Vulnerabilities (CVE)

Filtered by vendor Intel Subscribe
Filtered by product Celeron J4105
Total 26 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-24513 3 Debian, Intel, Siemens 71 Debian Linux, Atom C3308, Atom C3336 and 68 more 2022-04-22 2.1 LOW 6.5 MEDIUM
Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2020-24489 2 Debian, Intel 214 Debian Linux, Atom X5-e3930, Atom X5-e3940 and 211 more 2022-04-06 4.6 MEDIUM 8.8 HIGH
Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2021-0186 1 Intel 365 Celeron J1750, Celeron J1750 Firmware, Celeron J1800 and 362 more 2021-11-23 4.6 MEDIUM 6.7 MEDIUM
Improper input validation in the Intel(R) SGX SDK applications compiled for SGX2 enabled processors may allow a privileged user to potentially escalation of privilege via local access.
CVE-2020-8694 1 Intel 598 Celeron 3855u, Celeron 3855u Firmware, Celeron 3865u and 595 more 2021-05-11 2.1 LOW 5.5 MEDIUM
Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2020-0599 1 Intel 122 Atom 230, Atom 230 Firmware, Atom 330 and 119 more 2020-11-30 4.6 MEDIUM 6.7 MEDIUM
Improper access control in the PMC for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2019-0120 1 Intel 56 Atom 230, Atom 230 Firmware, Atom 330 and 53 more 2020-08-24 2.1 LOW 4.4 MEDIUM
Insufficient key protection vulnerability in silicon reference firmware for Intel(R) Pentium(R) Processor J Series, Intel(R) Pentium(R) Processor N Series, Intel(R) Celeron(R) J Series, Intel(R) Celeron(R) N Series, Intel(R) Atom(R) Processor A Series, Intel(R) Atom(R) Processor E3900 Series, Intel(R) Pentium(R) Processor Silver Series may allow a privileged user to potentially enable denial of service via local access.