Intel Xeon Platinum 8321HC

CPE Details

Intel Xeon Platinum 8321HC
-
2021-06-15
19h01 +00:00
2021-06-21
12h39 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:intel:xeon_platinum_8321hc:-:*:*:*:*:*:*:*

Informations

Vendor

intel

Product

xeon_platinum_8321hc

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-24436 2022-06-15 18h08 +00:00 Observable behavioral in power management throttling for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via network access.
6.5
Medium
CVE-2021-0145 2022-02-09 21h04 +00:00 Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
5.5
Medium
CVE-2021-0106 2021-06-09 17h13 +00:00 Incorrect default permissions in the Intel(R) Optane(TM) DC Persistent Memory for Windows software versions before 2.00.00.3842 or 1.00.00.3515 may allow an authenticated user to potentially enable escalation of privilege via local access.
7.8
High
CVE-2021-0134 2021-06-09 17h10 +00:00 Improper input validation in an API for the Intel(R) Security Library before version 3.3 may allow a privileged user to potentially enable denial of service via network access.
4.9
Medium
CVE-2021-0131 2021-06-09 17h10 +00:00 Use of cryptographically weak pseudo-random number generator (PRNG) in an API for the Intel(R) Security Library before version 3.3 may allow an authenticated user to potentially enable information disclosure via network access.
6.5
Medium
CVE-2021-0132 2021-06-09 17h10 +00:00 Missing release of resource after effective lifetime in an API for the Intel(R) Security Library before version 3.3 may allow a privileged user to potentially enable denial of service via network access.
4.9
Medium
CVE-2021-0133 2021-06-09 17h10 +00:00 Key exchange without entity authentication in the Intel(R) Security Library before version 3.3 may allow an authenticated user to potentially enable escalation of privilege via network access.
8.1
High