Summary
Detail | |||
---|---|---|---|
Vendor | Intel | First view | 2022-05-12 |
Product | Celeron g5900 Firmware | Last view | 2023-11-14 |
Version | Type | Os | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:o:intel:celeron_g5900_firmware:-:*:*:*:*:*:*:* | 8 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8 | 2023-11-14 | CVE-2023-25756 | Out-of-bounds read in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via adjacent access. |
3.5 | 2023-11-14 | CVE-2023-22329 | Improper input validation in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via adjacent access. |
4.4 | 2023-08-11 | CVE-2022-43505 | Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable denial of service via local access. |
6.7 | 2023-02-16 | CVE-2022-30704 | Improper initialization in the Intel(R) TXT SINIT ACM for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. |
6.4 | 2022-11-11 | CVE-2022-21198 | Time-of-check time-of-use race condition in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. |
5.5 | 2022-08-18 | CVE-2022-26373 | Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. |
5.5 | 2022-06-15 | CVE-2022-21180 | Improper input validation for some Intel(R) Processors may allow an authenticated user to potentially cause a denial of service via local access. |
2.4 | 2022-05-12 | CVE-2022-0005 | Sensitive information accessible by physical probing of JTAG interface for some Intel(R) Processors with SGX may allow an unprivileged user to potentially enable information disclosure via physical access. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
20% (1) | CWE-665 | Improper Initialization |
20% (1) | CWE-367 | Time-of-check Time-of-use (TOCTOU) Race Condition |
20% (1) | CWE-319 | Cleartext Transmission of Sensitive Information |
20% (1) | CWE-125 | Out-of-bounds Read |
20% (1) | CWE-20 | Improper Input Validation |