Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:h:intel:celeron_1000m:-:*:*:*:*:*:*:*
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-25756 |
Out-of-bounds read in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via adjacent access. Published: November 14, 2023; 2:15:19 PM -0500 |
V3.1: 8.0 HIGH V2.0:(not available) |
CVE-2023-22329 |
Improper input validation in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via adjacent access. Published: November 14, 2023; 2:15:17 PM -0500 |
V3.1: 3.5 LOW V2.0:(not available) |
CVE-2022-30704 |
Improper initialization in the Intel(R) TXT SINIT ACM for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. Published: February 16, 2023; 3:15:14 PM -0500 |
V3.1: 6.7 MEDIUM V2.0:(not available) |
CVE-2022-21198 |
Time-of-check time-of-use race condition in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. Published: November 11, 2022; 11:15:11 AM -0500 |
V3.1: 6.4 MEDIUM V2.0:(not available) |
CVE-2020-0543 |
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Published: June 15, 2020; 10:15:11 AM -0400 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2020-0551 |
Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html Published: March 12, 2020; 6:15:15 PM -0400 |
V3.1: 5.6 MEDIUM V2.0: 1.9 LOW |
CVE-2020-0550 |
Improper data forwarding in some data cache for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. The list of affected products is provided in intel-sa-00330: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html Published: March 12, 2020; 6:15:15 PM -0400 |
V3.1: 5.6 MEDIUM V2.0: 1.9 LOW |