Known Vulnerabilities for Core I5-9500e by Intel

Listed below are 10 of the newest known vulnerabilities associated with "Core I5-9500e" by "Intel".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2022-21151 Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authentica... 5.5 - MEDIUM 2022-05-12 2023-08-08
CVE-2021-0115 Buffer overflow in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of ... 6.7 - MEDIUM 2022-02-09 2022-02-25
CVE-2021-0114 Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an esca... 6.7 - MEDIUM 2021-08-16 2022-05-03
CVE-2021-0111 NULL pointer dereference in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an es... 6.7 - MEDIUM 2022-02-09 2022-02-25
CVE-2021-0107 Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalat... 6.7 - MEDIUM 2022-02-09 2022-02-25
CVE-2021-0103 Insufficient control flow management in the firmware for some Intel(R) Processors may allow a privileged user to potentially ... 6.7 - MEDIUM 2022-02-09 2022-07-12
CVE-2021-0099 Insufficient control flow management in the firmware for some Intel(R) Processors may allow an authenticated user to potentia... 7.8 - HIGH 2022-02-09 2022-07-12
CVE-2021-0093 Incorrect default permissions in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable ... 4.4 - MEDIUM 2022-02-09 2022-02-25
CVE-2021-0092 Improper access control in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a deni... 4.4 - MEDIUM 2022-02-09 2022-02-25
CVE-2021-0091 Improper access control in the firmware for some Intel(R) Processors may allow an unauthenticated user to potentially enable ... 7.8 - HIGH 2022-02-09 2022-07-12

Popular searches for Core I5-9500e

Intel product specifications

ark.intel.com/content/www/us/en/ark.html

Intel product specifications Intel Compare products including processors, desktop boards, server products and networking products.

ark.intel.com/?wapkw=quicklink%3Aproduct-specifications ark.intel.com ark.intel.com www.intel.com.au/content/www/au/en/ark/compare.html www.intel.in/content/www/in/en/ark/compare.html processorfinder.intel.com processorfinder.intel.com/Default.aspx ark.intel.com/VTList.aspx Intel Central processing unit Server (computing) Intel Graphics Technology Field-programmable gate array Ethernet Next Unit of Computing Specification (technical standard) Computer network Chipset Product (business) Desktop computer System on a chip Code name Gigabit Ethernet Intel Core Feedback Celeron User (computing) Intel Atom

PassMark Software - CPU Benchmarks

www.cpubenchmark.net

PassMark Software - CPU Benchmarks PassMark Software - CPU Benchmarks - Over 1 million CPUs and 1,000 models benchmarked and compared in graph form, updated daily!

www.cpubenchmark.net/cpu_value_available.html www.cpubenchmark.net/singleThread.html www.cpubenchmark.net/high_end_cpus.html www.cpubenchmark.net/cpu_list.php www.cpubenchmark.net/cross-platform.html www.cpubenchmark.net/laptop.html www.cpubenchmark.net/desktop.html www.cpubenchmark.net/market_share.html www.cpubenchmark.net/socketType.html Central processing unit Benchmark (computing) Software Graph (discrete mathematics) Advanced Micro Devices Personal computer Multi-core processor Apple Inc. Ryzen Thread (computing) Intel Xeon User (computing) Website Qualcomm Epyc Symmetric multiprocessing Computer performance Loopback Qualcomm Snapdragon

© CVE.report 2024 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report