Core I3
by Intel
Standard maintenance is sufficient
Core I3 has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
26.7%
Confirmed actively exploited (CISA)
0.0%
Public exploit code available
6.7%
Based on 15 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2017-5753 | 5.6 | 94.3% | — |
| CVE-2017-5715 | 5.6 | 89.1% | — |
| CVE-2017-5754 | 5.6 | 87.6% | — |
| CVE-2018-3639 | 5.5 | 46.0% | — |
| CVE-2018-3646 | 5.6 | 3.9% | — |
| CVE-2018-3620 | 5.6 | 3.0% | — |
| CVE-2018-3615 | 6.4 | 1.4% | — |
| CVE-2018-3693 | 5.6 | 1.3% | — |
| CVE-2018-3665 | 5.6 | 1.3% | — |
| CVE-2018-3640 | 5.6 | 0.9% | — |
| CVE-2018-9056 | 5.6 | 0.1% | — |
| CVE-2020-24491 | 4.4 | 0.1% | — |
| CVE-2018-12169 | 7.6 | 0.1% | — |
| CVE-2017-5704 | 6.7 | 0.0% | — |
| CVE-2018-3619 | 4.6 | 0.0% | — |
24
/ 100
low-risk
Active Threat
22/50 · Moderate
Exploit Availability
2/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.