Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2016-8106
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A Denial of Service in Intel Ethernet Controller's X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Intel Ethernet Controller 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Intel Ethernet Controller X710等都是美国英特尔(Intel)公司的以太网控制器。 Intel Ethernet Controller X710和XL710中的Non-Volatile Memory 5.05之前的版本存在拒绝服务漏洞。远程攻击者可利用该漏洞造成控制器停止发送和接收数据。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
IntelIntel® Ethernet Controller X710 family and Intel® Ethernet Controller XL710 family Before NVM Version 5.05 -
II. Public POCs for CVE-2016-8106
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2016-8106
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2016-8106

No comments yet


Leave a comment