Vulnerabilities > Intel > Medium

DATE CVE VULNERABILITY TITLE RISK
2013-09-12 CVE-2013-5740 Unspecified vulnerability in Intel products
Unspecified vulnerability in the Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) before 1.2, as used by the Intel QM77, QS77, Q77 Express, C216, Q67 Express, C202, C204, and C206 chipsets and Mobile Intel QM67 and QS67 chipsets, when the measured launch environment (MLE) is invoked, allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors.
local
intel
6.9
2013-01-01 CVE-2012-6459 Information Exposure vulnerability in Intel Connman 1.3
ConnMan 1.3 on Tizen continues to list the bluetooth service after offline mode has been enabled, which might allow remote attackers to obtain sensitive information via Bluetooth packets.
network
intel linux CWE-200
4.3
2012-09-07 CVE-2010-5269 Unspecified vulnerability in Intel Threading Building Blocks 2.2.013
Untrusted search path vulnerability in tbb.dll in Intel Threading Building Blocks (TBB) 2.2.013 allows local users to gain privileges via a Trojan horse tbbmalloc.dll file in the current working directory, as demonstrated by a directory that contains a .pbk file.
local
intel
6.9
2010-12-22 CVE-2010-3268 Improper Input Validation vulnerability in multiple products
The GetStringAMSHandler function in prgxhndl.dll in hndlrsvc.exe in the Intel Alert Handler service (aka Symantec Intel Handler service) in Intel Alert Management System (AMS), as used in Symantec Antivirus Corporate Edition 10.1.4.4010 on Windows 2000 SP4 and Symantec Endpoint Protection before 11.x, does not properly validate the CommandLine field of an AMS request, which allows remote attackers to cause a denial of service (application crash) via a crafted request.
network
low complexity
intel symantec microsoft CWE-20
5.0
2010-02-08 CVE-2010-0560 Local Privilege Escalation vulnerability in Intel BIOS System Management Mode
Unspecified vulnerability in the BIOS in Intel Desktop Board DB, DG, DH, DP, and DQ Series allows local administrators to execute arbitrary code in System Management Mode (SSM) via unknown attack vectors.
local
low complexity
intel
4.6
2009-08-27 CVE-2008-7096 Permissions, Privileges, and Access Controls vulnerability in Intel Bios
Intel Desktop and Intel Mobile Boards with BIOS firmware DQ35JO, DQ35MP, DP35DP, DG33FB, DG33BU, DG33TL, MGM965TW, D945GCPE, and DX38BT allows local administrators with ring 0 privileges to gain additional privileges and modify code that is running in System Management Mode, or access hypervisory memory as demonstrated at Black Hat 2008 by accessing certain remapping registers in Xen 3.3.
local
intel CWE-264
6.9
2007-10-23 CVE-2007-4574 Local Denial Of Service vulnerability in Redhat Enterprise Linux 5.0
Unspecified vulnerability in the "stack unwinder fixes" in kernel in Red Hat Enterprise Linux 5, when running on AMD64 and Intel 64, allows local users to cause a denial of service via unknown vectors.
local
redhat amd intel
4.7
2007-08-13 CVE-2007-3851 Resource Management Errors vulnerability in Linux Kernel
The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer.
local
high complexity
linux intel CWE-399
6.0
2007-02-01 CVE-2007-0661 Remote Denial of Service vulnerability in Intel Southbridge 2 Baseboard Management Controller
Intel Enterprise Southbridge 2 Baseboard Management Controller (BMC), Intel Server Boards 5000XAL, S5000PAL, S5000PSL, S5000XVN, S5000VCL, S5000VSA, SC5400RA, and OEM Firmware for Intel Enterprise Southbridge Baseboard Management Controller before 20070119, when Intelligent Platform Management Interface (IPMI) is enabled, allow remote attackers to connect and issue arbitrary IPMI commands, possibly triggering a denial of service.
5.4
2006-12-20 CVE-2006-6651 Remote Code execution vulnerability in Intel 2200Bg Proset Wireless 9.0.3.9
Race condition in W29N51.SYS in the Intel 2200BG wireless driver 9.0.3.9 allows remote attackers to cause memory corruption and execute arbitrary code via a series of crafted beacon frames.
network
intel
6.8