Vulnerabilities > Intel > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-11-11 | CVE-2022-29486 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Intel Hyperscan Improper buffer restrictions in the Hyperscan library maintained by Intel(R) all versions downloaded before 04/29/2022 may allow an unauthenticated user to potentially enable escalation of privilege via network access. | 9.8 |
2022-08-18 | CVE-2022-30601 | Insufficiently Protected Credentials vulnerability in Intel products Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access. | 9.8 |
2022-08-18 | CVE-2022-22730 | Improper Authentication vulnerability in Intel Edge Insights for Industrial Improper authentication in the Intel(R) Edge Insights for Industrial software before version 2.6.1 may allow an unauthenticated user to potentially enable escalation of privilege via network access. | 9.8 |
2022-08-18 | CVE-2022-25899 | Unspecified vulnerability in Intel Open Active Management Technology Cloud Toolkit Authentication bypass for the Open AMT Cloud Toolkit software maintained by Intel(R) before versions 2.0.2 and 2.2.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access. | 9.8 |
2022-08-03 | CVE-2022-32292 | Out-of-bounds Write vulnerability in multiple products In ConnMan through 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in received_data to execute code. | 9.8 |
2022-01-28 | CVE-2022-23096 | Out-of-bounds Read vulnerability in multiple products An issue was discovered in the DNS proxy in Connman through 1.40. | 9.1 |
2022-01-28 | CVE-2022-23097 | Out-of-bounds Read vulnerability in multiple products An issue was discovered in the DNS proxy in Connman through 1.40. | 9.1 |
2021-12-14 | CVE-2021-45046 | It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. | 9.0 |
2021-12-10 | CVE-2021-44228 | Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. network low complexity apache siemens intel debian fedoraproject sonicwall netapp cisco snowsoftware bentley percussion apple critical | 10.0 |
2021-06-09 | CVE-2021-33833 | Out-of-bounds Write vulnerability in multiple products ConnMan (aka Connection Manager) 1.30 through 1.39 has a stack-based buffer overflow in uncompress in dnsproxy.c via NAME, RDATA, or RDLENGTH (for A or AAAA). | 9.8 |