Intel Celeron N N4100

CPE Details

Intel Celeron N N4100
n4100
2018-02-07
11h24 +00:00
2023-09-25
16h36 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*

Informations

Vendor

intel

Product

celeron_n

Version

n4100

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-24436 2022-06-15 18h08 +00:00 Observable behavioral in power management throttling for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via network access.
6.5
Moyen
CVE-2019-14615 2020-01-17 16h36 +00:00 Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.
5.5
Moyen
CVE-2018-3693 2018-07-10 19h00 +00:00 Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.
5.6
Moyen
CVE-2018-9056 2018-03-27 15h00 +00:00 Systems with microprocessors utilizing speculative execution may allow unauthorized disclosure of information to an attacker with local user access via a side-channel attack on the directional branch predictor, as demonstrated by a pattern history table (PHT), aka BranchScope.
5.6
Moyen
CVE-2017-5715 2018-01-04 13h00 +00:00 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
5.6
Moyen
CVE-2017-5753 2018-01-04 13h00 +00:00 Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
5.6
Moyen
CVE-2017-5754 2018-01-04 13h00 +00:00 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
5.6
Moyen