Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-25756 |
Out-of-bounds read in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via adjacent access. Published: November 14, 2023; 2:15:19 PM -0500 |
V3.1: 8.0 HIGH V2.0:(not available) |
CVE-2023-22329 |
Improper input validation in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via adjacent access. Published: November 14, 2023; 2:15:17 PM -0500 |
V3.1: 3.5 LOW V2.0:(not available) |
CVE-2022-44611 |
Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via adjacent access. Published: August 10, 2023; 11:15:15 PM -0400 |
V3.1: 8.0 HIGH V2.0:(not available) |
CVE-2022-43505 |
Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable denial of service via local access. Published: August 10, 2023; 11:15:15 PM -0400 |
V3.1: 4.4 MEDIUM V2.0:(not available) |
CVE-2022-38087 |
Exposure of resource to wrong sphere in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access. Published: May 10, 2023; 10:15:13 AM -0400 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2022-33894 |
Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. Published: May 10, 2023; 10:15:12 AM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-38090 |
Improper isolation of shared resources in some Intel(R) Processors when using Intel(R) Software Guard Extensions may allow a privileged user to potentially enable information disclosure via local access. Published: February 16, 2023; 4:15:13 PM -0500 |
V3.1: 4.4 MEDIUM V2.0:(not available) |
CVE-2022-26047 |
Improper input validation for some Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products may allow unauthenticated user to potentially enable denial of service via local access. Published: November 11, 2022; 11:15:12 AM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2022-26373 |
Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. Published: August 18, 2022; 4:15:11 PM -0400 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2022-21180 |
Improper input validation for some Intel(R) Processors may allow an authenticated user to potentially cause a denial of service via local access. Published: June 15, 2022; 5:15:09 PM -0400 |
V3.1: 5.5 MEDIUM V2.0: 4.9 MEDIUM |
CVE-2022-21151 |
Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Published: May 12, 2022; 1:15:09 PM -0400 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2022-0005 |
Sensitive information accessible by physical probing of JTAG interface for some Intel(R) Processors with SGX may allow an unprivileged user to potentially enable information disclosure via physical access. Published: May 12, 2022; 1:15:09 PM -0400 |
V3.1: 2.4 LOW V2.0: 2.1 LOW |
CVE-2021-33124 |
Out-of-bounds write in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access. Published: May 12, 2022; 1:15:09 PM -0400 |
V3.1: 6.7 MEDIUM V2.0: 7.2 HIGH |
CVE-2021-33123 |
Improper access control in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access. Published: May 12, 2022; 1:15:09 PM -0400 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2021-33122 |
Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access. Published: May 12, 2022; 1:15:09 PM -0400 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2021-33103 |
Unintended intermediary in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access. Published: May 12, 2022; 1:15:09 PM -0400 |
V3.1: 6.7 MEDIUM V2.0: 7.2 HIGH |
CVE-2021-33107 |
Insufficiently protected credentials in USB provisioning for Intel(R) AMT SDK before version 16.0.3, Intel(R) SCS before version 12.2 and Intel(R) MEBx before versions 11.0.0.0012, 12.0.0.0011, 14.0.0.0004 and 15.0.0.0004 may allow an unauthenticated user to potentially enable information disclosure via physical access. Published: February 09, 2022; 6:15:15 PM -0500 |
V3.1: 4.6 MEDIUM V2.0: 2.1 LOW |
CVE-2021-0156 |
Improper input validation in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable an escalation of privilege via local access. Published: February 09, 2022; 6:15:13 PM -0500 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2021-0125 |
Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via physical access. Published: February 09, 2022; 6:15:13 PM -0500 |
V3.1: 6.6 MEDIUM V2.0: 4.6 MEDIUM |
CVE-2021-0124 |
Improper access control in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via physical access. Published: February 09, 2022; 6:15:13 PM -0500 |
V3.1: 6.6 MEDIUM V2.0: 4.6 MEDIUM |