Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
intel vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2022-33964
Improper input validation in the Intel(R) SUR software before version 2.4.8902 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Intel System Usage Report
9.8
CVSSv3
CVE-2022-29514
Improper access control in the Intel(R) SUR software before version 2.4.8902 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Intel System Usage Report
9.8
CVSSv3
CVE-2022-25987
Improper handling of Unicode encoding in source code to be compiled by the Intel(R) C++ Compiler Classic before version 2021.6 for Intel(R) oneAPI Toolkits before version 2022.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Intel C\\+\\+ Compiler Classic
9.8
CVSSv3
CVE-2022-26843
Insufficient visual distinction of homoglyphs presented to user in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.1 for Intel(R) oneAPI Toolkits before version 2022.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Intel Oneapi Dpc\\+\\+\\/c\\+\\+ Compiler
9.8
CVSSv3
CVE-2022-26845
Improper authentication in firmware for Intel(R) AMT prior to 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Intel Active Management Technology Firmware
9.8
CVSSv3
CVE-2022-29486
Improper buffer restrictions in the Hyperscan library maintained by Intel(R) all versions downloaded prior to 04/29/2022 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Intel Hyperscan
9.8
CVSSv3
CVE-2022-30601
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access.
Intel Standard Manageability
Intel Active Management Technology Firmware
9.8
CVSSv3
CVE-2022-25899
Authentication bypass for the Open AMT Cloud Toolkit software maintained by Intel(R) prior to 2.0.2 and 2.2.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Intel Open Active Management Technology Cloud Toolkit
9.8
CVSSv3
CVE-2022-22730
Improper authentication in the Intel(R) Edge Insights for Industrial software before version 2.6.1 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Intel Edge Insights For Industrial
9.8
CVSSv3
CVE-2022-32292
In ConnMan up to and including 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in received_data to execute code.
Intel Connman
Debian Debian Linux 11.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
XXE
CVE-2024-34490
SQL injection
CVE-2024-34488
CVE-2024-4507
CVE-2023-7028
CVE-2024-23187
TCP
CVE-2024-4439
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »