Vulnerabilities > Intel > Core I9 11900T
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-02-09 | CVE-2021-0115 | Classic Buffer Overflow vulnerability in multiple products Buffer overflow in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. | 6.7 |
2022-02-09 | CVE-2021-0127 | Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access. | 5.5 |
2022-02-09 | CVE-2021-0145 | Improper Initialization vulnerability in multiple products Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | 5.5 |
2021-11-17 | CVE-2021-0157 | Unspecified vulnerability in Intel products Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. | 6.7 |
2021-11-17 | CVE-2021-0158 | Improper Input Validation vulnerability in Intel products Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. | 6.7 |
2021-08-16 | CVE-2021-0114 | Insecure Default Initialization of Resource vulnerability in Intel products Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access. | 6.7 |
2021-07-14 | CVE-2021-0144 | Insecure Default Initialization of Resource vulnerability in Intel products Insecure default variable initialization for the Intel BSSA DFT feature may allow a privileged user to potentially enable an escalation of privilege via local access. | 6.7 |
2021-06-09 | CVE-2020-24489 | Incomplete Cleanup vulnerability in multiple products Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access. | 8.8 |