Intel Atom X5 E3930
By the Year
In 2024 there have been 0 vulnerabilities in Intel Atom X5 E3930 . Atom X5 E3930 did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 0 | 0.00 |
2022 | 2 | 6.65 |
2021 | 1 | 8.80 |
2020 | 1 | 7.80 |
2019 | 0 | 0.00 |
2018 | 3 | 5.57 |
It may take a day or so for new Atom X5 E3930 vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Intel Atom X5 E3930 Security Vulnerabilities
Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may
CVE-2022-0002
6.5 - Medium
- March 11, 2022
Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
Hardware allows activation of test or debug logic at runtime for some Intel(R) Trace Hub instances which may allow an unauthenticated user to potentially enable escalation of privilege
CVE-2021-33150
6.8 - Medium
- March 11, 2022
Hardware allows activation of test or debug logic at runtime for some Intel(R) Trace Hub instances which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Incomplete cleanup in some Intel(R) VT-d products may
CVE-2020-24489
8.8 - High
- June 09, 2021
Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.
Insufficient Cleanup
Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may
CVE-2020-0559
7.8 - High
- August 13, 2020
Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
Incorrect Permission Assignment for Critical Resource
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may
CVE-2018-3639
5.5 - Medium
- May 22, 2018
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
Side Channel Attack
Systems with microprocessors utilizing speculative execution and indirect branch prediction may
CVE-2017-5715
5.6 - Medium
- January 04, 2018
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Side Channel Attack
Systems with microprocessors utilizing speculative execution and branch prediction may
CVE-2017-5753
5.6 - Medium
- January 04, 2018
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Side Channel Attack
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Oracle Local Service Management System or by Intel? Click the Watch button to subscribe.