Vulnerabilities > Intel > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-11-11 | CVE-2022-29486 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Intel Hyperscan Improper buffer restrictions in the Hyperscan library maintained by Intel(R) all versions downloaded before 04/29/2022 may allow an unauthenticated user to potentially enable escalation of privilege via network access. | 9.8 |
2022-08-18 | CVE-2022-30601 | Insufficiently Protected Credentials vulnerability in Intel products Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access. | 9.8 |
2022-08-18 | CVE-2022-25899 | Unspecified vulnerability in Intel Open Active Management Technology Cloud Toolkit Authentication bypass for the Open AMT Cloud Toolkit software maintained by Intel(R) before versions 2.0.2 and 2.2.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access. | 9.8 |
2022-08-03 | CVE-2022-32292 | Out-of-bounds Write vulnerability in multiple products In ConnMan through 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in received_data to execute code. | 9.8 |
2022-01-28 | CVE-2022-23096 | Out-of-bounds Read vulnerability in multiple products An issue was discovered in the DNS proxy in Connman through 1.40. | 9.1 |
2022-01-28 | CVE-2022-23097 | Out-of-bounds Read vulnerability in multiple products An issue was discovered in the DNS proxy in Connman through 1.40. | 9.1 |
2021-12-14 | CVE-2021-45046 | Expression Language Injection vulnerability in multiple products It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. | 9.0 |
2021-12-10 | CVE-2021-44228 | Deserialization of Untrusted Data vulnerability in multiple products Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. network low complexity apache siemens intel debian fedoraproject sonicwall netapp cisco snowsoftware bentley percussion apple CWE-502 critical | 10.0 |
2020-11-12 | CVE-2020-8752 | Out-of-bounds Write vulnerability in multiple products Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access. | 9.8 |
2020-11-12 | CVE-2020-8747 | Out-of-bounds Read vulnerability in multiple products Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access. | 9.1 |