Intel NUC Board NUC5i3MYBE

CPE Details

Intel NUC Board NUC5i3MYBE
-
2020-09-23
10h46 +00:00
2020-09-23
10h46 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:h:intel:nuc_board_nuc5i3mybe:-:*:*:*:*:*:*:*

Informations

Vendor

intel

Product

nuc_board_nuc5i3mybe

Version

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-36349 2022-11-11 15h48 +00:00 Insecure default variable initialization in BIOS firmware for some Intel(R) NUC Boards and Intel(R) NUC Kits before version MYi30060 may allow an authenticated user to potentially enable denial of service via local access.
5.5
Moyen
CVE-2022-36370 2022-11-11 15h48 +00:00 Improper authentication in BIOS firmware for some Intel(R) NUC Boards and Intel(R) NUC Kits before version MYi30060 may allow a privileged user to potentially enable escalation of privilege via local access.
7.8
Haute
CVE-2022-24436 2022-06-15 18h08 +00:00 Observable behavioral in power management throttling for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via network access.
6.5
Moyen
CVE-2020-0530 2020-03-12 19h55 +00:00 Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html
7.8
Haute
CVE-2020-0526 2020-03-12 19h02 +00:00 Improper input validation in firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html
6.7
Moyen