Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
intel sgx platform software vulnerabilities and exploits
(subscribe to this query)
7.3
CVSSv3
CVE-2018-18098
Improper file verification in install routine for Intel(R) SGX SDK and Platform Software for Windows prior to 2.2.100 may allow an escalation of privilege via local access.
Intel Sgx Platform Software
Intel Sgx Sdk
1 Article
5.5
CVSSv3
CVE-2020-24452
Improper input validation in the Intel(R) SGX Platform Software for Windows* may allow an authenticated user to potentially enable a denial of service via local access.
Intel Sgx Platform
5.5
CVSSv3
CVE-2022-21123
Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Xen Xen
Fedoraproject Fedora 35
Fedoraproject Fedora 36
Intel Sgx Dcap
Intel Sgx Psw
Intel Sgx Sdk
Vmware Esxi 7.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
5.5
CVSSv3
CVE-2022-21125
Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Xen Xen
Fedoraproject Fedora 35
Fedoraproject Fedora 36
Intel Sgx Dcap
Intel Sgx Psw
Intel Sgx Sdk
Vmware Esxi 7.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
5.5
CVSSv3
CVE-2022-21166
Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Xen Xen
Fedoraproject Fedora 35
Fedoraproject Fedora 36
Intel Sgx Dcap
Intel Sgx Psw
Intel Sgx Sdk
Vmware Esxi 7.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
6.5
CVSSv3
CVE-2022-40982
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Redhat Enterprise Linux 7.0
Xen Xen -
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
Intel Microcode
Intel Xeon E-2314 Firmware -
Intel Xeon E-2324g Firmware -
Intel Xeon E-2334 Firmware -
Intel Xeon E-2374g Firmware -
Intel Xeon E-2336 Firmware -
Intel Xeon E-2356g Firmware -
Intel Xeon E-2386g Firmware -
Intel Xeon E-2378 Firmware -
Intel Xeon E-2378g Firmware -
Intel Xeon E-2388g Firmware -
Intel Xeon W-1350 Firmware -
Intel Xeon W-1350p Firmware -
Intel Xeon W-1370 Firmware -
Intel Xeon W-1370p Firmware -
Intel Xeon W-1390t Firmware -
Intel Xeon W-1390 Firmware -
2 Github repositories
2 Articles
6.4
CVSSv3
CVE-2018-3615
Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis.
Intel Core I5 6600
Intel Core I5 6685r
Intel Core I5 6600k
Intel Core I5 6600t
Intel Core I5 6585r
Intel Core I5 6500
Intel Core I5 6500t
Intel Core I5 6500te
Intel Core I5 6402p
Intel Core I5 6400
Intel Core I5 6400t
Intel Core I5 6440eq
Intel Core I5 6440hq
Intel Core I5 6442eq
Intel Core I5 6360u
Intel Core I5 6350hq
Intel Core I5 6300hq
Intel Core I5 6300u
Intel Core I5 6200u
Intel Core I5 6260u
Intel Core I5 6267u
Intel Core I5 6287u
2 Articles
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started