Celeron J4105 Intel Celeron J4105

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Intel Celeron J4105.

By the Year

In 2026 there have been 0 vulnerabilities in Intel Celeron J4105. Celeron J4105 did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 0 0.00
2022 3 6.60
2021 2 7.65
2020 1 7.80

It may take a day or so for new Celeron J4105 vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Intel Celeron J4105 Security Vulnerabilities

Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may
CVE-2022-0002 6.5 - Medium - March 11, 2022

Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.

Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may
CVE-2022-0001 6.5 - Medium - March 11, 2022

Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.

Hardware allows activation of test or debug logic at runtime for some Intel(R) Trace Hub instances which may allow an unauthenticated user to potentially enable escalation of privilege
CVE-2021-33150 6.8 - Medium - March 11, 2022

Hardware allows activation of test or debug logic at runtime for some Intel(R) Trace Hub instances which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

Incomplete cleanup in some Intel(R) VT-d products may
CVE-2020-24489 8.8 - High - June 09, 2021

Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.

Insufficient Cleanup

Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may
CVE-2020-24513 6.5 - Medium - June 09, 2021

Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may
CVE-2020-0559 7.8 - High - August 13, 2020

Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Incorrect Permission Assignment for Critical Resource

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Intel Celeron J4105 or by Intel? Click the Watch button to subscribe.

Intel
Vendor

subscribe