Vulnerabilities (CVE)

Filtered by vendor Intel Subscribe
Total 1571 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-35201 2 Intel, Microsoft 2 Server Debug And Provisioning Tool, Windows 2025-02-04 N/A 6.7 MEDIUM
Incorrect default permissions in the Intel(R) SDP Tool for Windows software all versions may allow an authenticated user to enable escalation of privilege via local access.
CVE-2024-36253 2 Intel, Microsoft 2 Server Debug And Provisioning Tool, Windows 2025-02-04 N/A 6.7 MEDIUM
Uncontrolled search path in the Intel(R) SDP Tool for Windows software all version may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-43489 1 Intel 1 Computing Improvement Program 2025-02-04 N/A 5.5 MEDIUM
Improper access control for some Intel(R) CIP software before version 2.4.10717 may allow an authenticated user to potentially enable denial of service via local access.
CVE-2024-36276 1 Intel 1 Computing Improvement Program 2025-02-04 N/A 6.7 MEDIUM
Insecure inherited permissions for some Intel(R) CIP software before version 2.4.10852 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2024-36482 1 Intel 1 Computing Improvement Program 2025-02-04 N/A 8.2 HIGH
Improper input validation in some Intel(R) CIP software before version 2.4.10852 may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2022-21198 1 Intel 894 Celeron 1000m, Celeron 1000m Firmware, Celeron 1005m and 891 more 2025-02-04 N/A 7.9 HIGH
Time-of-check time-of-use race condition in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2021-44228 12 Apache, Apple, Bentley and 9 more 157 Log4j, Xcode, Synchro and 154 more 2025-02-04 9.3 HIGH 10.0 CRITICAL
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
CVE-2022-26047 1 Intel 353 Converged Security And Manageability Engine, Core I3-1000g1 Firmware, Core I3-1000g4 Firmware and 350 more 2025-01-29 N/A 4.3 MEDIUM
Improper input validation for some Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products may allow unauthenticated user to potentially enable denial of service via local access.
CVE-2024-21814 1 Intel 1 Chipset Device Software 2025-01-28 N/A 6.7 MEDIUM
Uncontrolled search path for some Intel(R) Chipset Device Software before version 10.1.19444.8378 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2024-21837 1 Intel 1 Quartus Prime 2025-01-28 N/A 6.7 MEDIUM
Uncontrolled search path in some Intel(R) Quartus(R) Prime Lite Edition Design software before version 23.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2024-21809 1 Intel 1 Quartus Prime 2025-01-28 N/A 6.7 MEDIUM
Improper conditions check for some Intel(R) Quartus(R) Prime Lite Edition Design software before version 23.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2024-21777 1 Intel 1 Quartus Prime 2025-01-28 N/A 6.7 MEDIUM
Uncontrolled search path in some Intel(R) Quartus(R) Prime Pro Edition Design software before version 23.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2024-21862 1 Intel 1 Quartus Prime 2025-01-28 N/A 6.7 MEDIUM
Uncontrolled search path in some Intel(R) Quartus(R) Prime Standard Edition Design software before version 23.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-45743 1 Intel 1 Driver \& Support Assistant 2025-01-28 N/A 6.7 MEDIUM
Uncontrolled search path in some Intel(R) DSA software uninstallers before version 23.4.39.10 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-38090 1 Intel 454 Celeron J1750, Celeron J1750 Firmware, Celeron J1800 and 451 more 2025-01-28 N/A 6.0 MEDIUM
Improper isolation of shared resources in some Intel(R) Processors when using Intel(R) Software Guard Extensions may allow a privileged user to potentially enable information disclosure via local access.
CVE-2024-21861 1 Intel 1 Graphics Performance Analyzers Framework 2025-01-23 N/A 6.7 MEDIUM
Uncontrolled search path in some Intel(R) GPA Framework software before version 2023.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2024-21788 1 Intel 1 Graphics Performance Analyzers 2025-01-23 N/A 6.7 MEDIUM
Uncontrolled search path in some Intel(R) GPA software before version 2023.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-43748 1 Intel 1 Graphics Performance Analyzers Framework 2025-01-23 N/A 7.8 HIGH
Improper access control in some Intel(R) GPA Framework software installers before version 2023.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-43629 1 Intel 1 Graphics Performance Analyzers 2025-01-23 N/A 7.8 HIGH
Incorrect default permissions in some Intel(R) GPA software installers before version 2023.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-41961 1 Intel 1 Graphics Performance Analyzers 2025-01-23 N/A 6.7 MEDIUM
Uncontrolled search path in some Intel(R) GPA software before version 2023.3 may allow an authenticated user to potentially enable escalation of privilege via local access.