Vulnerabilities > Intel
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-07-31 | CVE-2017-5693 | Resource Exhaustion vulnerability in Intel Puma Firmware 5.0/6.0Soc/7.0Soc Firmware in the Intel Puma 5, 6, and 7 Series might experience resource depletion or timeout, which allows a network attacker to create a denial of service via crafted network traffic. | 7.5 |
2018-07-10 | CVE-2018-3693 | Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis. | 5.6 |
2018-07-10 | CVE-2018-3688 | Unquoted Search Path or Element vulnerability in Intel Quartus Prime Programmer and Tools 15.1/18.0 Unquoted service paths in Intel Quartus Prime Programmer and Tools in versions 15.1 - 18.0 allow a local attacker to potentially execute arbitrary code. | 7.8 |
2018-07-10 | CVE-2018-3687 | Unquoted Search Path or Element vulnerability in Intel Quartus II Programmer and Tools 11.0/15.0 Unquoted service paths in Intel Quartus II Programmer and Tools in versions 11.0 - 15.0 allow a local attacker to potentially execute arbitrary code. | 7.8 |
2018-07-10 | CVE-2018-3684 | Unquoted Search Path or Element vulnerability in Intel Quartus II 11.0/15.0 Unquoted service paths in Intel Quartus II in versions 11.0 - 15.0 allow a local attacker to potentially execute arbitrary code. | 7.8 |
2018-07-10 | CVE-2018-3683 | Unquoted Search Path or Element vulnerability in Intel Quartus Prime Unquoted service paths in Intel Quartus Prime in versions 15.1 - 18.0 allow a local attacker to potentially execute arbitrary code. | 7.8 |
2018-07-10 | CVE-2018-3682 | Improper Privilege Management vulnerability in Intel BMC Firmware BMC Firmware in Intel server boards, compute modules, and systems potentially allow an attacker with administrative privileges to make unauthorized read\writes to the SMBUS. | 8.2 |
2018-07-10 | CVE-2018-3668 | Unquoted Search Path or Element vulnerability in Intel Processor Diagnostic Tool 4.1.0.24 Unquoted service paths in Intel Processor Diagnostic Tool (IPDT) before version 4.1.0.27 allows a local attacker to potentially execute arbitrary code. | 7.8 |
2018-07-10 | CVE-2018-3667 | Insecure Default Initialization of Resource vulnerability in Intel Processor Diagnostic Tool 4.1.0.24 Installation tool IPDT (Intel Processor Diagnostic Tool) 4.1.0.24 sets permissions of installed files incorrectly, allowing for execution of arbitrary code and potential privilege escalation. | 7.8 |
2018-07-10 | CVE-2018-3652 | Information Exposure vulnerability in Intel products Existing UEFI setting restrictions for DCI (Direct Connect Interface) in 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family allows a limited physical presence attacker to potentially access platform secrets via debug interfaces. | 7.6 |