Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
core i7 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2017_5715
First of all This repository is based on the findings of these 3 repositories: https://github.com/peter-nebe/optee_os/tree/master, https://github.com/jefg89/optee-rpi4/tree/main and most notably https://github.com/joaopeixoto13/OPTEE-RPI4. The idea of this repository is to work a...
1 Github repository
NA
CVE-2018_3639
First of all This repository is based on the findings of these 3 repositories: https://github.com/peter-nebe/optee_os/tree/master, https://github.com/jefg89/optee-rpi4/tree/main and most notably https://github.com/joaopeixoto13/OPTEE-RPI4. The idea of this repository is to work a...
1 Github repository
NA
CVE-2022_23960
First of all This repository is based on the findings of these 3 repositories: https://github.com/peter-nebe/optee_os/tree/master, https://github.com/jefg89/optee-rpi4/tree/main and most notably https://github.com/joaopeixoto13/OPTEE-RPI4. The idea of this repository is to work a...
1 Github repository
6.5
CVSSv3
CVE-2022-0001
Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
Intel Celeron J4005 -
Intel Celeron N4100 -
Intel Celeron N4000 -
Intel Celeron J4105 -
Intel Pentium Silver J5005 -
Intel Pentium Silver N5000 -
Intel Core I3-10110u -
Intel Core I3-1005g1 -
Intel Core I5-10210u -
Intel Core I5-10310y -
Intel Core I5-10210y -
Intel Core I5-1035g4 -
Intel Core I5-1035g7 -
Intel Core I5-1035g1 -
Intel Core I5-9300h -
Intel Core I5-9400h -
Intel Core I5-9400 -
Intel Core I5-9600k -
Intel Core I5-8265u -
Intel Core I5-8200y -
Intel Core I7-10510u -
Intel Core I7-10510y -
9 Github repositories
3 Articles
6.5
CVSSv3
CVE-2022-0002
Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
Intel Celeron J4005 -
Intel Celeron N4100 -
Intel Celeron N4000 -
Intel Celeron J4105 -
Intel Celeron J3355 -
Intel Celeron N3350 -
Intel Celeron J3455 -
Intel Celeron N3450 -
Intel Atom X5-e3930 -
Intel Atom X5-e3940 -
Intel Atom X7-e3950 -
Intel Pentium Silver J5005 -
Intel Pentium Silver N5000 -
Intel Core I3-10110u -
Intel Core I3-1005g1 -
Intel Core I5-10210u -
Intel Core I5-10310y -
Intel Core I5-10210y -
Intel Core I5-1035g4 -
Intel Core I5-1035g7 -
Intel Core I5-1035g1 -
Intel Core I5-9300h -
1 Github repository
3 Articles
6.8
CVSSv3
CVE-2021-33150
Hardware allows activation of test or debug logic at runtime for some Intel(R) Trace Hub instances which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Intel Core I7-6700k -
Intel Atom C2750 -
Intel Xeon D-2141i -
Intel Xeon D-2177nt -
Intel Xeon D-2161i -
Intel Xeon D-2143it -
Intel Xeon D-2146nt -
Intel Xeon D-2145nt -
Intel Xeon D-2123it -
Intel Xeon D-2173it -
Intel Xeon D-2187nt -
Intel Xeon D-2142it -
Intel Xeon D-2163it -
Intel Xeon D-2183it -
Intel Xeon D-2166nt -
Intel Celeron J4005 -
Intel Celeron N4000 -
Intel Celeron J4105 -
Intel Celeron J3355 -
Intel Celeron J3455 -
Intel Celeron J3060 -
Intel Celeron J3160 -
1 Article
4.4
CVSSv3
CVE-2021-0093
Incorrect default permissions in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a denial of service via local access.
Intel Atom C3308 -
Intel Atom C3336 -
Intel Atom C3338 -
Intel Atom C3338r -
Intel Atom C3436l -
Intel Atom C3508 -
Intel Atom C3538 -
Intel Atom C3558 -
Intel Atom C3558r -
Intel Atom C3708 -
Intel Atom C3750 -
Intel Atom C3758 -
Intel Atom C3758r -
Intel Atom C3808 -
Intel Atom C3830 -
Intel Atom C3850 -
Intel Atom C3858 -
Intel Atom C3950 -
Intel Atom C3955 -
Intel Atom C3958 -
Intel Core I3-1000g1 -
Intel Core I3-1000g4 -
7.8
CVSSv3
CVE-2021-0099
Insufficient control flow management in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable an escalation of privilege via local access.
Intel Core I7-6700k -
Intel Xeon D-1649n -
Intel Xeon D-1633n -
Intel Xeon D-1637 -
Intel Xeon D-1627 -
Intel Xeon D-1623n -
Intel Xeon D-1622 -
Intel Xeon D-1653n -
Intel Xeon D-1602 -
Intel Core I3-1005g1 -
Intel Core I3-10110u -
Intel Core I3-10110y -
Intel Core I3-9300 -
Intel Core I3-9300t -
Intel Xeon D-2123it -
Intel Xeon D-2141i -
Intel Xeon D-2142it -
Intel Xeon D-2143it -
Intel Xeon D-2145nt -
Intel Xeon D-2146nt -
Intel Xeon D-2161i -
Intel Xeon D-2163it -
6.7
CVSSv3
CVE-2021-0103
Insufficient control flow management in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
Intel Core I7-6700k -
Intel Xeon D-1649n -
Intel Xeon D-1633n -
Intel Xeon D-1637 -
Intel Xeon D-1627 -
Intel Xeon D-1623n -
Intel Xeon D-1622 -
Intel Xeon D-1653n -
Intel Xeon D-1602 -
Intel Core I3-1005g1 -
Intel Core I3-10110u -
Intel Core I3-10110y -
Intel Core I3-9300 -
Intel Core I3-9300t -
Intel Xeon D-2123it -
Intel Xeon D-2141i -
Intel Xeon D-2142it -
Intel Xeon D-2143it -
Intel Xeon D-2145nt -
Intel Xeon D-2146nt -
Intel Xeon D-2161i -
Intel Xeon D-2163it -
6.7
CVSSv3
CVE-2021-0107
Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Atom C3308 -
Intel Atom C3336 -
Intel Atom C3338 -
Intel Atom C3338r -
Intel Atom C3436l -
Intel Atom C3508 -
Intel Atom C3538 -
Intel Atom C3558 -
Intel Atom C3558r -
Intel Atom C3708 -
Intel Atom C3750 -
Intel Atom C3758 -
Intel Atom C3758r -
Intel Atom C3808 -
Intel Atom C3830 -
Intel Atom C3850 -
Intel Atom C3858 -
Intel Atom C3950 -
Intel Atom C3955 -
Intel Atom C3958 -
Intel Core I3-1000g1 -
Intel Core I3-1000g4 -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »