Filtered by vendor Intel
Subscriptions
Total
1696 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2000-0516 | 1 Intel | 1 Shiva Access Manager | 2024-11-20 | N/A |
When configured to store configuration information in an LDAP directory, Shiva Access Manager 5.0.0 stores the root DN (Distinguished Name) name and password in cleartext in a file that is world readable, which allows local users to compromise the LDAP server. | ||||
CVE-2000-0451 | 1 Intel | 1 Express 8100 | 2024-11-20 | N/A |
The Intel express 8100 ISDN router allows remote attackers to cause a denial of service via oversized or fragmented ICMP packets. | ||||
CVE-2000-0384 | 1 Intel | 2 Netstructure 7110, Netstructure 7180 | 2024-11-20 | N/A |
NetStructure 7110 and 7180 have undocumented accounts (servnow, root, and wizard) whose passwords are easily guessable from the NetStructure's MAC address, which could allow remote attackers to gain root access. | ||||
CVE-2000-0068 | 1 Intel | 1 Inbusiness Email Station | 2024-11-20 | N/A |
daynad program in Intel InBusiness E-mail Station does not require authentication, which allows remote attackers to modify its configuration, delete files, or read mail. | ||||
CVE-1999-1566 | 1 Intel | 1 Iparty | 2024-11-20 | N/A |
Buffer overflow in iParty server 1.2 and earlier allows remote attackers to cause a denial of service (crash) by connecting to default port 6004 and sending repeated extended characters. | ||||
CVE-1999-1476 | 1 Intel | 2 Pentium, Pentuim | 2024-11-20 | N/A |
A bug in Intel Pentium processor (MMX and Overdrive) allows local users to cause a denial of service (hang) in Intel-based operating systems such as Windows NT and Windows 95, via an invalid instruction, aka the "Invalid Operand with Locked CMPXCHG8B Instruction" problem. | ||||
CVE-2024-39609 | 1 Intel | 3 M70klp Firmware, Server Board M70klp2sb, Server Board M70klp2sb Firmware | 2024-11-19 | 7.5 High |
Improper Access Control in UEFI firmware for some Intel(R) Server Board M70KLP may allow a privileged user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-41167 | 1 Intel | 2 M10jnp2sb, M10jnp2sb Firmware | 2024-11-19 | 7.5 High |
Improper input validation in UEFI firmware in some Intel(R) Server Board M10JNP2SB Family may allow a privileged user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-29077 | 1 Intel | 1 Jam Stapl Player Software | 2024-11-15 | 6.7 Medium |
Improper access control in some JAM STAPL Player software before version 2.6.1 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-36242 | 1 Intel | 1 Processors | 2024-11-15 | 8.8 High |
Protection mechanism failure in the SPP for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-36245 | 1 Intel | 1 Vtune Profiler | 2024-11-15 | 6.7 Medium |
Uncontrolled search path element in some Intel(R) VTune(TM) Profiler software before version 2024.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-31407 | 1 Intel | 1 High Level Synthesis Compiler Software | 2024-11-15 | 6.7 Medium |
Uncontrolled search path in some Intel(R) High Level Synthesis Compiler software for Intel(R) Quartus(R) Prime Pro Edition Software before version 24.1 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-26017 | 1 Intel | 1 Rendering Toolkit Software | 2024-11-15 | 6.7 Medium |
Uncontrolled search path in some Intel(R) Rendering Toolkit software before version 2024.1.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-38387 | 1 Intel | 1 Graphics Driver | 2024-11-15 | 6.7 Medium |
Uncontrolled search path in the Intel(R) Graphics Driver installers for versions 15.40 and 15.45 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-28028 | 1 Intel | 1 Neural Compressor Software | 2024-11-15 | 7.5 High |
Improper input validation in some Intel(R) Neural Compressor software before version v3.0 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. | ||||
CVE-2024-21820 | 1 Intel | 4 3rd Generation Intel Xeon Scalable Processor Family, 4th Generation Intel Xeon Processor Scalable Family, 5th Generation Intel Xeon Processor Scalable Family and 1 more | 2024-11-15 | 7.2 High |
Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-21850 | 1 Intel | 1 Tdx Module Software | 2024-11-15 | 6 Medium |
Sensitive information in resource not removed before reuse in some Intel(R) TDX Seamldr module software before version 1.5.02.00 may allow a privileged user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-22185 | 1 Intel | 2 4th Generation Intel Xeon Processor Scalable Family, 5th Generation Intel Xeon Processor Scalable Family | 2024-11-15 | 7.2 High |
Time-of-check Time-of-use Race Condition in some Intel(R) processors with Intel(R) ACTM may allow a privileged user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-23918 | 1 Intel | 4 3rd Generation Intel Xeon Scalable Processor Family, 4th Generation Intel Xeon Processor Scalable Family, 5th Generation Intel Xeon Processor Scalable Family and 1 more | 2024-11-15 | 8.8 High |
Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-24985 | 1 Intel | 2 4th Generation Intel Xeon Processor Scalable Family, 5th Generation Intel Xeon Processor Scalable Family | 2024-11-15 | 7.2 High |
Exposure of resource to wrong sphere in some Intel(R) processors with Intel(R) ACTM may allow a privileged user to potentially enable escalation of privilege via local access. |