Intel Celeron 3955U

CPE Details

Intel Celeron 3955U
-
2020-04-10
17h57 +00:00
2020-04-10
17h57 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:h:intel:celeron_3955u:-:*:*:*:*:*:*:*

Informations

Vendor

intel

Product

celeron_3955u

Version

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-22329 2023-11-14 19h05 +00:00 Improper input validation in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via adjacent access.
3.5
Bas
CVE-2023-25756 2023-11-14 19h05 +00:00 Out-of-bounds read in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via adjacent access.
8
Haute
CVE-2022-30704 2023-02-16 19h59 +00:00 Improper initialization in the Intel(R) TXT SINIT ACM for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
7.2
Haute
CVE-2022-21198 2022-11-11 15h49 +00:00 Time-of-check time-of-use race condition in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
7.9
Haute
CVE-2022-24436 2022-06-15 18h08 +00:00 Observable behavioral in power management throttling for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via network access.
6.5
Moyen
CVE-2021-33150 2022-03-11 16h54 +00:00 Hardware allows activation of test or debug logic at runtime for some Intel(R) Trace Hub instances which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
6.8
Moyen
CVE-2020-8695 2020-11-12 17h03 +00:00 Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
5.5
Moyen
CVE-2020-8694 2020-11-12 17h03 +00:00 Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
5.5
Moyen
CVE-2020-8696 2020-11-12 17h02 +00:00 Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
5.5
Moyen
CVE-2020-0543 2020-06-15 11h55 +00:00 Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
5.5
Moyen
CVE-2020-0551 2020-03-12 20h04 +00:00 Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html
5.6
Moyen
CVE-2020-0549 2020-01-27 23h03 +00:00 Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
5.5
Moyen
CVE-2020-0548 2020-01-27 23h02 +00:00 Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
5.5
Moyen