Product:

Pentium_j6426

(Intel)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 2
Date Id Summary Products Score Patch Annotated
2021-06-09 CVE-2020-24489 Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access. Debian_linux, Atom_x5\-E3930, Atom_x5\-E3940, Atom_x7\-E3950, Celeron_j1750, Celeron_j1800, Celeron_j1850, Celeron_j1900, Celeron_j3060, Celeron_j3160, Celeron_j3355, Celeron_j3355e, Celeron_j3455, Celeron_j3455e, Celeron_j4005, Celeron_j4025, Celeron_j4105, Celeron_j4115, Celeron_j4125, Celeron_j6412, Celeron_j6413, Celeron_n2805, Celeron_n2806, Celeron_n2807, Celeron_n2808, Celeron_n2810, Celeron_n2815, Celeron_n2820, Celeron_n2830, Celeron_n2840, Celeron_n2910, Celeron_n2920, Celeron_n2930, Celeron_n2940, Celeron_n3000, Celeron_n3010, Celeron_n3050, Celeron_n3060, Celeron_n3150, Celeron_n3160, Celeron_n3350, Celeron_n3350e, Celeron_n3450, Celeron_n4000, Celeron_n4000c, Celeron_n4020, Celeron_n4020c, Celeron_n4100, Celeron_n4120, Celeron_n4500, Celeron_n4505, Celeron_n5095, Celeron_n5100, Celeron_n5105, Celeron_n6210, Celeron_n6211, Core_i3\-1000g1, Core_i3\-1000g4, Core_i3\-1000ng4, Core_i3\-1005g1, Core_i3\-10100, Core_i3\-10100e, Core_i3\-10100f, Core_i3\-10100t, Core_i3\-10100te, Core_i3\-10100y, Core_i3\-10105, Core_i3\-10105f, Core_i3\-10105t, Core_i3\-10110u, Core_i3\-10110y, Core_i3\-10300, Core_i3\-10300t, Core_i3\-10305, Core_i3\-10305t, Core_i3\-10320, Core_i3\-10325, Core_i3\-11100b, Core_i3\-1110g4, Core_i3\-1115g4, Core_i3\-1115g4e, Core_i3\-1115gre, Core_i3\-1120g4, Core_i3\-1125g4, Core_i3\-L13g4, Core_i5\-10200h, Core_i5\-10210u, Core_i5\-10210y, Core_i5\-10300h, Core_i5\-1030g4, Core_i5\-1030g7, Core_i5\-1030ng7, Core_i5\-10310u, Core_i5\-10310y, Core_i5\-1035g1, Core_i5\-1035g4, Core_i5\-1035g7, Core_i5\-1038ng7, Core_i5\-10400, Core_i5\-10400f, Core_i5\-10400h, Core_i5\-10400t, Core_i5\-10500, Core_i5\-10500e, Core_i5\-10500h, Core_i5\-10500t, Core_i5\-10500te, Core_i5\-10505, Core_i5\-10600, Core_i5\-10600k, Core_i5\-10600kf, Core_i5\-10600t, Core_i5\-11260h, Core_i5\-11300h, Core_i5\-1130g7, Core_i5\-11320h, Core_i5\-1135g7, Core_i5\-11400, Core_i5\-11400f, Core_i5\-11400h, Core_i5\-11400t, Core_i5\-1140g7, Core_i5\-1145g7, Core_i5\-1145g7e, Core_i5\-1145gre, Core_i5\-11500, Core_i5\-11500b, Core_i5\-11500h, Core_i5\-11500t, Core_i5\-1155g7, Core_i5\-11600, Core_i5\-11600k, Core_i5\-11600kf, Core_i5\-11600t, Core_i5\-L16g7, Core_i7\-10510u, Core_i7\-10510y, Core_i7\-1060g7, Core_i7\-1060ng7, Core_i7\-10610u, Core_i7\-1065g7, Core_i7\-1068ng7, Core_i7\-10700, Core_i7\-10700e, Core_i7\-10700f, Core_i7\-10700k, Core_i7\-10700kf, Core_i7\-10700t, Core_i7\-10700te, Core_i7\-10710u, Core_i7\-10750h, Core_i7\-10810u, Core_i7\-10850h, Core_i7\-10870h, Core_i7\-10875h, Core_i7\-11370h, Core_i7\-11375h, Core_i7\-11390h, Core_i7\-1160g7, Core_i7\-1165g7, Core_i7\-11700, Core_i7\-11700b, Core_i7\-11700f, Core_i7\-11700k, Core_i7\-11700kf, Core_i7\-11700t, Core_i7\-11800h, Core_i7\-1180g7, Core_i7\-11850h, Core_i7\-1185g7, Core_i7\-1185g7e, Core_i7\-1185gre, Core_i7\-1195g7, Core_i9\-10850k, Core_i9\-10885h, Core_i9\-10900, Core_i9\-10900e, Core_i9\-10900f, Core_i9\-10900k, Core_i9\-10900kf, Core_i9\-10900t, Core_i9\-10900te, Core_i9\-10910, Core_i9\-10980hk, Core_i9\-11900, Core_i9\-11900f, Core_i9\-11900h, Core_i9\-11900k, Core_i9\-11900kb, Core_i9\-11900kf, Core_i9\-11900t, Core_i9\-11950h, Core_i9\-11980hk, Pentium_j2850, Pentium_j2900, Pentium_j3710, Pentium_j4205, Pentium_j6426, Pentium_n3510, Pentium_n3520, Pentium_n3530, Pentium_n3540, Pentium_n3700, Pentium_n3710, Pentium_n4200, Pentium_n4200e, Pentium_n6415, Pentium_silver_a1030, Pentium_silver_j5005, Pentium_silver_j5040, Pentium_silver_n5000, Pentium_silver_n5030, Pentium_silver_n6000, Pentium_silver_n6005 8.8
2020-08-13 CVE-2020-0559 Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access. Ac_3165_firmware, Ac_3168_firmware, Ac_7265_firmware, Ac_8260_firmware, Ac_8265_firmware, Ac_9260_firmware, Ac_9461_firmware, Ac_9462_firmware, Ac_9560_firmware, Atom_x5\-E3930, Atom_x5\-E3940, Atom_x7\-E3950, Ax200_firmware, Ax201_firmware, Celeron_j1750, Celeron_j1800, Celeron_j1850, Celeron_j1900, Celeron_j3060, Celeron_j3160, Celeron_j3355, Celeron_j3355e, Celeron_j3455, Celeron_j3455e, Celeron_j4005, Celeron_j4025, Celeron_j4105, Celeron_j4125, Celeron_j6412, Celeron_j6413, Celeron_n2805, Celeron_n2806, Celeron_n2807, Celeron_n2808, Celeron_n2810, Celeron_n2815, Celeron_n2820, Celeron_n2830, Celeron_n2840, Celeron_n2910, Celeron_n2920, Celeron_n2930, Celeron_n2940, Celeron_n3000, Celeron_n3010, Celeron_n3050, Celeron_n3060, Celeron_n3150, Celeron_n3160, Celeron_n3350, Celeron_n3350e, Celeron_n3450, Celeron_n4000, Celeron_n4020, Celeron_n4100, Celeron_n4120, Celeron_n4500, Celeron_n4505, Celeron_n5100, Celeron_n5105, Celeron_n6210, Celeron_n6211, Pentium_j2850, Pentium_j2900, Pentium_j3710, Pentium_j4205, Pentium_j6426, Pentium_n3510, Pentium_n3520, Pentium_n3530, Pentium_n3540, Pentium_n3700, Pentium_n3710, Pentium_n4200, Pentium_n4200e, Pentium_n6415 7.8