Filtered by vendor Intel
Subscriptions
Total
1696 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-32971 | 1 Intel | 1 System Usage Report | 2025-01-27 | 3.1 Low |
Improper authentication in the Intel(R) SUR software before version 2.4.8902 may allow a privileged user to potentially enable escalation of privilege via network access. | ||||
CVE-2022-33972 | 1 Intel | 106 Xeon Gold 5315y, Xeon Gold 5315y Firmware, Xeon Gold 5317 and 103 more | 2025-01-27 | 6.1 Medium |
Incorrect calculation in microcode keying mechanism for some 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable information disclosure via local access. | ||||
CVE-2022-34841 | 1 Intel | 1 Media Software Development Kit | 2025-01-27 | 5.7 Medium |
Improper buffer restrictions in the Intel(R) Media SDK software before version 22.2.2 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2022-27170 | 1 Intel | 1 Media Software Development Kit | 2025-01-27 | 5.7 Medium |
Protection mechanism failure in the Intel(R) Media SDK software before version 22.2.2 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2022-34346 | 1 Intel | 1 Media Software Development Kit | 2025-01-27 | 4.8 Medium |
Out-of-bounds read in the Intel(R) Media SDK software before version 22.2.2 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2022-36289 | 1 Intel | 1 Media Software Development Kit | 2025-01-27 | 2.8 Low |
Protection mechanism failure in the Intel(R) Media SDK software before version 22.2.2 may allow an authenticated user to potentially enable denial of service via local access. | ||||
CVE-2022-35883 | 1 Intel | 1 Media Software Development Kit | 2025-01-27 | 2.2 Low |
NULL pointer dereference in the Intel(R) Media SDK software before version 22.2.2 may allow an authenticated user to potentially enable denial of service via local access. | ||||
CVE-2022-34843 | 1 Intel | 1 Trace Analyzer And Collector | 2025-01-27 | 4.8 Medium |
Integer overflow in the Intel(R) Trace Analyzer and Collector software before version 2021.5 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2022-32575 | 1 Intel | 1 Trace Analyzer And Collector | 2025-01-27 | 4.8 Medium |
Out-of-bounds write in the Intel(R) Trace Analyzer and Collector software before version 2021.5 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2022-34864 | 1 Intel | 1 Trace Analyzer And Collector | 2025-01-27 | 4.2 Medium |
Out-of-bounds read in the Intel(R) Trace Analyzer and Collector software before version 2021.5 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2022-35729 | 2 Intel, Openbmc-project | 58 C621a, C624a, C627a and 55 more | 2025-01-27 | 7.5 High |
Out of bounds read in firmware for OpenBMC in some Intel(R) platforms before version 0.72 may allow unauthenticated user to potentially enable denial of service via network access. | ||||
CVE-2022-29494 | 1 Intel | 58 C621a, C627a, C629a and 55 more | 2025-01-27 | 6.5 Medium |
Improper input validation in firmware for OpenBMC in some Intel(R) platforms before versions egs-0.91-179 and bhs-04-45 may allow an authenticated user to potentially enable denial of service via network access. | ||||
CVE-2022-29493 | 1 Intel | 248 Baseboard Management Controller Firmware, C252, C256 and 245 more | 2025-01-27 | 4.5 Medium |
Uncaught exception in webserver for the Integrated BMC in some Intel(R) platforms before versions 2.86, 2.09 and 2.78 may allow a privileged user to potentially enable denial of service via network access. | ||||
CVE-2022-33196 | 2 Intel, Redhat | 274 Xeon D-1513n, Xeon D-1513n Firmware, Xeon D-1518 and 271 more | 2025-01-27 | 7.2 High |
Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access. | ||||
CVE-2022-21163 | 1 Intel | 1 Crypto Api Toolkit For Intel Sgx | 2025-01-27 | 8.4 High |
Improper access control in the Crypto API Toolkit for Intel(R) SGX before version 2.0 commit ID 91ee496 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2022-36397 | 1 Intel | 1 Quickassist Technology | 2025-01-27 | 7.3 High |
Incorrect default permissions in the software installer for some Intel(R) QAT drivers for Linux before version 4.17 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2022-37340 | 1 Intel | 1 Quickassist Technology | 2025-01-27 | 6.7 Medium |
Uncontrolled search path in some Intel(R) QAT drivers for Windows before version 1.6 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2022-36382 | 1 Intel | 30 Ethernet Controller X710-am2, Ethernet Controller X710-am2 Firmware, Ethernet Controller X710-bm2 and 27 more | 2025-01-27 | 6 Medium |
Out-of-bounds write in firmware for some Intel(R) Ethernet Network Controllers and Adapters E810 Series before version 1.7.0.8 and some Intel(R) Ethernet 700 Series Controllers and Adapters before version 9.101 may allow a privileged user to potentially enable denial of service via local access. | ||||
CVE-2022-27808 | 2 Intel, Microsoft | 2 Administrative Tools For Intel Network Adapters, Windows | 2025-01-27 | 6.3 Medium |
Insufficient control flow management in some Intel(R) Ethernet Controller Administrative Tools drivers for Windows before version 1.5.0.2 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2022-27234 | 1 Intel | 1 Computer Vision Annotation Tool | 2025-01-27 | 4.3 Medium |
Server-side request forgery in the CVAT software maintained by Intel(R) before version 2.0.1 may allow an authenticated user to potentially enable information disclosure via network access. |