Vulnerabilities > Intel > Critical

DATE CVE VULNERABILITY TITLE RISK
2022-11-11 CVE-2022-29486 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Intel Hyperscan
Improper buffer restrictions in the Hyperscan library maintained by Intel(R) all versions downloaded before 04/29/2022 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
network
low complexity
intel CWE-119
critical
9.8
2022-08-18 CVE-2022-30601 Insufficiently Protected Credentials vulnerability in Intel products
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access.
network
low complexity
intel CWE-522
critical
9.8
2022-08-18 CVE-2022-25899 Unspecified vulnerability in Intel Open Active Management Technology Cloud Toolkit
Authentication bypass for the Open AMT Cloud Toolkit software maintained by Intel(R) before versions 2.0.2 and 2.2.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
network
low complexity
intel
critical
9.8
2022-08-03 CVE-2022-32292 Out-of-bounds Write vulnerability in multiple products
In ConnMan through 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in received_data to execute code.
network
low complexity
intel debian CWE-787
critical
9.8
2022-01-28 CVE-2022-23096 Out-of-bounds Read vulnerability in multiple products
An issue was discovered in the DNS proxy in Connman through 1.40.
network
low complexity
intel debian CWE-125
critical
9.1
2022-01-28 CVE-2022-23097 Out-of-bounds Read vulnerability in multiple products
An issue was discovered in the DNS proxy in Connman through 1.40.
network
low complexity
intel debian CWE-125
critical
9.1
2021-12-14 CVE-2021-45046 Expression Language Injection vulnerability in multiple products
It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations.
network
high complexity
apache intel siemens debian sonicwall fedoraproject CWE-917
critical
9.0
2021-12-10 CVE-2021-44228 Deserialization of Untrusted Data vulnerability in multiple products
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints.
10.0
2020-11-12 CVE-2020-8752 Out-of-bounds Write vulnerability in multiple products
Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.
network
low complexity
intel netapp CWE-787
critical
9.8
2020-11-12 CVE-2020-8747 Out-of-bounds Read vulnerability in multiple products
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.
network
low complexity
intel netapp CWE-125
critical
9.1