Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
intel silicon reference firmware - vulnerabilities and exploits
(subscribe to this query)
6.7
CVSSv3
CVE-2018-12201
Buffer overflow vulnerability in Platform Sample / Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor, Intel(R) Pentium(R) Silver J5005 Processor, Intel(R) Pentium(R) Silver N5000 Processor, Intel(R) Celeron(R) J4105 Proc...
Intel Platform Sample Firmware -
Intel Silicon Reference Firmware -
6.7
CVSSv3
CVE-2018-12203
Denial of service vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel Core Processor, 7th Generation Intel Core Processor may allow privileged user to potentially execute arbitrary code via local access.
Intel Platform Sample Firmware -
Intel Silicon Reference Firmware -
6.8
CVSSv3
CVE-2018-12205
Improper certificate validation in Platform Sample/ Silicon Reference firmware for 8th Generation Intel(R) Core(tm) Processor, 7th Generation Intel(R) Core(tm) Processor may allow an unauthenticated user to potentially enable an escalation of privilege via physical access.
Intel Platform Sample Firmware -
Intel Silicon Reference Firmware -
6.7
CVSSv3
CVE-2018-12202
Privilege escalation vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor may allow privileged user to potentially leverage existing features via local access.
Intel Platform Sample Firmware -
Intel Silicon Reference Firmware -
6.7
CVSSv3
CVE-2018-12204
Improper memory initialization in Platform Sample/Silicon Reference firmware Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow privileged user to potentially enable an escalation of privilege via local access.
Intel Platform Sample Firmware -
Intel Silicon Reference Firmware -
6.7
CVSSv3
CVE-2019-0126
Insufficient access control in silicon reference firmware for Intel(R) Xeon(R) Scalable Processor, Intel(R) Xeon(R) Processor D Family may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access.
Intel Xeon D-1649n Firmware -
Intel Xeon D-1633n Firmware -
Intel Xeon D-1637 Firmware -
Intel Xeon D-1627 Firmware -
Intel Xeon D-1623n Firmware -
Intel Xeon D-1622 Firmware -
Intel Xeon D-1653n Firmware -
Intel Xeon D-1602 Firmware -
Intel Xeon D-2141i Firmware -
Intel Xeon D-2177nt Firmware -
Intel Xeon D-2161i Firmware -
Intel Xeon D-2143it Firmware -
Intel Xeon D-2146nt Firmware -
Intel Xeon D-2145nt Firmware -
Intel Xeon D-2123it Firmware -
Intel Xeon D-2173it Firmware -
Intel Xeon D-2191 Firmware -
Intel Xeon D-2187nt Firmware -
Intel Xeon D-2142it Firmware -
Intel Xeon D-2163it Firmware -
Intel Xeon D-2183it Firmware -
Intel Xeon D-2166nt Firmware -
4.4
CVSSv3
CVE-2019-0120
Insufficient key protection vulnerability in silicon reference firmware for Intel(R) Pentium(R) Processor J Series, Intel(R) Pentium(R) Processor N Series, Intel(R) Celeron(R) J Series, Intel(R) Celeron(R) N Series, Intel(R) Atom(R) Processor A Series, Intel(R) Atom(R) Processor ...
Intel J5005 Firmware -
Intel J4205 Firmware -
Intel J3710 Firmware -
Intel N3540 Firmware -
Intel N3530 Firmware -
Intel N5000 Firmware -
Intel Celeron J4005 Firmware -
Intel Celeron N4100 Firmware -
Intel Celeron N4000 Firmware -
Intel Celeron J4105 Firmware -
Intel Celeron J3355 Firmware -
Intel Celeron N3350 Firmware -
Intel Celeron J3455 Firmware -
Intel Celeron N3450 Firmware -
Intel Celeron J3060 Firmware -
Intel Celeron J3160 Firmware -
Intel Celeron N3000 Firmware -
Intel Celeron N2940 Firmware -
Intel Celeron N2840 Firmware -
Intel Celeron N2930 Firmware -
Intel Celeron N2830 Firmware -
Intel Atom 330 Firmware -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started