Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-22338

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-11 Aug, 2023 | 02:37
Updated At-13 Feb, 2025 | 16:43
Rejected At-
Credits

Out-of-bounds read in some Intel(R) oneVPL GPU software before version 22.6.5 may allow an authenticated user to potentially enable information disclosure via local access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:11 Aug, 2023 | 02:37
Updated At:13 Feb, 2025 | 16:43
Rejected At:
▼CVE Numbering Authority (CNA)

Out-of-bounds read in some Intel(R) oneVPL GPU software before version 22.6.5 may allow an authenticated user to potentially enable information disclosure via local access.

Affected Products
Vendor
n/a
Product
Intel(R) oneVPL GPU software
Default Status
unaffected
Versions
Affected
  • before version 22.6.5
Problem Types
TypeCWE IDDescription
N/AN/Ainformation disclosure
CWECWE-125Out-of-bounds read
Type: N/A
CWE ID: N/A
Description: information disclosure
Type: CWE
CWE ID: CWE-125
Description: Out-of-bounds read
Metrics
VersionBase scoreBase severityVector
3.14.4MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
Version: 3.1
Base score: 4.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00818.html
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J7RNFPWOSFII2JE2KDRHPLJANZC3YATW/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TULYSWHC3X76AIGGMUSLBTWOXNND6IEV/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L27GRS7E45IOCZ44VQX2NJ33GVRBWHBS/
N/A
Hyperlink: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00818.html
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J7RNFPWOSFII2JE2KDRHPLJANZC3YATW/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TULYSWHC3X76AIGGMUSLBTWOXNND6IEV/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L27GRS7E45IOCZ44VQX2NJ33GVRBWHBS/
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00818.html
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J7RNFPWOSFII2JE2KDRHPLJANZC3YATW/
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TULYSWHC3X76AIGGMUSLBTWOXNND6IEV/
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L27GRS7E45IOCZ44VQX2NJ33GVRBWHBS/
x_transferred
Hyperlink: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00818.html
Resource:
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J7RNFPWOSFII2JE2KDRHPLJANZC3YATW/
Resource:
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TULYSWHC3X76AIGGMUSLBTWOXNND6IEV/
Resource:
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L27GRS7E45IOCZ44VQX2NJ33GVRBWHBS/
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:11 Aug, 2023 | 03:15
Updated At:08 Nov, 2023 | 03:08

Out-of-bounds read in some Intel(R) oneVPL GPU software before version 22.6.5 may allow an authenticated user to potentially enable information disclosure via local access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Secondary3.14.4MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 4.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
CPE Matches

Intel Corporation
intel
>>onevpl_gpu_runtime>>Versions before 22.6.5(exclusive)
cpe:2.3:a:intel:onevpl_gpu_runtime:*:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>37
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>38
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>39
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-125Primarynvd@nist.gov
CWE-125Secondarysecure@intel.com
CWE ID: CWE-125
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-125
Type: Secondary
Source: secure@intel.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00818.htmlsecure@intel.com
Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J7RNFPWOSFII2JE2KDRHPLJANZC3YATW/secure@intel.com
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L27GRS7E45IOCZ44VQX2NJ33GVRBWHBS/secure@intel.com
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TULYSWHC3X76AIGGMUSLBTWOXNND6IEV/secure@intel.com
Mailing List
Third Party Advisory
Hyperlink: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00818.html
Source: secure@intel.com
Resource:
Vendor Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J7RNFPWOSFII2JE2KDRHPLJANZC3YATW/
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L27GRS7E45IOCZ44VQX2NJ33GVRBWHBS/
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TULYSWHC3X76AIGGMUSLBTWOXNND6IEV/
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

872Records found

CVE-2019-14629
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 10.40%
||
7 Day CHG~0.00%
Published-17 Jan, 2020 | 17:38
Updated-05 Aug, 2024 | 00:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper permissions in Intel(R) DAAL before version 2020 Gold may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-Intel Corporation
Product-data_analytics_acceleration_libraryIntel(R) DAAL
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2019-11096
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.12% / 31.28%
||
7 Day CHG~0.00%
Published-16 Dec, 2019 | 19:13
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient memory protection for Intel(R) Ethernet I218 Adapter driver for Windows* 10 before version 24.1 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-ethernet_i218_adapter_driverwindows_10Intel(R) Ethernet I218 Adapter driver for Windows* 10
CVE-2019-1020014
Matching Score-8
Assigner-7556d962-6fb7-411e-85fa-6cd62f095ba8
ShareView Details
Matching Score-8
Assigner-7556d962-6fb7-411e-85fa-6cd62f095ba8
CVSS Score-5.5||MEDIUM
EPSS-0.24% / 46.79%
||
7 Day CHG~0.00%
Published-29 Jul, 2019 | 12:20
Updated-05 Aug, 2024 | 03:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

docker-credential-helpers before 0.6.3 has a double free in the List functions.

Action-Not Available
Vendor-Canonical Ltd.Fedora ProjectDocker, Inc.
Product-credential_helpersfedoraubuntu_linuxdocker-credential-helpers
CWE ID-CWE-415
Double Free
CVE-2023-32283
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.10% / 27.57%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 15:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insertion of sensitive information into log file in some Intel(R) On Demand software before versions 1.16.2, 2.1.1, 3.1.0 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-on_demandIntel(R) On Demand software
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2023-32609
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5||MEDIUM
EPSS-0.06% / 18.37%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-01 Oct, 2024 | 20:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the Intel Unite(R) android application before version 4.2.3504 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-uniteIntel Unite(R) android application
CWE ID-CWE-284
Improper Access Control
CVE-2019-0184
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.14% / 34.50%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 19:09
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in protected memory subsystem for Intel(R) TXT for 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 Families; Intel(R) Xeon(R) E-2100 and E-2200 Processor Families with Intel(R) Processor Graphics and Intel(R) TXT may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1230_v5xeon_e-2276mcore_i7-8665uxeon_e3-1558l_v5core_i7-7660ucore_i7-8706gxeon_e3-1565l_v5_firmwarecore_i5-6585rxeon_e3-1501l_v6_firmwarexeon_e3-1565l_v5core_i9-9880h_firmwarecore_i7-8700t_firmwarexeon_e-2124g_firmwarexeon_e-2126g_firmwarecore_i5-8305g_firmwarecore_i5-7500_firmwarexeon_e3-1240_v6core_i7-8700xeon_e3-1220_v5_firmwarecore_i7-7700tcore_i7-8086kcore_i7-9700core_i7-8700kcore_i7-6650u_firmwarexeon_e-2226gxeon_e3-1280_v5core_i5-8600k_firmwarecore_i5-7442eqcore_i7-6822eqxeon_e-2276m_firmwarexeon_e-2134core_i5-9600_firmwarecore_i5-9600t_firmwarecore_i7-6700texeon_e-2226g_firmwarexeon_e3-1501l_v6core_i7-7600ucore_i5-7y57_firmwarexeon_e3-1225_v6core_i5-7442eq_firmwarecore_i5-6442eq_firmwarexeon_e-2144g_firmwarexeon_e3-1505l_v6xeon_e3-1225_v5_firmwarexeon_e3-1240l_v5xeon_e-2134_firmwarecore_i5-7360u_firmwarecore_i5-8210y_firmwarecore_i5-6442eqcore_i5-9600kcore_i7-7600u_firmwarexeon_e3-1240_v5_firmwarecore_i5-6500te_firmwarexeon_e3-1245_v5core_i5-9500_firmwarexeon_e3-1558l_v5_firmwarecore_i5-8350ucore_i5-7300ucore_i5-6440hq_firmwarexeon_e3-1505l_v6_firmwarecore_i5-8600xeon_e-2136xeon_e-2246gcore_i5-8500tcore_i7-9700kcore_i5-7500core_i7-8500y_firmwarecore_m7-6y75xeon_e3-1270_v5_firmwarecore_i5-6600t_firmwarecore_i5-8350u_firmwarexeon_e3-1275_v5_firmwarexeon_e3-1535m_v5core_i7-7700xeon_e3-1535m_v5_firmwarecore_i7-6820hq_firmwarecore_i7-7820hq_firmwarecore_i7-7920hqcore_i7-7920hq_firmwarexeon_e3-1575m_v5_firmwarecore_i5-8600kcore_i7-8700k_firmwarexeon_e-2124_firmwarexeon_e3-1545m_v5core_i7-8700_firmwarexeon_e3-1240_v6_firmwarexeon_e3-1501m_v6_firmwarexeon_e3-1260l_v5_firmwarexeon_e3-1501m_v6core_i5-8365uxeon_e3-1505m_v5_firmwarexeon_e3-1578l_v5core_i7-6660uxeon_e3-1270_v5core_i5-7600xeon_e3-1260l_v5xeon_e-2286mintel_core_i7-8850hxeon_e3-1505m_v5core_i5-6500_firmwareintel_core_i7-8700bcore_i7-7820eq_firmwarexeon_e-2276gcore_i5-6500t_firmwarexeon_e-2186gxeon_e-2244gxeon_e-2174gcore_i9-9900kxeon_e-2176gcore_i5-6685r_firmwarexeon_e3-1230_v6_firmwarecore_i7-7y75_firmwarecore_i5-8200y_firmwareintel_core_i7-8850h_firmwarecore_i5-6500txeon_e3-1585_v5xeon_e3-1225_v6_firmwarecore_i5-9500tcore_i5-7500t_firmwarecore_i7-8700tcore_i5-8600t_firmwarexeon_e3-1280_v5_firmwarexeon_e3-1220_v6_firmwarecore_i7-6820hqcore_i7-8650uxeon_e3-1535m_v6_firmwarecore_i5-6600_firmwarecore_i5-6600xeon_e-2286m_firmwarecore_i7-6700tcore_i7-6920hqcore_i5-9600xeon_e3-1230_v6core_i7-8510y_firmwarexeon_e3-1585l_v5_firmwarecore_i7-6700_firmwarexeon_e3-1240l_v5_firmwarecore_i5-7300u_firmwarecore_i5-8600_firmwarecore_i7-6822eq_firmwarexeon_e-2186g_firmwarexeon_e-2274gxeon_e-2124gcore_i5-7600t_firmwarecore_i5-9500core_i5-7440hq_firmwarexeon_e-2288gxeon_e3-1280_v6core_i7-6700t_firmwarexeon_e3-1245_v5_firmwarecore_i7-9850hcore_i7-9700t_firmwarexeon_e3-1280_v6_firmwarexeon_e-2124core_i9-9880hcore_i7-6820eq_firmwarecore_i5-7440eqcore_i5-8500t_firmwarexeon_e-2136_firmwarexeon_e-2276g_firmwarexeon_e3-1235l_v5_firmwarecore_m5-6y57xeon_e-2274g_firmwarexeon_e-2126gcore_i7-8706g_firmwarecore_i7-6920hq_firmwarecore_i7-9700tcore_i7-7820eqxeon_e3-1535m_v6core_i5-7360ucore_i9-9900xeon_e3-1220_v5core_i5-6500core_i7-8650u_firmwarexeon_e-2146g_firmwarexeon_e3-1220_v6core_m7-6y75_firmwarecore_i9-9900k_firmwarecore_i7-9850h_firmwareintel_core_i7-8700b_firmwarecore_i7-6660u_firmwarecore_i5-7600txeon_e3-1230_v5_firmwarecore_i5-7440eq_firmwarexeon_e-2278g_firmwarexeon_e-2224gxeon_e-2286gcore_i5-8365u_firmwarecore_i7-6700te_firmwarecore_i5-8310y_firmwarecore_i5-6600txeon_e-2244g_firmwarecore_i7-6650ucore_i5-6360u_firmwarexeon_e3-1575m_v5xeon_e-2278gcore_i7-8086k_firmwarecore_i5-6585r_firmwarexeon_e3-1585_v5_firmwarexeon_e-2176g_firmwarecore_i7-8665u_firmwarecore_i5-9400hcore_i7-8500ycore_i7-6820eqcore_i9-9900_firmwarecore_i9-9900txeon_e3-1505m_v6_firmwarexeon_e3-1545m_v5_firmwarexeon_e3-1235l_v5core_i5-6500tecore_i7-7660u_firmwarecore_i7-7820hqxeon_e3-1585l_v5core_i5-8210ycore_i5-8500_firmwarexeon_e3-1275_v5core_i7-9700k_firmwarexeon_e3-1240_v5xeon_e-2288g_firmwarecore_i5-6685rcore_i7-7700t_firmwarecore_i5-9400h_firmwarexeon_e-2246g_firmwarecore_i5-8200yxeon_e-2174g_firmwarecore_i5-8310yxeon_e3-1515m_v5xeon_e3-1225_v5core_i5-8500core_i5-7440hqcore_i5-7600_firmwarexeon_e-2144gcore_i5-6360uxeon_e3-1515m_v5_firmwarecore_i5-9500t_firmwarecore_m5-6y57_firmwarecore_i7-8510ycore_i7-7700_firmwarecore_i5-6440hqcore_i7-7y75core_i5-9600txeon_e-2286g_firmwarecore_i7-6700core_i5-7y57core_i5-6440eqcore_i5-6440eq_firmwarecore_i5-8600tcore_i5-8305gcore_i5-7500txeon_e3-1505m_v6core_i5-9600k_firmwarecore_i9-9900t_firmwarexeon_e-2146gcore_i7-9700_firmwarexeon_e-2224g_firmwarexeon_e3-1578l_v5_firmware2019.2 IPU – Intel(R) TXT
CVE-2023-28411
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.3||MEDIUM
EPSS-0.05% / 13.48%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-27 Jan, 2025 | 18:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Double free in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_system_d50tnp1mhcpacserver_system_d50tnp2mhsvac_firmwareserver_system_m50cyp2ur312_firmwareserver_system_d50tnp2mhsvacserver_system_d50tnp1mhcrac_firmwareserver_system_d50tnp2mhstacserver_system_d50tnp2mfalacserver_system_m50cyp2ur208server_system_d50tnp1mhcrlc_firmwareserver_system_m50cyp1ur212_firmwareserver_system_m50cyp2ur208_firmwareserver_system_m50cyp2ur312server_system_m50cyp1ur204_firmwareserver_system_d50tnp1mhcracserver_system_d50tnp1mhcrlcserver_system_d50tnp2mhstac_firmwareserver_system_m50cyp1ur204server_system_d50tnp1mhcpac_firmwareserver_system_d50tnp2mfalac_firmwareserver_system_m50cyp1ur212Intel(R) Server Board BMC firmware
CWE ID-CWE-415
Double Free
CVE-2019-0185
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.14% / 34.50%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:40
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in protected memory subsystem for SMM for 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor families; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 families; Intel(R) Xeon(R) E-2100 and E-2200 Processor families with Intel(R) Processor Graphics may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i7-7700kcore_i7-8705gxeon_e-2276mcore_i7-8665uxeon_e3-1558l_v5core_i7-7660ucore_i7-6600ucore_i7-8706gxeon_e3-1565l_v5_firmwarexeon_e3-1501l_v6_firmwarexeon_e3-1565l_v5xeon_e-2236core_i9-9880h_firmwarecore_i7-8700t_firmwarexeon_e-2236_firmwarexeon_e-2124g_firmwarecore_i7-9700kfxeon_e-2126g_firmwarecore_i5-7500_firmwarexeon_e-2254me_firmwarecore_i7-8700core_i7-8665ue_firmwarexeon_e-2276me_firmwarecore_i5-7y54core_i7-8705g_firmwarecore_i7-7700tcore_i7-8086kcore_i5-7260u_firmwarecore_i7-6600u_firmwarecore_i7-9700core_i5-7600k_firmwarecore_i7-6770hqcore_i7-8700kcore_i7-6650u_firmwarexeon_e-2226gcore_i9-9900kfcore_i5-7200u_firmwarecore_i5-7442eqcore_i7-6822eqxeon_e-2276m_firmwarexeon_e-2134core_i7-6700tecore_i7-6567u_firmwarecore_i7-9700texeon_e3-1501l_v6xeon_e-2226g_firmwarecore_i7-7600uxeon_e-2224core_i5-7y57_firmwarexeon_e-2186m_firmwarecore_i7-9700f_firmwarecore_i5-7442eq_firmwarecore_i7-8569u_firmwarecore_i7\+8700_firmwarexeon_e-2144g_firmwarexeon_e3-1505l_v6xeon_e-2278gexeon_e-2134_firmwarecore_i5-7360u_firmwarecore_i7-7600u_firmwarecore_i7-7700hqcore_i7-7820hkcore_i7-6870hqxeon_e3-1558l_v5_firmwarecore_i7-6970hqcore_i7-9700fcore_i5-7300uxeon_e3-1505l_v6_firmwarexeon_e-2136xeon_e-2246gcore_i7-9700kcore_i5-7500core_i7-8500y_firmwarecore_i5-7200ucore_i7-8700b_firmwarexeon_e3-1535m_v5core_i5-7287u_firmwarecore_i7-7700xeon_e3-1535m_v5_firmwarecore_i7-6820hq_firmwarecore_i7-7820hq_firmwarecore_i7-7920hqxeon_e-2286m__firmwarecore_i7-7920hq_firmwarexeon_e3-1575m_v5_firmwarecore_i9-9900ks_firmwarexeon_e-2254mlcore_i7-8700k_firmwarexeon_e3-1545m_v5xeon_e-2124_firmwarecore_i7-8700_firmwarexeon_e3-1501m_v6_firmwarecore_i7-8750hxeon_e3-1501m_v6xeon_e3-1505m_v5_firmwarexeon_e-2226ge_firmwarexeon_e-2254ml_firmwarexeon_e3-1578l_v5core_i7-6660ucore_i5-7600core_i7-9850he_firmwarecore_i7-8557u_firmwarexeon_e3-1505m_v5core_i7-7820eq_firmwarexeon_e-2276gxeon_e-2186gcore_i5-7400tcore_i5-7267u_firmwarexeon_e-2276mlxeon_e-2244gxeon_e-2174gcore_i9-9900kxeon_e-2176gcore_i7-8809gcore_i5-7260ucore_i7-8709gcore_i7-8700bcore_i7-7y75_firmwarecore_i7-8550u_firmwarecore_i7-7500u_firmwarecore_i5-7267uxeon_e3-1585_v5core_i7-6700k_firmwarecore_i7-7820hk_firmwarecore_i7-8557ucore_i9-9900kf_firmwarecore_i7-6560uxeon_e-2278ge_firmwarecore_i5-7500t_firmwarecore_i7-6820hk_firmwarecore_i7-8700tcore_i7-6820hqcore_i7-9850hecore_i5-7400core_i7-8650uxeon_e3-1535m_v6_firmwarecore_i7-6700tcore_i7-6920hqcore_i7-9750h_firmwarecore_i9-9900ksxeon_e-2286m_xeon_e3-1585l_v5_firmwarecore_i7-6700_firmwarexeon_e-2234_firmwarecore_i5-7300u_firmwarecore_i7-8565u_firmwarecore_i7-6822eq_firmwarexeon_e-2224_firmwarecore_i7-9750hfxeon_e-2186g_firmwarecore_i5-7600t_firmwarexeon_e-2274gxeon_e-2124gxeon_e-2278gelcore_i5-7440hq_firmwarexeon_e-2288gcore_i7-6700t_firmwarexeon_e-2234core_i7-8709g_firmwarecore_i7-6500ucore_i7-6500u_firmwarecore_i7-9850hcore_i7-6700kcore_i7-9700t_firmwarexeon_e-2124core_i9-9880hcore_i7-6820eq_firmwarecore_i5-7440eqcore_i5-7287uxeon_e-2136_firmwarexeon_e-2276g_firmwarexeon_e-2276mecore_i7-8565ucore_i5-7600kcore_i5-7300hq_firmwarexeon_e-2274g_firmwarexeon_e-2126gcore_i5-7300hqcore_i7-7560ucore_i7-8706g_firmwarecore_i7-6920hq_firmwarecore_i7-9700tcore_i7-7820eqcore_i5-7400t_firmwarexeon_e3-1535m_v6core_i7-9850hlcore_i5-7360ucore_i9-9900core_i7-9850hl_firmwarecore_i7-8650u_firmwarexeon_e-2146g_firmwarecore_i7-6785r_firmwarecore_i7-8850h_firmwarecore_i9-9900k_firmwarecore_i7-6700hq_firmwarecore_i7-6700hqcore_i7-7700k_firmwarecore_i7-9700kf_firmwarecore_i7-9850h_firmwarexeon_e-2186mcore_i7-7567u_firmwarecore_i7-9700exeon_e-2176mcore_i7-6970hq_firmwarecore_i7-6785rcore_i7-7700hq_firmwarecore_i7-6820hkcore_i7-6660u_firmwarecore_i5-7600tcore_i5-7440eq_firmwarecore_i7-9750hf_firmwarecore_i7-7500ucore_i7-8550uxeon_e-2278g_firmwarexeon_e-2276ml_firmwarexeon_e-2224gxeon_e-2286gcore_i7-6700te_firmwarexeon_e-2226gexeon_e-2244g_firmwarecore_i7-6650uxeon_e3-1575m_v5xeon_e-2278gxeon_e3-1505l_v5core_i7-8559u_firmwarecore_i7-8850hcore_i7-8086k_firmwarecore_i7-8665u_firmwarexeon_e-2176g_firmwarexeon_e3-1585_v5_firmwarecore_i7-6560u_firmwarecore_i7-6820eqcore_i7-8500ycore_i7-7567ucore_i9-9900tcore_i9-9900_firmwarexeon_e3-1505m_v6_firmwarexeon_e3-1545m_v5_firmwarecore_i7-9700e_firmwarecore_i7\+8700core_i7-7660u_firmwarecore_i7-7820hqxeon_e3-1585l_v5core_i7-8750h_firmwarecore_i5-7400_firmwarecore_i7-8665uecore_i7-9700k_firmwarecore_i7-8809g_firmwarexeon_e-2288g_firmwarecore_i7-7700t_firmwarecore_i9-9980hk_firmwarecore_i5-7y54_firmwarexeon_e-2246g_firmwarecore_i7-6567uxeon_e-2176m_firmwarexeon_e-2174g_firmwarexeon_e3-1515m_v5xeon_e3-1505l_v5_firmwarecore_i7-6870hq_firmwarexeon_e-2278gel_firmwarecore_i5-7440hqcore_i5-7600_firmwarexeon_e-2144gxeon_e3-1515m_v5_firmwarecore_i7-8569ucore_i7-9700te_firmwarecore_i7-7700_firmwarecore_i7-6770hq_firmwarexeon_e-2254mecore_i7-9750hcore_i7-7y75core_i7-7560u_firmwarexeon_e-2286g_firmwarecore_i7-6700core_i5-7y57core_i5-7500txeon_e3-1505m_v6core_i9-9980hkcore_i7-8559ucore_i9-9900t_firmwarecore_i7-9700_firmwarexeon_e-2146gxeon_e-2224g_firmwarexeon_e3-1578l_v5_firmware2019.2 IPU – Intel(R) Processor Graphics SMM
CVE-2023-28723
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-3.3||LOW
EPSS-0.10% / 27.48%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Exposure of sensitive information to an unauthorized actor in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncIntel CorporationMicrosoft Corporation
Product-windowslinux_kernelaptio_v_uefi_firmware_integrator_toolsIntel(R) Aptio* V UEFI Firmware Integrator Tools
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-33119
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.83%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the Intel(R) RealSense(TM) DCM before version 20210625 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-realsense_depth_camera_managerIntel(R) RealSense(TM) DCM
CVE-2023-24478
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 19.56%
||
7 Day CHG~0.00%
Published-15 Aug, 2023 | 12:42
Updated-01 Oct, 2024 | 18:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of insufficiently random values for some Intel Agilex(R) software included as part of Intel(R) Quartus(R) Prime Pro Edition for linux before version 22.4 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-quartus_primeIntel Agilex(R) software included as part of Intel(R) Quartus(R) Prime Pro Edition for linux
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2023-25080
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 28.55%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-02 Aug, 2024 | 11:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure in some Intel(R) Distribution of OpenVINO toolkit software before version 2023.0.0 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-openvinoIntel(R) Distribution of OpenVINO toolkit software
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2018-3639
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-46.74% / 97.58%
||
7 Day CHG~0.00%
Published-22 May, 2018 | 12:00
Updated-16 Sep, 2024 | 22:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

Action-Not Available
Vendor-Debian GNU/LinuxMitel Networks Corp.Siemens AGIntel CorporationSonicWall Inc.Microsoft CorporationRed Hat, Inc.NVIDIA CorporationOracle CorporationCanonical Ltd.Arm Limited
Product-surface_proenterprise_linux_server_ausopenstackxeon_e3_1225_v3xeon_e5_2450lxeon_e5_1620_v3xeon_e5_1428lxeon_e5_1620_v4xeon_e3_1240l_v5windows_10xeon_e3_1270xeon_e3_1230l_v3xeon_e3_1225_v5xeon_e5_2643_v2simatic_ipc677c_firmwaresinumerik_tcu_30.3xeon_e3_1220l_v3itc1900_pro_firmwarexeon_e5_2450_v2simatic_ipc647cweb_application_firewallxeon_e5_2408l_v3xeon_e3_1240_v2xeon_e5_2609_v4simatic_ipc627catom_zxeon_e3_1265l_v2xeon_e3_1278l_v4xeon_e3_1240simatic_ipc547g_firmwarexeon_e3_1246_v3xeon_e5_2637itc1900_proxeon_e5_2448litc1500_pro_firmwaresimatic_ipc347esinema_remote_connect_firmwareitc1900jetson_tx1xeon_e3enterprise_linux_serverxeon_e5_2608l_v3xeon_e3_1501l_v6solarisxeon_e5_1650_v3xeon_e5_2430lsimatic_ipc677cxeon_e7xeon_e3_1240_v5xeon_e5_2428l_v3xeon_e5_2430l_v2xeon_e3_1280_v5simatic_ipc847dxeon_e5_2648l_v3simatic_ipc827cceleron_nxeon_e5_2428lxeon_e5_1660_v4itc1900_firmwarexeon_e5_2428l_v2simatic_ipc477exeon_e5_2407_v2simatic_field_pg_m4_firmwaresimatic_ipc427d_firmwarexeon_e5_2650_v2xeon_e3_1245_v3xeon_e3_1245xeon_e3_1225xeon_e5_2630l_v3xeon_e3_1275_v2xeon_e5_2620_v3cortex-axeon_e3_1241_v3simatic_ipc427e_firmwareitc2200_pro_firmwaresimatic_ipc647d_firmwarexeon_platinummivoice_connectxeon_e5_1680_v4xeon_e5_2628l_v3xeon_e5_2430xeon_e5_2643_v3xeon_e5_1428l_v2xeon_e3_1240l_v3sinumerik_tcu_30.3_firmwarexeon_e3_1285l_v4secure_mobile_accessitc2200xeon_e3_1230_v6local_service_management_systemxeon_e5_2643_v4xeon_e5_2620xeon_e3_1285_v6xeon_e5_2418lxeon_e3_1275_v5xeon_e3_1286_v3xeon_e3_1268l_v5xeon_e3_1290xeon_e5_2448l_v2xeon_e5_1650_v4xeon_e5_2630l_v4simatic_ipc677dsinumerik_840_d_sl_firmwarexeon_e5_2403_v2virtualization_managerxeon_e3_1268l_v3simatic_ipc477d_firmwarexeon_e3_1285_v3xeon_e5_2450xeon_e5_2623_v3xeon_e5_2650l_v3simatic_field_pg_m5xeon_e3_1501m_v6mivoice_businessxeon_e3_1265l_v4simatic_ipc477e_firmwaresimatic_ipc847c_firmwaresimatic_et_200_sp_firmwaresimatic_ipc477e_proatom_csimatic_ipc827datom_esimatic_et_200_spxeon_e5_1660xeon_e5_2618l_v3surface_pro_with_lte_advancedxeon_e5_2618l_v2xeon_e3_1280_v3simatic_ipc627dxeon_e3_12201_v2xeon_e3_1270_v2xeon_e5xeon_e3_1280simatic_s7-1500xeon_e5_2628l_v4xeon_e5_2640_v3xeon_e3_1270_v3simatic_ipc3000_smart_firmwarexeon_e5_2608l_v4xeon_e5_2650enterprise_linux_eusxeon_e3_1265l_v3xeon_e5_1650_v2cloud_global_management_systemxeon_e5_2609xeon_e3_1260l_v5xeon_e5_2650lvirtualizationxeon_e5_2418l_v2xeon_e3_1225_v6xeon_e5_2640sinumerik_840_d_slruggedcom_ape_firmwareatom_x5-e3930simatic_ipc547gsimatic_ipc847cxeon_e3_1285_v4atom_x7-e3950xeon_e5_2630l_v2simatic_ipc477e_pro_firmwaremicollabxeon_e5_2403xeon_e3_1260lxeon_e5_2438l_v3xeon_e3_12201pentiumsimatic_s7-1500_firmwarexeon_e3_1220_v6xeon_e3_1230_v2xeon_e5_1680_v3xeon_e5_1630_v3simatic_ipc647c_firmwareenterprise_linux_workstationxeon_e3_1235xeon_e3_1281_v3xeon_e5_1428l_v3simatic_ipc477c_firmwaresimotion_p320-4e_firmwarexeon_e5_2648lsimatic_ipc347e_firmwarexeon_e3_1276_v3xeon_silverxeon_e5_1620_v2xeon_e5_2630_v2itc2200_firmwaremivoic_mx-onecore_i7xeon_e-1105cxeon_e5_2630lxeon_e5_2643simatic_ipc827c_firmwaresimotion_p320-4exeon_e3_1275l_v3debian_linuxitc1500xeon_e3_1105c_v2xeon_e5_2637_v2itc1500_proxeon_e3_1245_v5xeon_e5_2430_v2xeon_e5_2640_v4xeon_e5_2648l_v2windows_server_2008itc2200_prosimatic_ipc677d_firmwarexeon_e3_1230_v3xeon_e3_1226_v3xeon_e5_2637_v3ruggedcom_apesimatic_ipc547e_firmwarexeon_e3_1245_v6xeon_e5_2420_v2core_i3xeon_e3_1505m_v5mivoice_border_gatewayxeon_e5_2620_v4simatic_ipc827d_firmwarecore_i5xeon_e3_1235l_v5surface_studioxeon_e5_1660_v3celeron_jxeon_e3_1505l_v5xeon_e3_1230simatic_ipc427c_firmwarexeon_e5_2630_v4pentium_jxeon_e3_1275_v6xeon_e3_1285l_v3xeon_e5_1620atom_x5-e3940simatic_ipc427exeon_e5_2640_v2simatic_ipc477dsimatic_ipc427dxeon_e5_2609_v2simatic_itp1000_firmwarexeon_e5_1630_v4xeon_e5_2407xeon_e3_1220_v3windows_7xeon_e3_1280_v6pentium_silversimatic_ipc3000_smartenterprise_linux_server_tussimatic_ipc547exeon_e5_2618l_v4xeon_e3_1275_v3xeon_e3_1505l_v6ubuntu_linuxwindows_8.1xeon_e3_1240_v6global_management_systemxeon_e5_2620_v2xeon_e3_1270_v5itc1500_firmwaresinema_remote_connectsurfacexeon_e5_2450l_v2simatic_ipc627c_firmwaremivoice_5000xeon_e5_2609_v3xeon_e3_1220_v5xeon_e5_2603xeon_e5_2630_v3simatic_itp1000core_mxeon_e5_2650l_v2enterprise_linux_desktopxeon_e3_1231_v3simatic_ipc427cxeon_e3_1280_v2xeon_e5_1650xeon_e5_2470enterprise_linuxxeon_goldsimatic_ipc647dxeon_e5_2603_v3xeon_e3_1286l_v3simatic_field_pg_m5_firmwaresimatic_ipc847d_firmwarexeon_e5_2603_v2open_integration_gatewayxeon_e3_1290_v2xeon_e5_2603_v4xeon_e3_1220_v2xeon_e3_1270_v6simatic_ipc477cwindows_server_2012sinumerik_pcu_50.5windows_server_2016xeon_e3_1225_v2jetson_tx2xeon_e3_1271_v3surface_bookxeon_e5_2623_v4xeon_e3_1230_v5xeon_e5_2440simatic_ipc627d_firmwarexeon_e5_2440_v2mrg_realtimexeon_e3_1258l_v4xeon_e5_2650_v4sonicosvxeon_e5_2418l_v3sinumerik_pcu_50.5_firmwarexeon_e5_2628l_v2micloud_management_portalxeon_e5_2470_v2simatic_field_pg_m4xeon_e3_1245_v2xeon_e5_2637_v4struxureware_data_center_expertxeon_e5_2650_v3xeon_e3_1240_v3xeon_e5_2648l_v4xeon_e5_1660_v2email_securityxeon_e5_2630xeon_e5_2420xeon_e3_1125c_v2Multiple
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-36241
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.18% / 39.32%
||
7 Day CHG~0.00%
Published-05 Feb, 2021 | 07:11
Updated-04 Aug, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

autoar-extractor.c in GNOME gnome-autoar through 0.2.4, as used by GNOME Shell, Nautilus, and other software, allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location.

Action-Not Available
Vendor-n/aThe GNOME ProjectFedora Project
Product-gnome-autoarfedoran/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-22379
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 17.58%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-27 Jan, 2025 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_system_d50tnp1mhcpacserver_system_d50tnp2mhsvac_firmwareserver_system_m50cyp2ur312_firmwareserver_system_d50tnp2mhsvacserver_system_d50tnp1mhcrac_firmwareserver_system_d50tnp2mhstacserver_system_d50tnp2mfalacserver_system_m50cyp2ur208server_system_d50tnp1mhcrlc_firmwareserver_system_m50cyp1ur212_firmwareserver_system_m50cyp2ur208_firmwareserver_system_m50cyp2ur312server_system_m50cyp1ur204_firmwareserver_system_d50tnp1mhcracserver_system_d50tnp1mhcrlcserver_system_d50tnp2mhstac_firmwareserver_system_m50cyp1ur204server_system_d50tnp1mhcpac_firmwareserver_system_d50tnp2mfalac_firmwareserver_system_m50cyp1ur212Intel(R) Server Board BMC firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2023-20588
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-4.00% / 87.96%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 17:06
Updated-17 Oct, 2024 | 14:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Speculative Leaks

A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. 

Action-Not Available
Vendor-Debian GNU/LinuxMicrosoft CorporationXen ProjectFedora ProjectAdvanced Micro Devices, Inc.
Product-windows_server_2022_23h2athlon_gold_pro_3150ge_firmwareryzen_3_pro_3200ge_firmwareepyc_7371_firmwareepyc_7261epyc_7451ryzen_5_pro_3400g_firmwareryzen_3_3200gewindows_11_21h2epyc_7551_firmwareryzen_5_pro_3350ge_firmwareathlon_silver_pro_3125ge_firmwarewindows_10_21h2epyc_7351p_firmwareathlon_pro_300gefedoraathlon_gold_pro_3150gwindows_10_22h2epyc_7571_firmwareryzen_5_pro_3400gepyc_7401pryzen_5_3400gepyc_7281_firmwareathlon_silver_pro_3125geepyc_7601ryzen_5_pro_3350geryzen_3_pro_3200geryzen_3_pro_3200g_firmwareepyc_7371athlon_pro_300ge_firmwareryzen_3_3200g_firmwareryzen_3_pro_3200gathlon_silver_3050gedebian_linuxepyc_7451_firmwareryzen_3_3200gepyc_7281epyc_7551windows_11_22h2epyc_7301epyc_7551pwindows_server_2008epyc_7401p_firmwareathlon_gold_3150gwindows_server_2016athlon_silver_3050ge_firmwarewindows_server_2012epyc_7351pepyc_7551p_firmwarewindows_10_1507ryzen_5_pro_3350g_firmwareepyc_7601_firmwareepyc_7351_firmwareepyc_7251epyc_7401epyc_7571athlon_gold_pro_3150gexenwindows_10_1607athlon_gold_pro_3150g_firmwareathlon_gold_3150geepyc_7251_firmwareepyc_7401_firmwareryzen_5_pro_3400geryzen_5_pro_3350gryzen_3_3200ge_firmwareryzen_5_3400g_firmwareepyc_7351epyc_7261_firmwarewindows_11_23h2windows_10_1809ryzen_5_pro_3400ge_firmwareathlon_gold_3150ge_firmwareepyc_7501epyc_7501_firmwareathlon_gold_3150g_firmwareepyc_7301_firmwarewindows_server_2019Athlon™ PRO 3000 Series Processors with Radeon™ Vega Graphics EPYC™ 7001 ProcessorsRyzen™ PRO 3000 Series Processors with Radeon™ Vega GraphicsAthlon™ 3000 Series Processors with Radeon™ Graphics Ryzen™ 3000 Series Processors with Radeon™ Graphics
CWE ID-CWE-369
Divide By Zero
CVE-2023-27538
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-7.7||HIGH
EPSS-0.01% / 1.24%
||
7 Day CHG~0.00%
Published-30 Mar, 2023 | 00:00
Updated-09 Jun, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.

Action-Not Available
Vendor-n/aNetApp, Inc.Fedora ProjectDebian GNU/LinuxBroadcom Inc.Splunk LLC (Cisco Systems, Inc.)CURL
Product-debian_linuxbrocade_fabric_operating_system_firmwareh700sh300sh410s_firmwareuniversal_forwarderfedorah300s_firmwareh700s_firmwareh500sh500s_firmwarelibcurlclustered_data_ontapactive_iq_unified_managerh410shttps://github.com/curl/curl
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-305
Authentication Bypass by Primary Weakness
CVE-2022-47927
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 7.39%
||
7 Day CHG~0.00%
Published-12 Jan, 2023 | 00:00
Updated-08 Apr, 2025 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. When installing with a pre-existing data directory that has weak permissions, the SQLite files are created with file mode 0644, i.e., world readable to local users. These files include credentials data.

Action-Not Available
Vendor-n/aWikimedia FoundationFedora Project
Product-fedoramediawikin/a
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2022-46299
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-3.3||LOW
EPSS-0.10% / 27.48%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management for some Intel Unison software may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationApple Inc.Google LLCMicrosoft Corporation
Product-androidwindowsunison_softwareiphone_osIntel Unison software
CWE ID-CWE-691
Insufficient Control Flow Management
CVE-2022-46279
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5||MEDIUM
EPSS-0.08% / 24.43%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-27 Jan, 2025 | 18:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the Intel(R) Retail Edge android application before version 3.0.301126-RELEASE may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-retail_edge_programIntel(R) Retail Edge android application
CWE ID-CWE-284
Improper Access Control
CVE-2022-46646
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-2.2||LOW
EPSS-0.10% / 28.37%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Exposure of sensitive information to an unauthorized actor for some Intel Unison software may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationApple Inc.Google LLCMicrosoft Corporation
Product-androidwindowsunison_softwareiphone_osIntel Unison software
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-46647
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-2.5||LOW
EPSS-0.10% / 28.37%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insertion of sensitive information into log file for some Intel Unison software may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationApple Inc.Google LLCMicrosoft Corporation
Product-androidwindowsunison_softwareiphone_osIntel Unison software
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2022-45109
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-3.3||LOW
EPSS-0.10% / 27.48%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 16:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization for some Intel Unison software may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationApple Inc.Google LLCMicrosoft Corporation
Product-androidwindowsunison_softwareiphone_osIntel Unison software
CWE ID-CWE-665
Improper Initialization
CVE-2022-44612
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 14.89%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-04 Oct, 2024 | 13:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of hard-coded credentials in some Intel(R) Unison(TM) software before version 10.12 may allow an authenticated user user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-unisonIntel(R) Unison(TM) software
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2023-1055
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 12.85%
||
7 Day CHG~0.00%
Published-27 Feb, 2023 | 00:00
Updated-11 Mar, 2025 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in RHDS 11 and RHDS 12. While browsing entries LDAP tries to decode the userPassword attribute instead of the userCertificate attribute which could lead into sensitive information leaked. An attacker with a local account where the cockpit-389-ds is running can list the processes and display the hashed passwords. The highest threat from this vulnerability is to data confidentiality.

Action-Not Available
Vendor-n/aRed Hat, Inc.Fedora Project
Product-fedoradirectory_serverRed Hat Directory Server
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-295
Improper Certificate Validation
CVE-2022-43477
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-3.3||LOW
EPSS-0.10% / 27.48%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incomplete cleanup for some Intel Unison software may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationApple Inc.Google LLCMicrosoft Corporation
Product-androidwindowsunison_softwareiphone_osIntel Unison software
CWE ID-CWE-459
Incomplete Cleanup
CVE-2022-41621
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-3.3||LOW
EPSS-0.07% / 20.61%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-24 Jan, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in some Intel(R) QAT drivers for Windows before version 1.9.0 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-quickassist_technologyIntel(R) QAT drivers for Windows
CWE ID-CWE-284
Improper Access Control
CVE-2022-41771
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 21.55%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-24 Jan, 2025 | 17:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect permission assignment for critical resource in some Intel(R) QAT drivers for Windows before version 1.9.0 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-quickassist_technologyIntel(R) QAT drivers for Windows
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2022-42331
Matching Score-8
Assigner-Xen Project
ShareView Details
Matching Score-8
Assigner-Xen Project
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 10.01%
||
7 Day CHG~0.00%
Published-21 Mar, 2023 | 00:00
Updated-13 Feb, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.

Action-Not Available
Vendor-Xen ProjectFedora Project
Product-xenfedoraxen
CVE-2022-41646
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.11% / 29.45%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-27 Jan, 2025 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management in the Intel(R) IPP Cryptography software before version 2021.6 may allow an unauthenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-integrated_performance_primitives_cryptographyIntel(R) IPP Cryptography software
CWE ID-CWE-691
Insufficient Control Flow Management
CVE-2022-41614
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.37%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 20:00
Updated-27 Jan, 2025 | 18:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficiently protected credentials in the Intel(R) ON Event Series Android application before version 2.0 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-on_event_seriesIntel(R) ON Event Series Android application
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2022-40974
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-1.8||LOW
EPSS-0.06% / 20.18%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-27 Jan, 2025 | 18:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incomplete cleanup in the Intel(R) IPP Cryptography software before version 2021.6 may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-integrated_performance_primitives_cryptographyIntel(R) IPP Cryptography software
CWE ID-CWE-459
Incomplete Cleanup
CVE-2022-21233
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.11% / 30.15%
||
7 Day CHG+0.03%
Published-18 Aug, 2022 | 00:00
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper isolation of shared resources in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-celeron_j3355_firmwareatom_c3950xeon_gold_6300_firmwarecore_i5-11400xeon_d-1548xeon_d-2733nt_firmwareceleron_j4125core_i9-11900_firmwarexeon_d-1633nxeon_d-1653nxeon_d-2173it_firmwarexeon_d-2145nt_firmwareceleron_n4120atom_c3338_firmwareatom_p5942b_firmwarexeon_gold_5300core_i5-1155g7_firmwarexeon_e-2374gxeon_d-1749nt_firmwarecore_i5-1235ucore_i5-11260hxeon_d-1557_firmwareatom_p5752_firmwarexeon_e-2374g_firmwarexeon_d-2163it_firmwarexeon_d-1531xeon_d-1533n_firmwareatom_p5721atom_c3758xeon_d-2177ntcore_i9-11900kfxeon_d-2786nte_firmwareatom_p5342_firmwarecore_i3-l13g4core_i7-11700k_firmwarexeon_d-2775te_firmwarexeon_d-1573n_firmwarexeon_d-1571_firmwarepentium_j6425atom_x6425repentium_silver_j5040_firmwarecore_i7-12700kfxeon_w-11955mcore_i9-12900_firmwarecore_i5-12600h_firmwarecore_i5-11400fcore_i7-1185g7xeon_d-2796texeon_d-1541_firmwareceleron_6600hexeon_d-2798nxpentium_j6425_firmwarecore_i5-12400fcore_i7-1260uceleron_n3350exeon_d-2142itcore_i9-11980hk_firmwareceleron_j4005_firmwareceleron_7305_firmwarexeon_w-11555mrecore_i9-11900kcore_i9-12900hkatom_p5752core_i5-12450hxeon_d-1726celeron_g6900atom_x5-a3930atom_c5320atom_x6413e_firmwarexeon_d-1735tr_firmwarecore_i5-1035g1_firmwarecore_i3-1005g1xeon_d-2777nxpentium_gold_8500_firmwarexeon_d-2752nte_firmwarecore_i7-1185gre_firmwarexeon_d-2796nt_firmwarepentium_n6415xeon_d-1637atom_p5352_firmwareatom_p5332core_i5-11320h_firmwarexeon_d-1539_firmwarecore_i9-12900core_i7-12650h_firmwareatom_c3538atom_p5342celeron_j6413atom_x6413ecore_i5-12500core_i7-1270p_firmwarecore_i5-11600kfxeon_d-1602atom_c3508xeon_d-2799core_i7-12700xeon_d-1563n_firmwarexeon_d-2145ntceleron_j4105_firmwarecore_i7-12700t_firmwarexeon_d-2163itatom_p5931b_firmwarecore_i3-11100he_firmwarepentium_gold_g7400core_i3-1120g4core_i5-12500h_firmwarecore_i5-11400hcore_i9-11900hxeon_d-1623ncore_i7-1185g7ecore_i3-12100txeon_d-1521core_i5-1130g7xeon_d-1713nt_firmwarexeon_e-2378g_firmwareceleron_j4025_firmwarecore_i9-11900atom_p5921bcore_i7-12700kf_firmwarexeon_silver_4300core_i3-12100f_firmwarecore_i5-1240p_firmwarecore_i5-1145g7atom_p5322xeon_d-2143itxeon_d-2753ntpentium_gold_8505_firmwarecore_i7-1160g7_firmwarexeon_w-1390_firmwarexeon_d-1632_firmwarecore_i7-11850h_firmwarexeon_gold_5300_firmwarecore_i9-11900fxeon_d-1612_firmwarexeon_d-2177nt_firmwareatom_x7-e3950_firmwarecore_i9-11950hxeon_d-1563nceleron_n3450_firmwareatom_c3750xeon_d-1712tr_firmwarexeon_w-1300_firmwarecore_i7-1195g7celeron_n4500xeon_d-1739_firmwarexeon_e-2386gcore_i7-1165g7core_i5-11400_firmwareceleron_6305core_i7-11850hecore_i3-1215u_firmwarecore_i7-1260p_firmwareceleron_n5105_firmwarexeon_d-1733nt_firmwarecore_i3-1115gre_firmwarecore_i5-1145g7exeon_d-2142it_firmwarexeon_d-2779_firmwarecore_i5-1030g7xeon_d-1602_firmwarexeon_w-11865mre_firmwarecore_i5-1230u_firmwareceleron_j4025xeon_d-2733ntcore_i3-1000g1_firmwarexeon_w-11155mlexeon_d-1559_firmwareceleron_n4100core_i5-11400f_firmwarexeon_d-2777nx_firmwarecore_i9-11900k_firmwarecore_i7-1185g7_firmwareatom_p5362core_i7-11800h_firmwarexeon_d-2795ntcore_i7-1180g7_firmwareceleron_6600he_firmwarecore_i7-1060g7_firmwarecore_i7-1280pxeon_d-2779pentium_n4200_firmwarecore_i9-11900t_firmwarepentium_silver_n5030_firmwarepentium_silver_j5040atom_c3558rcore_i3-1110g4_firmwarepentium_n4200e_firmwareceleron_n6211xeon_w-1370atom_c3808xeon_d-1715terxeon_d-1559atom_c5325atom_c3436l_firmwarecore_i5-12600txeon_d-1537core_i7-1260u_firmwareatom_p5352xeon_d-1734nt_firmwarecore_i7-1180g7core_i5-12400xeon_w-1370pxeon_d-2752ntecore_i3-12300t_firmwarecore_i7-1255u_firmwarexeon_w-1390t_firmwareatom_x5-e3940xeon_d-1649natom_p5742core_i7-1195g7_firmwarexeon_d-1540xeon_d-1736nt_firmwarecore_i3-11100hepentium_gold_7505xeon_d-2712t_firmwarecore_i7-12700kxeon_d-1513natom_c3558_firmwarexeon_d-1527core_i5-12600_firmwarexeon_d-2745nxceleron_j3455_firmwareatom_c5310core_i7-1255ucore_i5-12600hcore_i9-11900kf_firmwarexeon_d-1748te_firmwarecore_i7-12700hatom_p5962b_firmwareatom_c3336_firmwarecore_i5-11300hcore_i3-1000g4pentium_silver_n6000core_i9-12900kf_firmwarecore_i7-11390h_firmwarexeon_d-2146ntatom_c3858xeon_d-1713ntxeon_d-2752terceleron_j4125_firmwarexeon_w-11555mlecore_i5-12500hpentium_j4205xeon_w-1390tcore_i5-1035g4_firmwareatom_c5115xeon_d-2757nx_firmwarecore_i5-1140g7core_i7-12700k_firmwarecore_i3-1220p_firmwarecore_i7-11700kfcore_i7-11700_firmwarexeon_d-2795nt_firmwarexeon_d-1713nte_firmwarecore_i7-11375hatom_c3850pentium_gold_g7400_firmwareatom_c5315core_i5-11500tcore_i9-12900h_firmwareatom_p5721_firmwarecore_i5-11400h_firmwareatom_c3508_firmwarexeon_d-1521_firmwarecore_i7-1185greceleron_g6900_firmwareatom_c5315_firmwarexeon_e-2356gxeon_d-1557atom_x6200fe_firmwarecore_i5-1145gre_firmwareceleron_n5100atom_c3436lcore_i3-1210ucore_i5-12600xeon_d-2752ter_firmwarexeon_d-1637_firmwarexeon_e-2334atom_x5-a3960_firmwarexeon_w-11555mle_firmwareatom_c3708core_i5-12600k_firmwarexeon_w-1350core_i5-1035g1xeon_w-11865mlecore_i7-11850hceleron_n4505_firmwarecore_i9-11900f_firmwarexeon_e-2314_firmwarecore_i7-1250uatom_c5125_firmwarexeon_d-1718t_firmwareceleron_n4500_firmwareatom_c3336celeron_n6211_firmwarecore_i5-11500_firmwareatom_c3955_firmwarexeon_w-1350pxeon_d-2143it_firmwarecore_i7-1065g7_firmwareceleron_n5100_firmwareatom_x6212re_firmwarecore_i5-1145g7_firmwareatom_x5-e3930core_i9-12900hatom_x6211ecore_i7-11800hpentium_n4200ecore_i7-11370h_firmwarecore_i7-11375h_firmwareceleron_j6413_firmwarexeon_d-1736ntxeon_d-1747ntecore_i5-11500h_firmwareatom_c3830core_i5-1240pceleron_6305_firmwarecore_i5-12500tcore_i9-12900txeon_d-1523n_firmwarexeon_d-2183it_firmwarecore_i5-12600t_firmwarexeon_e-2324gatom_x6200fecore_i5-12400_firmwarepentium_gold_8500core_i5-1250pxeon_d-1548_firmwarexeon_d-1528core_i5-11300h_firmwarexeon_w-11155mre_firmwarecore_i7-12800h_firmwarecore_i5-11600_firmwarecore_i7-12650hxeon_d-1622_firmwarexeon_d-1527_firmwarexeon_d-1531_firmwarexeon_d-1633n_firmwareceleron_n4020_firmwarexeon_w-11865mrexeon_d-1513n_firmwarecore_i5-11600kxeon_d-2798nx_firmwarecore_i5-1030g4_firmwarexeon_e-2378core_i3-1115g4exeon_d-1747nte_firmwarexeon_d-1726_firmwareatom_x5-a3940xeon_e-2386g_firmwareceleron_n4505xeon_d-2191_firmwarexeon_d-2146nt_firmwareatom_c5325_firmwarexeon_d-1518_firmwareatom_c5115_firmwarecore_i9-12900k_firmwareatom_c3558rccore_i3-1120g4_firmwareatom_c3308xeon_d-1715ter_firmwarexeon_d-2745nx_firmwarecore_i5-1230uxeon_w-11155mrecore_i5-1140g7_firmwareceleron_j3455ecore_i3-12300_firmwareceleron_n4020core_i3-1215ucore_i5-11400tcore_i7-11700kxeon_w-1350_firmwarexeon_platinum_8300_firmwareatom_c3558rc_firmwareatom_c5320_firmwarexeon_d-1577_firmwarexeon_e-2334_firmwareceleron_j4105xeon_d-1748teatom_c3830_firmwarecore_i9-12900t_firmwarecore_i3-l13g4_firmwarecore_i5-12400t_firmwarexeon_d-2187ntxeon_d-2775teceleron_n4100_firmwarexeon_d-1518core_i7-1065g7core_i5-11600kf_firmwarexeon_w-1370p_firmwarepentium_gold_g7400tcore_i3-1000g1core_i5-1130g7_firmwareatom_x5-a3930_firmwarepentium_gold_7505_firmwarecore_i9-11900h_firmwareceleron_j3355exeon_e-2356g_firmwarecore_i3-1220pcore_i5-12400tcore_i7-12700tatom_x5-e3930_firmwarexeon_d-1718tatom_p5731_firmwarecore_i5-1135g7_firmwarecore_i9-11950h_firmwarexeon_d-2753nt_firmwarecore_i7-1265u_firmwareceleron_7300xeon_w-1350p_firmwareatom_x5-a3960core_i3-1115g4_firmwarexeon_d-1533ncore_i5-1145grexeon_d-1529_firmwarecore_i5-11600k_firmwareceleron_j3355core_i5-1135g7xeon_d-1712trcore_i3-1115g4xeon_e-2378_firmwarexeon_d-1736_firmwarexeon_d-2173itceleron_j3355e_firmwarexeon_d-2161ixeon_d-2766ntcore_i5-1155g7pentium_gold_8505xeon_d-2123itxeon_d-1714_firmwarecore_i5-1245u_firmwarecore_i7-11700kf_firmwareatom_p5332_firmwareceleron_j3455core_i9-12900hk_firmwarecore_i7-12700fcore_i3-1110g4atom_c3558r_firmwarecore_i3-12100fcore_i7-1250u_firmwarepentium_silver_n6000_firmwarexeon_d-1722necore_i5-1235u_firmwarexeon_d-2776ntxeon_d-2161i_firmwareatom_x6425e_firmwarecore_i7-1260pceleron_n4000_firmwareatom_c3758_firmwarexeon_e-2388gcore_i7-11390hxeon_d-2786ntexeon_d-1537_firmwarepentium_n6415_firmwarexeon_d-2796te_firmwarexeon_d-2191xeon_d-1612core_i9-12900fxeon_d-1540_firmwareatom_c3808_firmwareceleron_g6900tpentium_silver_n6005core_i9-11980hkatom_p5931bxeon_d-1553n_firmwarecore_i5-l16g7_firmwarecore_i7-12700f_firmwarecore_i7-12700_firmwarecore_i5-11500core_i7-11700xeon_d-2798ntatom_x6425re_firmwarecore_i7-1265ucore_i3-12300xeon_d-1736atom_c3858_firmwarexeon_d-2738xeon_d-1567_firmwareatom_p5742_firmwareatom_c3338core_i5-11500t_firmwarexeon_e-2388g_firmwarexeon_d-1749ntatom_x7-e3950core_i3-12300txeon_e-2336xeon_d-1627atom_c3708_firmwarecore_i5-12450h_firmwarecore_i5-11600t_firmwarecore_i5-1240uceleron_7305xeon_d-1623n_firmwarecore_i7-11370hxeon_w-1300xeon_d-1702xeon_d-1722ne_firmwarecore_i5-12500_firmwarexeon_d-1528_firmwarecore_i5-1035g4core_i5-l16g7core_i5-11500hcore_i9-12900kcore_i5-11600tatom_c3308_firmwarexeon_d-1732te_firmwarepentium_silver_n5030xeon_d-1529atom_p5322_firmwarecore_i3-1210u_firmwareceleron_n4000atom_p5362_firmwarecore_i7-1160g7core_i5-12600kfxeon_e-2324g_firmwarecore_i5-1035g7_firmwareatom_x5-a3950_firmwarexeon_d-1564n_firmwarecore_i3-12100t_firmwarecore_i9-12900kfxeon_d-1714xeon_d-1567atom_x5-a3940_firmwareatom_c3538_firmwarepentium_silver_n5000_firmwareatom_x5-e3940_firmwareceleron_j4005pentium_silver_n5000core_i7-11850he_firmwarexeon_d-2141ixeon_d-1581_firmwarexeon_d-2141i_firmwareceleron_6305e_firmwareatom_x6211e_firmwarecore_i5-1245uxeon_d-2776nt_firmwarecore_i5-1035g7xeon_d-1734ntatom_p5921b_firmwareceleron_n3350xeon_w-11855matom_p5962bxeon_w-1390core_i7-11700t_firmwarecore_i3-1115grecore_i5-11600core_i7-11700fxeon_d-1587atom_x6212receleron_n5105core_i7-1270pxeon_d-2183itxeon_d-2123it_firmwarecore_i5-12500t_firmwarexeon_w-1370_firmwarexeon_d-1649n_firmwarexeon_d-1524nxeon_d-2712tpentium_silver_n6005_firmwareceleron_n3350_firmwarecore_i5-1240u_firmwarecore_i9-12900f_firmwarexeon_d-1523ncore_i3-1005g1_firmwarecore_i3-12100_firmwarecore_i5-12600kf_firmwareatom_c3958atom_x6425eatom_c3338rxeon_d-1520core_i5-1145g7e_firmwarexeon_d-2187nt_firmwarexeon_d-1524n_firmwarexeon_w-1390p_firmwareatom_c5310_firmwarexeon_w-11955m_firmwareatom_p5942bcore_i7-12700h_firmwarecore_i7-1280p_firmwarexeon_d-1543nxeon_d-1541xeon_d-1543n_firmwareatom_c3750_firmwarexeon_d-2799_firmwarecore_i7-11700txeon_d-1564nxeon_d-1622xeon_d-1732texeon_d-1520_firmwareatom_x5-a3950celeron_7300_firmwarecore_i5-1030g7_firmwarepentium_gold_g7400t_firmwarecore_i7-1185g7e_firmwareatom_c3955core_i9-11900tatom_p5731core_i5-11260h_firmwareatom_c3758r_firmwareceleron_n4120_firmwarepentium_silver_j5005_firmwarecore_i7-1060g7atom_x6427fepentium_j4205_firmwarexeon_w-11855m_firmwarexeon_gold_6300core_i5-11400t_firmwarexeon_d-1587_firmwareatom_c3558xeon_d-2796ntxeon_e-2336_firmwarexeon_d-1713nteceleron_n3350e_firmwarexeon_d-1739celeron_6305eatom_x6427fe_firmwarecore_i5-11320hxeon_d-1577atom_c3958_firmwarexeon_d-1735trxeon_d-2766nt_firmwarexeon_d-2757nxxeon_w-11555mre_firmwarexeon_e-2314xeon_d-2166ntxeon_w-1390pxeon_d-1539core_i5-1250p_firmwarexeon_silver_4300_firmwarecore_i3-12100atom_c5125xeon_d-1746ter_firmwarexeon_w-11865mle_firmwarexeon_d-1581xeon_platinum_8300core_i3-1000g4_firmwarecore_i7-1165g7_firmwarepentium_n4200xeon_d-1627_firmwarexeon_d-1702_firmwarexeon_d-1733ntcore_i5-12400f_firmwarecore_i7-11700f_firmwareatom_c3850_firmwarexeon_d-1653n_firmwarecore_i3-1125g4_firmwareatom_c3950_firmwarecore_i3-1125g4xeon_d-1553nceleron_j3455e_firmwareceleron_n3450core_i5-1030g4xeon_e-2378gxeon_d-2798nt_firmwarexeon_d-1573ncore_i5-12600kxeon_d-1632xeon_d-2166nt_firmwarecore_i7-12800hceleron_g6900t_firmwarexeon_w-11155mle_firmwarexeon_d-1746terxeon_d-1571core_i3-1115g4e_firmwareatom_c3758rxeon_d-2738_firmwareatom_c3338r_firmwarepentium_silver_j5005Intel(R) Processors
CVE-2022-37409
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.08% / 25.44%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-27 Jan, 2025 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management for the Intel(R) IPP Cryptography software before version 2021.6 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-integrated_performance_primitives_cryptographyIntel(R) IPP Cryptography software
CWE ID-CWE-691
Insufficient Control Flow Management
CVE-2022-37327
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.05% / 14.27%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-27 Jan, 2025 | 18:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in BIOS firmware for Intel(R) NUC, Intel(R) NUC Performance Kit, Intel(R) NUC Performance Mini PC, Intel(R) NUC 8 Compute Element, Intel(R) NUC Pro Kit, Intel(R) NUC Pro Board, Intel(R) NUC 11 Compute Element, Intel(R) NUC 12 Compute Element, Intel(R) NUC Extreme, Intel(R) NUC 12 Extreme Compute Element, Intel(R) NUC Laptop Kit, Intel(R) NUC Enthusiast, Intel(R) NUC Essential, Intel(R) NUC Laptop Kit, Intel(R) NUC Extreme Compute Element, Intel(R) NUC Boards, Intel(R) NUC Pro Compute Element, Intel(R) NUC Rugged may allow a privileged user to enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-laprc510_firmwarenuc10i7fnhaa_firmwarecm8i3cb4nnuc12wski7nuc10i7fnk_firmwarenuc12wshi5elm12hbcnuc11tnhi3elm12hbc_firmwarenuc8cchbnuc11tnbi3elm12hbi5nuc11tnhi50z_firmwarenuc10i3fnhfnuc10i5fnhnnuc11tnki3_firmwarelapkc71f_firmwarenuc9vxqnx_firmwarenuc12wshi50z_firmwarenuc10i7fnhcnuc11tnbi5_firmwarenuc10i5fnknuc8i3pnh_firmwarenuc10i3fnkn_firmwarenuc11tnhi70qnuc11tnhi50w_firmwarenuc8cchkrn_firmwarenuc10i3fnhnuc11tnbi50z_firmwarelaprc710nuc10i5fnhjnuc10i3fnklapac71gnuc11atkpenuc11tnki70z_firmwarenuc9v7qnx_firmwarenuc12wski7_firmwarenuc12wsbi50z_firmwarenuc9vxqnxnuc11atkc4nuc11tnhi70z_firmwarenuc11atkpe_firmwarenuc10i5fnkpanuc10i3fnk_firmwarenuc10i5fnh_firmwarenuc12wski70znuc11tnhi50znuc12wsbi70zcm8i3cb4n_firmwarenuc10i3fnhnnuc8cchb_firmwarenuc11tnhi50lcm8ccb4r_firmwarenuc11tnki7nuc12wshi3_firmwarenuc11tnki30z_firmwarecm11ebc4w_firmwarenuc9vxqnbnuc11atkc4_firmwarelapbc710cm11ebi58w_firmwarecm11ebc4wnuc11btmi9nuc11tnbi70znuc12edbi7_firmwarenuc11tnhi3_firmwarenuc12wshi70zelm12hbi3_firmwarenuc11tnki7_firmwarenuc11tnbi5laprc710_firmwarenuc12wshi50znuc11tnhi70l_firmwarenuc11tnbi30z_firmwarenuc12wshi3nuc10i3fnhfanuc10i5fnhj_firmwarenuc10i7fnkn_firmwarenuc12wsbi3_firmwarenuc12wshi30lnuc12wshi30z_firmwarenuc12snki72vanuc11tnhi5nuc8cchkrnnuc10i7fnknnuc12wsbi70z_firmwarenuc12wski70z_firmwarenuc11atbc4_firmwarenuc12wsbi30znuc8i3pnb_firmwarenuc8i3pnbnuc12wsbi3nuc8cchkrnuc10i3fnhfa_firmwarenuc12wshi7cm11ebi38w_firmwarenuc11tnhi70lnuc10i5fnhf_firmwarenuc8i3pnhnuc11tnbi3_firmwareelm12hbi5_firmwarenuc10i5fnk_firmwarenuc11tnki50znuc11tnki70znuc8cchbnnuc11tnbi50znuc10i7fnknuc12dcmi7nuc11tnhi30p_firmwarenuc10i7fnhn_firmwarenuc11tnhi30llapbc710_firmwarelapkc51enuc8cchkr_firmwarenuc10i3fnhn_firmwarecm8ccb4rnuc10i5fnkn_firmwarelapkc71e_firmwareelm12hbi7_firmwarenuc12wski30znuc10i3fnhjanuc10i5fnhjanuc10i7fnhja_firmwarenuc12wsbi30z_firmwarecm8i5cb8nnuc12wshi5_firmwarenuc12wski5_firmwarenuc11atbc4nuc11dbbi7_firmwarenuc9vxqnb_firmwarenuc9v7qnbcm8pcb4r_firmwarenuc10i7fnhc_firmwarenuc8i3pnk_firmwarenuc12snki72va_firmwarelapbc510nuc10i3fnhja_firmwarenuc12edbi7lapac71h_firmwarenuc12wsbi50znuc11tnki50z_firmwarenuc11dbbi7cm8i5cb8n_firmwarenuc12dcmi9_firmwarenuc12wski5elm12hbi7lapac71hnuc10i5fnhja_firmwarenuc10i7fnkpanuc10i7fnh_firmwarenuc12wski50z_firmwarenuc11tnbi7nuc10i5fnkpnuc10i7fnhnnuc12wski3_firmwarecm8pcb4rnuc10i5fnkpa_firmwarenuc11dbbi9nuc11phki7caa_firmwarenuc8i3pnknuc11tnki5_firmwarenuc11tnbi30znuc12snki72_firmwareelm12hbi3nuc11tnki30zcm8i7cb8n_firmwarelaprc510cm11ebi38wnuc12wshi70z_firmwarenuc10i7fnhjacm8i7cb8nnuc12wsbi5_firmwarenuc10i7fnkpa_firmwarenuc12wski3nuc11tnbi7_firmwarenuc11tnhi70znuc12wshi30l_firmwarenuc12dcmi9nuc11tnhi5_firmwarenuc11tnbi70z_firmwarelapkc71flapkc51e_firmwarenuc11tnhi30pnuc11tnhi70q_firmwarecm11ebi716wnuc11tnki5nuc9v7qnb_firmwarenuc10i5fnhfnuc8cchbn_firmwarenuc11atkc2_firmwarelapbc510_firmwarenuc12snki72nuc12edbi9_firmwarenuc11phki7c_firmwarenuc11tnhi50wnuc11tnhi7cm11ebi716w_firmwarenuc10i5fnhnuc12edbi9nuc12wsbi5nuc10i5fnhca_firmwarenuc10i5fnkncm11ebi58wnuc11dbbi9_firmwarenuc11atkc2nuc11tnhi30znuc10i5fnkp_firmwarenuc10i7fnhnuc11tnhi50l_firmwarenuc9v7qnxlapac71g_firmwarenuc12dcmi7_firmwarenuc10i3fnknnuc10i7fnhaalapkc71enuc10i5fnhn_firmwarenuc11phki7cnuc12wski30z_firmwarenuc11tnhi30l_firmwarenuc10i7fnkpnuc12wski50znuc11tnhi7_firmwarenuc12wshi30znuc11tnki3nuc10i3fnhf_firmwarenuc10i7fnkp_firmwarenuc11btmi7_firmwarenuc11phki7caanuc10i5fnhcanuc10i3fnh_firmwarenuc11btmi9_firmwarenuc11tnhi30z_firmwarenuc12wshi7_firmwarenuc11btmi7Intel(R) NUC, Intel(R) NUC Performance Kit, Intel(R) NUC Performance Mini PC, Intel(R) NUC 8 Compute Element, Intel(R) NUC Pro Kit, Intel(R) NUC Pro Board, Intel(R) NUC 11 Compute Element, Intel(R) NUC 12 Compute Element, Intel(R) NUC Extreme, Intel(R) NUC 12 Extreme Compute Element, Intel(R) NUC Laptop Kit, Intel(R) NUC Enthusiast, Intel(R) NUC Essential, Intel(R) NUC Laptop Kit, Intel(R) NUC Extreme Compute Element, Intel(R) NUC Boards, Intel(R) NUC Pro Compute Element, Intel(R) NUC Rugged
CWE ID-CWE-20
Improper Input Validation
CVE-2022-38087
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.1||MEDIUM
EPSS-0.03% / 8.46%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Exposure of resource to wrong sphere in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_platinum_8153xeon_d-2796texeon_w-10885m_firmwarexeon_w-1350_firmwarecore_i3-9100_firmwarexeon_w-3245mxeon_bronze_3104_firmwarexeon_gold_6146xeon_e-2378gcore_i7-1068ng7xeon_gold_6126f_firmwarexeon_d-2738core_i5-1035g7core_i3-10105f_firmwarexeon_platinum_8168_firmwarecore_i3-8350k_firmwarexeon_silver_4108_firmwarecore_i3-9350k_firmwarexeon_e-2124g_firmwarexeon_d-1527core_i7-9700kfxeon_gold_5115xeon_d-2766ntcore_i5-8305g_firmwarecore_i5-7500_firmwarexeon_e-2314xeon_gold_6136xeon_gold_6138f_firmwarexeon_e-2254me_firmwarecore_i7-10870h_firmwarecore_i5-8400hxeon_w-2125xeon_platinum_8170xeon_e-2276me_firmwarecore_i5-7y54xeon_gold_6138xeon_d-2163it_firmwarecore_i7-1060g7_firmwarexeon_platinum_8164core_i7-9700xeon_d-1521_firmwarecore_i5-10200hxeon_e-2226gcore_i9-9900kfxeon_w-1250p_firmwarexeon_silver_4116t_firmwarecore_i3-10100f_firmwarexeon_d-2766nt_firmwarexeon_d-2775te_firmwarexeon_d-1557_firmwarecore_i5-1035g4xeon_w-2255core_i5-10400hcore_i3-8145ucore_i7-10700k_firmwarexeon_d-1518xeon_w-11555mlexeon_e-2276m_firmwarecore_i5-9600_firmwarecore_i5-9600t_firmwarexeon_d-1714core_i3-10100ycore_i3-7020uxeon_d-2799_firmwarecore_i7-9700tecore_i5-10400tcore_i3-8109uxeon_platinum_8168core_i5-10310ucore_i7-7600ucore_i5-9400f_firmwarexeon_e-2224xeon_d-1734nt_firmwarexeon_e-2186m_firmwarecore_i5-7y57_firmwarecore_i7-10700t_firmwarecore_i7-9700f_firmwarecore_i5-9500e_firmwarecore_i3-7100e_firmwarecore_i3-7100ecore_i3-7300xeon_d-1567_firmwarexeon_e-2378xeon_d-1567core_i5-8269u_firmwarexeon_e-2278gexeon_gold_6138t_firmwarexeon_e-2134_firmwarexeon_silver_4116_firmwarexeon_d-2173it_firmwarecore_i5-10600_firmwarexeon_w-2245core_i3-9100hlxeon_gold_5122xeon_platinum_8180_firmwarexeon_d-1746terxeon_w-3335_firmwarexeon_gold_6126_firmwarecore_i5-10400core_i7-7600u_firmwarecore_i5-8400bcore_i3-9300t_firmwarecore_i7-10610u_firmwarecore_i7-10710u_firmwarecore_i5-10500tecore_i7-7820hkxeon_w-1250e_firmwarexeon_w-1250te_firmwarecore_i5-9500_firmwarexeon_w-3335xeon_w-1290tcore_i5-8400h_firmwarexeon_w-11155mre_firmwarecore_i3-9100texeon_gold_6150_firmwarecore_i7-9700fcore_i9-10980hkxeon_platinum_8156xeon_w-3345_firmwarecore_i5-8600xeon_e-2136core_i7-10510ucore_i7-9700kcore_i5-10400t_firmwarecore_i5-9400_firmwarexeon_bronze_3106_firmwarecore_i7-8500y_firmwarexeon_gold_6138_firmwarexeon_d-2177nt_firmwarexeon_d-1533n_firmwarecore_i3-10100ecore_i3-8100core_i7-1060g7xeon_w-2265core_i9-10900xeon_w-10855mxeon_w-2245_firmwarexeon_w-1390p_firmwarexeon_w-10855m_firmwarexeon_e-2374g_firmwarexeon_gold_6126fcore_i3-7300_firmwarexeon_d-1712trxeon_d-1539core_i3-10100txeon_w-3375_firmwarexeon_silver_4109t_firmwarexeon_w-1390t_firmwarexeon_d-1713ntexeon_w-11555mrecore_i5-7287u_firmwarecore_i7-7700xeon_d-2752ter_firmwarexeon_silver_4114_firmwarexeon_d-2733nt_firmwarexeon_e-2386gcore_i9-10900kcore_i3-10325_firmwarecore_i7-7820hq_firmwarecore_i3-7102ecore_i7-7920hq_firmwarexeon_d-2146ntcore_i5-8600kxeon_platinum_8160fxeon_d-1577_firmwarecore_i7-10700te_firmwarexeon_e-2124_firmwarecore_i9-10900fcore_i7-8700k_firmwarexeon_platinum_p-8136xeon_w-2223_firmwarecore_i7-8700_firmwarecore_i7-8750hcore_i3-10105t_firmwarecore_i5-8365uxeon_e-2226ge_firmwarexeon_d-2187ntcore_i5-9600kfcore_i5-8500b_firmwarexeon_d-1732tecore_i3-10100tecore_i3-7100u_firmwarecore_i5-10400_firmwarecore_i5-7600xeon_w-3265_firmwarexeon_platinum_8158_firmwarecore_i7-10700fxeon_gold_5120_firmwarexeon_d-2776nt_firmwarexeon_e-2286mcore_i5-1030g4_firmwarecore_i7-9850he_firmwarecore_i7-8557u_firmwarexeon_w-1270te_firmwarexeon_d-1732te_firmwarexeon_d-2166ntcore_i7-1068ng7_firmwarecore_i7-10750hxeon_silver_4114t_firmwarexeon_w-2195core_i7-7820eq_firmwarexeon_gold_6134_firmwarexeon_e-2276gxeon_w-1290p_firmwarecore_i3-8300xeon_w-1390core_i3-1000g4xeon_e-2186gxeon_w-3235_firmwarecore_i5-7267u_firmwarecore_i5-7400txeon_gold_6130t_firmwarexeon_silver_4116txeon_d-2183itxeon_w-3365_firmwarexeon_e-2174gxeon_d-1622core_i3-7100core_i7-8809gcore_i3-8145uecore_i5-10400h_firmwarecore_i5-7260ucore_i7-8700bxeon_w-2145_firmwarexeon_d-2145ntcore_i5-10500_firmwarecore_i7-7500u_firmwarexeon_gold_6126t_firmwarecore_i5-7267uxeon_w-1250pxeon_e-2334_firmwarecore_i5-10210ycore_i7-7820hk_firmwarecore_i5-10500ecore_i9-9900kf_firmwarecore_i5-9400txeon_w-2123xeon_w-3275mcore_i5-10210u_firmwarecore_i5-9500fcore_i5-8300hcore_i5-8600t_firmwarexeon_gold_5119t_firmwarecore_i5-10600txeon_d-1736xeon_e-2356gcore_i7-9850hecore_i3-10110yxeon_d-1513n_firmwarecore_i5-10600kfcore_i3-7300t_firmwarexeon_gold_6142_firmwarecore_i7-10700exeon_silver_4108xeon_gold_6130tcore_i5-10500h_firmwarecore_i9-9900kscore_i5-9600core_i7-10870hxeon_w-11555mre_firmwarecore_i5-7300u_firmwarecore_i5-8600_firmwarecore_i3-9100fcore_i5-9600kf_firmwarexeon_bronze_3106xeon_e-2224_firmwarecore_i7-9750hfcore_i5-9300h_firmwarexeon_e-2274gcore_i7-10700kxeon_d-2786nte_firmwarecore_i5-9500core_i3-9320_firmwarexeon_e-2278gelcore_i3-8145ue_firmwarexeon_d-1540core_i5-10500te_firmwarecore_i5-8400b_firmwarexeon_platinum_8160tcore_i3-8100_firmwarexeon_d-1528xeon_d-1715ter_firmwarexeon_e-2124core_i9-9880hcore_i7-10710ucore_i5-7287ucore_i7-10700kfcore_i5-8500t_firmwarexeon_w-1350p_firmwarexeon_d-2141ixeon_d-1541core_i3-7100h_firmwarexeon_w-1250tecore_i5-8300h_firmwarexeon_d-1633n_firmwarexeon_e-2136_firmwarexeon_e-2276g_firmwarexeon_e-2276mecore_i7-8565uxeon_d-1747nte_firmwarecore_m3-7y32_firmwarecore_i5-7300hq_firmwarexeon_e-2274g_firmwarecore_i3-10300_firmwarecore_i5-7300hqcore_i7-7560ucore_i7-8706g_firmwarexeon_w-2133_firmwarecore_i5-7400t_firmwarexeon_d-1548core_i3-8100t_firmwarecore_i5-8259uxeon_d-1649nxeon_d-1529xeon_w-11955m_firmwarecore_i9-9900core_i7-10510y_firmwarexeon_w-1250_firmwarecore_i3-10100e_firmwarecore_i7-9850hl_firmwarexeon_platinum_8160xeon_gold_5115_firmwarexeon_w-3265m_firmwarexeon_platinum_8156_firmwarexeon_w-11555mle_firmwarexeon_w-11865mle_firmwarexeon_e-2146g_firmwarecore_i7-8850h_firmwarexeon_gold_5118_firmwarecore_i5-1038ng7_firmwarecore_i3-8140uxeon_d-2738_firmwarexeon_e-2336xeon_e-2388gcore_i7-9700kf_firmwarexeon_w-2225_firmwarecore_i3-10105core_i7-9850h_firmwarexeon_gold_6146_firmwarexeon_d-1713ntcore_i3-10100te_firmwarexeon_gold_6148fxeon_gold_6132xeon_d-2752terxeon_d-2799core_i3-7100_firmwarecore_i5-7600txeon_d-2795ntcore_i9-10900k_firmwarexeon_w-1270_firmwarexeon_w-2155xeon_e-2278g_firmwarecore_i7-7500ucore_i7-8550uxeon_e-2276ml_firmwarexeon_d-1736ntxeon_e-2224gxeon_w-2135core_i3-9100txeon_platinum_8160_firmwarexeon_d-2798nt_firmwarexeon_d-1623nxeon_w-2145core_i5-8310y_firmwarexeon_e-2226gecore_i3-10300t_firmwarexeon_gold_6142core_i5-9300hxeon_w-3323_firmwarexeon_gold_6148_firmwarecore_i9-10900_firmwarecore_i3-7167u_firmwarecore_i7-8559u_firmwarexeon_d-1722necore_i7-8086k_firmwarexeon_d-1718t_firmwarecore_i7-10610ucore_i5-10505_firmwarecore_i5-1035g1_firmwarecore_i7-8665u_firmwarexeon_e-2176g_firmwarecore_i3-7167uxeon_d-1622_firmwarecore_i5-9400hcore_i7-8500ycore_i7-7567ucore_i9-9900txeon_w-2295_firmwarecore_i3-8145u_firmwarexeon_d-2796nt_firmwarexeon_w-1390pxeon_d-1749nt_firmwarecore_i7-9700e_firmwarexeon_d-2161ixeon_platinum_8164_firmwarecore_i5-10300h_firmwarexeon_d-2141i_firmwarecore_i7-7660u_firmwarecore_i7-7820hqcore_i5-8210ycore_i7-8750h_firmwarecore_i5-10200h_firmwarecore_i3-7300tcore_i5-7400_firmwarecore_i3-8109u_firmwarecore_i3-8300t_firmwarecore_i7-9700k_firmwarexeon_e-2288g_firmwarecore_i3-9100f_firmwarecore_i5-7y54_firmwarexeon_e-2246g_firmwarexeon_e-2176m_firmwarexeon_e-2174g_firmwarecore_i3-10300tcore_i3-7101ecore_i3-8100b_firmwarexeon_d-1513nxeon_d-1537xeon_d-2187nt_firmwarexeon_w-1290tecore_i9-8950hk_firmwarecore_i5-8500xeon_d-1539_firmwarexeon_w-3223core_i5-9500te_firmwarecore_i5-7600_firmwarexeon_gold_6130_firmwarexeon_w-3275m_firmwarexeon_silver_4112xeon_d-1559xeon_w-3323xeon_gold_5120txeon_w-3175xxeon_w-2235_firmwarexeon_gold_6134core_i5-8265ucore_i7-10700kf_firmwarexeon_e-2254mexeon_w-3235xeon_platinum_8160f_firmwarecore_i7-9750hxeon_e-2336_firmwarecore_i7-7y75xeon_w-2225core_i7-7560u_firmwarexeon_e-2286g_firmwarexeon_w-2133xeon_d-2183it_firmwarecore_i5-7y57xeon_d-2753ntcore_i3-10305tcore_i7-10700_firmwarecore_i3-8350kxeon_gold_6148xeon_d-1557core_i5-7500txeon_gold_6144xeon_d-1736nt_firmwarecore_i5-9600k_firmwarecore_i9-9900t_firmwarecore_i3-9100xeon_d-1726xeon_e-2224g_firmwarexeon_d-1553n_firmwarexeon_gold_6128_firmwarexeon_w-2223xeon_platinum_8170_firmwarexeon_e-2276mcore_i7-7700kcore_i7-8705gcore_i5-9500ecore_i7-8665ucore_i3-8300tcore_i7-7660uxeon_d-1627_firmwarecore_i7-8706gxeon_gold_6126txeon_gold_6140_firmwarexeon_w-3225xeon_e-2236core_i9-9880h_firmwarexeon_w-1370core_i7-10850hxeon_e-2236_firmwarecore_i7-8700t_firmwarexeon_e-2126g_firmwarecore_i7-8700core_i5-10400fcore_i5-8259u_firmwarecore_i7-8665ue_firmwarexeon_w-2155_firmwarecore_i3-7130u_firmwarexeon_w-1290te_firmwarecore_i5-8400core_i7-8705g_firmwarexeon_d-1746ter_firmwarecore_i9-10900te_firmwarecore_i3-10300core_i7-7700tcore_i7-10700tcore_i3-7100txeon_w-3225_firmwarecore_i7-8086kcore_i5-10210ucore_i5-7260u_firmwarexeon_w-2295xeon_d-2776ntxeon_d-1527_firmwarexeon_d-2798ntcore_i5-7600k_firmwarexeon_d-1733ntcore_i5-8257ucore_i5-8365ue_firmwarecore_i7-8700kxeon_w-3245m_firmwarecore_i5-7200u_firmwarecore_i5-8600k_firmwarecore_i7-10510u_firmwarecore_i5-7442eqxeon_e-2134xeon_platinum_p-8136_firmwarexeon_e-2226g_firmwarexeon_d-2143itxeon_d-2163itcore_i3-10100_firmwarecore_i5-10505xeon_d-2161i_firmwarexeon_d-2779_firmwarecore_i5-1030g7xeon_w-1390txeon_w-1270core_i5-7442eq_firmwarecore_i5-10310y_firmwarecore_i7-8569u_firmwarecore_i7\+8700_firmwarexeon_e-2144g_firmwarexeon_silver_4109tcore_i3-1000g1core_i7-10510yxeon_gold_5122_firmwarecore_i5-7360u_firmwarecore_i5-10600kf_firmwarecore_i3-10110ucore_i5-8210y_firmwarexeon_w-2275_firmwarexeon_gold_6138fcore_i3-9100e_firmwarexeon_gold_6132_firmwarexeon_gold_6136_firmwarecore_i5-9600kcore_i3-10305t_firmwarecore_i5-10310u_firmwarexeon_d-1531_firmwarecore_i7-7700hqxeon_w-1270texeon_silver_4114xeon_d-2123it_firmwarecore_i9-10900f_firmwarecore_i3-9100hl_firmwarecore_i3-10105fcore_i3-8100hcore_i3-9100t_firmwarexeon_d-1715terxeon_e-2386g_firmwarexeon_bronze_3104core_i5-10300hxeon_d-1571xeon_d-1736_firmwarecore_i5-8350uxeon_w-11865mlecore_i3-1005g1_firmwarecore_i5-7300uxeon_w-3223_firmwarexeon_d-2173itxeon_w-11855mxeon_d-2123itxeon_e-2246gcore_i5-8500tcore_i3-10100y_firmwarexeon_w-3265mcore_i5-7500xeon_d-1627xeon_d-2796ntxeon_w-2255_firmwarexeon_gold_6144_firmwarexeon_d-2779xeon_d-1602core_i5-7200ucore_i5-8350u_firmwarexeon_d-2796te_firmwarecore_i7-8700b_firmwarexeon_platinum_p-8124core_i9-8950hkxeon_gold_6150core_i9-10900ecore_i9-10850kxeon_gold_6140xeon_d-1649n_firmwarecore_i7-7920hqcore_i5-9300hf_firmwarexeon_e-2314_firmwarexeon_e-2254mlcore_i9-9900ks_firmwarecore_i3-9300_firmwarecore_i5-8400txeon_w-2123_firmwarexeon_gold_6148f_firmwarexeon_d-2145nt_firmwarexeon_w-1270pcore_i7-10700xeon_d-1726_firmwarecore_i3-9100te_firmwarexeon_e-2254ml_firmwarexeon_w-1290_firmwarexeon_d-2712txeon_d-1537_firmwarecore_i7-10750h_firmwarexeon_e-2334core_i3-7350k_firmwarexeon_gold_6126xeon_d-1541_firmwarexeon_w-1290e_firmwarecore_i3-10105tcore_i9-10885hxeon_w-1250exeon_d-2166nt_firmwarexeon_d-2712t_firmwarecore_i3-10325xeon_d-1623n_firmwarexeon_w-3375xeon_platinum_p-8124_firmwarecore_i3-7100hcore_i3-7101te_firmwarexeon_d-1548_firmwarexeon_d-1713nte_firmwarecore_i3-9300xeon_w-3365xeon_e-2276mlcore_i7-10875hxeon_gold_6130f_firmwarexeon_e-2244gcore_i9-9900kcore_i3-9350kf_firmwarexeon_d-1559_firmwarexeon_e-2176gxeon_d-2142itxeon_e-2324gxeon_gold_6142fcore_i7-8709gcore_i3-10100core_i7-7y75_firmwarecore_i5-8200y_firmwarecore_i7-8550u_firmwarecore_i5-1035g7_firmwarexeon_platinum_8153_firmwarexeon_gold_6130core_i7-10700f_firmwarexeon_d-1529_firmwarexeon_d-1540_firmwarexeon_d-1637_firmwarecore_i5-9400core_m3-8100y_firmwarecore_i3-8100txeon_d-1733nt_firmwarexeon_d-2733ntxeon_platinum_8160t_firmwarecore_i7-8557uxeon_d-2142it_firmwarexeon_e-2278ge_firmwarecore_i5-9500tcore_i5-7500t_firmwarecore_i3-10305_firmwarecore_i7-8700tcore_i5-8260u_firmwarexeon_d-2143it_firmwarecore_m3-7y32xeon_d-1735trcore_i5-7400xeon_d-2795nt_firmwarexeon_silver_4110core_i7-8650uxeon_d-2752ntexeon_d-1523n_firmwarecore_i3-7102e_firmwarexeon_d-2753nt_firmwarecore_m3-7y30_firmwarecore_i9-10900e_firmwarexeon_gold_5119txeon_e-2286m_firmwarecore_i3-7320xeon_e-2378g_firmwarecore_i7-9750h_firmwarexeon_w-1390_firmwarexeon_w-11865mrexeon_e-2234_firmwarecore_i5-1035g1core_i5-1038ng7xeon_w-3265core_i7-8565u_firmwarexeon_w-3245xeon_gold_6138tcore_i7-10700e_firmwarexeon_d-1718txeon_e-2186g_firmwarecore_i5-1035g4_firmwarecore_i3-10110y_firmwarexeon_gold_5120xeon_e-2124gcore_i5-7600t_firmwarecore_i5-8500bxeon_d-1523ncore_i5-8269ucore_i5-7440hq_firmwarecore_i5-1030g4xeon_d-2786ntecore_i7-10700texeon_e-2288gcore_i3-9100exeon_gold_6154_firmwarexeon_d-1653nxeon_e-2234core_i5-10500core_i7-8709g_firmwarexeon_d-1637xeon_d-1577xeon_e-2356g_firmwarexeon_silver_4114tcore_i7-9850hcore_i5-9400fcore_i7-9700t_firmwarexeon_platinum_8176_firmwarexeon_gold_6154core_i5-10500e_firmwarecore_i5-7440eqxeon_d-1543n_firmwarexeon_w-1250xeon_w-1270p_firmwarexeon_w-2195_firmwarecore_i5-8279ucore_i5-8279u_firmwarecore_i3-8130u_firmwarecore_i5-9500f_firmwarexeon_d-1722ne_firmwarecore_i5-10600t_firmwarecore_i5-9300hfcore_i3-7100uxeon_w-1290exeon_gold_5120t_firmwarecore_i5-10210y_firmwarexeon_d-1747ntexeon_d-1653n_firmwarecore_i3-7101tecore_i3-7350kxeon_d-1734ntxeon_w-2265_firmwarexeon_w-3275xeon_d-1735tr_firmwarecore_i5-7600kxeon_d-1553ncore_i5-8250ucore_i3-10305core_i3-8140u_firmwarecore_i3-1000g4_firmwarexeon_e-2126gxeon_d-1571_firmwarecore_i7-9700txeon_w-1270exeon_silver_4116xeon_d-1633ncore_i3-7100t_firmwarexeon_w-1370p_firmwarecore_i7-7820eqcore_i7-9850hlcore_i5-7360uxeon_w-1290t_firmwarecore_i7-8650u_firmwarexeon_w-3245_firmwarecore_i5-10600kxeon_d-1518_firmwarecore_i3-9350kfxeon_e-2388g_firmwarexeon_w-1370pcore_i9-9900k_firmwarecore_i7-7700k_firmwarecore_m3-8100yxeon_w-2135_firmwarecore_i9-10900kfcore_i5-8250u_firmwarexeon_w-11155mrexeon_e-2186mcore_i7-9700ecore_i7-7567u_firmwarecore_i3-7320_firmwarecore_i5-8400_firmwarexeon_gold_6152_firmwarexeon_platinum_8176f_firmwarexeon_d-1520xeon_e-2176mcore_i7-7700hq_firmwarexeon_d-2146nt_firmwarexeon_gold_6152xeon_platinum_8158core_i5-7440eq_firmwarecore_i3-1000g1_firmwarecore_i5-10600k_firmwarecore_i7-9750hf_firmwarecore_i5-10310ycore_i5-8400t_firmwarexeon_w-1290pxeon_d-1739_firmwarexeon_e-2286gxeon_w-2125_firmwarexeon_d-1713nt_firmwarexeon_w-11155mlexeon_d-1520_firmwarecore_i5-8365u_firmwarecore_i5-10500hxeon_w-2175_firmwarexeon_platinum_8176core_i5-8260uxeon_silver_4112_firmwarecore_i9-10900t_firmwarecore_i7-10810u_firmwarecore_i3-10100t_firmwarexeon_d-1531core_i3-9300txeon_e-2244g_firmwarecore_i7-10810ucore_i5-10400f_firmwarexeon_e-2278gcore_i3-8100h_firmwarecore_i3-10105_firmwarexeon_w-1370_firmwarexeon_d-1533nxeon_w-1270e_firmwarexeon_w-2235core_i7-10875h_firmwarexeon_w-3175x_firmwarexeon_e-2378_firmwarecore_i7-8850hcore_i5-10500t_firmwarecore_i3-7130uxeon_gold_5118core_i5-8265u_firmwarexeon_gold_6128xeon_w-11955mxeon_gold_6130fxeon_e-2374gcore_i3-10100fcore_i3-8300_firmwarecore_i9-9900_firmwarecore_i7-1065g7_firmwarecore_i5-10600xeon_gold_6142f_firmwarexeon_d-1702_firmwarecore_i7\+8700core_i5-8257u_firmwarecore_i9-10900kf_firmwarecore_m3-7y30core_i3-9350kxeon_w-1350core_i5-8500_firmwarexeon_w-11155mle_firmwarexeon_gold_6138pcore_i9-10850k_firmwarecore_i5-8365uecore_i7-8665uexeon_w-1290xeon_gold_6138p_firmwarecore_i7-8809g_firmwarexeon_platinum_8176fxeon_w-3345core_i9-10885h_firmwarecore_i7-7700t_firmwarecore_i9-9980hk_firmwarexeon_w-10885mxeon_w-3275_firmwarecore_i5-1030g7_firmwarecore_i5-9400h_firmwarecore_i3-10320xeon_d-1748tecore_i9-10900tcore_i5-8200yxeon_w-11855m_firmwarecore_i5-8310yxeon_w-2275xeon_d-2752nte_firmwarexeon_d-1739core_i3-10110u_firmwarexeon_d-1543nxeon_d-1528_firmwarexeon_e-2324g_firmwarexeon_e-2278gel_firmwarecore_i5-9500texeon_e-2144gcore_i5-7440hqxeon_d-1702xeon_d-1521xeon_w-1350pcore_i5-9500t_firmwarecore_i7-8569ucore_i7-9700te_firmwarecore_i7-7700_firmwarexeon_d-1748te_firmwarexeon_d-1749ntcore_i5-10500txeon_d-1712tr_firmwarecore_i3-10320_firmwarecore_i3-1005g1xeon_w-11865mre_firmwarecore_i3-8100bcore_i5-9600tcore_i3-7020u_firmwarecore_i3-7101e_firmwarecore_i3-9320xeon_d-2775texeon_silver_4110_firmwarecore_i7-10850h_firmwarecore_i7-1065g7core_i5-9400t_firmwarecore_i9-9980hkcore_i5-8305gcore_i7-8559ucore_i5-8600txeon_d-1714_firmwarexeon_d-1602_firmwarecore_i9-10900texeon_e-2146gcore_i9-10980hk_firmwarecore_i7-9700_firmwarecore_i3-8130uxeon_platinum_8180xeon_d-2177ntxeon_w-2175Intel(R) Processors
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2022-3560
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 4.23%
||
7 Day CHG~0.00%
Published-02 Feb, 2023 | 00:00
Updated-26 Mar, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in pesign. The pesign package provides a systemd service used to start the pesign daemon. This service unit runs a script to set ACLs for /etc/pki/pesign and /run/pesign directories to grant access privileges to users in the 'pesign' group. However, the script doesn't check for symbolic links. This could allow an attacker to gain access to privileged files and directories via a path traversal attack.

Action-Not Available
Vendor-pesign_projectn/aFedora ProjectRed Hat, Inc.
Product-enterprise_linuxpesignfedorapesign
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2018-12193
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.83%
||
7 Day CHG~0.00%
Published-10 Oct, 2018 | 18:00
Updated-16 Sep, 2024 | 20:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in driver stack for Intel QuickAssist Technology for Linux before version 4.2 may allow an unprivileged user to potentially disclose information via local access.

Action-Not Available
Vendor-Intel Corporation
Product-quickassist_technologyIntel QuickAssit Technology for Linux
CVE-2022-43666
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-3.3||LOW
EPSS-0.10% / 27.48%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Exposure of sensitive system information due to uncleared debug information for some Intel Unison software may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationApple Inc.Google LLCMicrosoft Corporation
Product-androidwindowsunison_softwareiphone_osIntel Unison software
CWE ID-CWE-1258
Exposure of Sensitive System Information Due to Uncleared Debug Information
CVE-2022-21166
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.36% / 57.28%
||
7 Day CHG+0.01%
Published-15 Jun, 2022 | 20:03
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aXen ProjectVMware (Broadcom Inc.)Debian GNU/LinuxIntel CorporationFedora Project
Product-esxidebian_linuxsgx_dcapsgx_pswsgx_sdkfedoraxenIntel(R) Processors
CWE ID-CWE-459
Incomplete Cleanup
CVE-2022-21152
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 19.92%
||
7 Day CHG~0.00%
Published-18 Aug, 2022 | 19:47
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the Intel(R) Edge Insights for Industrial software before version 2.6.1 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-edge_insights_for_industrialIntel(R) Edge Insights for Industrial software
CVE-2022-21125
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.52% / 65.94%
||
7 Day CHG+0.01%
Published-15 Jun, 2022 | 20:01
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aXen ProjectVMware (Broadcom Inc.)Debian GNU/LinuxIntel CorporationFedora Project
Product-esxidebian_linuxsgx_dcapsgx_pswsgx_sdkfedoraxenIntel(R) Processors
CWE ID-CWE-459
Incomplete Cleanup
CVE-2022-42878
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-2.8||LOW
EPSS-0.10% / 27.48%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-27 Jan, 2025 | 18:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Null pointer dereference for some Intel(R) Trace Analyzer and Collector software before version 2021.8.0 published Dec 2022 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-trace_analyzer_and_collectoroneapi_hpc_toolkitIntel(R) Trace Analyzer and Collector software
CWE ID-CWE-395
Use of NullPointerException Catch to Detect NULL Pointer Dereference
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2022-21151
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 12.46%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aNetApp, Inc.Debian GNU/LinuxIntel Corporation
Product-celeron_j3355_firmwareceleron_n2815core_i7-6870hqcore_i3-9100ecore_i7-7700t_firmwarecore_i3-10100core_i7-8850h_firmwarecore_i5-1038ng7core_i3-7300celeron_j4125core_i7-10510yceleron_n3010_firmwarecore_i7-10710u_firmwarecore_i5-7y57_firmwareceleron_n4120core_i9-10900_firmwarecore_i5-6350hqcore_i5-6300u_firmwarecore_i3-6300tceleron_j6412xeon_platinum_8353hcore_i7-9700k_firmwarecore_i5-8500t_firmwarecore_i3-9300t_firmwarecore_i5-9500t_firmwarecore_i7-8709g_firmwarecore_i7-10875h_firmwareceleron_j1900_firmwarecore_i5-7500core_i5-6500tcore_i5-6260uxeon_silver_4314_firmwarecore_i9-9900kf_firmwarecore_i5-7440hqcore_i7-6785r_firmwarecore_i7-8709gcore_i5-10600t_firmwarecore_i5-10300h_firmwarecore_i9-10900tcore_i5-8200ycore_i7-10700tecore_i9-10900kcore_i5-10500t_firmwarecore_i5-10600_firmwarepentium_silver_j5040_firmwarecore_i5-9400t_firmwarecore_i7-8809g_firmwarecore_i5-8260ucore_i5-10400tdebian_linuxcore_i7-6820eq_firmwarecore_i7-9700kfcore_i5-7287u_firmwarexeon_gold_6328hl_firmwareceleron_n3350ecore_i5-7600k_firmwarecore_i5-8305g_firmwareceleron_j4005_firmwarecore_m7-6y75core_i3-8100b_firmwarecore_i9-10900te_firmwarecore_i5-10500hcore_i3-8300t_firmwarecore_i3-7167u_firmwarecore_i5-10600kfxeon_platinum_8380_firmwarecore_i7-10700_firmwareceleron_n2840_firmwarexeon_silver_4314core_i5-1035g1_firmwareceleron_j3060core_i3-1005g1core_i7-1068ng7core_m3-6y30_firmwarecore_i7-7820eq_firmwarecore_i5-8210y_firmwarecore_i5-9400fcore_i3-10100ecore_i7-6650u_firmwarexeon_silver_4316_firmwarecore_i7-10700kf_firmwarecore_i5-9500f_firmwarecore_i7-7560ucore_i7-9700tceleron_j6413xeon_platinum_8368_firmwarecore_i7-8550u_firmwarecore_i5-7600tcore_i5-8365uxeon_platinum_8376hxeon_gold_6312u_firmwarecore_i5-9600kfceleron_j4105_firmwarecore_i5-6267u_firmwarecore_i5-8600_firmwareceleron_n2806_firmwarecore_i5-8269ucore_i3-8100_firmwarexeon_gold_6334_firmwarexeon_gold_6338ncore_i5-7600t_firmwareceleron_j3160_firmwarexeon_gold_6328hlcore_i7-9700t_firmwarecore_i7-8665ue_firmwarexeon_gold_6330core_i7-10810ucore_i3-10300tcore_i7-7820hq_firmwarecore_i3-8100core_i3-8145uecore_i7-6560u_firmwareceleron_j4025_firmwarecore_i5-6585rcore_i5-9600kcore_i5-8265ucore_i7-10700tcore_i9-9900kfcore_i3-7100core_m5-6y54core_i5-6300hqcore_i7-7600u_firmwarecore_i7-9700kf_firmwarecore_i5-6402p_firmwarecore_i5-9300hcore_i5-10500ecore_i7-10750hcore_i9-10850kcore_i5-6600t_firmwarecore_i5-8500bcore_i3-7100e_firmwarexeon_gold_6338celeron_n2840xeon_gold_5315yxeon_platinum_8368q_firmwarecore_i5-8250u_firmwarecore_i7-7820hk_firmwarecore_i5-6600core_i3-8100hcore_i5-8400b_firmwarecore_i3-7300t_firmwareceleron_n2810core_i7-8706gcore_i3-6300core_i5-7400t_firmwarecore_i7-9700f_firmwarecore_i5-8365u_firmwareceleron_n3450_firmwareceleron_j1750_firmwarecore_i7-6500u_firmwarecore_i3-8130u_firmwarecore_i9-10885hcore_i5-10310uceleron_n4500core_i7-8557uxeon_gold_6338tceleron_n2910_firmwarecore_i5-9500_firmwarecore_i5-7440eqcore_i3-6320core_i3-9100t_firmwarecore_i3-8350k_firmwarecore_m3-7y32celeron_n5105_firmwarecore_i7-10750h_firmwarexeon_platinum_8360y_firmwarecore_i7-8557u_firmwarecore_i5-6440eqcore_i5-1030g7core_m3-7y32_firmwareceleron_j4025xeon_platinum_8376hl_firmwarexeon_platinum_8360hcore_i9-10980hkcore_i3-1000g1_firmwareceleron_n2808_firmwarecore_i7-10700k_firmwarecore_i9-10900t_firmwarexeon_gold_5320tceleron_n4100core_i3-10305_firmwarecore_i3-7100u_firmwarecore_i3-10325_firmwarecore_i7-10510y_firmwarecore_i5-7267u_firmwarecore_i7-1060g7_firmwarecore_i5-6287ucore_i7-8500yxeon_gold_6330h_firmwarecore_i7-1068ng7_firmwarecore_i5-9600tfas_biospentium_silver_n5030_firmwarepentium_silver_j5040core_i5-7400_firmwareceleron_j3060_firmwarexeon_gold_6336y_firmwareceleron_n6211core_i7-6700te_firmwarecore_i5-9600core_i5-8600tcore_i5-7200u_firmwarecore_i7-7y75_firmwareceleron_n6210_firmwareceleron_j1850_firmwarecore_i3-10320_firmwarexeon_platinum_8360hl_firmwarexeon_gold_6328hcore_i3-6100hcore_i7-7500uxeon_gold_5318s_firmwarecore_i3-10320xeon_gold_6342_firmwarecore_i3-10105fxeon_gold_5320xeon_gold_5320h_firmwarecore_i3-6098pcore_i5-6400core_i7-10875hceleron_n3060_firmwarexeon_platinum_8362_firmwarecore_i5-6300hq_firmwarecore_i3-7101tecore_i7-7700core_i5-10400hcore_i5-6440eq_firmwarecore_i5-9600kf_firmwarecore_i5-7300hqcore_i5-10505_firmwareceleron_n3050_firmwareceleron_n2810_firmwarexeon_gold_6312uceleron_j1800_firmwareceleron_j3455_firmwarecore_i9-9900t_firmwarecore_i5-6600kcore_i5-9600_firmwarecore_i7-9700exeon_platinum_8380hlcore_i7-9700tecore_i7-8500y_firmwarecore_i7-6822eq_firmwarecore_i7-6700t_firmwarecore_i7-6700tcore_i5-6442eq_firmwarecore_i3-6102e_firmwarexeon_gold_5318ncore_i3-10105tcore_i9-9900k_firmwarecore_i3-8100h_firmwarecore_i7-10510u_firmwarexeon_platinum_8358_firmwarecore_i7-7700_firmwarecore_i7-6820hk_firmwarecore_i5-6500tecore_i5-6260u_firmwarecore_i3-10105t_firmwarepentium_silver_n6000core_i5-10400h_firmwarecore_i3-1000g4xeon_silver_4309ycore_i3-7100t_firmwarecore_i9-10900kfcore_i3-9100hlcore_i5-6500core_i3-10100tcore_i9-9980hk_firmwarecore_i3-9100f_firmwareceleron_n2805_firmwarexeon_gold_6314ucore_i5-8300h_firmwarecore_i9-9980hkceleron_j4125_firmwarecore_i5-8279u_firmwarecore_i5-8500b_firmwarecore_i7-7700hq_firmwarecore_i3-7100tcore_i3-6102ecore_i5-1035g4_firmwarexeon_platinum_8358p_firmwarexeon_platinum_8362core_i7-6770hqcore_i7-10610ucore_i7-9850h_firmwarexeon_platinum_8351n_firmwarecore_m5-6y54_firmwarecore_i7-7y75core_i7-8559ucore_i5-9500exeon_gold_6314u_firmwareceleron_n3010xeon_platinum_8368qcore_i5-9400core_i7-6600ucore_i3-6320_firmwarecore_i3-6100e_firmwarecore_i7-9750h_firmwarecore_i3-10325xeon_platinum_8356h_firmwarecore_i5-8500_firmwarecore_i7-8700core_i3-7130ucore_i5-8400celeron_n5100xeon_platinum_8380hcore_i3-10105f_firmwareceleron_n3000_firmwarecore_i7\+8700xeon_gold_5318sceleron_n2805core_i5-7440hq_firmwarecore_i7-9850hcore_i5-7300hq_firmwarecore_i3-10110u_firmwarecore_i5-7600core_i7-6500uceleron_n4505_firmwarecore_i5-1035g1celeron_n2808core_i5-8310y_firmwareceleron_n3060core_i3-10110ucore_i7-8665u_firmwarecore_i9-10885h_firmwarecore_i7-8086k_firmwareceleron_j6412_firmwareceleron_n4500_firmwarecore_i3-10100y_firmwarecore_i7-7567u_firmwarecore_i3-9100e_firmwareceleron_n6211_firmwarecore_i5-7442eq_firmwarecore_i3-7320_firmwarecore_i7-8569u_firmwarecore_i7-6770hq_firmwarecore_i9-10900core_i7-1065g7_firmwarecore_i5-9400tceleron_n5100_firmwarecore_i5-7360ucore_i5-7300ucore_i3-10300core_i3-8100t_firmwarecore_i5-7600_firmwarecore_i5-6600tceleron_j6413_firmwarecore_i5-6500t_firmwarecore_i5-10310u_firmwarecore_i7-8565ucore_i3-7100h_firmwarecore_i5-8400_firmwarecore_i7-6600u_firmwarecore_i7-6567u_firmwarecore_i7-7700kcore_i7-10870hcore_i7-10510ucore_i3-10100fcore_i3-6300t_firmwarecore_i9-9900_firmwarecore_i7-7920hq_firmwareceleron_n2940core_i5-8310ycore_i5-10500h_firmwarecore_i3-10300_firmwarecore_i5-6440hqcore_i7-9750hf_firmwareceleron_j1750core_i7-6660ucore_i7-6870hq_firmwarecore_i3-6100ecore_i5-7200ucore_i7-9700fcore_i5-8265u_firmwarecore_i7-6970hq_firmwarexeon_platinum_8352s_firmwarexeon_platinum_8380h_firmwareceleron_n3000core_i5-10210ucore_i7-6820hqcore_i3-7300_firmwarecore_i3-9100tcore_i5-10500xeon_platinum_8351nxeon_gold_6354_firmwarecore_i5-8400bcore_i7-8850hcore_i3-7100hcore_i9-8950hk_firmwareceleron_n2930celeron_n2830core_i5-8400h_firmwarecore_i3-6100ucore_i5-10400t_firmwarecore_i9-9900kscore_i5-6350hq_firmwarexeon_platinum_8352vceleron_n4020_firmwarecore_i3-10100_firmwarexeon_platinum_8352y_firmwarecore_i9-10900texeon_platinum_8358core_i9-8950hkcore_i5-1030g4_firmwarecore_i5-6360ucore_i3-6157ucore_i5-9500fcore_i3-10100yxeon_platinum_8360ycore_i5-10600tceleron_n3150_firmwarecore_i5-10600kf_firmwarexeon_gold_5317_firmwarecore_i5-9500te_firmwarecore_i7-7700k_firmwarexeon_gold_6336yceleron_n4505core_i9-10900e_firmwarecore_i5-9400hcore_i7-7660ucore_i3-9320core_i7-7700hqxeon_platinum_8376h_firmwarecore_i7-6820hq_firmwarecore_i7-10700f_firmwarecore_i3-10100t_firmwarecore_i5-6402pcore_m3-7y30core_i5-8269u_firmwarecore_i3-6100t_firmwarecore_i3-10105celeron_n6210xeon_silver_4309y_firmwareceleron_j3455eceleron_n4020core_i9-10900kf_firmwarecore_i7-8550ucore_i7-10810u_firmwarecore_i3-7101e_firmwareceleron_n2920_firmwarecore_i9-9880h_firmwarecore_i7-9700core_i7-6700hqcore_i3-8300core_i5-6500_firmwarecore_i3-7102e_firmwarecore_i7-9850hexeon_platinum_8360hlxeon_gold_6346_firmwareceleron_j4105core_i7-10700kfcore_i7-9850hl_firmwarecore_i5-8260u_firmwarecore_i5-8400txeon_gold_5315y_firmwarecore_i5-7500tcore_i5-6440hq_firmwarexeon_silver_4310tceleron_n4100_firmwarecore_i7-1065g7xeon_gold_5318hcore_i5-6267ucore_i3-1000g1core_i7-6660u_firmwarexeon_gold_5320_firmwarecore_i5-7y54core_i5-8257u_firmwarecore_i5-7400core_i5-1038ng7_firmwarecore_i3-6100te_firmwareceleron_n2815_firmwareceleron_j3355ecore_i5-9400f_firmwarecore_i7-8700b_firmwarecore_i3-10305t_firmwarecore_i7-8706g_firmwarecore_i5-7287ucore_i7-6567ucore_i9-10850k_firmwarecore_i5-8365ue_firmwarecore_i7-7660u_firmwarexeon_platinum_8352score_i3-6167u_firmwareceleron_n2910xeon_gold_6330n_firmwarecore_i7-7920hqcore_i7-10700core_i5-6600_firmwarecore_i5-9600t_firmwareceleron_n2940_firmwarecore_i7-10610u_firmwarecore_i5-10500e_firmwarecore_i3-7020uceleron_j3355core_i5-8600k_firmwarecore_i5-9300hfcore_i3-8145u_firmwarecore_i5-10400core_i3-9300core_i3-8145uceleron_j3355e_firmwarecore_i3-7020u_firmwarecore_i7-7567ucore_i7-8700kcore_i3-7130u_firmwarecore_i7-10870h_firmwarecore_i3-6098p_firmwareceleron_j1800core_i3-9300tcore_i7-7820hqcore_i7-7820eqcore_i7-9700kcore_i5-8365uecore_i3-8109uceleron_j3455core_i7-6920hq_firmwarepentium_silver_n6000_firmwarexeon_gold_6346celeron_n3160core_i5-8200y_firmwareceleron_n3160_firmwareceleron_n2830_firmwarecore_i7-10700ecore_i7-10700te_firmwarecore_i5-8350ucore_i3-7320core_i7-8750h_firmwarecore_i3-10100tecore_i5-6200u_firmwareceleron_n4000_firmwarecore_m5-6y57xeon_gold_6348h_firmwareceleron_n2807core_i5-10210u_firmwarecore_i7-9700te_firmwarecore_i3-8140u_firmwarecore_i5-7y57core_i7-6700tecore_i3-9300_firmwarecore_i3-10100te_firmwarexeon_gold_6330hcore_i5-7260ucore_i5-10600k_firmwarecore_i9-10900ecore_i5-8259u_firmwarecore_i3-9100core_i7-9750hcore_i3-6100u_firmwarepentium_silver_n6005core_i3-10110y_firmwarecore_i5-8600core_i5-8250uxeon_platinum_8380core_m3-8100y_firmwarexeon_platinum_8368core_i5-10500tecore_i7-6700_firmwarecore_i7-8559u_firmwarecore_i5-7500_firmwarecore_i7-7500u_firmwarecore_i5-10210y_firmwarecore_i7-8700k_firmwarecore_i3-6100tecore_i7-8700bcore_i5-10500tcore_i5-10600core_i5-10500_firmwarecore_i5-10310yxeon_platinum_8352mcore_i5-10310y_firmwarecore_i3-9100tecore_i5-9300hf_firmwarecore_m5-6y57_firmwarecore_i5-8259uxeon_gold_6326_firmwarecore_i3-6006u_firmwarecore_i7-10700kcore_i3-8109u_firmwarecore_i9-9880hcore_i7-8705g_firmwarecore_i7-6650ucore_i3-9350k_firmwarecore_i5-7442eqcore_i7-8665uecore_i5-6400_firmwarecore_i3-8130ucore_i3-7167ucore_i3-8300tcore_i5-1035g4xeon_gold_6342core_i7-8650ucore_i5-10200hpentium_silver_n5030core_i9-9900kcore_i7-8705gceleron_n2920xeon_silver_4316celeron_n4000core_i5-10400fcore_i3-6157u_firmwarecore_i7-7600uxeon_gold_6330ncore_i5-1035g7_firmwarecore_i3-7100ecore_i7\+8700_firmwarecore_i5-9400_firmwarecore_i5-9500core_i3-7101ecore_i9-9900core_i3-8145ue_firmwarecore_i3-7350k_firmwarecore_i5-8400t_firmwarepentium_silver_n5000_firmwarecore_i7-9850hlceleron_j4005celeron_n3150xeon_platinum_8354hpentium_silver_n5000xeon_gold_6348hcore_i5-8400hcore_i5-6300ucore_i7-9750hfcore_m3-6y30core_i3-10110yxeon_gold_6334core_i5-1035g7xeon_gold_6326core_i7-7820hkcore_i5-9300h_firmwareceleron_n3350core_i5-8305gcore_i3-6100core_i3-9350kxeon_gold_6328h_firmwareceleron_n2820celeron_n2820_firmwarexeon_gold_5318h_firmwarecore_i5-7400txeon_gold_6348core_i7-8750hcore_i3-6100tceleron_n5105xeon_gold_6354core_i7-8665ucore_i3-10305tcore_i3-10100e_firmwarecore_m7-6y75_firmwareceleron_n2807_firmwarecore_i3-9350kf_firmwarecore_i5-8300hcore_i5-7440eq_firmwarecore_i3-7101te_firmwareceleron_n2806pentium_silver_n6005_firmwarecore_i3-8140uxeon_gold_5320hceleron_n3350_firmwarecore_i7-8086kcore_i5-10600kcore_i3-8350kcore_i5-7360u_firmwarecore_i5-9500e_firmwarecore_i7-9700e_firmwarecore_i7-10850hcore_i3-1005g1_firmwarecore_i5-6360u_firmwarecore_i5-9500texeon_gold_6338n_firmwarecore_i3-9100hl_firmwarecore_i5-10500te_firmwarecore_i3-10300t_firmwarecore_i5-7y54_firmwarecore_i3-8100bcore_i3-6167ucore_i5-8279ucore_i9-10900f_firmwarecore_i3-10100f_firmwarecore_m3-8100yxeon_platinum_8356hxeon_gold_6338t_firmwarecore_i5-8600kcore_i5-7267ucore_i3-7100ucore_i5-6442eqcore_i7-8700tcore_i3-7100_firmwarecore_i3-9320_firmwarecore_i7-6700k_firmwarecore_i5-7260u_firmwarexeon_gold_5320t_firmwarexeon_gold_5318y_firmwarecore_i5-7300u_firmwareceleron_n2930_firmwareceleron_j1900core_i5-6685r_firmwarecore_i7-8700t_firmwarecore_i7-10700e_firmwarecore_i3-9100te_firmwarecore_i5-6500te_firmwarecore_i5-1030g7_firmwarecore_i5-8600t_firmwarexeon_platinum_8352v_firmwarecore_i7-6700kcore_i7-6970hqxeon_gold_5318n_firmwarecore_i7-6822eqcore_i3-7300tcore_i5-8500xeon_silver_4310t_firmwarecore_i5-9400h_firmwarecore_i5-8210ycore_i5-10400f_firmwareceleron_n4120_firmwarecore_i7-6785rpentium_silver_j5005_firmwarecore_i7-6560ucore_i7-1060g7core_i7-8565u_firmwarecore_i5-8257uxeon_gold_5318ycore_i7-8569uxeon_silver_4310core_i7-10700t_firmwarecore_i9-9900txeon_platinum_8352m_firmwarecore_i7-9700_firmwarecore_i7-7700tcore_i5-6685rcore_i3-9350kfceleron_n3350e_firmwarecore_i5-6287u_firmwarecore_i5-8500tcore_i7-8809gcore_i3-10105_firmwarecore_i7-8650u_firmwarecore_i5-6400t_firmwarecore_i3-6300_firmwarecore_i7-10850h_firmwarecore_i5-6400txeon_gold_6348_firmwarecore_i3-10305core_i7-8700_firmwarecore_i7-9850he_firmwarecore_i3-7350kcore_i3-6100h_firmwarecore_i3-8300_firmwarecore_i5-10505core_i3-9100_firmwarecore_i7-6820eqcore_i7-6700xeon_silver_4310_firmwarecore_i7-6920hqxeon_platinum_8360h_firmwarecore_i5-6585r_firmwarecore_i5-7600kcore_i7-7560u_firmwarecore_i7-6820hkcore_m3-7y30_firmwarecore_i3-6006uxeon_platinum_8354h_firmwarecore_i7-10710uceleron_j3160core_i5-10300hxeon_platinum_8358pcore_i5-10210yxeon_gold_6330_firmwarecore_i3-1000g4_firmwarecore_i5-8350u_firmwarexeon_platinum_8380hl_firmwarecore_i9-9900ks_firmwarexeon_gold_6338_firmwarecore_i3-9100fcore_i5-7500t_firmwarecore_i9-10900fceleron_j3455e_firmwareceleron_n3450core_i5-1030g4core_i5-10200h_firmwarecore_i3-8100tcore_i3-6100_firmwarecore_i9-10980hk_firmwarexeon_platinum_8352ycore_i5-9500tcore_i5-10400_firmwarexeon_gold_5317celeron_n3050core_i5-6600k_firmwarecore_i7-6700hq_firmwareceleron_j1850core_i3-7102exeon_platinum_8376hlcore_i5-6200ucore_i7-10700fcore_i5-9600k_firmwarecore_i9-10900k_firmwarexeon_platinum_8353h_firmwarepentium_silver_j5005Intel(R) Processors
CVE-2022-40768
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 3.48%
||
7 Day CHG~0.00%
Published-18 Sep, 2022 | 00:00
Updated-03 Aug, 2024 | 12:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncFedora ProjectDebian GNU/Linux
Product-debian_linuxlinux_kernelfedoran/a
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2022-30944
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.08% / 24.98%
||
7 Day CHG+0.01%
Published-18 Aug, 2022 | 00:00
Updated-05 May, 2025 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-active_management_technology_firmwarestandard_manageabilityIntel(R) AMT and Intel(R) Standard Manageability
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2019-11833
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 2.61%
||
7 Day CHG~0.00%
Published-15 May, 2019 | 12:19
Updated-04 Aug, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.

Action-Not Available
Vendor-n/aFedora ProjectCanonical Ltd.Red Hat, Inc.Linux Kernel Organization, IncDebian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxlinux_kernelenterprise_linux_for_real_time_for_nfv_tusenterprise_linux_server_ausenterprise_linux_workstationfedoraenterprise_linuxenterprise_linux_eusenterprise_linux_for_real_time_for_nfventerprise_linux_for_real_time_tusenterprise_linux_server_tusenterprise_linux_desktopenterprise_linux_for_real_timen/a
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2022-29507
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.55%
||
7 Day CHG~0.00%
Published-18 Aug, 2022 | 19:59
Updated-18 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficiently protected credentials in the Intel(R) Team Blue mobile application in all versions may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-team_blueversion
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2020-12458
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 20.90%
||
7 Day CHG~0.00%
Published-29 Apr, 2020 | 15:57
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An information-disclosure flaw was found in Grafana through 6.7.3. The database directory /var/lib/grafana and database file /var/lib/grafana/grafana.db are world readable. This can result in exposure of sensitive information (e.g., cleartext or encrypted datasource passwords).

Action-Not Available
Vendor-n/aRed Hat, Inc.Fedora ProjectGrafana Labs
Product-ceph_storagegrafanafedoraenterprise_linuxn/a
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2020-12376
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.55%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:56
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of hard-coded key in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-hns2600bpb24rr1304wftysrr2208wf0zsrr1208wftysr2208wftzsrr1304wf0ysr2312wf0nprhns2600bpbr1304wftyshns2600bpqr2224wfqzsr1000wfhns2600bpblc24rs2600bpqrhns2600bpbrs2600stqhns2600bpblcr2308wftzshns2600bpsrr1208wftysrr2208wf0zsr2208wftzsr2312wf0npr1208wfqysrr2224wftzsrr2208wfqzsrs2600stbr2224wftzsr2312wftzsrr2308wftzsrs2600wf0bmc_firmwarehns2600bps24rhns2600bpqrs2600wfqr2208wfqzshns2600bpshns2600bpq24rhns2600bpb24hns2600bps24r1304wf0ysrhns2600bpq24s2600wfts2600bpbrhns2600bpblc24s2600bpsrr2312wfqzsr2312wftzsIntel(R) Server Boards, Server Systems and Compute Modules
CWE ID-CWE-798
Use of Hard-coded Credentials
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 17
  • 18
  • Next
Details not found