Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-28711

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-11 Aug, 2023 | 02:37
Updated At-02 Oct, 2024 | 13:24
Rejected At-
Credits

Insufficient control flow management in the Hyperscan Library maintained by Intel(R) before version 5.4.1 may allow an authenticated user to potentially enable denial of service via local access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:11 Aug, 2023 | 02:37
Updated At:02 Oct, 2024 | 13:24
Rejected At:
▼CVE Numbering Authority (CNA)

Insufficient control flow management in the Hyperscan Library maintained by Intel(R) before version 5.4.1 may allow an authenticated user to potentially enable denial of service via local access.

Affected Products
Vendor
n/a
Product
Hyperscan Library maintained by Intel(R)
Default Status
unaffected
Versions
Affected
  • before version 5.4.1
Problem Types
TypeCWE IDDescription
N/AN/Adenial of service
CWECWE-691Insufficient control flow management
Type: N/A
CWE ID: N/A
Description: denial of service
Type: CWE
CWE ID: CWE-691
Description: Insufficient control flow management
Metrics
VersionBase scoreBase severityVector
3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00879.html
N/A
Hyperlink: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00879.html
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00879.html
x_transferred
Hyperlink: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00879.html
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:11 Aug, 2023 | 03:15
Updated At:07 Nov, 2023 | 04:10

Insufficient control flow management in the Hyperscan Library maintained by Intel(R) before version 5.4.1 may allow an authenticated user to potentially enable denial of service via local access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Secondary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Intel Corporation
intel
>>hyperscan_library>>Versions before 5.4.1(exclusive)
cpe:2.3:a:intel:hyperscan_library:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-670Primarynvd@nist.gov
CWE-691Secondarysecure@intel.com
CWE ID: CWE-670
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-691
Type: Secondary
Source: secure@intel.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00879.htmlsecure@intel.com
Vendor Advisory
Hyperlink: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00879.html
Source: secure@intel.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

136Records found

CVE-2022-29466
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.3||HIGH
EPSS-0.04% / 11.69%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for Intel(R) SPS before version SPS_E3_04.01.04.700.0 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_platform_services_firmwareIntel(R) SPS
CWE ID-CWE-20
Improper Input Validation
CVE-2023-32544
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.3||HIGH
EPSS-0.05% / 13.54%
||
7 Day CHG~0.00%
Published-19 Jan, 2024 | 20:03
Updated-17 Jun, 2025 | 21:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in some Intel HotKey Services for Windows 10 for Intel NUC P14E Laptop Element software installers before version 1.1.45 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_p14e_laptop_elementIntel HotKey Services for Windows 10 for Intel NUC P14E Laptop Element software installers
CWE ID-CWE-284
Improper Access Control
CVE-2019-11089
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.16% / 37.16%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 19:05
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in Kernel Mode module for Intel(R) Graphics Driver before version 25.20.100.6519 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.
Product-graphics_drivercloud_backupsteelstore_cloud_integrated_storagesolidfire_baseboard_management_controller_firmwaresolidfire_baseboard_management_controllerdata_availability_services2019.2 IPU – Intel(R) Graphics Driver for Windows* and Linux
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0147
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 16.33%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:23
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_controller_x710-at2_firmwareethernet_controller_x710-tm4_firmwareethernet_controller_x710-bm2_firmwareethernet_controller_710-bm1ethernet_controller_xxv710-am2ethernet_controller_xxv710-am1_firmwareethernet_controller_xxv710-am1ethernet_controller_x710-bm2ethernet_controller_xxv710-am2_firmwareethernet_700_series_softwareethernet_controller_x710-at2ethernet_controller_710-bm1_firmwareethernet_controller_x710-tm42019.2 IPU – Intel(R) Ethernet 700 Series Controllers
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0146
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.16% / 37.12%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:23
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Resource leak in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 2.8.43 may allow an authenticated user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_controller_x710-at2_firmwareethernet_controller_x710-tm4_firmwareethernet_controller_x710-bm2_firmwareethernet_controller_710-bm1ethernet_controller_xxv710-am2ethernet_controller_xxv710-am1_firmwareethernet_controller_xxv710-am1ethernet_controller_x710-bm2ethernet_controller_xxv710-am2_firmwareethernet_700_series_softwareethernet_controller_x710-at2ethernet_controller_710-bm1_firmwareethernet_controller_x710-tm42019.2 IPU – Intel(R) Ethernet 700 Series Controllers
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2019-0154
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 21.28%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:19
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aCanonical Ltd.Intel Corporation
Product-xeon_e3-1230_v5core_i7-7700kcore_i7-8705gpentium_silver_n5000_firmwarecore_i7-8665uxeon_e-2276mxeon_e3-1558l_v5core_i7-7660ucore_i7-6600ucore_i7-8706gxeon_e3-1565l_v5_firmwarexeon_e3-1565l_v5xeon_e3-1501l_v6_firmwarexeon_e-2236core_i9-9880h_firmwarecore_i7-8700t_firmwarexeon_e-2236_firmwarexeon_e-2124g_firmwarexeon_e-2126g_firmwareatom_x5-a3940xeon_e3-1240_v6xeon_e-2254me_firmwarecore_i7-8700core_i7-8665ue_firmwarexeon_e-2276me_firmwarexeon_e3-1220_v5_firmwarecore_i7-8705g_firmwareatom_x5-a3930_firmwarecore_i7-7700tcore_i7-8086kcore_i7-6600u_firmwarecore_i7-6770hqcore_i7-8700kcore_i7-6650u_firmwarexeon_e3-1280_v5core_i9-9900kfxeon_e-2226gxeon_e3-1270_v6_firmwarexeon_e3-1285_v6_firmwarecore_i7-6822eqxeon_e-2276m_firmwarexeon_e-2134core_i7-6700teceleron_j3455core_i7-6567u_firmwarexeon_e3-1501l_v6xeon_e-2226g_firmwarecore_i7-7600uxeon_e3-1285_v6xeon_e-2224xeon_e-2186m_firmwarexeon_e3-1225_v6core_i7-8569u_firmwarecore_i7\+8700_firmwarexeon_e-2144g_firmwarexeon_e3-1240l_v5xeon_e3-1225_v5_firmwarexeon_e3-1505l_v6xeon_e-2278gexeon_e-2134_firmwareceleron_n4100core_i7-7600u_firmwarecore_i7-7700hqxeon_e3-1240_v5_firmwarecore_i7-7820hkxeon_e3-1245_v5core_i7-6870hqxeon_e3-1558l_v5_firmwarecore_i7-6970hqceleron_n4000_firmwarexeon_e3-1505l_v6_firmwareceleron_j3455_firmwarexeon_e-2136xeon_e-2246gcore_i7-8500y_firmwareatom_x5-a3940_firmwarexeon_e3-1270_v5_firmwareatom_x7-a3950_firmwarecore_i7-8700b_firmwarexeon_e3-1275_v5_firmwarexeon_e3-1535m_v5xeon_e3-1535m_v5_firmwarecore_i7-7700core_i7-6820hq_firmwarecore_i7-7820hq_firmwarecore_i7-7920hqxeon_e3-1575m_v5_firmwarecore_i7-7920hq_firmwarexeon_e3-1268l_v5core_i9-9900ks_firmwarexeon_e-2254mlxeon_e3-1545m_v5core_i7-8700k_firmwarexeon_e-2124_firmwarexeon_e3-1260l_v5_firmwarexeon_e3-1240_v6_firmwarexeon_e3-1501m_v6_firmwarecore_i7-8700_firmwarecore_i7-8750hxeon_e3-1501m_v6xeon_e3-1505m_v5_firmwarexeon_e-2226ge_firmwarexeon_e-2254ml_firmwareceleron_j4105_firmwarexeon_e3-1578l_v5core_i7-6660uxeon_e3-1270_v5pentium_n4200_firmwarexeon_e3-1260l_v5xeon_e3-1270_v6pentium_silver_n5000xeon_e-2286mxeon_e3-1505m_v5core_i7-8557u_firmwarecore_i7-7820eq_firmwarexeon_e-2276gxeon_e-2186gxeon_e-2276mlxeon_e-2244gxeon_e-2174gcore_i9-9900kxeon_e-2176gcore_i7-8809gceleron_j4105core_i7-8709gcore_i7-8700bxeon_e3-1230_v6_firmwarecore_i7-7y75_firmwarecore_i7-8550u_firmwarecore_i7-7500u_firmwarexeon_e3-1275_v6_firmwarexeon_e3-1585_v5xeon_e3-1225_v6_firmwarecore_i7-6700k_firmwarecore_i7-7820hk_firmwarecore_i7-8557ucore_i9-9900kf_firmwarecore_i7-6560uxeon_e-2278ge_firmwareceleron_j3355core_i7-6820hk_firmwarecore_i7-8700txeon_e3-1280_v5_firmwarecore_i7-6820hqxeon_e3-1220_v6_firmwarecore_i7-8650uxeon_e3-1535m_v6_firmwarexeon_e-2286m_firmwarecore_i7-6700tcore_i7-6920hqcore_i9-9900ksxeon_e3-1230_v6atom_x7-a3950core_i7-6700_firmwarexeon_e3-1585l_v5_firmwarexeon_e3-1240l_v5_firmwarexeon_e-2234_firmwareatom_x5-a3930core_i7-8565u_firmwarecore_i7-6822eq_firmwarexeon_e-2224_firmwarexeon_e-2186g_firmwareceleron_n3350xeon_e-2274gxeon_e-2124gpentium_silver_j5005xeon_e-2278gelxeon_e3-1280_v6xeon_e-2288gcore_i7-6700t_firmwarexeon_e-2234xeon_e3-1245_v5_firmwarecore_i7-8709g_firmwarecore_i7-6500ucore_i7-6500u_firmwarecore_i7-6700kxeon_e3-1280_v6_firmwarexeon_e-2124celeron_n4100_firmwarecore_i9-9880hcore_i7-6820eq_firmwarepentium_silver_j5005_firmwarexeon_e-2136_firmwarexeon_e-2276g_firmwarexeon_e3-1235l_v5_firmwarexeon_e-2276mecore_i7-8565uceleron_n3350_firmwarexeon_e-2274g_firmwarexeon_e-2126gcore_i7-7560ucore_i7-8706g_firmwarecore_i7-6920hq_firmwarecore_i7-7820eqxeon_e3-1535m_v6core_i9-9900celeron_n3450_firmwarexeon_e3-1220_v5core_i7-8650u_firmwarexeon_e-2146g_firmwarexeon_e3-1220_v6core_i7-6785r_firmwarecore_i7-8850h_firmwarecore_i9-9900k_firmwarecore_i7-6700hq_firmwarecore_i7-6700hqcore_i7-7700k_firmwarepentium_n4200core_i7-7567u_firmwarexeon_e-2186mxeon_e-2176mcore_i7-6970hq_firmwarecore_i7-6785rcore_i7-7700hq_firmwarecore_i7-6820hkcore_i7-6660u_firmwarexeon_e3-1230_v5_firmwarexeon_e-2278g_firmwarecore_i7-7500ucore_i7-8550uubuntu_linuxxeon_e-2276ml_firmwarexeon_e-2224gxeon_e-2286gxeon_e3-1268l_v5_firmwarecore_i7-6700te_firmwarepentium_j4205xeon_e3-1275_v6xeon_e-2226gexeon_e-2244g_firmwarecore_i7-6650uxeon_e3-1575m_v5xeon_e-2278gxeon_e3-1505l_v5xeon_e3-1245_v6core_i7-8559u_firmwarecore_i7-8850hcore_i7-8086k_firmwareceleron_j4005_firmwarexeon_e3-1585_v5_firmwarexeon_e-2176g_firmwarecore_i7-8665u_firmwarecore_i7-6560u_firmwarecore_i7-6820eqcore_i7-8500ycore_i7-7567uxeon_e3-1505m_v6_firmwarecore_i9-9900tcore_i9-9900_firmwarexeon_e3-1545m_v5_firmwarexeon_e3-1235l_v5core_i7\+8700core_i7-7660u_firmwarepentium_j4205_firmwarexeon_e3-1585l_v5core_i7-7820hqcore_i7-8750h_firmwarexeon_e3-1275_v5core_i7-8665uecore_i7-8809g_firmwarexeon_e3-1240_v5xeon_e-2288g_firmwareceleron_n4000core_i7-7700t_firmwarecore_i9-9980hk_firmwarexeon_e-2246g_firmwarecore_i7-6567uxeon_e-2176m_firmwarexeon_e-2174g_firmwareceleron_n3450xeon_e3-1515m_v5xeon_e3-1505l_v5_firmwarexeon_e3-1225_v5core_i7-6870hq_firmwarexeon_e-2278gel_firmwarexeon_e-2144gxeon_e3-1245_v6_firmwarexeon_e3-1515m_v5_firmwarecore_i7-8569ucore_i7-7700_firmwarecore_i7-6770hq_firmwarexeon_e-2254mecore_i7-7y75celeron_j3355_firmwareceleron_j4005core_i7-7560u_firmwarexeon_e-2286g_firmwarecore_i7-6700xeon_e3-1505m_v6core_i9-9980hkcore_i7-8559ucore_i9-9900t_firmwarexeon_e-2146gxeon_e-2224g_firmwarexeon_e3-1578l_v5_firmware2019.2 IPU – Intel(R) Processor Graphics Update
CVE-2019-0149
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.12% / 31.09%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:24
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 2.8.43 may allow an authenticated user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_controller_x710-at2_firmwareethernet_controller_x710-tm4_firmwareethernet_controller_x710-bm2_firmwareethernet_controller_710-bm1ethernet_controller_xxv710-am2ethernet_controller_xxv710-am1_firmwareethernet_controller_xxv710-am1ethernet_controller_x710-bm2ethernet_controller_xxv710-am2_firmwareethernet_700_series_softwareethernet_controller_x710-at2ethernet_controller_710-bm1_firmwareethernet_controller_x710-tm42019.2 IPU – Intel(R) Ethernet 700 Series Controllers
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0148
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.16% / 37.12%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:23
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Resource leak in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_controller_x710-at2_firmwareethernet_controller_x710-tm4_firmwareethernet_controller_x710-bm2_firmwareethernet_controller_710-bm1ethernet_controller_xxv710-am2ethernet_controller_xxv710-am1_firmwareethernet_controller_xxv710-am1ethernet_controller_x710-bm2ethernet_controller_xxv710-am2_firmwareethernet_700_series_softwareethernet_controller_x710-at2ethernet_controller_710-bm1_firmwareethernet_controller_x710-tm42019.2 IPU – Intel(R) Ethernet 700 Series Controllers
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2019-0143
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.17% / 38.82%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:22
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unhandled exception in Kernel-mode drivers for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_controller_x710-at2_firmwareethernet_controller_x710-tm4_firmwareethernet_controller_x710-bm2_firmwareethernet_controller_710-bm1ethernet_controller_xxv710-am2ethernet_controller_xxv710-am1ethernet_controller_xxv710-am1_firmwareethernet_controller_x710-bm2ethernet_controller_xxv710-am2_firmwareethernet_700_series_softwareethernet_controller_x710-at2ethernet_controller_710-bm1_firmwareethernet_controller_x710-tm42019.2 IPU – Intel(R) Ethernet 700 Series Controllers
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
CVE-2018-3634
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.85%
||
7 Day CHG~0.00%
Published-15 May, 2018 | 14:00
Updated-16 Sep, 2024 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Parameter corruption in NDIS filter driver in Intel Online Connect Access 1.9.22.0 allows an attacker to cause a denial of service via local access.

Action-Not Available
Vendor-Intel Corporation
Product-online_connect_accessOnline Connect Access
CWE ID-CWE-20
Improper Input Validation
CVE-2022-23403
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.13% / 33.32%
||
7 Day CHG~0.00%
Published-18 Aug, 2022 | 19:55
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the Intel(R) Data Center Manager software before version 4.1 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-data_center_managerIntel(R) Data Center Manager software
CWE ID-CWE-20
Improper Input Validation
CVE-2022-21180
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.09% / 26.82%
||
7 Day CHG~0.00%
Published-15 Jun, 2022 | 20:04
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel(R) Processors may allow an authenticated user to potentially cause a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1565l_v5core_i7-6870hqxeon_e-2286gcore_i7-8670t_firmwarepentium_gold_g5500tcore_i7-7700t_firmwarecore_i3-10100core_i3-7320t_firmwarecore_i7-8850h_firmwarecore_i5-11400core_i7-10510yceleron_g5900t_firmwarexeon_e3-1220_v5core_i5-7y57_firmwarexeon_e-2174g_firmwarecore_i7-10710u_firmwarecore_i9-11900_firmwarexeon_e-2276ml_firmwarexeon_e3-1505m_v5_firmwarexeon_w-1270p_firmwarexeon_e3-1578l_v5_firmwarexeon_e-2246gcore_i9-10900_firmwarecore_i5-6350hqcore_i3-6300txeon_e-2374gcore_i5-8500t_firmwarecore_i7-9700k_firmwarexeon_e-2254ml_firmwarexeon_e-2236xeon_e3-1220_v5_firmwarexeon_e-2374g_firmwarecore_i7-8709g_firmwarepentium_gold_g6605pentium_gold_g6405u_firmwarepentium_gold_g5400tcore_i5-6500tcore_i5-7500core_i7-10875h_firmwarecore_i9-9900kf_firmwarecore_4415uxeon_e3-1545m_v5_firmwarecore_i3-6120core_i7-8709gcore_i5-7440hqxeon_w-10855mxeon_e-2278gepentium_gold_g5600_firmwarecore_i9-11900kfcore_i5-10600t_firmwarepentium_gold_g6505xeon_w-1270xeon_e3-1505l_v6xeon_e-2254me_firmwarecore_i7-11700k_firmwarecore_i5-10300h_firmwarepentium_gold_g6400core_i9-10900tpentium_gold_g5400_firmwarexeon_e-2126gcore_i5-8200ycore_i5-10500t_firmwarecore_i9-10900kcore_i5-10600_firmwarecore_i7-10700tecore_i7-8809g_firmwarecore_i5-11400fcore_i5-10400txeon_w-1290exeon_e3-1235l_v5core_i3-7110u_firmwarecore_5405u_firmwarecore_i7-6820eq_firmwareceleron_g5925_firmwarecore_i7-9700kfpentium_g4420t_firmwarepentium_g4520_firmwarecore_i5-7287u_firmwarexeon_w-1290te_firmwarecore_i3-8000tcore_i5-7600k_firmwarecore_i5-8305g_firmwarecore_i5-10110y_firmwarecore_i5-8650k_firmwarecore_i9-10900te_firmwarecore_i9-11900kcore_i3-8300t_firmwarecore_i3-7167u_firmwarecore_i5-10600kfxeon_w-10855_firmwarecore_i7-10700_firmwarepentium_gold_g6600_firmwarexeon_e-2146gcore_i9-10850hcore_i7-7820eq_firmwarecore_i5-8210y_firmwarecore_i5-9400fpentium_gold_g5420tcore_i7-10700kf_firmwarexeon_e-2286g_firmwarexeon_e3-1515m_v5core_i7-7560uceleron_g3920t_firmwarecore_i7-8550u_firmwarecore_i5-7600txeon_e-2284g_firmwarecore_i5-11600kfcore_i5-8365uceleron_g5900_firmwarexeon_e3-1260l_v5_firmwarexeon_e3-1240l_v5core_i5-9600kfpentium_g4500xeon_e-2288g_firmwarexeon_e-2276mxeon_e-2224gcore_i5-8600_firmwarecore_i5-8269ucore_i3-8100_firmwarepentium_g4500txeon_e3-1505m_v5core_i5-7600t_firmwarepentium_g4500_firmwarecore_i7-7510uxeon_e3-1535m_v6_firmwarecore_i7-10810ucore_i3-10300tcore_i7-7820hq_firmwarecore_i3-8100pentium_gold_g5500_firmwarepentium_gold_g5500t_firmwarexeon_e-2378g_firmwarecore_i9-11900core_i5-9600kcore_i5-8265ucore_i9-9900kfxeon_e-2246g_firmwarecore_i7-10700tcore_i5-8650core_i5-6300hqcore_i7-7600u_firmwarecore_i3-6120_firmwarecore_i7-9700kf_firmwarecore_i5-9300hcore_i7-10750hcore_i9-10850kceleron_g3920core_i5-6600t_firmwarecore_i3-7100e_firmwarecore_i5-8500bcore_3865u_firmwarepentium_gold_g6405xeon_e3-1225_v6_firmwarecore_i5-8250u_firmwarecore_i7-7820hk_firmwarexeon_w-1390_firmwarecore_4415ycore_i5-6600core_i3-8100hcore_i5-8400b_firmwarecore_i7-8706gceleron_g3940_firmwarepentium_gold_g6400tcore_i3-6300celeron_g3900core_i3-8120core_i5-7400t_firmwarecore_i9-11900fxeon_e3-1270_v5_firmwarecore_i5-8365u_firmwareceleron_g3902ecore_3865uxeon_w-1300_firmwarecore_i3-8130u_firmwarecore_i9-10885hcore_i7-8557ucore_i5-7440eqcore_i3-6320xeon_e-2386gcore_i3-8350k_firmwarecore_i5-11400_firmwarepentium_gold_g6605_firmwarexeon_e-2134core_i7-10750h_firmwarexeon_w-1290tecore_i7-8557u_firmwarecore_i5-6440eqcore_i9-10980hkxeon_e-2176mcore_i9-10900t_firmwarecore_i7-10700k_firmwarepentium_gold_g6505_firmwarecore_i5-11400f_firmwarecore_i3-10305_firmwarecore_i3-7100u_firmwarexeon_e-2274gcore_i3-10325_firmwarecore_i7-10510y_firmwarecore_i9-11900k_firmwareceleron_g5905t_firmwarexeon_e-2134_firmwarecore_i3-7007u_firmwarecore_i5-7267u_firmwarecore_i7-8500ycore_i5-7640x_firmwarecore_i9-11900t_firmwarexeon_e-2226g_firmwarepentium_g4520core_i5-7400_firmwarecore_i7-6700te_firmwarexeon_w-1370pentium_g4400_firmwareceleron_g3900te_firmwarexeon_e-2174gcore_i5-8600tcore_i7-8510y_firmwarexeon_e3-1585_v5_firmwarecore_i5-7200u_firmwarexeon_e3-1220_v6pentium_gold_g5420_firmwarecore_i7-7y75_firmwarepentium_gold_g6405t_firmwarexeon_e3-1220_v6_firmwareceleron_g3930ecore_i3-10320_firmwareceleron_g4900t_firmwarexeon_e-2176gxeon_e-2288gcore_i3-6100hcore_i7-7500uxeon_e-2274g_firmwarexeon_e3-1225_v6xeon_w-1370pcore_i3-6320t_firmwarexeon_e3-1280_v6core_i3-10320core_i5-8420t_firmwarepentium_gold_g5400xeon_e-2124g_firmwarecore_i3-10105fcore_i3-7120_firmwarexeon_w-1390t_firmwarexeon_e-2224_firmwarecore_i5-6400core_4415u_firmwarecore_i7-10875hcore_i5-6300hq_firmwarepentium_g4420tcore_i3-7101tecore_i7-7700core_i5-10400hcore_i5-6440eq_firmwarecore_i5-7300hqcore_i5-9600kf_firmwarecore_i5-10505_firmwarexeon_w-10885mxeon_e-2224g_firmwarexeon_e3-1505m_v6pentium_gold_g6500_firmwarecore_4410y_firmwarexeon_e3-1535m_v5core_i5-6600kcore_i5-10110yxeon_e3-1505m_v6_firmwarecore_i3-7007uxeon_e-2254mecore_i9-11900kf_firmwarexeon_e3-1505l_v5core_i7-8500y_firmwarecore_i7-6700t_firmwarecore_i7-6700tcore_i7-6822eq_firmwarecore_i5-6442eq_firmwarecore_i3-6102e_firmwarecore_i3-10105tcore_i9-9900k_firmwarecore_i7-6820hk_firmwarecore_i5-6500tecore_i7-10510u_firmwarecore_i7-7700_firmwarecore_i3-8100h_firmwareceleron_g5905_firmwarecore_i5-6500core_i3-10105t_firmwarecore_i5-10400h_firmwarecore_i9-10900kfcore_i9-9980hk_firmwarexeon_e-2144gcore_i3-10100tpentium_gold_g6600core_i7-7700hq_firmwarecore_i5-8300h_firmwarexeon_e3-1270_v6_firmwarecore_i9-9980hkcore_3965y_firmwarecore_i5-8500b_firmwarexeon_e-2244gcore_i3-6102exeon_w-1390tceleron_g3902e_firmwarecore_i7-6770hqcore_i7-10610uxeon_e3-1235l_v5_firmwarecore_i7-9850h_firmwarecore_i7-11700kfpentium_gold_g5420core_i7-11700_firmwarecore_i7-7740xcore_i7-7y75core_i7-8559ucore_i9-10850h_firmwarexeon_e3-1575m_v5core_i5-7210ucore_i5-8550_firmwarexeon_e-2124gcore_i5-11500tcore_i7-8670_firmwarecore_i7-8560ucore_i5-9400pentium_gold_g5600core_i3-6320_firmwarecore_i3-6100e_firmwarexeon_e3-1285_v6_firmwarexeon_w-1290t_firmwarecore_i3-10325xeon_e-2356gcore_i5-8500_firmwarecore_i7-8700core_i3-7130uxeon_e3-1585l_v5_firmwarecore_i5-8400xeon_e3-1585_v5core_i3-10105f_firmwarexeon_e-2334core_i5-7440hq_firmwarecore_i7-9850hcore_i5-7300hq_firmwarecore_i5-8650kxeon_w-1350core_i3-10110u_firmwarecore_i5-7600xeon_e3-1505l_v5_firmwarecore_i7-8750hfxeon_e3-1280_v5_firmwarexeon_w-1290core_i9-11900f_firmwarexeon_e-2186gxeon_e-2314_firmwarecore_i5-8310y_firmwarecore_i3-10110ucore_i7-8665u_firmwarecore_i9-10885h_firmwarexeon_e3-1280_v5core_i7-7567u_firmwarecore_i5-7442eq_firmwarecore_i5-11500_firmwarecore_i7-6770hq_firmwarecore_i7-8569u_firmwarecore_3965ycore_i5-8420_firmwarexeon_w-1350pcore_i9-10900xeon_e3-1230_v6_firmwarexeon_e3-1565l_v5_firmwarexeon_e3-1275_v6core_i5-7360uxeon_w-1250core_i5-7300ucore_i3-10300xeon_w-1290p_firmwareceleron_g5925core_i5-7600_firmwarecore_i5-6600tcore_i3-8100t_firmwarexeon_w-1250p_firmwarexeon_e3-1230_v5_firmwarecore_i5-6500t_firmwareceleron_g5920core_i3-7100h_firmwarecore_i7-8565ucore_i7-8670core_4205uxeon_e3-1578l_v5core_3965ucore_i5-8400_firmwarexeon_e-2104g_firmwarexeon_e-2234_firmwarecore_i7-7700kcore_i7-8510ycore_i7-10870hceleron_g3900t_firmwarecore_i7-10510ucore_i3-7320tcore_i3-6300t_firmwarecore_i3-10100fxeon_w-1290ppentium_gold_g5500core_i7-7920hq_firmwareceleron_5305u_firmwareceleron_g4900_firmwareceleron_g3940core_i5-8310ycore_i3-10300_firmwarecore_i5-6440hqcore_i7-9750hf_firmwarexeon_e-2324gcore_i7-6870hq_firmwarecore_i3-6100ecore_i5-7200uxeon_e3-1270_v5core_i3-8000t_firmwarecore_i5-8265u_firmwarecore_i7-6970hq_firmwarepentium_g4520t_firmwarexeon_e-2186m_firmwarecore_i7-6820hqcore_i5-10210ucore_i3-8000_firmwarexeon_e-2234pentium_gold_g5400t_firmwarecore_i5-10500core_i7-7740x_firmwarecore_i5-8400bpentium_gold_g6405tceleron_g5900tcore_i7-8850hcore_i3-7100hcore_i9-8950hk_firmwarecore_i5-8400h_firmwarecore_i5-11600_firmwarexeon_e3-1240_v6_firmwarecore_i5-10400t_firmwarecore_i5-6350hq_firmwarecore_i3-10100_firmwarecore_i9-8950hkxeon_e3-1230_v6core_i9-10900tecore_i5-11600kxeon_e3-1501l_v6xeon_e-2378core_i5-10600tcore_i5-10600kf_firmwarecore_i7-7700k_firmwarecore_i5-7640xcore_i5-7500uxeon_w-1290_firmwarexeon_e-2386g_firmwarexeon_e-2176m_firmwarecore_i5-9400hcore_i9-10900e_firmwarexeon_e-2278g_firmwarexeon_e3-1240_v6celeron_g5205u_firmwarexeon_e3-1230_v5xeon_e3-1240_v5_firmwarepentium_gold_g6505tcore_i7-7660uxeon_e3-1275_v5_firmwarexeon_e-2278gel_firmwarecore_i3-6320tcore_i7-7700hqcore_i7-6820hq_firmwarexeon_e-2236_firmwarexeon_e-2244g_firmwarepentium_gold_g6500tcore_i3-10100t_firmwarecore_i7-10700f_firmwarecore_m3-7y30core_i5-8269u_firmwarecore_i3-6100t_firmwarecore_i3-10105xeon_e3-1505l_v6_firmwarexeon_e3-1285_v6pentium_g4400te_firmwareceleron_g4900tceleron_g3900tcore_i5-11400tcore_i7-11700kcore_i9-10900kf_firmwarecore_i7-8550uxeon_e-2276mlxeon_e3-1225_v5_firmwarecore_i7-10810u_firmwarexeon_e3-1245_v6_firmwarexeon_w-1350_firmwarecore_i3-7101e_firmwarecore_i9-9880h_firmwarexeon_e3-1270_v6core_i7-6700hqxeon_e3-1545m_v5core_i5-6500_firmwarecore_i3-7102e_firmwarexeon_e3-1515m_v5_firmwarecore_i3-8300pentium_gold_g6400t_firmwarexeon_e-2334_firmwarexeon_e-2276me_firmwarepentium_g4520tcore_i7-10700kfcore_i5-8400tcore_i5-6440hq_firmwarecore_i5-7500tceleron_g5905xeon_w-1370p_firmwarecore_i5-11600kf_firmwarexeon_e-2136_firmwarexeon_w-1270_firmwarexeon_e-2276mecore_i5-7y54core_i5-7400core_i3-6100te_firmwarecore_i7-8700b_firmwarecore_i5-9400f_firmwarexeon_e-2356g_firmwarecore_i7-8706g_firmwarecore_i3-10305t_firmwarecore_i5-7287uxeon_w-10855m_firmwarexeon_e-2146g_firmwarecore_i7-7660u_firmwarecore_i9-10850k_firmwarecore_i7-7920hqcore_i7-10700core_i5-6600_firmwarexeon_e-2126g_firmwarexeon_w-1350p_firmwarecore_i7-10610u_firmwareceleron_g4920_firmwareceleron_g3920_firmwarecore_i3-7020ucore_i5-11600k_firmwarecore_i3-8145u_firmwarecore_i5-8600k_firmwarexeon_e-2136xeon_w-1270pxeon_e-2378_firmwarecore_i3-8145ucore_i5-10400core_i3-7020u_firmwarecore_i7-7567uxeon_w-1250pcore_i7-8700kcore_i3-7130u_firmwarecore_i7-10870h_firmwarepentium_g4500t_firmwarecore_i7-7820eqcore_i3-6120tcore_i7-7820hqcore_i7-9700kceleron_g4920core_i7-11700kf_firmwarepentium_gold_g6405_firmwarepentium_g4420core_i7-6920hq_firmwarecore_i3-8109ucore_5405ucore_i5-8420tpentium_g4540core_i5-8200y_firmwarexeon_e-2144g_firmwarecore_i7-10700te_firmwarecore_i7-10700exeon_e3-1585l_v5core_i5-8350uceleron_g5305uxeon_e3-1275_v5core_i7-8750h_firmwarecore_i3-10100teceleron_g5205uxeon_e3-1558l_v5_firmwarepentium_gold_g5420t_firmwarecore_i5-10210u_firmwarexeon_e-2388gxeon_e-2226gcore_i5-7y57core_i7-6700teceleron_g5905tcore_i3-10100te_firmwarecore_i3-6120t_firmwarecore_i5-7260uxeon_e-2278gcore_i5-10600k_firmwarecore_i9-10900ecore_i5-8259u_firmwarexeon_e-2124core_i5-8250ucore_i5-8600xeon_e-2186g_firmwarepentium_g4540_firmwarecore_m3-8100y_firmwarecore_3965u_firmwarecore_i5-10500tecore_i7-6700_firmwarecore_i7-8559u_firmwarecore_i5-7500_firmwarecore_4205u_firmwarecore_i7-7500u_firmwarecore_i5-10210y_firmwarecore_i7-8700k_firmwarexeon_e-2184g_firmwarecore_i3-6100tecore_i3-8000core_i7-11700core_i5-11500celeron_g3900tecore_i7-8700bpentium_g4400t_firmwarecore_i5-10500tcore_i5-10600xeon_e3-1240l_v5_firmwarecore_i5-10500_firmwarexeon_e3-1501l_v6_firmwarexeon_e3-1260l_v5core_i5-10310ycore_i5-10310y_firmwarepentium_gold_g6500t_firmwarecore_i5-8259ucore_i5-11500t_firmwarexeon_e-2388g_firmwarepentium_gold_g6405ucore_i7-10700kxeon_e-2336xeon_e3-1575m_v5_firmwarexeon_e3-1225_v5core_i3-8109u_firmwarexeon_e-2186mxeon_e3-1558l_v5core_i5-11600t_firmwarecore_i9-9880hcore_i7-8705g_firmwarexeon_e-2286mcore_i5-7442eqxeon_w-1300core_i5-6400_firmwarecore_i3-8130ucore_i5-7500u_firmwarecore_i3-7167ucore_i3-8300tcore_i3-7340core_i5-11600tcore_i7-8650ucore_i5-10200hxeon_e3-1268l_v5xeon_e-2284gcore_i7-8705gcore_i9-9900kcore_i5-10400fxeon_e-2324g_firmwarecore_i7-7600uxeon_e-2278ge_firmwarecore_i3-7100epentium_gold_g6400_firmwarexeon_w-10855core_i5-9400_firmwarecore_i7-7510u_firmwarexeon_e3-1535m_v6core_i3-7101exeon_w-10885m_firmwarexeon_e-2276m_firmwarecore_i5-8400t_firmwarecore_i5-8400hxeon_e-2286m_firmwarexeon_e3-1245_v5core_i3-7120xeon_e3-1501m_v6_firmwarecore_i7-9750hfxeon_e-2176g_firmwarecore_i7-7820hkcore_i5-9300h_firmwarexeon_e-2254mlcore_i5-8305gcore_i3-6100celeron_g5900xeon_w-1390celeron_g3930tecore_i7-11700t_firmwarecore_i5-7400tcore_i5-11600core_i7-8750hcore_i3-6100tcore_i7-11700fcore_i7-8665ucore_i3-10305tcore_i5-7210u_firmwarexeon_e3-1275_v6_firmwarecore_i5-8300hxeon_w-1370_firmwarecore_i3-7101te_firmwarecore_i5-7440eq_firmwarecore_i5-8420core_i5-7360u_firmwarecore_i3-8350kcore_i5-10600kcore_i7-10850hcore_i3-7120tcore_i3-8120_firmwarecore_i7-8560u_firmwarecore_i5-10500te_firmwarecore_i3-8020_firmwarexeon_w-1290e_firmwarecore_i5-7y54_firmwarecore_i3-10300t_firmwarexeon_e3-1280_v6_firmwarexeon_w-1390p_firmwarecore_i5-8550core_i3-10100f_firmwarecore_i9-10900f_firmwarecore_m3-8100ycore_i5-7267ucore_i5-8600kcore_i3-7100ucore_i5-6442eqcore_i7-8700tcore_i7-6700k_firmwarecore_i5-7260u_firmwarecore_i7-11700txeon_e3-1245_v5_firmwarecore_i5-7300u_firmwarecore_i7-8700t_firmwarecore_i7-10700e_firmwarecore_i5-6500te_firmwarecore_i3-7120t_firmwarecore_i5-8600t_firmwarecore_i7-6700kcore_i7-6970hqcore_i3-7340_firmwarecore_i7-6822eqcore_i5-8500xeon_e-2184gcore_i9-11900tcore_i5-9400h_firmwarecore_i5-8210ycore_i5-10400f_firmwarepentium_g4420_firmwarecore_i7-8565u_firmwarecore_i7-8569ucore_i5-11400t_firmwarecore_i7-10700t_firmwarecore_i7-7700txeon_e3-1240_v5xeon_e-2336_firmwarexeon_w-1290tceleron_g3930te_firmwarecore_i7-8809gcore_i5-8500tcore_i3-10105_firmwarecore_i7-8650u_firmwarexeon_e3-1501m_v6core_i5-6400t_firmwarecore_i3-6300_firmwarecore_i7-10850h_firmwarexeon_e3-1535m_v5_firmwarexeon_e-2314core_i3-7110ucore_i5-6400tcore_i3-10305pentium_g4400tecore_i3-6100h_firmwarecore_i7-8700_firmwarexeon_w-1390pcore_i3-8300_firmwarecore_i5-8650_firmwareceleron_g3920tcore_i5-10505core_i7-6700core_i7-6820eqcore_i7-6920hqpentium_g4400tcore_i7-6820hkcore_i7-7560u_firmwarecore_i5-7600kpentium_g4400core_m3-7y30_firmwarecore_i7-10710ucore_i5-10210ycore_i5-10300hcore_i5-8350u_firmwarexeon_e-2276g_firmwarecore_i3-8020celeron_g5920_firmwareceleron_g3930e_firmwarexeon_e-2224pentium_gold_g6500xeon_e-2124_firmwareceleron_5305ucore_i7-11700f_firmwarexeon_w-1250_firmwarecore_i5-7500t_firmwarecore_i9-10900fceleron_g4900xeon_e-2278gelxeon_e3-1245_v6xeon_e-2378gcore_i3-8100tcore_i5-10200h_firmwarecore_i3-6100_firmwarecore_4410ycore_i9-10980hk_firmwarecore_i7-8670tcore_i5-10400_firmwarecore_i5-6600k_firmwarecore_i7-6700hq_firmwarexeon_e-2104gcore_i3-7102epentium_gold_g6505t_firmwarexeon_e3-1268l_v5_firmwarecore_4415y_firmwarexeon_e-2276gceleron_g5305u_firmwareceleron_g3900_firmwarecore_i7-10700fcore_i5-9600k_firmwarecore_i9-10900k_firmwarecore_i7-8750hf_firmwareIntel(R) Processors
CWE ID-CWE-20
Improper Input Validation
CVE-2022-21156
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.17%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Access of uninitialized pointer in the Intel(R) Trace Analyzer and Collector before version 2021.5 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-trace_analyzer_and_collectorIntel(R) Trace Analyzer and Collector
CWE ID-CWE-824
Access of Uninitialized Pointer
CVE-2022-21133
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.17%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in the Intel(R) Trace Analyzer and Collector before version 2021.5 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-trace_analyzer_and_collectorIntel(R) Trace Analyzer and Collector
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-46748
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.10% / 28.78%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 18:50
Updated-13 Feb, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.

Action-Not Available
Vendor-Intel CorporationAdvanced Micro Devices, Inc.
Product-radeon_rx_7700sryzen_5_pro_3200geradeon_pro_w6900xryzen_3_5300uradeon_rx_5700mradeon_rx_vega_m_firmwareradeon_pro_w6500mradeon_rx_7900_greradeon_rx_vega_56core_i5-8305gradeon_pro_vega_56_firmwareryzen_5_4600hsradeon_rx_5600ryzen_7_4980uradeon_rx_5300mradeon_rx_7900mryzen_3_3015ceradeon_rx_7900_xtradeon_rx_5500_xtradeon_rx_6600sradeon_rx_6650mnuc_8_enthusiast_nuc8i7hvkvawradeon_rx_6650_xtradeon_pro_w6800xradeon_rx_6700_xtryzen_5_pro_3400gradeon_rx_7600m_xtryzen_5_pro_3350geryzen_5_5600gryzen_5_pro_3400geradeon_pro_w6600radeon_pro_vega_64radeon_rx_6700mryzen_5_4680uryzen_5_5500unuc_8_enthusiast_nuc8i7hvkvaradeon_pro_w7600radeon_rx_6650m_xtradeon_rx_6700radeon_rx_7700_xtradeon_rx_7600sradeon_rx_6550mradeon_rx_5600_xtradeon_rx_6850m_xtradeon_rx_6550sradeon_pro_w5700radeon_rx_6800ryzen_7_4800hryzen_3_3015eradeon_softwareradeon_rx_6600mradeon_rx_5500mradeon_rx_7900_xtxryzen_7_5700gnuc_8_enthusiast_nuc8i7hnkqcradeon_rx_6900_xtradeon_rx_5600mradeon_rx_6950_xtryzen_3_4300geryzen_5_pro_3200gradeon_rx_vega_64_firmwareryzen_7_4700gryzen_3_4300gryzen_9_4900hsradeon_rx_5700_xtradeon_rx_6500mcore_i7-8706gradeon_rx_6800_xtradeon_pro_w6400radeon_rx_6500_xtradeon_rx_5700radeon_rx_6450mradeon_rx_7800_xtryzen_5_4500uradeon_rx_5300radeon_pro_w5500xradeon_pro_w6300mryzen_5_4600uradeon_pro_w6800x_duoradeon_pro_vega_64_firmwareradeon_rx_5500ryzen_7_4700geryzen_9_4900hradeon_rx_6400radeon_rx_6600_xtradeon_pro_vega_56ryzen_7_5700uradeon_rx_6800mradeon_rx_6300mryzen_5_4600geradeon_rx_7600radeon_pro_w6300radeon_pro_w6600xryzen_5_5500hradeon_pro_w7500radeon_rx_vega_56_firmwareradeon_rx_7600mcore_i7-8709gryzen_7_4700uradeon_pro_w6600mryzen_5_5600gecore_i7-8705gryzen_3_4300uradeon_pro_w5500ryzen_3_5300geryzen_5_4500ryzen_3_4100ryzen_7_4800hsradeon_pro_w5700xradeon_pro_w6800ryzen_7_5700geradeon_rx_6600radeon_rx_vega_64ryzen_3_5300gryzen_5_4600gnuc_kit_nuc8i7hnknuc_kit_nuc8i7hvkryzen_5_pro_3350gryzen_5_4600hradeon_pro_w7800radeon_rx_6700sradeon_rx_5300_xtradeon_rx_6800sRadeon™ RX Vega Series Graphics CardsRadeon™ PRO WX Vega Series Graphics CardsRadeon™ RX 5000/6000/7000 Series Graphics CardsRadeon™ PRO W5000/W6000/W7000 Series Graphics Cards
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-33098
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 19.66%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 19:12
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the Intel(R) Ethernet ixgbe driver for Linux before version 3.17.3 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_500_series_controllers_driverethernet_connection_x540ethernet_connection_x557ethernet_connection_x550Intel(R) Ethernet ixgbe driver for Linux
CWE ID-CWE-20
Improper Input Validation
CVE-2021-33135
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 14.32%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:35
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Uncontrolled resource consumption in the Linux kernel drivers for Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-software_guard_extensionsIntel(R) SGX
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-33073
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 19.66%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 19:22
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Uncontrolled resource consumption in the Intel(R) Distribution of OpenVINOâ„¢ Toolkit before version 2021.4 may allow an unauthenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-distribution_of_openvino_toolkitIntel(R) Distribution of OpenVINOâ„¢ Toolkit
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-33087
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.03%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 18:53
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication in the installer for the Intel(R) NUC M15 Laptop Kit Management Engine driver pack before version 15.0.10.1508 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_m15_laptop_kit_management_engine_driver_packnuc_m15_laptop_kit_lapbc710nuc_m15_laptop_kit_lapbc510Intel(R) NUC M15 Laptop Kit Management Engine driver pack
CWE ID-CWE-287
Improper Authentication
CVE-2022-35883
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-2.2||LOW
EPSS-0.05% / 14.76%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 20:00
Updated-27 Jan, 2025 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NULL pointer dereference in the Intel(R) Media SDK software before version 22.2.2 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-media_software_development_kitIntel(R) Media SDK software
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2021-33069
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.14% / 34.01%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:35
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper resource shutdown or release in firmware for some Intel(R) SSD, Intel(R) SSD DC, Intel(R) Optane(TM) SSD and Intel(R) Optane(TM) SSD DC may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-optane_memory_h20_with_solid_state_storageoptane_ssd_dc_p4800x_firmwareoptane_ssd_dc_p4801x_firmwareoptane_ssd_905poptane_memory_h10_with_solid_state_storage_firmwareoptane_ssd_900poptane_ssd_dc_p4801xoptane_ssd_p5800x_firmwareoptane_memory_h10_with_solid_state_storageoptane_memory_h20_with_solid_state_storage_firmwareoptane_ssd_dc_p4800xoptane_ssd_905p_firmwareoptane_ssd_900p_firmwareoptane_ssd_p5800xIntel(R) SSD, Intel(R) SSD DC, Intel(R) Optane(TM) SSD and Intel(R) Optane(TM) SSD DC
CWE ID-CWE-404
Improper Resource Shutdown or Release
CVE-2021-33096
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.17%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper isolation of shared resources in network on chip for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-82599en_firmware82599eb82599eb_firmware82599es_firmware82599en82599esIntel(R) 82599 Ethernet Controllers and Adapters
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-0110
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 19.66%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 19:24
Updated-03 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in some Intel(R) Thunderbolt(TM) Windows DCH Drivers before version 1.41.1054.0 may allow unauthenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i5-10310ythunderbolt_dch_drivercore_i5-10310ucore_i7-10510ujhl7340jhl7440jhl6540core_i3-1110g4core_i5-10210ucore_i5-10210yjhl8440jhl6240jhl6340core_i5-10610ujhl8540core_i7-1160g7core_i7-10810ucore_i5-1135g7core_i7-10710ucore_i7-10510ycore_i3-10110yjhl7540core_i3-10110ucore_i5-1130g7core_i7-1185g7core_i3-1120g4core_i7-1165g7core_i3-10100ycore_i3-1115g4core_i3-1125g4Intel(R) Thunderbolt(TM) Windows DCH Drivers
CVE-2020-8715
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.16% / 37.88%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:57
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Invalid pointer for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bpblc24rserver_system_r1304wt2gsrserver_system_lsvrp_firmwarecompute_module_hns2600tpfrserver_system_r2208wt2ysrserver_board_s2600wftserver_system_r2312wftzsrserver_system_r1000sp_firmwareserver_board_s2600kprserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r1304sposhbnserver_board_s2600kpfserver_system_lsvrp4304es6xx1server_board_s2600cwtserver_board_s2600kpcompute_module_hns2600bpbserver_board_s2600stbcompute_module_hns2600kprserver_system_r1208wttgsrserver_board_s2600cw2rserver_board_s2600wfqrcompute_module_hns2600tp24rserver_system_r2308wftzsserver_system_r2308wttysserver_system_r1000wf_firmwareserver_board_s2600wftrserver_system_r1304wt2gscompute_module_hns2600tprserver_system_r2208wf0zsserver_board_s2600kptrserver_board_s2600st_firmwareserver_system_r1208sposhorrcompute_module_hns2600tp_firmwareserver_board_s1200splserver_board_s2600cw2srserver_system_r1208wt2gsserver_board_s2600tpserver_system_r2208wttyc1rserver_board_s2600stqrcompute_module_hns2600bpblc24server_board_s2600cw2scompute_module_hns2600kp_firmwareserver_system_vrn2208wfaf83server_board_s2600cwtrserver_board_s1200spsserver_board_s2600bpqserver_system_r2208wt2ysserver_system_r1208wttgsserver_system_r1304wttgsserver_system_r2208wttysrserver_system_r1304sposhbnrserver_system_r2208wfqzsrserver_board_s2600tpfserver_board_s2600cwtsserver_system_lr1304sp_firmwareserver_system_r2312wf0nprserver_board_s2600wttrserver_board_s2600wt2server_system_r1208wfqysrserver_system_vrn2208wfhy6server_board_s2600stqserver_system_r2224wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_nb2208wfqnfviserver_system_r2208wftzsserver_system_r2224wftzsrcompute_module_hns2600bpq24rserver_system_r2224wttysserver_board_s1200sp_firmwareserver_system_lr1304spcfg1rserver_system_lr1304spcfg1server_system_mcb2208wfaf5compute_module_hns2600bps24server_board_s2600bpsserver_board_s2600wt_firmwareserver_board_s2600bpqrserver_system_r2000wt_firmwareserver_system_r1208wt2gsrserver_system_vrn2208wfaf82compute_module_hns2600bpb24rserver_system_r1208wftysserver_system_r2000wf_firmwareserver_board_s2600cwserver_system_r2308wftzsrserver_system_lnetcnt3ycompute_module_s2600tp_firmwarecompute_module_hns2600bps24rserver_system_r1304wftysrserver_system_lsvrp4304es6xxrcompute_module_hns2600bpsrserver_board_s2600wt2rserver_system_mcb2208wfhy2server_board_s2600tpfrcompute_module_hns2600bpblcrserver_board_s2600cwtsrserver_system_r2224wfqzsserver_system_r2308wttysrcompute_module_hns2600tpfserver_system_r2312wftzsserver_system_vrn2208wfaf81server_board_s2600stbrcompute_module_hns2600bpqrserver_system_r2224wttysrserver_system_r2312wttyscompute_module_hns2600bpbrserver_system_r1208sposhorserver_board_s2600bp_firmwareserver_board_s2600bpbrserver_system_r1000wt_firmwareserver_board_s2600wttserver_board_s2600wf0compute_module_hns2600kpserver_system_r2312wfqzsserver_system_mcb2208wfaf6server_system_r1304wftysserver_system_r2208wttysserver_system_r1304sposhorrserver_system_vrn2208waf6compute_module_hns2600bp_firmwareserver_system_r1304sposhorcompute_module_hns2600tpcompute_module_hns2600kpfrcompute_module_hns2600bpqserver_board_s1200sporserver_board_s2600bpbserver_system_mcb2208wfaf4server_board_s1200splrserver_system_lr1304spcfsgx1compute_module_hns2600kpfcompute_module_hns2600bpblcserver_system_r2208wttyc1server_board_s2600cw2server_board_s1200sposerver_board_s2600wfqserver_board_s2600bpsrserver_system_r2312wf0npserver_system_r1304wttgsrserver_system_r2312wttysrserver_board_s2600kp_firmwareserver_system_r1208wttgsbppserver_board_s1200spsrcompute_module_hns2600bpsserver_system_r2208wf0zsrserver_board_s2600kpfrcompute_module_hns2600bpb24server_system_r2208wftzsrserver_system_r1208wftysrserver_board_s2600tprcompute_module_hns2600tp24srserver_board_s2600wf_firmwarecompute_module_hns2600bpq24Intel(R) Server Boards, Server Systems and Compute Modules Advisory
CWE ID-CWE-763
Release of Invalid Pointer or Reference
CVE-2020-8720
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.19% / 40.59%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 03:11
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bpblc24rserver_system_r1304wt2gsrserver_system_lsvrp_firmwarecompute_module_hns2600tpfrserver_system_r2208wt2ysrserver_board_s2600wftserver_system_r2312wftzsrserver_system_r1000sp_firmwareserver_board_s2600kprserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r1304sposhbnserver_board_s2600kpfserver_system_lsvrp4304es6xx1server_board_s2600cwtserver_board_s2600kpcompute_module_hns2600bpbserver_board_s2600stbcompute_module_hns2600kprserver_system_r1208wttgsrserver_board_s2600cw2rserver_board_s2600wfqrcompute_module_hns2600tp24rserver_system_r2308wftzsserver_system_r2308wttysserver_system_r1000wf_firmwareserver_board_s2600wftrserver_system_r1304wt2gscompute_module_hns2600tprserver_system_r2208wf0zsserver_board_s2600kptrserver_board_s2600st_firmwareserver_system_r1208sposhorrcompute_module_hns2600tp_firmwareserver_board_s1200splserver_board_s2600cw2srserver_system_r1208wt2gsserver_board_s2600tpserver_system_r2208wttyc1rserver_board_s2600stqrcompute_module_hns2600bpblc24server_board_s2600cw2scompute_module_hns2600kp_firmwareserver_system_vrn2208wfaf83server_board_s2600cwtrserver_board_s1200spsserver_board_s2600bpqserver_system_r2208wt2ysserver_system_r1208wttgsserver_system_r1304wttgsserver_system_r2208wttysrserver_system_r1304sposhbnrserver_system_r2208wfqzsrserver_board_s2600tpfserver_board_s2600cwtsserver_system_lr1304sp_firmwareserver_system_r2312wf0nprserver_board_s2600wttrserver_board_s2600wt2server_system_r1208wfqysrserver_system_vrn2208wfhy6server_board_s2600stqserver_system_r2224wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_nb2208wfqnfviserver_system_r2208wftzsserver_system_r2224wftzsrcompute_module_hns2600bpq24rserver_system_r2224wttysserver_board_s1200sp_firmwareserver_system_lr1304spcfg1rserver_system_lr1304spcfg1server_system_mcb2208wfaf5compute_module_hns2600bps24server_board_s2600bpsserver_board_s2600wt_firmwareserver_board_s2600bpqrserver_system_r2000wt_firmwareserver_system_r1208wt2gsrserver_system_vrn2208wfaf82compute_module_hns2600bpb24rserver_system_r1208wftysserver_system_r2000wf_firmwareserver_board_s2600cwserver_system_r2308wftzsrserver_system_lnetcnt3ycompute_module_s2600tp_firmwarecompute_module_hns2600bps24rserver_system_r1304wftysrserver_system_lsvrp4304es6xxrcompute_module_hns2600bpsrserver_board_s2600wt2rserver_system_mcb2208wfhy2server_board_s2600tpfrcompute_module_hns2600bpblcrserver_board_s2600cwtsrserver_system_r2224wfqzsserver_system_r2308wttysrcompute_module_hns2600tpfserver_system_r2312wftzsserver_system_vrn2208wfaf81server_board_s2600stbrcompute_module_hns2600bpqrserver_system_r2224wttysrserver_system_r2312wttyscompute_module_hns2600bpbrserver_system_r1208sposhorserver_board_s2600bp_firmwareserver_board_s2600bpbrserver_system_r1000wt_firmwareserver_board_s2600wttserver_board_s2600wf0compute_module_hns2600kpserver_system_r2312wfqzsserver_system_mcb2208wfaf6server_system_r1304wftysserver_system_r2208wttysserver_system_r1304sposhorrserver_system_vrn2208waf6compute_module_hns2600bp_firmwareserver_system_r1304sposhorcompute_module_hns2600tpcompute_module_hns2600kpfrcompute_module_hns2600bpqserver_board_s1200sporserver_board_s2600bpbserver_system_mcb2208wfaf4server_board_s1200splrserver_system_lr1304spcfsgx1compute_module_hns2600kpfcompute_module_hns2600bpblcserver_system_r2208wttyc1server_board_s2600cw2server_board_s1200sposerver_board_s2600wfqserver_board_s2600bpsrserver_system_r2312wf0npserver_system_r1304wttgsrserver_system_r2312wttysrserver_board_s2600kp_firmwareserver_system_r1208wttgsbppserver_board_s1200spsrcompute_module_hns2600bpsserver_system_r2208wf0zsrserver_board_s2600kpfrcompute_module_hns2600bpb24server_system_r2208wftzsrserver_system_r1208wftysrserver_board_s2600tprcompute_module_hns2600tp24srserver_board_s2600wf_firmwarecompute_module_hns2600bpq24Intel(R) Server Boards, Server Systems and Compute Modules Advisory
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-36349
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.2||MEDIUM
EPSS-0.06% / 19.97%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-03 Aug, 2024 | 10:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure default variable initialization in BIOS firmware for some Intel(R) NUC Boards and Intel(R) NUC Kits before version MYi30060 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_board_nuc5i3mybenuc_kit_nuc5i3myhenuc_board_nuc5i3mybe_firmwarenuc_kit_nuc5i3myhe_firmwareIntel(R) NUC Boards and Intel(R) NUC Kits
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2024-29079
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.9||MEDIUM
EPSS-0.01% / 1.92%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 21:08
Updated-15 Nov, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management in some Intel(R) VROC software before version 8.6.0.3001 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) VROC softwarevroc_software
CWE ID-CWE-691
Insufficient Control Flow Management
CVE-2022-46299
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-3.3||LOW
EPSS-0.10% / 27.47%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management for some Intel Unison software may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationApple Inc.Google LLCMicrosoft Corporation
Product-androidwindowsunison_softwareiphone_osIntel Unison software
CWE ID-CWE-691
Insufficient Control Flow Management
CVE-2022-41646
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.11% / 29.44%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-27 Jan, 2025 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management in the Intel(R) IPP Cryptography software before version 2021.6 may allow an unauthenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-integrated_performance_primitives_cryptographyIntel(R) IPP Cryptography software
CWE ID-CWE-691
Insufficient Control Flow Management
CVE-2022-37409
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.08% / 25.44%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-27 Jan, 2025 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management for the Intel(R) IPP Cryptography software before version 2021.6 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-integrated_performance_primitives_cryptographyIntel(R) IPP Cryptography software
CWE ID-CWE-691
Insufficient Control Flow Management
CVE-2022-43505
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.1||MEDIUM
EPSS-0.01% / 1.04%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-13 Feb, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_d-2796texeon_e7-8893_v3pentium_gold_g4600xeon_w-1350_firmwarexeon_bronze_3104_firmwarecore_i7-1280pxeon_e5-2608l_v4_firmwarepentium_j2850xeon_gold_6146xeon_gold_6126f_firmwarecore_i7-1068ng7xeon_e5-2660_v3atom_c3830_firmwarecore_i7-5930k_firmwarecore_i5-1035g7xeon_platinum_8168_firmwarecore_i3-8350k_firmwareatom_c3758rcore_i3-9350k_firmwarexeon_d-1527xeon_e5-2697_v4xeon_d-2766ntpentium_gold_g6600_firmwarexeon_platinum_8170xeon_gold_6138f_firmwarexeon_w-2125core_i9-10940xpentium_gold_g6400t_firmwarepentium_n6415_firmwarexeon_platinum_8352yxeon_gold_5217_firmwarexeon_e7-8890_v3_firmwarexeon_d-2163it_firmwareceleron_g1610t_firmwarecore_i7-1060g7_firmwarexeon_platinum_8164core_i7-9700celeron_n2815core_i7-3960xxeon_gold_6240_firmwarexeon_gold_6234core_i9-9900kfxeon_e5-2699r_v4xeon_w-1250p_firmwarexeon_silver_4116t_firmwarexeon_d-2766nt_firmwarexeon_e5-2658a_v3_firmwarepentium_gold_g5400txeon_gold_6238rcore_i5-1035g4xeon_w-2255xeon_d-1518core_i5-10400hceleron_n5105core_i7-10700k_firmwarexeon_e5-1680_v3_firmwareceleron_n3000_firmwarexeon_w-11555mlecore_i5-9600t_firmwarecore_i9-9940x_firmwarexeon_d-2799_firmwarecore_i3-10100ycore_i7-9700texeon_e7-4830_v3_firmwarexeon_gold_6248_firmwarecore_i5-10400txeon_gold_6348_firmwarecore_i5-10310ucore_i9-7920xcore_i7-7600uxeon_e5-2683_v4xeon_gold_5318s_firmwarexeon_e5-1660_v3_firmwarecore_i5-9400f_firmwarexeon_e5-2608l_v4core_i7-1270pcore_i7-10700t_firmwarexeon_gold_5218core_i7-1270p_firmwareceleron_g1830core_i3-7100ecore_i9-7940x_firmwarexeon_d-1567core_i5-8269u_firmwarexeon_e3-1505l_v6xeon_platinum_8380hxeon_gold_5220r_firmwarexeon_d-2173it_firmwarexeon_platinum_8368q_firmwarexeon_w-2245celeron_n4100celeron_g6900xeon_d-1746terceleron_n3060xeon_e5-2699_v3core_i5-10400xeon_gold_6126_firmwarexeon_gold_6314upentium_gold_g6605_firmwareceleron_g5920core_i7-10710u_firmwarecore_i5-10500tecore_i7-7820hkcore_i7-6900kxeon_w-3335core_i9-9940xxeon_gold_6240xeon_gold_6150_firmwarecore_i7-3970x_firmwarepentium_gold_g6405t_firmwarecore_i5-8600xeon_bronze_3106_firmwarecore_i5-9400_firmwarexeon_d-2177nt_firmwarexeon_gold_6138_firmwarecore_i7-8500y_firmwarecore_i7-3930kxeon_e5-2667_v4_firmwarecore_i3-10100epentium_n4200e_firmwarecore_i7-7740x_firmwarecore_i7-1060g7xeon_gold_5220s_firmwarecore_i9-10900celeron_n2930celeron_n2840_firmwarexeon_platinum_8360ycore_i7-6800k_firmwarexeon_d-1539celeron_g4900tcore_i3-10100txeon_silver_4109t_firmwarexeon_w-1390t_firmwarexeon_gold_5220rpentium_gold_g7400exeon_gold_5318sxeon_d-2733nt_firmwarexeon_e7-4809_v3core_i9-10900kcore_i3-10325_firmwarexeon_gold_6230_firmwarexeon_d-2146ntcore_i5-8600kxeon_platinum_8160fpentium_gold_g7400txeon_e7-4820_v3_firmwarecore_i7-10700te_firmwarecore_i9-10900fcore_i7-8700k_firmwarepentium_n3520xeon_w-2223_firmwareatom_c3538_firmwarecore_i7-8750hcore_i3-10105t_firmwarecore_i9-9960x_firmwarecore_i3-7100u_firmwarecore_i7-6850kcore_i5-10400_firmwarexeon_e5-4669_v4_firmwareceleron_n4505_firmwarexeon_d-2166ntxeon_e3-1270_v6xeon_d-1732te_firmwarecore_i7-3920xmcore_i7-9850he_firmwarexeon_gold_6328h_firmwarexeon_silver_4114t_firmwarexeon_silver_4216xeon_gold_6230xeon_w-2195core_i7-7820eq_firmwareatom_c3336xeon_e5-2628l_v4xeon_gold_6130t_firmwarexeon_w-1290p_firmwarecore_i3-1000g4xeon_gold_5317core_i5-7267u_firmwarexeon_d-2183itxeon_w-3365_firmwareceleron_j6413_firmwarexeon_gold_6348h_firmwarecore_i3-7100core_i7-8809gxeon_gold_6246r_firmwarecore_i3-8145uexeon_e5-4667_v3xeon_e5-2609_v3_firmwareceleron_j4105core_i5-10400h_firmwarecore_i9-12900h_firmwarexeon_e3-1230_v6_firmwarecore_i5-10500_firmwarexeon_platinum_8360y_firmwarexeon_gold_6126t_firmwarepentium_gold_g6505core_i5-7267uceleron_j6412_firmwareceleron_g5900t_firmwarexeon_gold_5320tcore_i7-1260u_firmwarexeon_silver_4208pentium_gold_g6400te_firmwarecore_i5-10500exeon_gold_6312ucore_i5-9400txeon_w-2123xeon_gold_5220sceleron_j3355atom_x7-e3950xeon_d-1736core_i5-8600t_firmwarexeon_platinum_9282core_i5-8300hxeon_e3-1220_v6_firmwarexeon_e5-2683_v3core_i3-10110ycore_i5-10600kfxeon_gold_6142_firmwarexeon_platinum_9242_firmwarexeon_e3-1535m_v6_firmwarepentium_j6426_firmwareceleron_j3355exeon_gold_6240r_firmwarexeon_e5-2428l_v3_firmwarexeon_silver_4108xeon_gold_6130tcore_i7-12650h_firmwarexeon_platinum_8256_firmwarexeon_silver_4210core_i7-9800xxeon_e5-2618l_v4_firmwareceleron_j4125_firmwarepentium_gold_g5500tcore_i7-10870hxeon_w-11555mre_firmwarexeon_e5-2650_v3_firmwarexeon_platinum_8352s_firmwarexeon_e5-2660_v3_firmwarecore_i5-8600_firmwarexeon_silver_4215r_firmwarecore_i5-1245u_firmwarecore_i5-9600kf_firmwarexeon_silver_4310_firmwarecore_i7-1250uceleron_g4920pentium_gold_g6405uxeon_d-2786nte_firmwarecore_i5-9500core_i3-8145ue_firmwarexeon_d-1540core_i5-10500te_firmwarexeon_platinum_8368xeon_e5-2698_v4xeon_platinum_8160tceleron_n2807core_i7-7740xxeon_d-1528pentium_j3710xeon_silver_4310txeon_e3-1280_v6_firmwarexeon_gold_6230t_firmwarexeon_e5-2620_v3_firmwarexeon_e5-2660_v4xeon_platinum_8380xeon_gold_6314u_firmwarecore_i7-3940xmpentium_gold_7505_firmwareatom_x5-e3930_firmwarecore_i3-7100h_firmwarecore_i5-8300h_firmwarexeon_silver_4208_firmwarecore_i7-4940mxxeon_platinum_8268xeon_e5-2650_v4_firmwarepentium_j2850_firmwarepentium_n3530core_i7-4930kpentium_gold_8505_firmwarecore_i7-8565uxeon_e5-2687w_v4xeon_e5-2630_v4_firmwareceleron_n3350_firmwarepentium_gold_g6400e_firmwarexeon_d-1747nte_firmwarecore_i9-9980xe_firmwareceleron_n2820core_i3-10300_firmwarecore_i5-7300hqcore_i7-7560uxeon_e5-4667_v3_firmwarepentium_gold_g5420tcore_i3-8100t_firmwarecore_i5-8259ucore_i7-4820kxeon_e5-2699a_v4_firmwarexeon_d-1529celeron_g5900txeon_w-1250_firmwarecore_i9-12900hk_firmwarepentium_gold_g5500xeon_w-3265m_firmwarexeon_w-11555mle_firmwarexeon_e5-4660_v4_firmwarecore_i7-8850h_firmwarepentium_n3710_firmwarecore_i7-9700kf_firmwarecore_i9-7900x_firmwarecore_i3-10105core_i7-9850h_firmwarexeon_d-1713ntxeon_gold_6146_firmwarepentium_gold_g6405_firmwarexeon_e5-2630l_v4_firmwarexeon_gold_5218_firmwarexeon_gold_6132xeon_d-2799xeon_e5-2618l_v3_firmwarecore_i5-7600tpentium_gold_6500y_firmwarepentium_gold_g6500_firmwareceleron_g1630_firmwarexeon_e5-2618l_v4core_i9-10900k_firmwarexeon_w-1270_firmwarecore_i7-1280p_firmwarexeon_d-1736ntxeon_w-2135xeon_silver_4316_firmwarecore_i3-10300t_firmwarexeon_gold_6142core_i5-9300hpentium_gold_g6500xeon_d-1722necore_i3-7167u_firmwarecore_i7-8559u_firmwarexeon_e5-4610_v4_firmwarecore_i9-10920x_firmwarexeon_gold_5220t_firmwarecore_i7-8086k_firmwarecore_i7-10610uxeon_gold_5220_firmwarecore_i5-1035g1_firmwarecore_i7-12850hx_firmwarecore_i7-8665u_firmwareceleron_g1620core_i7-8500ycore_i5-9400hxeon_e5-4640_v3_firmwarexeon_gold_6338ncore_i9-9900txeon_e5-2680_v4_firmwareatom_c3436lxeon_gold_6208u_firmwarexeon_d-2796nt_firmwarexeon_e5-1630_v4_firmwarexeon_platinum_8360hxeon_w-1390pxeon_d-1749nt_firmwarexeon_gold_6250_firmwarecore_i7-9700e_firmwarecore_i7-7820hqxeon_e5-2620_v3xeon_e5-2648l_v3core_i3-8300t_firmwarecore_i3-8109u_firmwarecore_i5-7400_firmwarexeon_e5-2609_v3celeron_n3060_firmwarexeon_gold_6254_firmwarecore_i7-9700k_firmwarexeon_e5-2438l_v3core_i9-10980xe_firmwarexeon_platinum_8368qceleron_n4000celeron_n2830xeon_silver_4310xeon_e5-2650_v3xeon_e5-1650_v4_firmwarecore_i7-12800hcore_i3-10300txeon_gold_6258r_firmwarexeon_silver_4314_firmwarecore_i3-8100b_firmwareceleron_n3450core_i3-7101exeon_e5-2683_v3_firmwareceleron_n5100core_i9-7900xceleron_n2805_firmwarecore_i9-8950hk_firmwarexeon_gold_6209uceleron_g3930_firmwarexeon_d-1539_firmwarexeon_silver_4112xeon_w-3223celeron_j6412xeon_d-1559core_i7-3920xm_firmwarepentium_gold_g6600celeron_n2810xeon_w-3323xeon_w-2235_firmwareceleron_g1610tcore_i5-8265uxeon_platinum_8376h_firmwarepentium_gold_g6605core_i7-4930mxatom_c3558core_i7-5930kxeon_platinum_8352sceleron_g5925core_i7-7y75xeon_e5-2648l_v4_firmwarepentium_gold_g5400t_firmwarepentium_gold_4410y_firmwarexeon_d-2183it_firmwareatom_c3308core_i5-7y57celeron_g3920_firmwarexeon_e5-4627_v3core_i7-10700_firmwarexeon_gold_6148core_i3-8350kxeon_e3-1505m_v6xeon_gold_6144core_i5-7500txeon_d-1736nt_firmwarecore_i3-9100core_i9-12900hxcore_i5-9600k_firmwarecore_i5-1250pxeon_platinum_9282_firmwarecore_i7-12700h_firmwareatom_c3758atom_c3558rpentium_gold_g5600celeron_j4125atom_c3830xeon_gold_5220txeon_platinum_8276latom_c3750celeron_g4950_firmwareceleron_j1750core_i7-7700kcore_i7-8705gxeon_platinum_9222core_i5-9500exeon_gold_6230tcore_i5-12450h_firmwarecore_i7-7660uxeon_d-1627_firmwarecore_i7-8706gxeon_gold_6126tatom_c3558r_firmwarexeon_w-3225core_i7-12700hcore_i9-9880h_firmwarexeon_w-1370core_i7-8700t_firmwarexeon_e5-2408l_v3pentium_gold_4415u_firmwareatom_c3950_firmwarexeon_e3-1240_v6core_i5-12600hx_firmwareceleron_n6210core_i5-10400fcore_i5-8259u_firmwarecore_i7-8665ue_firmwarexeon_w-2155_firmwarecore_i7-8700pentium_j3710_firmwarexeon_e7-4850_v3_firmwarexeon_platinum_8380h_firmwarecore_i7-8705g_firmwarexeon_d-1746ter_firmwarecore_i9-10900te_firmwarecore_i7-7700tcore_i3-7100tcore_i7-5960x_firmwarexeon_w-3225_firmwarepentium_gold_8500core_i7-10700txeon_e5-1630_v4xeon_e5-4660_v3xeon_w-2295core_i5-10210ucore_i5-7260u_firmwarecore_i5-12450hcore_i5-7600k_firmwarexeon_e5-2697_v3_firmwarecore_i5-8257ucore_i7-8700kcore_i7-1260ppentium_gold_g6405tceleron_n2830_firmwarexeon_e3-1270_v6_firmwarexeon_e5-2658_v3_firmwarexeon_silver_4316core_i5-7200u_firmwarecore_i7-10510u_firmwarecore_i5-7442eqxeon_gold_5215xeon_e5-2667_v3xeon_d-2745nx_firmwarexeon_e7-4820_v3celeron_g1610_firmwarexeon_d-2143itcore_i3-10100_firmwarexeon_e5-2699_v4xeon_gold_6244_firmwarexeon_e3-1285_v6core_i5-10505xeon_d-2161i_firmwarecore_i5-1030g7pentium_gold_g7400e_firmwarexeon_e3-1225_v6core_i5-7442eq_firmwarecore_i7-8569u_firmwarepentium_n6415core_i7\+8700_firmwarexeon_e5-2699_v3_firmwarexeon_silver_4109txeon_bronze_3206r_firmwarexeon_e5-2643_v4_firmwarexeon_e5-2690_v3xeon_silver_4215rceleron_g1620t_firmwareceleron_g1820_firmwarecore_i3-10110ucore_i5-10600kf_firmwarexeon_gold_6138fxeon_e5-1630_v3xeon_gold_6136_firmwarexeon_gold_6330xeon_silver_4210txeon_platinum_8362_firmwarexeon_gold_6212u_firmwarexeon_e5-2680_v3core_i5-10310u_firmwarexeon_silver_4310t_firmwarexeon_gold_6212uxeon_e5-2697_v4_firmwarepentium_silver_n6000_firmwarecore_i9-7980xexeon_silver_4114xeon_gold_6240l_firmwarexeon_e5-4655_v3_firmwarexeon_d-2123it_firmwarecore_i3-9100hl_firmwarecore_i3-10105fceleron_g4900t_firmwarecore_i3-8100hpentium_gold_4415yxeon_bronze_3104core_i5-10300hxeon_gold_6238lxeon_e5-2637_v3xeon_e5-2699_v4_firmwarexeon_platinum_8353hxeon_w-11865mleceleron_n3050_firmwarecore_i3-1005g1_firmwarexeon_gold_6338_firmwarexeon_e7-8880l_v3_firmwarecore_i5-7300uxeon_e3-1505l_v6_firmwareceleron_j3455_firmwarecore_i5-8500txeon_w-3265mxeon_d-1627core_i5-7500xeon_d-2796ntceleron_n2910xeon_gold_5320hxeon_platinum_8260y_firmwareceleron_j1800_firmwarepentium_gold_g7400_firmwarexeon_d-2779xeon_d-1602pentium_gold_g6500tcore_i5-7200ucore_i5-8350u_firmwareceleron_g1820txeon_d-2796te_firmwareceleron_g3930exeon_gold_6338txeon_e5-2630l_v3_firmwarexeon_gold_6150xeon_gold_6240y_firmwarecore_i9-10850kxeon_e5-2690_v4pentium_gold_8505pentium_gold_g5600_firmwareceleron_g5905_firmwarexeon_e5-2658_v4_firmwarecore_i9-9900ks_firmwarepentium_gold_g6400tcore_i5-8400tcore_i3-9300_firmwarexeon_d-2145nt_firmwarepentium_gold_g5600tceleron_g3930txeon_w-1270pcore_i7-10700core_i9-10920xcore_i7-6950x_firmwarecore_i3-9100te_firmwareceleron_j4105_firmwarexeon_w-1290_firmwarexeon_d-2712tcore_i7-10750h_firmwarexeon_d-1541_firmwarexeon_w-1290e_firmwarexeon_gold_5318nceleron_g4920_firmwarecore_i5-1240p_firmwarecore_i3-10105txeon_w-1250epentium_silver_n5000core_i3-10325core_i9-12950hxxeon_d-1623n_firmwarecore_i3-7100hcore_i3-7101te_firmwarexeon_d-1548_firmwareatom_c3850_firmwarexeon_gold_6342_firmwarecore_i7-10875hxeon_gold_6130f_firmwarexeon_e5-2690_v3_firmwareceleron_n3350e_firmwarexeon_d-1559_firmwarexeon_platinum_8356hpentium_gold_g5400_firmwarexeon_e5-4648_v3_firmwarecore_i3-10100core_i7-7y75_firmwarecore_i5-8200y_firmwarecore_i7-8550u_firmwarecore_i5-1035g7_firmwarexeon_e5-2697a_v4_firmwarexeon_e5-4650_v3core_i7-10700f_firmwarecore_i5-7640x_firmwareceleron_j1900xeon_gold_5318h_firmwarexeon_d-1540_firmwarecore_i5-9400xeon_silver_4214y_firmwarexeon_d-1733nt_firmwarecore_i3-8100txeon_d-2733ntxeon_e5-1650_v3_firmwareceleron_n4505xeon_platinum_8160t_firmwarexeon_platinum_8260xeon_bronze_3204_firmwarexeon_gold_5320h_firmwareatom_x5-e3930xeon_d-2142it_firmwarecore_i5-7500t_firmwarecore_i3-1210u_firmwareceleron_g4930t_firmwarexeon_silver_4110core_i7-8650uxeon_bronze_3204xeon_silver_4314xeon_gold_5318n_firmwarexeon_d-2753nt_firmwarexeon_e5-4627_v3_firmwarecore_i9-10900e_firmwarecore_m3-7y30_firmwarexeon_gold_5119txeon_gold_6246rcore_i7-9750h_firmwareatom_c3338rpentium_gold_g4620_firmwarexeon_w-11865mrexeon_gold_5217celeron_j1850_firmwarepentium_gold_4415uxeon_e5-2687w_v4_firmwarepentium_silver_n5030core_i5-1038ng7xeon_gold_5222_firmwarexeon_w-3245core_i7-10700e_firmwareceleron_n2920_firmwarecore_i3-10110y_firmwarecore_i5-1035g4_firmwareceleron_g1850_firmwarecore_i5-8500bxeon_e5-2618l_v3xeon_d-1523ncore_i5-8269uxeon_e5-2608l_v3xeon_d-2786ntexeon_e5-4660_v3_firmwarecore_i7-10700teceleron_n3000xeon_d-1653ncore_i7-8709g_firmwarexeon_silver_4114txeon_gold_6240yxeon_e5-4669_v4atom_x5-e3940_firmwareceleron_n4100_firmwarecore_i5-10500e_firmwarexeon_d-1543n_firmwareceleron_g3900txeon_w-1270p_firmwarexeon_w-2195_firmwarexeon_gold_6208ucore_i5-8279u_firmwarecore_i5-9500f_firmwarexeon_w-1290ecore_i5-10600t_firmwarexeon_gold_6252n_firmwarecore_i5-10210y_firmwarexeon_e5-1650_v3core_i3-7350kxeon_w-2265_firmwarecore_i7-1250u_firmwarexeon_e7-8891_v3xeon_gold_6230r_firmwarecore_i5-8250ucore_i3-10305xeon_d-1571_firmwareceleron_g5900_firmwareceleron_g5920_firmwarecore_i7-9700txeon_w-1370p_firmwarecore_i7-7820eqatom_c3850xeon_gold_6252ncore_i5-1230u_firmwarexeon_gold_6244celeron_n3450_firmwarexeon_w-1290t_firmwarexeon_e5-2695_v3core_i3-1215u_firmwarexeon_gold_6330_firmwareceleron_n2805core_i7-8650u_firmwarexeon_w-3245_firmwarexeon_gold_6226_firmwareceleron_j1750_firmwarecore_i3-9350kfxeon_w-1370pcore_i9-9900k_firmwarecore_i7-7700k_firmwarexeon_gold_5320_firmwarexeon_w-2135_firmwarecore_i7-4960x_firmwarexeon_gold_6152_firmwarexeon_d-2757nxxeon_gold_6354xeon_e5-1660_v3xeon_d-1520xeon_platinum_8176f_firmwarexeon_platinum_8354h_firmwarexeon_platinum_8256xeon_e5-2623_v3xeon_gold_6238l_firmwarecore_i7-6850k_firmwarexeon_platinum_8158core_i9-9900xxeon_e5-2418l_v3atom_c3508_firmwarexeon_d-1739_firmwarexeon_gold_5318hcore_i5-1245uxeon_w-2125_firmwarexeon_d-1520_firmwarecore_i5-8365u_firmwarecore_i5-10500hxeon_w-2175_firmwarexeon_silver_4112_firmwarexeon_e3-1275_v6xeon_d-1531core_i3-9300txeon_gold_6262v_firmwarecore_i3-8100h_firmwarexeon_platinum_8260yceleron_j6413xeon_w-1370_firmwarexeon_e7-8867_v3core_i9-9980xexeon_gold_6128core_i7-10875h_firmwarexeon_d-2142itcore_i5-10500t_firmwarecore_i3-7130uceleron_j4005_firmwarecore_i5-8265u_firmwarexeon_gold_6130fxeon_w-11955mcore_i7-12800h_firmwareceleron_j3060_firmwarexeon_silver_4210t_firmwarecore_i9-10900x_firmwarecore_i7-6800kpentium_gold_g6400eceleron_n2920xeon_e3-1505m_v6_firmwarepentium_gold_7505pentium_n3520_firmwareceleron_g3930te_firmwarecore_i5-10600xeon_platinum_8276pentium_n3700_firmwarecore_i7\+8700xeon_e5-1660_v4_firmwarexeon_gold_6348core_i9-12900hxeon_e5-4628l_v4core_m3-7y30core_i3-9350kxeon_w-1350core_i5-8500_firmwarexeon_platinum_8368_firmwarexeon_e5-2680_v3_firmwarexeon_w-11155mle_firmwarexeon_gold_6138pcore_i7-8665uexeon_gold_6138p_firmwareceleron_g4950core_i7-1265u_firmwareceleron_j3455ecore_i7-7700t_firmwarexeon_gold_5320t_firmwarexeon_w-3275_firmwarexeon_d-1748texeon_e7-8890_v3core_i3-10320xeon_e5-2623_v4_firmwarecore_i5-8200yxeon_w-11855m_firmwareatom_c3808celeron_g3900t_firmwarexeon_w-2275pentium_n3710xeon_d-1543nceleron_n4020xeon_d-1528_firmwareceleron_g4900_firmwarecore_i5-7440hqceleron_g1620txeon_e3-1245_v6_firmwarexeon_d-1521xeon_d-1702core_i7-5960xcore_i9-10940x_firmwarexeon_gold_6342xeon_w-1350pxeon_gold_6230rxeon_e5-2637_v3_firmwarecore_i7-8569upentium_gold_g6405u_firmwareatom_c3950core_i7-7700_firmwareceleron_g3950_firmwarexeon_platinum_8353h_firmwarecore_i5-10500txeon_d-1712tr_firmwarexeon_e5-4650_v4_firmwarecore_i7-12850hxxeon_d-2798nx_firmwarexeon_gold_5318yceleron_j3355_firmwarexeon_gold_5218rxeon_gold_6226rxeon_bronze_3206rcore_i5-12600hxcore_i3-8100bcore_i5-9600tcore_i3-7101e_firmwarecore_i3-7020u_firmwarexeon_gold_6334_firmwarexeon_d-2775tecore_i3-9320xeon_silver_4110_firmwareceleron_n2910_firmwarecore_i7-1065g7core_i9-10900texeon_platinum_8180core_i9-10980hk_firmwarepentium_gold_g6400tecore_i5-1230ucore_i3-8130uxeon_e5-2628l_v3_firmwarexeon_platinum_8276l_firmwarexeon_e5-2650l_v3xeon_platinum_8153atom_c3858_firmwarexeon_e5-1630_v3_firmwarexeon_w-10885m_firmwarepentium_silver_n5000_firmwarecore_i3-9100_firmwarexeon_w-3245mxeon_e5-4610_v4celeron_g1620_firmwarexeon_d-2738celeron_j1900_firmwarecore_i3-10105f_firmwarexeon_e3-1501l_v6_firmwarexeon_silver_4108_firmwarexeon_gold_6338xeon_e5-1680_v3pentium_gold_g5420xeon_d-2777nxcore_i7-9700kfxeon_e5-2608l_v3_firmwarecore_i7-3960x_firmwarepentium_gold_g5420t_firmwarexeon_gold_5115core_i5-8305g_firmwarecore_i5-7500_firmwarexeon_gold_6136core_i7-10870h_firmwarecore_i5-8400hceleron_j1850core_i7-1260uxeon_e5-4610_v3xeon_e7-8870_v3pentium_gold_g5420_firmwarecore_i5-7y54xeon_e5-4650_v4xeon_platinum_8360hl_firmwarexeon_gold_6138atom_c3336_firmwarexeon_e5-1660_v4xeon_e5-2699r_v4_firmwarexeon_gold_6326xeon_d-1521_firmwarecore_i7-4930mx_firmwarexeon_gold_5317_firmwarecore_i5-10200hxeon_d-1557_firmwarexeon_d-2775te_firmwarecore_i3-10100f_firmwarepentium_gold_g4560_firmwareatom_c3708_firmwarecore_i5-12500hcore_i3-8145ucore_i3-1220pxeon_gold_5318y_firmwarexeon_e5-1620_v3_firmwarecore_i5-9600_firmwarexeon_d-1714core_i3-7020uxeon_platinum_8268_firmwarexeon_e3-1501l_v6pentium_silver_n6000core_i3-8109uxeon_gold_6262vxeon_e5-2609_v4_firmwarexeon_platinum_8168xeon_d-1734nt_firmwarexeon_e5-2640_v3core_i5-7y57_firmwarexeon_e5-2418l_v3_firmwarecore_i7-9700f_firmwarexeon_e5-1620_v4xeon_e7-8880l_v3celeron_n4500core_i5-9500e_firmwarecore_i3-7100e_firmwarexeon_d-1567_firmwarecore_i3-7300core_i5-12600hxeon_e5-2630l_v3core_i7-12800hxxeon_e5-4640_v4xeon_e5-4655_v4_firmwarexeon_gold_6138t_firmwarexeon_silver_4116_firmwarecore_i5-10600_firmwarexeon_gold_5122xeon_platinum_8180_firmwarecore_i3-9100hlceleron_n3150xeon_silver_4210_firmwarexeon_platinum_8376hceleron_n5100_firmwarexeon_gold_6312u_firmwarexeon_w-3335_firmwareatom_c3436l_firmwarecore_i7-7600u_firmwareatom_c3338r_firmwarecore_i5-8400bcore_i3-9300t_firmwarecore_i7-10610u_firmwarexeon_gold_6248rxeon_w-1250e_firmwarexeon_w-1250te_firmwarecore_i5-9500_firmwarexeon_e5-4627_v4_firmwarecore_i5-1240pxeon_silver_4214r_firmwarepentium_gold_g5620xeon_platinum_8276_firmwarexeon_w-1290tcore_i5-8400h_firmwareceleron_n4120xeon_w-11155mre_firmwarepentium_gold_g7400te_firmwarecore_i3-9100tepentium_gold_g6505tcore_i7-9700fcore_i9-10980hkcore_i9-9820x_firmwarexeon_platinum_8156xeon_w-3345_firmwareceleron_g3930tepentium_gold_6405u_firmwarecore_i7-10510ucore_i7-9700kceleron_n2840core_i5-10400t_firmwarexeon_d-1533n_firmwarecore_i3-8100xeon_w-2265xeon_silver_4309y_firmwarexeon_gold_5215_firmwarexeon_gold_5320xeon_e5-2667_v4pentium_n3540_firmwarexeon_w-10855mpentium_n3510xeon_w-2245_firmwarexeon_w-1390p_firmwarexeon_w-10855m_firmwarexeon_gold_6126fxeon_d-1712trcore_i3-7300_firmwarecore_i5-1235u_firmwarexeon_w-3375_firmwarexeon_d-1713ntexeon_w-11555mrecore_i5-7287u_firmwarecore_i7-7700xeon_e5-1680_v4xeon_d-2752ter_firmwarepentium_j2900_firmwarexeon_silver_4114_firmwarepentium_n3700core_i7-7820hq_firmwarepentium_gold_g6505t_firmwarecore_i3-7102ecore_i7-7920hq_firmwarexeon_platinum_8280l_firmwarexeon_d-1577_firmwarexeon_e3-1240_v6_firmwarecore_i7-8700_firmwarexeon_e5-2658_v3xeon_e5-4660_v4xeon_gold_6250lceleron_g3900_firmwarecore_i5-8365uceleron_g6900t_firmwareceleron_j3060xeon_e3-1501m_v6xeon_gold_6210ucore_i7-5820k_firmwarecore_i5-9600kfxeon_d-2187ntcore_i5-8500b_firmwarexeon_d-1732teceleron_n3160core_i3-10100texeon_e5-2643_v3_firmwareceleron_g6900_firmwareceleron_g4930core_i5-7600xeon_platinum_8380hlpentium_n4200_firmwarecore_i9-7940xxeon_platinum_8158_firmwarexeon_w-3265_firmwarexeon_e5-2698_v3_firmwarecore_i7-10700fxeon_d-2776nt_firmwarecore_i9-9960xcore_i5-1030g4_firmwarexeon_gold_5120_firmwarexeon_w-1270te_firmwarecore_i7-8557u_firmwarepentium_gold_g4600_firmwarepentium_n3540core_i7-1068ng7_firmwarecore_i7-10750hxeon_platinum_8253xeon_e5-2630l_v4xeon_gold_6134_firmwarexeon_e5-4667_v4atom_c3958xeon_w-3235_firmwarecore_i3-8300xeon_w-1390xeon_gold_6242r_firmwarecore_i5-7400txeon_platinum_8358_firmwarexeon_silver_4116txeon_e5-2690_v4_firmwarexeon_e5-2630_v4xeon_d-1622xeon_e5-4610_v3_firmwarecore_i5-7260ucore_i7-8700bxeon_w-2145_firmwarexeon_e5-2643_v3xeon_d-2145ntcore_i9-12950hx_firmwarexeon_e5-1650_v4xeon_gold_6238celeron_j1800core_i7-7500u_firmwarexeon_e5-2630_v3xeon_w-1250pcore_i7-12650hcore_i7-7800xcore_i3-1215uxeon_e3-1275_v6_firmwarecore_i5-10210yxeon_e3-1225_v6_firmwarecore_i7-7820hk_firmwarexeon_e5-2623_v4core_i7-4930k_firmwarecore_i9-9900kf_firmwarexeon_e5-4620_v4_firmwarexeon_w-3275mcore_i5-9500fcore_i5-10210u_firmwarecore_i7-3820xeon_gold_5119t_firmwarecore_i5-10600txeon_d-1513n_firmwarecore_i7-9850hecore_i3-7300t_firmwarecore_i7-10700exeon_e5-1620_v4_firmwarepentium_gold_4410ycore_i5-10500h_firmwarecore_i9-9900kscore_i5-9600pentium_gold_g6500t_firmwarexeon_gold_5315yxeon_e5-2637_v4_firmwarecore_i5-7300u_firmwarecore_i7-4960xcore_i3-9100fpentium_gold_g7400texeon_platinum_8354hpentium_gold_g5600t_firmwarexeon_bronze_3106core_i7-3940xm_firmwarexeon_gold_6338n_firmwarecore_i7-9750hfxeon_gold_6256_firmwarepentium_gold_6405uceleron_n3350atom_c3708core_i5-9300h_firmwarecore_i7-10700kceleron_g1820xeon_platinum_8351n_firmwarexeon_e7-8880_v3celeron_g5925_firmwarepentium_silver_j5005core_i3-9320_firmwarecore_i5-8400b_firmwarexeon_e3-1280_v6xeon_e7-8891_v3_firmwarecore_i7-9800x_firmwarecore_i3-8100_firmwarexeon_e5-2650l_v3_firmwarexeon_silver_4214rcore_i7-5820kxeon_e5-2697_v3xeon_d-1715ter_firmwarexeon_e5-4627_v4pentium_j2900core_i9-9880hcore_i7-10710ucore_i5-7287uxeon_d-1541core_i5-8500t_firmwarexeon_d-2141icore_i7-10700kfxeon_w-1350p_firmwarexeon_w-1250tecore_i7-1255u_firmwarexeon_d-1633n_firmwareceleron_g6900tpentium_gold_g4560xeon_d-2757nx_firmwarexeon_gold_6230n_firmwarexeon_e5-4620_v3_firmwarexeon_gold_5222core_i7-3930k_firmwarecore_m3-7y32_firmwarecore_i5-7300hq_firmwarecore_i7-8706g_firmwarexeon_w-2133_firmwareceleron_n4500_firmwarexeon_platinum_8360hlcore_i5-7400t_firmwarexeon_d-1548xeon_e5-4667_v4_firmwarepentium_gold_4415y_firmwarexeon_e3-1535m_v6xeon_platinum_8380_firmwarexeon_d-1649nxeon_platinum_9221core_i9-9900celeron_j3355e_firmwarexeon_w-11955m_firmwarexeon_e5-2603_v4_firmwareatom_c3308_firmwarecore_i7-10510y_firmwarecore_i3-10100e_firmwarecore_i7-9850hl_firmwarexeon_platinum_8160celeron_n2806xeon_gold_5115_firmwarexeon_platinum_8156_firmwareatom_x5-e3940xeon_w-11865mle_firmwarexeon_e5-2428l_v3xeon_gold_5118_firmwarecore_i5-1038ng7_firmwarecore_i3-8140uxeon_d-2738_firmwareceleron_g5905txeon_e5-2667_v3_firmwarexeon_e5-4648_v3core_i7-7800x_firmwarexeon_w-2225_firmwarexeon_platinum_8360h_firmwarecore_i3-10100te_firmwarexeon_gold_6148fxeon_d-2752terxeon_gold_6238t_firmwarecore_i3-7100_firmwareatom_c3338core_i9-9820xxeon_d-2795ntxeon_w-2155core_i7-7500ucore_i7-8550uceleron_g1840_firmwarexeon_e5-2623_v3_firmwarexeon_e5-2650l_v4_firmwareceleron_n3010core_i3-9100txeon_platinum_8160_firmwarexeon_d-2798nt_firmwareceleron_j4025xeon_d-1623npentium_j4205xeon_w-2145core_i5-8310y_firmwarecore_i5-12600h_firmwarepentium_gold_4425ycore_i9-9900x_firmwarexeon_e5-4650_v3_firmwarexeon_gold_6148_firmwarexeon_w-3323_firmwarecore_i9-10900_firmwarexeon_platinum_9222_firmwarexeon_platinum_8253_firmwarexeon_d-1718t_firmwarexeon_d-1622_firmwarecore_i5-10505_firmwarecore_i3-7167ucore_i7-7567uxeon_w-2295_firmwarecore_i3-8145u_firmwarexeon_silver_4214celeron_n3160_firmwarexeon_gold_5315y_firmwarexeon_d-2161iatom_c3858xeon_platinum_8164_firmwarexeon_silver_4210rxeon_d-2141i_firmwarecore_i5-10300h_firmwarepentium_silver_n6005core_i7-7660u_firmwareceleron_n2820_firmwareatom_c3558_firmwarecore_i5-8210yceleron_n6211xeon_e5-2670_v3xeon_gold_5218bxeon_e5-4640_v4_firmwarecore_i7-8750h_firmwarecore_i5-10200h_firmwareatom_x7-e3950_firmwarecore_i3-7300txeon_e5-1680_v4_firmwarexeon_silver_4216_firmwareceleron_n6210_firmwareceleron_n6211_firmwareceleron_n3010_firmwarecore_i3-9100f_firmwarecore_i5-7y54_firmwarexeon_e5-2648l_v4pentium_gold_g6400_firmwarexeon_e5-4620_v4xeon_d-1513nxeon_d-1537xeon_d-2187nt_firmwarexeon_w-1290tecore_i5-8500core_i5-7600_firmwarecore_i5-9500te_firmwarexeon_gold_6130_firmwarexeon_w-3275m_firmwarepentium_n3510_firmwarexeon_e5-2630_v3_firmwarexeon_gold_5120txeon_w-3175xxeon_gold_6134celeron_n2808_firmwarecore_i7-1260p_firmwarecore_i7-10700kf_firmwarexeon_e5-2628l_v3xeon_w-3235xeon_gold_6222v_firmwarexeon_platinum_8160f_firmwarecore_i7-9750hxeon_gold_6226r_firmwarexeon_platinum_8260_firmwarexeon_e5-4669_v3xeon_w-2225pentium_gold_g6405core_i7-7560u_firmwarexeon_w-2133xeon_d-2753ntxeon_d-1557core_i3-10305tpentium_silver_j5040xeon_gold_6328hlxeon_d-1726core_i9-9900t_firmwarepentium_gold_g5500_firmwarepentium_gold_g7400t_firmwarexeon_e7-8860_v3_firmwarexeon_d-1553n_firmwarexeon_gold_6128_firmwarexeon_e5-2687w_v3_firmwarexeon_w-2223xeon_silver_4210r_firmwarecore_i9-7920x_firmwarexeon_platinum_8170_firmwarecore_i7-8665uceleron_n2940_firmwarecore_i3-8300txeon_platinum_8362core_i7-12650hxxeon_gold_6140_firmwarecore_i7-6950xpentium_gold_g5620_firmwarecore_i7-10850hxeon_gold_6338t_firmwarecore_i3-1210uceleron_g1820t_firmwarexeon_gold_6238_firmwareceleron_g5905core_i9-7960x_firmwareceleron_g3950xeon_silver_4309ycore_i3-7130u_firmwarexeon_w-1290te_firmwarexeon_e5-2640_v4_firmwarecore_i5-8400core_i3-10300xeon_gold_6354_firmwareatom_c3955_firmwarexeon_gold_6246celeron_n2930_firmwarecore_i7-8086kpentium_gold_g5500t_firmwarexeon_e5-2603_v3_firmwarexeon_d-2776ntxeon_d-1527_firmwarexeon_d-2798ntxeon_d-1733ntpentium_gold_5405u_firmwarecore_i5-8365ue_firmwarexeon_e5-2683_v4_firmwarexeon_w-3245m_firmwarecore_i5-1240u_firmwarexeon_e5-2628l_v4_firmwarexeon_e5-4628l_v4_firmwareatom_c3758r_firmwarecore_i5-12500h_firmwarexeon_e5-2603_v3celeron_n2940core_i5-8600k_firmwarexeon_e7-8870_v3_firmwarexeon_e3-1285_v6_firmwareceleron_j3455xeon_e5-4655_v3xeon_e5-2620_v4_firmwarexeon_d-2163itxeon_d-2779_firmwarexeon_w-1390tceleron_n2807_firmwarexeon_w-1270atom_c3538core_i5-10310y_firmwarepentium_gold_4417uxeon_d-2777nx_firmwarecore_i7-10510ycore_i3-1000g1xeon_e5-4655_v4xeon_gold_5215lxeon_gold_5122_firmwarexeon_silver_4215_firmwarecore_i5-7360u_firmwarexeon_w-2275_firmwarecore_i5-8210y_firmwareceleron_j3160xeon_e5-2658_v4celeron_n3150_firmwarecore_i3-9100e_firmwarexeon_gold_6132_firmwarecore_i9-7960xxeon_e7-8893_v3_firmwarecore_i7-7820xceleron_g3900core_i5-9600kceleron_g5905t_firmwarecore_i3-10305t_firmwarexeon_d-1531_firmwarecore_i7-7700hqxeon_w-1270texeon_e7-4830_v3atom_c3750_firmwareceleron_n5105_firmwarecore_i9-10900f_firmwarecore_i9-12900hkxeon_e5-2698_v3core_i3-9100t_firmwarexeon_e7-8880_v3_firmwarexeon_gold_6250l_firmwarexeon_d-1715teratom_c3508core_i3-1220p_firmwareceleron_g5900xeon_e5-2648l_v3_firmwarexeon_gold_6258rxeon_d-1571xeon_gold_6240lxeon_d-1736_firmwarexeon_e5-1620_v3xeon_gold_6250core_i5-8350uxeon_gold_6348hceleron_n4000_firmwarexeon_w-3223_firmwarexeon_d-2173itceleron_g1830_firmwarexeon_w-11855mceleron_g3930xeon_d-2123itceleron_g3930t_firmwarecore_i3-10100y_firmwareceleron_n2806_firmwarexeon_gold_5218n_firmwarecore_i9-12900hx_firmwarexeon_e5-2670_v3_firmwarexeon_e5-2637_v4xeon_w-2255_firmwarexeon_platinum_8358p_firmwarexeon_gold_6144_firmwarexeon_e5-2695_v4_firmwarexeon_e5-2687w_v3xeon_e5-1428l_v3_firmwarexeon_gold_6330h_firmwarexeon_e5-2680_v4core_i7-8700b_firmwarexeon_gold_5218tcore_i9-8950hkxeon_e5-2697a_v4core_i9-10900exeon_e7-4809_v3_firmwarexeon_gold_6242_firmwarexeon_gold_6140xeon_d-1649n_firmwarexeon_e5-2609_v4core_i7-7920hqcore_i5-9300hf_firmwarexeon_w-2123_firmwarexeon_gold_6148f_firmwarexeon_platinum_8356h_firmwarexeon_e3-1501m_v6_firmwarecore_i7-12800hx_firmwarexeon_d-1726_firmwarexeon_d-1537_firmwarecore_i3-7350k_firmwarexeon_gold_6126xeon_d-2166nt_firmwarecore_i9-10885hxeon_platinum_8358pxeon_d-2712t_firmwareceleron_g1840t_firmwarexeon_w-3375xeon_e5-2643_v4xeon_e5-2699a_v4celeron_g1840xeon_d-1713nte_firmwarexeon_gold_6328hl_firmwarecore_i3-9300xeon_gold_5218r_firmwarexeon_w-3365xeon_platinum_8352m_firmwarexeon_e7-8860_v3core_i9-9900kcore_i3-9350kf_firmwarexeon_e5-2698_v4_firmwarexeon_gold_6142fceleron_g1630core_i7-8709gceleron_j4025_firmwarexeon_platinum_8153_firmwarepentium_silver_j5040_firmwarexeon_gold_6130xeon_e5-2650l_v4xeon_d-1529_firmwarepentium_gold_4417u_firmwarexeon_d-1637_firmwarecore_i9-9920xcore_m3-8100y_firmwarecore_i7-8557uxeon_silver_4214_firmwareceleron_g4930_firmwarecore_i5-9500tceleron_g1610core_i5-8260u_firmwarexeon_d-2143it_firmwarecore_i7-8700txeon_platinum_9242core_i3-10305_firmwarexeon_d-1735trcore_m3-7y32core_i5-7400xeon_d-2795nt_firmwarexeon_platinum_8280lxeon_e7-4850_v3celeron_n2810_firmwarexeon_d-1523n_firmwarexeon_d-2752ntecore_i3-7102e_firmwarexeon_platinum_8352y_firmwarexeon_platinum_8280_firmwarecore_i3-7320xeon_e5-2408l_v3_firmwarexeon_e5-4669_v3_firmwarexeon_platinum_8358xeon_w-1390_firmwarexeon_e3-1230_v6atom_c3758_firmwarexeon_e7-8867_v3_firmwarepentium_gold_g7400core_i5-1035g1xeon_gold_6230nxeon_w-3265core_i7-8565u_firmwarexeon_gold_6246_firmwarexeon_gold_5218nxeon_gold_6138tpentium_gold_4425y_firmwarexeon_e5-2620_v4xeon_d-1718txeon_gold_6248r_firmwarexeon_platinum_9221_firmwarexeon_gold_5120core_i5-7600t_firmwarecore_i5-1250p_firmwarexeon_gold_6326_firmwareceleron_n3050core_i9-7980xe_firmwarecore_i5-7440hq_firmwarecore_i5-1030g4pentium_gold_8500_firmwarecore_i3-9100exeon_gold_6154_firmwarexeon_gold_5220core_i5-10500xeon_d-1637xeon_d-1577celeron_g3930e_firmwarexeon_gold_6254xeon_silver_4209t_firmwarecore_i7-9850hcore_i5-9400fcore_i7-9700t_firmwarexeon_platinum_8176_firmwarexeon_gold_6154core_i5-7440eqpentium_silver_j5005_firmwarexeon_gold_5215l_firmwarexeon_platinum_8351ncore_i7-7820x_firmwarexeon_w-1250xeon_platinum_8376hl_firmwarecore_i7-1265uxeon_e5-2640_v4xeon_gold_6330n_firmwarecore_i5-8279ucore_i3-8130u_firmwarexeon_d-1722ne_firmwarexeon_gold_6336yceleron_g3920xeon_platinum_8352vcore_i3-7100ucore_i5-9300hfxeon_d-1747ntexeon_gold_5120t_firmwareceleron_g1850xeon_d-1653n_firmwarepentium_gold_g6505_firmwarecore_i3-7101texeon_d-1734ntxeon_w-3275xeon_d-1735tr_firmwarecore_i5-7600kcore_i7-4820k_firmwarexeon_platinum_8270_firmwarexeon_e5-2640_v3_firmwarexeon_d-1553ncore_i3-8140u_firmwarecore_i3-1000g4_firmwareatom_c3808_firmwareatom_c3955xeon_silver_4209txeon_e5-4620_v3xeon_silver_4116xeon_w-1270exeon_gold_6234_firmwarexeon_gold_6210u_firmwarecore_i3-7100t_firmwarexeon_d-1633ncore_i7-9850hlceleron_g1840tcore_i5-7360ucore_i7-1255uxeon_gold_5218t_firmwarexeon_gold_6248core_i5-10600kxeon_platinum_8260l_firmwarexeon_d-1518_firmwarepentium_n3530_firmwarexeon_e3-1220_v6xeon_platinum_8280core_m3-8100yxeon_platinum_8380hl_firmwarecore_i5-8250u_firmwarexeon_w-11155mrecore_i9-10900kfpentium_n4200xeon_e5-2438l_v3_firmwarepentium_gold_g4620core_i3-7320_firmwareceleron_n4120_firmwarecore_i7-7567u_firmwarexeon_gold_6336y_firmwarecore_i7-9700ecore_i5-8400_firmwarecore_i7-7700hq_firmwarexeon_platinum_8352mceleron_n3350exeon_d-2146nt_firmwarexeon_gold_6152core_i5-7440eq_firmwarecore_i3-1000g1_firmwarecore_i5-10600k_firmwarecore_i7-9750hf_firmwarexeon_e5-2658a_v3core_i5-10310yxeon_gold_5218b_firmwarexeon_gold_6330hcore_i5-8400t_firmwarexeon_w-1290pxeon_gold_6222vxeon_d-1713nt_firmwarexeon_w-11155mlepentium_j6426core_i7-3820_firmwarexeon_platinum_8176xeon_platinum_8376hlcore_i5-8260uxeon_gold_6242celeron_n2808core_i7-10810u_firmwarecore_i3-10100t_firmwarecore_i9-10900t_firmwarecore_i5-12450hx_firmwarepentium_silver_n6005_firmwarecore_i7-10810upentium_silver_n5030_firmwarecore_i5-10400f_firmwarexeon_e5-2660_v4_firmwarexeon_e5-2650_v4xeon_platinum_8270core_i3-10105_firmwarexeon_d-1533nxeon_w-1270e_firmwarexeon_gold_6242rxeon_e3-1245_v6celeron_j3160_firmwarexeon_silver_4215xeon_w-3175x_firmwarexeon_gold_6346xeon_w-2235core_i7-8850hceleron_j3455e_firmwarexeon_e5-2695_v4xeon_gold_5118core_i3-10100fcore_i3-8300_firmwareceleron_g4930tcore_i9-9900_firmwarecore_i7-1065g7_firmwarecore_i9-10900xceleron_n2815_firmwarexeon_gold_6142f_firmwarexeon_d-1702_firmwarexeon_gold_6238txeon_silver_4214yxeon_e5-2603_v4core_i5-8257u_firmwarecore_i9-10980xexeon_e5-2695_v3_firmwarecore_i9-10900kf_firmwarepentium_j4205_firmwarexeon_gold_6330ncore_i5-12450hxcore_i7-3970xceleron_n4020_firmwarecore_i9-10850k_firmwarecore_i5-8365uexeon_d-2798nxxeon_w-1290atom_c3338_firmwarecore_i7-8809g_firmwarexeon_platinum_8176fxeon_platinum_8352v_firmwarexeon_w-3345xeon_d-2745nxcore_i5-1235ucore_i9-10885h_firmwarecore_i7-12650hx_firmwarecore_i9-9980hk_firmwarepentium_n4200exeon_gold_6240rxeon_w-10885mceleron_g4900core_i5-1240ucore_i5-1030g7_firmwarecore_i5-9400h_firmwarecore_i9-10900tpentium_gold_g5400xeon_gold_6334core_i5-8310yxeon_d-2752nte_firmwarecore_i5-7640xxeon_d-1739core_i3-10110u_firmwarecore_i5-9500texeon_gold_6226xeon_gold_6256xeon_gold_6238r_firmwarecore_i5-9500t_firmwarecore_i7-6900k_firmwarexeon_gold_6252core_i7-9700te_firmwarexeon_d-1749ntxeon_d-1748te_firmwarexeon_e5-4640_v3core_i3-10320_firmwarepentium_gold_5405uxeon_gold_6346_firmwarecore_i3-1005g1celeron_j4005xeon_w-11865mre_firmwarexeon_gold_6328hxeon_gold_6252_firmwarecore_i7-4940mx_firmwarexeon_gold_6209u_firmwarecore_i9-9920x_firmwarecore_i5-8600tcore_i5-8305gcore_i7-10850h_firmwarexeon_e5-1428l_v3core_i5-9400t_firmwarecore_i7-8559uxeon_platinum_8260lxeon_d-1714_firmwarecore_i9-9980hkxeon_d-1602_firmwarecore_i7-9700_firmwarexeon_d-2177ntatom_c3958_firmwarepentium_gold_6500ypentium_gold_g6400xeon_w-2175Intel(R) Processors
CWE ID-CWE-691
Insufficient Control Flow Management
CVE-2023-24587
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.9||MEDIUM
EPSS-0.04% / 11.42%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-11 Oct, 2024 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management in firmware for some Intel(R) Optane(TM) SSD products may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-optane_memory_h20_with_solid_state_storageoptane_ssd_dc_p4800x_firmwareoptane_ssd_dc_p4801x_firmwareoptane_ssd_905poptane_ssd_900poptane_ssd_dc_p4801xoptane_memory_h20_with_solid_state_storage_firmwareoptane_ssd_dc_p4800xoptane_ssd_905p_firmwareoptane_ssd_900p_firmwareIntel(R) Optane(TM) SSD products
CWE ID-CWE-691
Insufficient Control Flow Management
CVE-2020-25598
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 22.71%
||
7 Day CHG~0.00%
Published-23 Sep, 2020 | 21:07
Updated-04 Aug, 2024 | 15:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Xen 4.14.x. There is a missing unlock in the XENMEM_acquire_resource error path. The RCU (Read, Copy, Update) mechanism is a synchronisation primitive. A buggy error path in the XENMEM_acquire_resource exits without releasing an RCU reference, which is conceptually similar to forgetting to unlock a spinlock. A buggy or malicious HVM stubdomain can cause an RCU reference to be leaked. This causes subsequent administration operations, (e.g., CPU offline) to livelock, resulting in a host Denial of Service. The buggy codepath has been present since Xen 4.12. Xen 4.14 and later are vulnerable to the DoS. The side effects are believed to be benign on Xen 4.12 and 4.13, but patches are provided nevertheless. The vulnerability can generally only be exploited by x86 HVM VMs, as these are generally the only type of VM that have a Qemu stubdomain. x86 PV and PVH domains, as well as ARM VMs, typically don't use a stubdomain. Only VMs using HVM stubdomains can exploit the vulnerability. VMs using PV stubdomains, or with emulators running in dom0, cannot exploit the vulnerability.

Action-Not Available
Vendor-n/aFedora ProjectopenSUSEXen Project
Product-xenfedoraleapn/a
CWE ID-CWE-670
Always-Incorrect Control Flow Implementation
CVE-2021-32684
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.2||MEDIUM
EPSS-0.19% / 40.94%
||
7 Day CHG~0.00%
Published-14 Jun, 2021 | 23:05
Updated-03 Aug, 2024 | 23:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Handler in @scandipwa/magento-scripts

magento-scripts contains scripts and configuration used by Create Magento App, a zero-configuration tool-chain which allows one to deploy Magento 2. In versions 1.5.1 and 1.5.2, after changing the function from synchronous to asynchronous there wasn't implemented handler in the start, stop, exec, and logs commands, effectively making them unusable. Version 1.5.3 contains patches for the problems.

Action-Not Available
Vendor-scandipwascandipwa
Product-magento-scriptscreate-magento-app
CWE ID-CWE-670
Always-Incorrect Control Flow Implementation
CVE-2024-53134
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 1.75%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 14:20
Updated-04 May, 2025 | 09:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
pmdomain: imx93-blk-ctrl: correct remove path

In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx93-blk-ctrl: correct remove path The check condition should be 'i < bc->onecell_data.num_domains', not 'bc->onecell_data.num_domains' which will make the look never finish and cause kernel panic. Also disable runtime to address "imx93-blk-ctrl 4ac10000.system-controller: Unbalanced pm_runtime_enable!"

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-670
Always-Incorrect Control Flow Implementation
CVE-2024-47763
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 0.42%
||
7 Day CHG~0.00%
Published-09 Oct, 2024 | 18:03
Updated-10 Oct, 2024 | 12:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Wasmtime runtime crash when combining tail calls with trapping imports

Wasmtime is an open source runtime for WebAssembly. Wasmtime's implementation of WebAssembly tail calls combined with stack traces can result in a runtime crash in certain WebAssembly modules. The runtime crash may be undefined behavior if Wasmtime was compiled with Rust 1.80 or prior. The runtime crash is a deterministic process abort when Wasmtime is compiled with Rust 1.81 and later. WebAssembly tail calls are a proposal which relatively recently reached stage 4 in the standardization process. Wasmtime first enabled support for tail calls by default in Wasmtime 21.0.0, although that release contained a bug where it was only on-by-default for some configurations. In Wasmtime 22.0.0 tail calls were enabled by default for all configurations. The specific crash happens when an exported function in a WebAssembly module (or component) performs a `return_call` (or `return_call_indirect` or `return_call_ref`) to an imported host function which captures a stack trace (for example, the host function raises a trap). In this situation, the stack-walking code previously assumed there was always at least one WebAssembly frame on the stack but with tail calls that is no longer true. With the tail-call proposal it's possible to have an entry trampoline appear as if it directly called the exit trampoline. This situation triggers an internal assert in the stack-walking code which raises a Rust `panic!()`. When Wasmtime is compiled with Rust versions 1.80 and prior this means that an `extern "C"` function in Rust is raising a `panic!()`. This is technically undefined behavior and typically manifests as a process abort when the unwinder fails to unwind Cranelift-generated frames. When Wasmtime is compiled with Rust versions 1.81 and later this panic becomes a deterministic process abort. Overall the impact of this issue is that this is a denial-of-service vector where a malicious WebAssembly module or component can cause the host to crash. There is no other impact at this time other than availability of a service as the result of the crash is always a crash and no more. This issue was discovered by routine fuzzing performed by the Wasmtime project via Google's OSS-Fuzz infrastructure. We have no evidence that it has ever been exploited by an attacker in the wild. All versions of Wasmtime which have tail calls enabled by default have been patched: * 21.0.x - patched in 21.0.2 * 22.0.x - patched in 22.0.1 * 23.0.x - patched in 23.0.3 * 24.0.x - patched in 24.0.1 * 25.0.x - patched in 25.0.2. Wasmtime versions from 12.0.x (the first release with experimental tail call support) to 20.0.x (the last release with tail-calls off-by-default) have support for tail calls but the support is disabled by default. These versions are not affected in their default configurations, but users who explicitly enabled tail call support will need to either disable tail call support or upgrade to a patched version of Wasmtime. The main workaround for this issue is to disable tail support for tail calls in Wasmtime, for example with `Config::wasm_tail_call(false)`. Users are otherwise encouraged to upgrade to patched versions.

Action-Not Available
Vendor-bytecodealliance
Product-wasmtime
CWE ID-CWE-670
Always-Incorrect Control Flow Implementation
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found