-3753
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-6.8||MEDIUM
EPSS-0.05% / 15.16%
||
7 Day CHG~0.00%
Published-10 Aug, 2017 | 00:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in some Lenovo products that use UEFI (BIOS) code developed by American Megatrends, Inc. (AMI). With this vulnerability, conditions exist where an attacker with administrative privileges or physical access to a system may be able to run specially crafted code that can allow them to bypass system protections such as Device Guard and Hyper-V.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkstation_c30_\(1136\)_firmwarethinkcentre_m800zthinkstation_p710yangtian_mc_h110_firmware63_firmwareyangtian_mf\/wf_h81_firmwareyangtian_me\/we_h110_firmwarethinkcentre_m9500zv320-15iap_firmwarethinkcentre_m610_firmwares200z_firmwareideacentre_700_firmwarethinkcentre_m7250z_firmwarethinkcentre_m73z_\(aio\)thinkcentre_m600_firmwarethinkcentre_m900_firmwarethinkserver_rq750_firmwarethinkcentre_m710t\/s_firmwarethinkcentre_e74_firmwarethinkcentre_m910qthinkserver_ts450thinkstation_p510_firmwareideacentre_700thinkcentre_m92p_firmwarethinkcentre_m9550z_firmwarethinkcentre_e93_firmwarethinkcentre_e74z_firmwarethinkserver_ts250_firmwareideacentre_510s-08ish_firmwareyangtian_afq150_firmwareyangtian_mc_godavarithinkstation_p300thinkcentre_m4500t\/s_firmwarethinkstation_p410_firmwarethinkserver_rd440_firmwarethinkcentre_m83z_\(aio\)_firmwarethinkcentre_m6600qideacentre_510s-08ishyangtian_s3040_firmwarethinkstation_c30_\(1136\)thinkstation_p910thinkcentre_m92pthinkstation_p300_firmwarethinkcentre_m8300zthinkcentre_m8250z_firmwarethinkserver_rd340_firmwarethinkcentre_x1_aiothinkstation_d30_\(4354\)thinkcentre_m4500k_firmwarethinkcentre_m8250zthinkcentre_m610thinkcentre_m8600t\/sthinkcentre_e93z_\(aio\)thinkstation_c30_\(1137\)_firmwarethinkcentre_m910xthinkcentre_e74ideacentre_510s-23isu_firmwarethinkcentre_m72e_firmwarethinkcentre_m7200zthinkcentre_m8350zthinkcentre_m92s500thinkcentre_m8500t\/s_firmwarethinkcentre_m73thinkcentre_m700zthinkcentre_m7200z_firmwarethinkcentre_e79_firmwarethinkstation_p900_firmwarethinkcentre_m8500t\/syangtian_mc_godavari_firmwares200zthinkcentre_m7300z_firmwarethinkcentre_m83_firmwarethinkstation_p700thinkserver_rd540_firmwareyangtian_mc_h110yangtian_s800_firmwarethinkcentre_e79thinkcentre_m910q_firmwarethinkstation_c30_\(1137\)m4500_idthinkstation_e32thinkstation_p900thinkcentre_m810z_firmwarethinkcentre_m79yangtian_s3040thinkcentre_e73thinkstation_p310_firmwarethinkserver_ts150_firmwarethinkcentre_m710t\/sthinkcentre_m72eideacentre_510s-23isuthinkserver_ts240thinkcentre_m715q_firmware63thinkstation_p310yangtian_mc_carrizo-lthinkcentre_m6500t\/sthinkcentre_m83z_\(aio\)thinkstation_p700_firmwareyangtian_afh110_firmwarethinkcentre_m6600t\/s_firmwareyangtian_afq150thinkstation_s30_\(4352\)thinkcentre_m800thinkstation_d30_\(4353\)thinkcentre_m8300z_firmwareyangtian_afh81_firmwareyangtian_afh110thinkcentre_m900m4500_id_firmwarethinkserver_ts140_firmwarethinkstation_d30_\(4353\)_firmwarethinkstation_s30_\(4352\)_firmwarethinkcentre_m910t\/sthinkcentre_m910x_firmwarethinkcentre_e73z_\(aio\)_firmwarethinkserver_rd340thinkstation_p510thinkcentre_m700_firmwareideacentre_300-20ish_firmwarem4550_id_firmwarethinkcentre_m6600thinkserver_ts450_firmwarethinkstation_p320thinkserver_td340h50-30gideacentre_300s-11ishyangtian_afh81v320-15iapthinkcentre_m900z_firmwarem4550_idthinkcentre_m6600t\/sthinkcentre_m700ideacentre_300s-11ish_firmwarethinkcentre_m7250zthinkserver_rd540thinkstation_p320_firmwarethinkcentre_m83thinkcentre_m600thinkcentre_m8350z_firmwarethinkserver_ts550_firmwarethinkcentre_m900zthinkcentre_m8200z_firmwarethinkcentre_e73s_firmwarem4500_firmwarethinkcentre_m93p_firmwarem4500yangtian_mc_h81thinkcentre_m73_firmwarethinkcentre_e73_firmwarethinkcentre_m800_firmwarethinkcentre_m7300zthinkcentre_m4500kthinkcentre_m9550zthinkcentre_e93thinkcentre_m8200zthinkstation_e32_firmwarethinkcentre_m6500t\/s_firmwareyangtian_mc_h81_firmwarethinkserver_ts250thinkcentre_m700z_firmwarethinkserver_rd440thinkserver_ts150thinkstation_e31_firmwareyangtian_mc_carrizo-l_firmwarethinkcentre_m800z_firmwarethinkserver_ts240_firmwarethinkcentre_m92_firmwareideacentre_300-20ishthinkserver_rs140thinkserver_ts140thinkcentre_e75_t\/s_firmwarethinkcentre_e73sthinkcentre_m4600t\/sthinkcentre_m8600t\/s_firmwarethinkcentre_x1_aio_firmwarethinkstation_d30_\(4354\)_firmwares500_firmwarethinkcentre_e73z_\(aio\)thinkcentre_m73p_firmwarethinkcentre_m73z_\(aio\)_firmwarethinkcentre_e74s_firmwarethinkstation_e31thinkstation_p500thinkstation_p710_firmwarethinkcentre_m4500t\/sthinkcentre_m4500qthinkcentre_m9500z_firmwarethinkstation_p410thinkcentre_m4500q_firmwarethinkcentre_m6600q_firmwarethinkcentre_edge_62zthinkcentre_e75_t\/sthinkserver_td340_firmwareh50-30g_firmwarethinkcentre_e93z_\(aio\)_firmwarethinkcentre_m93_firmwarethinkstation_p500_firmwarethinkserver_rs140_firmwarethinkcentre_m93pthinkcentre_m93thinkcentre_edge_62z_firmwarethinkserver_rd640_firmwarethinkcentre_m910t\/s_firmwarethinkcentre_e74sthinkcentre_m6600_firmwareyangtian_mf\/wf_h81thinkcentre_e74zthinkstation_s30_\(4351\)thinkserver_ts550thinkstation_s30_\(4351\)_firmwarethinkserver_rq750thinkcentre_m73pthinkcentre_m810zthinkstation_p910_firmwarethinkcentre_m4600t\/s_firmwarethinkcentre_m79_firmwarethinkcentre_m715qDesktop and Notebook BIOS
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2017-11421
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.23%
||
7 Day CHG~0.00%
Published-18 Jul, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

gnome-exe-thumbnailer before 0.9.5 is prone to a VBScript Injection when generating thumbnails for MSI files, aka the "Bad Taste" issue. There is a local attack if the victim uses the GNOME Files file manager, and navigates to a directory containing a .msi file with VBScript code in its filename.

Action-Not Available
Vendor-gnome-exe-thumbnailer_projectn/a
Product-gnome-exe-thumbnailern/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2013-3200
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.2||HIGH
EPSS-0.45% / 62.61%
||
7 Day CHG~0.00%
Published-09 Oct, 2013 | 14:44
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The USB drivers in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_rtwindows_7windows_8windows_server_2008windows_vistawindows_server_2003windows_server_2012windows_xpn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2019-3575
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.11% / 30.48%
||
7 Day CHG~0.00%
Published-03 Jan, 2019 | 19:00
Updated-04 Aug, 2024 | 19:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Sqla_yaml_fixtures 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in sqla_yaml_fixtures.load.

Action-Not Available
Vendor-sqla_yaml_fixtures_projectn/a
Product-sqla_yaml_fixturesn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2017-1469
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.17%
||
7 Day CHG~0.00%
Published-14 Aug, 2017 | 22:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM InfoSphere Information Server 9.1, 11.3, and 11.5 could allow a local user to gain elevated privileges by placing arbitrary files in installation directories. IBM X-Force ID: 128468.

Action-Not Available
Vendor-IBM Corporation
Product-infosphere_information_serverInfoSphere Information Server
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2003-0498
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.14% / 34.39%
||
7 Day CHG~0.00%
Published-04 Jul, 2003 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Caché Database 5.x installs the /cachesys/csp directory with insecure permissions, which allows local users to execute arbitrary code by adding server-side scripts that are executed with root privileges.

Action-Not Available
Vendor-intersystemsn/a
Product-cache_databasen/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2010-2240
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.2||HIGH
EPSS-0.10% / 27.71%
||
7 Day CHG~0.00%
Published-03 Sep, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2019-4000
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.70%
||
7 Day CHG~0.00%
Published-25 Feb, 2020 | 20:28
Updated-04 Aug, 2024 | 19:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper neutralization of directives in dynamically evaluated code in Druva inSync Mac OS Client 6.5.0 allows a local, authenticated attacker to execute arbitrary Python expressions with root privileges.

Action-Not Available
Vendor-druvan/aApple Inc.
Product-macosinsyncDruva inSync Mac OS Client
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2000-0155
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-1.72% / 81.64%
||
7 Day CHG~0.00%
Published-23 Feb, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Windows NT Autorun executes the autorun.inf file on non-removable media, which allows local attackers to specify an alternate program to execute when other users access a drive.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_98windows_ntwindows_95n/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2019-3695
Matching Score-4
Assigner-SUSE
ShareView Details
Matching Score-4
Assigner-SUSE
CVSS Score-8.4||HIGH
EPSS-0.12% / 31.28%
||
7 Day CHG~0.00%
Published-03 Mar, 2020 | 11:05
Updated-16 Sep, 2024 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
pcp: Local privilege escalation from user pcp to root

A Improper Control of Generation of Code vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows the user pcp to run code as root by placing it into /var/log/pcp/configs.sh This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise High Performance Computing 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp versions prior to 4.3.1-3.5.3. SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server for SAP 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Software Development Kit 12-SP4 pcp versions prior to 3.11.9-6.14.1. SUSE Linux Enterprise Software Development Kit 12-SP5 pcp versions prior to 3.11.9-6.14.1. openSUSE Leap 15.1 pcp versions prior to 4.3.1-lp151.2.3.1.

Action-Not Available
Vendor-openSUSESUSE
Product-linux_enterprise_software_development_kitlinux_enterprise_serverlinux_enterprise_high_performance_computingpcpleapSUSE Linux Enterprise High Performance Computing 15-LTSSSUSE Linux Enterprise High Performance Computing 15-ESPOSSUSE Linux Enterprise Software Development Kit 12-SP4SUSE Linux Enterprise Software Development Kit 12-SP5openSUSE Leap 15.1SUSE Linux Enterprise Module for Development Tools 15-SP1SUSE Linux Enterprise Module for Open Buildservice Development Tools 15SUSE Linux Enterprise Server 15-LTSSSUSE Linux Enterprise Module for Development Tools 15SUSE Linux Enterprise Server for SAP 15
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2008-1084
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.2||HIGH
EPSS-11.56% / 93.36%
||
7 Day CHG~0.00%
Published-08 Apr, 2008 | 23:00
Updated-07 Aug, 2024 | 08:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the kernel in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, through Vista SP1, and Server 2008 allows local users to execute arbitrary code via unknown vectors related to improper input validation. NOTE: it was later reported that one affected function is NtUserFnOUTSTRING in win32k.sys.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_vistawindows_2000windows_2003_serverwindows_xpwindows_server_2008n/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2009-0390
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.18% / 40.35%
||
7 Day CHG~0.00%
Published-02 Feb, 2009 | 22:00
Updated-07 Aug, 2024 | 04:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Argument injection vulnerability in Enomaly Elastic Computing Platform (ECP), formerly Enomalism, before 2.1.1 allows local users to send signals to arbitrary processes by populating the /tmp/enomalism2.pid file with command-line arguments for the kill program.

Action-Not Available
Vendor-enomalyn/a
Product-elastic_computing_platformn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2019-10211
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-1.60% / 80.97%
||
7 Day CHG~0.00%
Published-29 Oct, 2019 | 13:15
Updated-04 Aug, 2024 | 22:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Postgresql Windows installer before versions 11.5, 10.10, 9.6.15, 9.5.19, 9.4.24 is vulnerable via bundled OpenSSL executing code from unprotected directory.

Action-Not Available
Vendor-The PostgreSQL Global Development GroupMicrosoft Corporation
Product-windowspostgresqlpostgresql
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2018-8415
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.23% / 46.10%
||
7 Day CHG~0.00%
Published-14 Nov, 2018 | 01:00
Updated-05 Aug, 2024 | 06:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A tampering vulnerability exists in PowerShell that could allow an attacker to execute unlogged code, aka "Microsoft PowerShell Tampering Vulnerability." This affects Windows 7, PowerShell Core 6.1, Windows Server 2012 R2, Windows RT 8.1, PowerShell Core 6.0, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2012windows_8.1windows_rt_8.1windows_7windows_10powershell_corewindows_server_2019windows_server_2008Windows Server 2008 R2PowerShell CoreWindows 10 ServersWindows Server 2012 R2Windows 10Windows Server 2019Windows Server 2012Windows 8.1Windows 7Windows RT 8.1Windows Server 2016
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2018-1792
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-8.8||HIGH
EPSS-0.15% / 36.59%
||
7 Day CHG~0.00%
Published-13 Nov, 2018 | 15:00
Updated-16 Sep, 2024 | 16:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM WebSphere MQ 8.0.0.0 through 8.0.0.10, 9.0.0.0 through 9.0.0.5, 9.0.1 through 9.0.5, and 9.1.0.0 could allow a local user to inject code that could be executed with root privileges. IBM X-Force ID: 148947.

Action-Not Available
Vendor-IBM Corporation
Product-websphere_mqMQ
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2016-4397
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.8||HIGH
EPSS-0.23% / 45.65%
||
7 Day CHG-0.00%
Published-06 Aug, 2018 | 20:00
Updated-06 Aug, 2024 | 00:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A local code execution security vulnerability was identified in HP Network Node Manager i (NNMi) v10.00, v10.10 and v10.20 Software.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-network_node_manager_iHP Network Node Manager (NNMi)
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2016-1602
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
CVSS Score-7.8||HIGH
EPSS-0.11% / 30.51%
||
7 Day CHG~0.00%
Published-23 Mar, 2017 | 06:36
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A code injection in the supportconfig data collection tool in supportutils in SUSE Linux Enterprise Server 12 and 12-SP1 and SUSE Linux Enterprise Desktop 12 and 12-SP1 could be used by local attackers to execute code as the user running supportconfig (usually root).

Action-Not Available
Vendor-n/aSUSE
Product-linux_enterprise_serversuse_linux_enterprise_serverlinux_enterprise_desktopsupportconfig
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2018-11781
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-7.8||HIGH
EPSS-0.25% / 48.33%
||
7 Day CHG~0.00%
Published-17 Sep, 2018 | 14:00
Updated-16 Sep, 2024 | 18:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache SpamAssassin 3.4.2 fixes a local user code injection in the meta rule syntax.

Action-Not Available
Vendor-Canonical Ltd.The Apache Software FoundationRed Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxspamassassinenterprise_linux_server_eusenterprise_linux_workstationenterprise_linux_desktopApache SpamAssassin
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2018-6574
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-33.95% / 96.82%
||
7 Day CHG+0.57%
Published-07 Feb, 2018 | 21:00
Updated-05 Aug, 2024 | 06:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow "go get" remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked.

Action-Not Available
Vendor-n/aDebian GNU/LinuxGoRed Hat, Inc.
Product-enterprise_linux_serverdebian_linuxenterprise_linux_server_eusenterprise_linux_server_ausgoenterprise_linux_server_tusn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2014-8660
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.18% / 40.35%
||
7 Day CHG~0.00%
Published-06 Nov, 2014 | 15:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SAP Document Management Services allows local users to execute arbitrary commands via unspecified vectors.

Action-Not Available
Vendor-n/aSAP SE
Product-document_management_servicesn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2008-4451
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.14% / 34.96%
||
7 Day CHG~0.00%
Published-06 Oct, 2008 | 23:00
Updated-07 Aug, 2024 | 10:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SysInspector AntiStealth driver (esiasdrv.sys) 3.0.65535.0 in ESET System Analyzer Tool 1.1.1.0 allows local users to execute arbitrary code via a certain METHOD_NEITHER IOCTL request to \Device\esiasdrv that overwrites a pointer.

Action-Not Available
Vendor-eset_softwaren/a
Product-system_analyzer_tooln/a
CWE ID-CWE-264
Not Available
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2008-3949
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.07% / 22.78%
||
7 Day CHG~0.00%
Published-22 Sep, 2008 | 17:00
Updated-07 Aug, 2024 | 10:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

emacs/lisp/progmodes/python.el in Emacs 22.1 and 22.2 imports Python script from the current working directory during editing of a Python file, which allows local users to execute arbitrary code via a Trojan horse Python file.

Action-Not Available
Vendor-n/aSUSE
Product-suse_linuxn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2008-0600
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.2||HIGH
EPSS-0.45% / 62.64%
||
7 Day CHG~0.00%
Published-12 Feb, 2008 | 20:00
Updated-07 Aug, 2024 | 07:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2008-0302
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.08% / 23.50%
||
7 Day CHG~0.00%
Published-17 Jan, 2008 | 01:00
Updated-07 Aug, 2024 | 07:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Untrusted search path vulnerability in apt-listchanges.py in apt-listchanges before 2.82 allows local users to execute arbitrary code via a malicious apt-listchanges program in the current working directory.

Action-Not Available
Vendor-n/aDebian GNU/Linux
Product-apt-listchangesn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2022-2054
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-8.4||HIGH
EPSS-0.13% / 33.26%
||
7 Day CHG~0.00%
Published-12 Jun, 2022 | 13:55
Updated-03 Aug, 2024 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Code Injection in nuitka/nuitka

Code Injection in GitHub repository nuitka/nuitka prior to 0.9.

Action-Not Available
Vendor-nuitkanuitka
Product-nuitkanuitka/nuitka
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found