Known Vulnerabilities for Celeron J6412 by Intel
Listed below are 5 of the newest known vulnerabilities associated with "Celeron J6412" by "Intel".
These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.
Data on known vulnerable versions is also displayed based on information from known CPEs
Known Vulnerabilities
| CVE | Shortened Description | Severity | Publish Date | Last Modified |
|---|---|---|---|---|
| CVE-2022-21151 | Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authentica... | 5.5 - MEDIUM | 2022-05-12 | 2023-08-08 |
| CVE-2021-0186 | Improper input validation in the Intel(R) SGX SDK applications compiled for SGX2 enabled processors may allow a privileged us... | 6.7 - MEDIUM | 2021-11-17 | 2021-11-23 |
| CVE-2021-0146 | Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated ... | 6.8 - MEDIUM | 2021-11-17 | 2022-05-03 |
| CVE-2020-24489 | Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privile... | 8.8 - HIGH | 2021-06-09 | 2022-04-06 |
| CVE-2020-0559 | Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 ... | 7.8 - HIGH | 2020-08-13 | 2022-04-28 |