Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ami aptio v 5.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-40261
An attacker can exploit this vulnerability to elevate privileges from ring 0 to ring -2, execute arbitrary code in System Management Mode - an environment more privileged than operating system (OS) and completely isolated from it. Running arbitrary code in SMM additionally bypass...
Intel Nuc M15 Laptop Kit Lapbc510 Firmware -
Intel Nuc M15 Laptop Kit Lapbc710 Firmware -
Ami Aptio V 5.0
NA
CVE-2022-26873
A potential attacker can execute an arbitrary code at the time of the PEI phase and influence the subsequent boot stages. This can lead to the mitigations bypassing, physical memory contents disclosure, discovery of any secrets from any Virtual Machines (VMs) and bypassing memory...
Intel Nuc M15 Laptop Kit Lapbc510 Firmware -
Intel Nuc M15 Laptop Kit Lapbc710 Firmware -
Ami Aptio V 5.0
NA
CVE-2022-40250
An attacker can exploit this vulnerability to elevate privileges from ring 0 to ring -2, execute arbitrary code in System Management Mode - an environment more privileged than operating system (OS) and completely isolated from it. Running arbitrary code in SMM additionally bypass...
Intel Nuc M15 Laptop Kit Lapbc510 Firmware Bc0074
Intel Nuc M15 Laptop Kit Lapbc710 Firmware Bc0074
Ami Aptio V 5.0
NA
CVE-2022-40262
A potential attacker can execute an arbitrary code at the time of the PEI phase and influence the subsequent boot stages. This can lead to the mitigations bypassing, physical memory contents disclosure, discovery of any secrets from any Virtual Machines (VMs) and bypassing memory...
Ami Aptio V 5.0
Intel Server Board M10jnp2sb Firmware -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started