Search Results (Refine Search)
- CPE Product Version: cpe:/h:intel:xeon_e3_1245_v5:-
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2021-0114 |
Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access. Published: August 16, 2021; 3:15:13 PM -0400 |
V3.1: 6.7 MEDIUM V2.0: 7.2 HIGH |
CVE-2021-0144 |
Insecure default variable initialization for the Intel BSSA DFT feature may allow a privileged user to potentially enable an escalation of privilege via local access. Published: July 14, 2021; 10:15:08 AM -0400 |
V3.1: 6.7 MEDIUM V2.0: 7.2 HIGH |
CVE-2018-3615 |
Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis. Published: August 14, 2018; 3:29:00 PM -0400 |
V3.0: 6.4 MEDIUM V2.0: 5.4 MEDIUM |
CVE-2018-3693 |
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis. Published: July 10, 2018; 5:29:01 PM -0400 |
V3.1: 5.6 MEDIUM V2.0: 4.7 MEDIUM |
CVE-2018-3652 |
Existing UEFI setting restrictions for DCI (Direct Connect Interface) in 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family allows a limited physical presence attacker to potentially access platform secrets via debug interfaces. Published: July 10, 2018; 5:29:00 PM -0400 |
V3.1: 7.6 HIGH V2.0: 4.6 MEDIUM |
CVE-2018-3627 |
Logic bug in Intel Converged Security Management Engine 11.x may allow an attacker to execute arbitrary code via local privileged access. Published: July 10, 2018; 5:29:00 PM -0400 |
V3.1: 8.2 HIGH V2.0: 4.6 MEDIUM |
CVE-2018-3640 |
Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a. Published: May 22, 2018; 8:29:00 AM -0400 |
V3.0: 5.6 MEDIUM V2.0: 4.7 MEDIUM |
CVE-2018-3639 |
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. Published: May 22, 2018; 8:29:00 AM -0400 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2018-9056 |
Systems with microprocessors utilizing speculative execution may allow unauthorized disclosure of information to an attacker with local user access via a side-channel attack on the directional branch predictor, as demonstrated by a pattern history table (PHT), aka BranchScope. Published: March 27, 2018; 1:29:00 PM -0400 |
V3.0: 5.6 MEDIUM V2.0: 4.7 MEDIUM |
CVE-2017-5754 |
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache. Published: January 04, 2018; 8:29:00 AM -0500 |
V3.0: 5.6 MEDIUM V2.0: 4.7 MEDIUM |
CVE-2017-5753 |
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. Published: January 04, 2018; 8:29:00 AM -0500 |
V3.1: 5.6 MEDIUM V2.0: 4.7 MEDIUM |
CVE-2017-5715 |
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. Published: January 04, 2018; 8:29:00 AM -0500 |
V3.1: 5.6 MEDIUM V2.0: 1.9 LOW |