Kategori: Güvenlik Açıkları

CVE-2021-0180

Uncontrolled resource consumption in the Intel(R) HAXM software before version 7.6.6 may allow an unauthenticated user to potentially enable privilege escalation via local access. Devamını…

Devamını oku

CVE-2021-0182

Uncontrolled resource consumption in the Intel(R) HAXM software before version 7.6.6 may allow an unauthenticated user to potentially enable information disclosure via local access. Devamını…

Devamını oku

CVE-2021-0186

Improper input validation in the Intel(R) SGX SDK applications compiled for SGX2 enabled processors may allow a privileged user to potentially escalation of privilege via…

Devamını oku

CVE-2021-0197

Protection mechanism failure in the firmware for the Intel(R) Ethernet Network Controller E810 before version 1.5.5.6 may allow a privileged user to enable a denial…

Devamını oku

CVE-2021-0198

Improper access control in the firmware for the Intel(R) Ethernet Network Controller E810 before version 1.5.5.6 may allow a privileged user to potentially enable a…

Devamını oku

CVE-2021-0199

Improper input validation in the firmware for the Intel(R) Ethernet Network Controller E810 before version 1.6.0.6 may allow a privileged user to potentially enable a…

Devamını oku

CVE-2021-0200

Out-of-bounds write in the firmware for Intel(R) Ethernet 700 Series Controllers before version 8.2 may allow a privileged user to potentially enable an escalation of…

Devamını oku

CVE-2021-0146 (atom_c3000_firmware, atom_x5-e3930_firmware, atom_x5-e3940_firmware, atom_x7-e3950_firmware, celeron_j1750_firmware, celeron_j1800_firmware, celeron_j1850_firmware, celeron_j1900_firmware, celeron_j3060_firmware, celeron_j3160_firmware, celeron_j3355_firmware, celeron_j3355e_firmware, celeron_j3455_firmware, celeron_j3455e_firmware, celeron_j4005_firmware, celeron_j4025_firmware, celeron_j4105_firmware, celeron_j4125_firmware, celeron_j6412_firmware, celeron_j6413_firmware, celeron_n2805_firmware, celeron_n2806_firmware, celeron_n2807_firmware, celeron_n2808_firmware, celeron_n2810_firmware, celeron_n2815_firmware, celeron_n2820_firmware, celeron_n2830_firmware, celeron_n2840_firmware, celeron_n2910_firmware, celeron_n2920_firmware, celeron_n2930_firmware, celeron_n2940_firmware, celeron_n3000_firmware, celeron_n3010_firmware, celeron_n3050_firmware, celeron_n3060_firmware, celeron_n3150_firmware, celeron_n3160_firmware, celeron_n3350_firmware, celeron_n3350e_firmware, celeron_n3450_firmware, celeron_n4000_firmware, celeron_n4020_firmware, celeron_n4100_firmware, celeron_n4120_firmware, celeron_n4500_firmware, celeron_n4505_firmware, celeron_n5100_firmware, celeron_n5105_firmware, celeron_n6210_firmware, celeron_n6211_firmware, pentium_j2850_firmware, pentium_j2900_firmware, pentium_j3710_firmware, pentium_j4205_firmware, pentium_j6426_firmware, pentium_n3510_firmware, pentium_n3520_firmware, pentium_n3530_firmware, pentium_n3540_firmware, pentium_n3700_firmware, pentium_n3710_firmware, pentium_n4200_firmware, pentium_n4200e_firmware, pentium_n6415_firmware, pentium_silver_j5005_firmware, pentium_silver_j5040_firmware, pentium_silver_n5000_firmware, pentium_silver_n5030_firmware, pentium_silver_n6000_firmware, pentium_silver_n6005_firmware)

Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of…

Devamını oku