Intel Compute Stick STK1A32SC

CPE Details

Intel Compute Stick STK1A32SC
-
2020-09-23
10h45 +00:00
2020-09-23
10h45 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:h:intel:compute_stick_stk1a32sc:-:*:*:*:*:*:*:*

Informations

Vendor

intel

Product

compute_stick_stk1a32sc

Version

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-24436 2022-06-15 18h08 +00:00 Observable behavioral in power management throttling for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via network access.
6.5
Moyen
CVE-2021-0109 2021-02-17 12h36 +00:00 Insecure inherited permissions for the Intel(R) SOC driver package for STK1A32SC before version 604 may allow an authenticated user to potentially enable escalation of privilege via local access.
7.8
Haute
CVE-2020-0530 2020-03-12 19h55 +00:00 Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html
7.8
Haute
CVE-2020-0526 2020-03-12 19h02 +00:00 Improper input validation in firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html
6.7
Moyen