Vulnerabilities > Intel > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2013-09-12 | CVE-2013-5740 | Unspecified vulnerability in Intel products Unspecified vulnerability in the Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) before 1.2, as used by the Intel QM77, QS77, Q77 Express, C216, Q67 Express, C202, C204, and C206 chipsets and Mobile Intel QM67 and QS67 chipsets, when the measured launch environment (MLE) is invoked, allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors. local intel | 6.9 |
2013-01-01 | CVE-2012-6459 | Information Exposure vulnerability in Intel Connman 1.3 ConnMan 1.3 on Tizen continues to list the bluetooth service after offline mode has been enabled, which might allow remote attackers to obtain sensitive information via Bluetooth packets. | 4.3 |
2012-09-07 | CVE-2010-5269 | Unspecified vulnerability in Intel Threading Building Blocks 2.2.013 Untrusted search path vulnerability in tbb.dll in Intel Threading Building Blocks (TBB) 2.2.013 allows local users to gain privileges via a Trojan horse tbbmalloc.dll file in the current working directory, as demonstrated by a directory that contains a .pbk file. local intel | 6.9 |
2010-12-22 | CVE-2010-3268 | Improper Input Validation vulnerability in multiple products The GetStringAMSHandler function in prgxhndl.dll in hndlrsvc.exe in the Intel Alert Handler service (aka Symantec Intel Handler service) in Intel Alert Management System (AMS), as used in Symantec Antivirus Corporate Edition 10.1.4.4010 on Windows 2000 SP4 and Symantec Endpoint Protection before 11.x, does not properly validate the CommandLine field of an AMS request, which allows remote attackers to cause a denial of service (application crash) via a crafted request. | 5.0 |
2010-02-08 | CVE-2010-0560 | Local Privilege Escalation vulnerability in Intel BIOS System Management Mode Unspecified vulnerability in the BIOS in Intel Desktop Board DB, DG, DH, DP, and DQ Series allows local administrators to execute arbitrary code in System Management Mode (SSM) via unknown attack vectors. | 4.6 |
2009-08-27 | CVE-2008-7096 | Permissions, Privileges, and Access Controls vulnerability in Intel Bios Intel Desktop and Intel Mobile Boards with BIOS firmware DQ35JO, DQ35MP, DP35DP, DG33FB, DG33BU, DG33TL, MGM965TW, D945GCPE, and DX38BT allows local administrators with ring 0 privileges to gain additional privileges and modify code that is running in System Management Mode, or access hypervisory memory as demonstrated at Black Hat 2008 by accessing certain remapping registers in Xen 3.3. | 6.9 |
2007-10-23 | CVE-2007-4574 | Local Denial Of Service vulnerability in Redhat Enterprise Linux 5.0 Unspecified vulnerability in the "stack unwinder fixes" in kernel in Red Hat Enterprise Linux 5, when running on AMD64 and Intel 64, allows local users to cause a denial of service via unknown vectors. | 4.7 |
2007-08-13 | CVE-2007-3851 | Resource Management Errors vulnerability in Linux Kernel The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer. | 6.0 |
2007-02-01 | CVE-2007-0661 | Remote Denial of Service vulnerability in Intel Southbridge 2 Baseboard Management Controller Intel Enterprise Southbridge 2 Baseboard Management Controller (BMC), Intel Server Boards 5000XAL, S5000PAL, S5000PSL, S5000XVN, S5000VCL, S5000VSA, SC5400RA, and OEM Firmware for Intel Enterprise Southbridge Baseboard Management Controller before 20070119, when Intelligent Platform Management Interface (IPMI) is enabled, allow remote attackers to connect and issue arbitrary IPMI commands, possibly triggering a denial of service. | 5.4 |
2006-12-20 | CVE-2006-6651 | Remote Code execution vulnerability in Intel 2200Bg Proset Wireless 9.0.3.9 Race condition in W29N51.SYS in the Intel 2200BG wireless driver 9.0.3.9 allows remote attackers to cause memory corruption and execute arbitrary code via a series of crafted beacon frames. network intel | 6.8 |