Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-28028

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-13 Nov, 2024 | 21:12
Updated At-14 Nov, 2024 | 19:36
Rejected At-
Credits

Improper input validation in some Intel(R) Neural Compressor software before version v3.0 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:13 Nov, 2024 | 21:12
Updated At:14 Nov, 2024 | 19:36
Rejected At:
▼CVE Numbering Authority (CNA)

Improper input validation in some Intel(R) Neural Compressor software before version v3.0 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

Affected Products
Vendor
n/a
Product
Intel(R) Neural Compressor software
Default Status
unaffected
Versions
Affected
  • before version v3.0
Problem Types
TypeCWE IDDescription
N/AN/Aescalation of privilege
CWECWE-20Improper input validation
Type: N/A
CWE ID: N/A
Description: escalation of privilege
Type: CWE
CWE ID: CWE-20
Description: Improper input validation
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
4.07.7HIGH
CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 4.0
Base score: 7.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01219.html
N/A
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01219.html
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Vendor
Intel Corporationintel
Product
neural_compressor_software
CPEs
  • cpe:2.3:a:intel:neural_compressor_software:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 3.0 (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:13 Nov, 2024 | 21:15
Updated At:15 Apr, 2026 | 00:35

Improper input validation in some Intel(R) Neural Compressor software before version v3.0 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.07.7HIGH
CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.17.5HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 7.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-20Secondarysecure@intel.com
CWE ID: CWE-20
Type: Secondary
Source: secure@intel.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01219.htmlsecure@intel.com
N/A
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01219.html
Source: secure@intel.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

272Records found

CVE-2023-28374
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.07% / 20.59%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 13:37
Updated-29 Oct, 2024 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-killer_wi-fi_6e_ax1690proset\/wirelesswi-fi_6e_ax211killerkiller_wi-fi_6e_ax1675wi-fi_6e_ax411proset_wi-fi_6e_ax210Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software
CWE ID-CWE-20
Improper Input Validation
CVE-2023-28738
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.07% / 20.62%
||
7 Day CHG~0.00%
Published-19 Jan, 2024 | 20:03
Updated-21 Oct, 2024 | 12:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel NUC BIOS firmware before version JY0070 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_kit_nuc7cjyhn_firmwarenuc_kit_nuc7cjysalnuc_kit_nuc7cjyhnuc_kit_nuc7cjyh_firmwarenuc_kit_nuc7cjyhnnuc_kit_nuc7pjyh_firmwarenuc_kit_nuc7cjysal_firmwarenuc_kit_nuc7pjyhn_firmwarenuc_kit_nuc7pjyhnnuc_7_essential_nuc7cjysamnnuc_kit_nuc7pjyhnuc_7_essential_nuc7cjysamn_firmwareIntel NUC BIOS firmwareintel_nuc_bios_firmware
CWE ID-CWE-116
Improper Encoding or Escaping of Output
CWE ID-CWE-20
Improper Input Validation
CVE-2023-27519
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.9||MEDIUM
EPSS-0.05% / 14.71%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-11 Jun, 2025 | 14:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for some Intel(R) Optane(TM) SSD products may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-optane_memory_h20_with_solid_state_storageoptane_ssd_dc_p4800x_firmwareoptane_ssd_dc_p4801x_firmwareoptane_ssd_905poptane_ssd_900poptane_ssd_dc_p4801xoptane_memory_h20_with_solid_state_storage_firmwareoptane_ssd_dc_p4800xoptane_ssd_905p_firmwareoptane_ssd_900p_firmwareIntel(R) Optane(TM) SSD products
CWE ID-CWE-20
Improper Input Validation
CVE-2022-26047
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.15% / 35.58%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:49
Updated-29 Jan, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products may allow unauthenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i9-10900kf_firmwarecore_i7-12650hx_firmwarecore_i7-10700f_firmwarecore_i5-9300h_firmwarecore_i3-8120_firmwarewi-fi_6_ax200core_i5-11600kf_firmwarecore_i9-10900t_firmwarekiller_wi-fi_6_ax1650_firmwarecore_i5-12600k_firmwarecore_i9-12950hx_firmwarecore_i5-1035g1_firmwarecore_i5-10200h_firmwarecore_i3-10325_firmwarecore_i7-12700_firmwarecore_i7-10870h_firmwarecore_i7-8665u_firmwarecore_i3-8100h_firmwarecore_i7-8850h_firmwarecore_i3-12100f_firmwarewi-fi_6_ax201core_i5-11260h_firmwarecore_i5-1140g7_firmwarecore_i7-9700k_firmwarecore_i5-10500t_firmwarecore_i3-8109u_firmwarecore_i5-10600t_firmwarecore_i3-10100_firmwarecore_i9-9900kf_firmwarecore_i5-10310u_firmwarecore_i7-1060ng7_firmwarecore_i9-9900t_firmwarecore_i5-8600k_firmwarecore_i9-9900ks_firmwarewi-fi_6e_ax210core_i5-8400h_firmwarecore_i9-10900x_firmwareproset\/wireless_wificore_i5-11600_firmwarecore_i7-1255u_firmwarecore_i9-10900_firmwarecore_i9-12900h_firmwarecore_i7-10875h_firmwarecore_i7-1185g7e_firmwarecore_i3-10100t_firmwarecore_i5-12400_firmwarecore_i3-10100te_firmwarewi-fi_6_ax200_firmwarecore_i3-9100hl_firmwarecore_i5-10210u_firmwarecore_i5-10600k_firmwarecore_i3-10305t_firmwarecore_i5-12500h_firmwarecore_i5-12600_firmwarecore_i9-11900k_firmwarecore_i9-10940x_firmwarecore_i7-11390h_firmwarecore_i7-8560u_firmwarecore_i7-9700_firmwarecore_i3-8000t_firmwarecore_i5-10500te_firmwarecore_i7-11850he_firmwarecore_i3-10105t_firmwarecore_i3-10305_firmwarecore_i7-8709g_firmwarecore_i3-8300_firmwarecore_i3-1000g4_firmwarecore_i5-1035g4_firmwarecore_i5-12450h_firmwarecore_i7-1250u_firmwarecore_i3-10300t_firmwarecore_i9-9980hk_firmwarecore_i7-11600h_firmwarecore_i7-10610u_firmwarecore_i9-10885h_firmwarecore_i9-10910_firmwarecore_i7-8557u_firmwarecore_i7-12800hx_firmwarecore_i3-8121u_firmwarecore_i7-1185g7_firmwarekiller_wi-fi_6e_ax1675_firmwarecore_i5-8600t_firmwarecore_i7-10700_firmwarecore_i7-1195g7_firmwarecore_i5-8650k_firmwarecore_i7-10700k_firmwarecore_i5-8500t_firmwarecore_i5-1030g7_firmwarecore_i5-8420_firmwarecore_i7-8700b_firmwarecore_i9-10920x_firmwarecore_i5-8310y_firmwarecore_i5-10400f_firmwarecore_i5-10400h_firmwarecore_i9-8950hk_firmwarecore_i3-8350k_firmwarecore_i9-10980xe_firmwarecore_i5-12450hx_firmwarecore_i3-11100he_firmwarecore_i5-11300h_firmwarecore_i5-8500b_firmwarecore_i5-10600kf_firmwarecore_i7-12700f_firmwarecore_i5-1145gre_firmwarecore_i5-8210y_firmwarecore_i7-11700k_firmwareuefi_wifi_drivercore_i5-8279u_firmwarecore_i5-11500he_firmwarecore_i5-11600t_firmwarecore_i5-10610u_firmwarecore_i9-11900_firmwarecore_i3-1000ng4_firmwarecore_i7-1270p_firmwarecore_i5-8550_firmwarecore_i5-9400f_firmwarecore_i3-8145u_firmwarecore_i5-1135g7_firmwarecore_i3-11100b_firmwarecore_i3-8000_firmwarecore_i9-10900f_firmwarecore_i5-9500_firmwarecore_i5-11320h_firmwarecore_i5-10300h_firmwarecore_i9-10900te_firmwarecore_i7-12700t_firmwarecore_i7-8700t_firmwarecore_i5-12600h_firmwarewi-fi_6_ax210_firmwarecore_i3-9100te_firmwarecore_i7-8550u_firmwarecore_i9-9980xe_firmwarecore_i9-11950h_firmwarecore_i5-9400t_firmwarecore_i5-12400t_firmwarecore_i9-11900kb_firmwarecore_i5-1250p_firmwarecore_i5-8200y_firmwarecore_i5-9300hf_firmwarecore_i7-10510y_firmwarekiller_wi-fi_6e_ax1675core_i7-11700b_firmwarewi-fi_6e_ax211core_i3-10105_firmwarecore_i5-10500_firmwarecore_i9-9900x_firmwarecore_i7-9700f_firmwarecore_i7-10710u_firmwarecore_i3-9300_firmwarecore_i3-8100_firmwarecore_i7-11700t_firmwarecore_i3-10105f_firmwarecore_i7-8750hf_firmwarecore_i3-12300t_firmwarecore_i5-11400f_firmwarecore_i7-1165g7_firmwarewi-fi_6_ax211core_i7-1180g7_firmwarecore_i7-12800h_firmwarecore_i3-10320_firmwarecore_i7-8670_firmwarecore_i5-8250u_firmwarecore_i9-11900t_firmwarecore_i7-10850h_firmwarecore_i7-8809g_firmwarecore_i3-1115g4e_firmwarecore_i5-1230u_firmwarecore_i5-8700b_firmwarecore_i9-9820x_firmwarecore_i5-8259u_firmwarecore_i5-8500_firmwarecore_i9-9920x_firmwarecore_i5-1145g7e_firmwarecore_i3-9100_firmwarecore_i3-9100t_firmwarecore_i5-10310y_firmwarecore_i3-9300t_firmwarecore_i7-11375h_firmwarecore_i5-11500t_firmwarecore_i7-8500y_firmwarecore_i7-10510u_firmwarecore_i3-8145ue_firmwarecore_i7-1260p_firmwarecore_i7-8705g_firmwarecore_i5-11400_firmwarecore_i5-1155g7_firmwarecore_i5-8600_firmwarecore_i5-9400h_firmwarecore_i7-8665ue_firmwarecore_i5-11500_firmwarecore_i5-8260u_firmwarewi-fi_6_ax210core_i7-9700kf_firmwarecore_i3-1125g4_firmwarecore_i3-10110y_firmwarecore_i3-12100_firmwarecore_i3-1215u_firmwarecore_i5-8420t_firmwarecore_i9-12900t_firmwarecore_i5-1145g7_firmwarekiller_wi-fi_6e_ax1690_firmwarecore_i9-9940x_firmwarecore_i7-8559u_firmwarecore_i5-11400t_firmwarecore_i3-1115gre_firmwarecore_i5-12500t_firmwarecore_i7-1065g7_firmwarecore_i9-10850k_firmwarecore_i7-11700kf_firmwarecore_i3-8300t_firmwarecore_i7-8569u_firmwarecore_i3-8140u_firmwarecore_i7-12700h_firmwarecore_i7-1265u_firmwarecore_i5-1245u_firmwarecore_i7-11700f_firmwarecore_i7-1185gre_firmwarecore_i7-9800x_firmwarecore_i9-12900f_firmwarecore_i7-8565u_firmwarecore_i5-8350u_firmwarecore_i5-9500te_firmwarecore_i7-9850he_firmwarecore_i5-1240p_firmwarecore_i7-10810u_firmwarecore_i3-9350k_firmwarecore_i7-11800h_firmwarecore_i5-1038ng7_firmwarecore_i7-9700t_firmwarecore_i3-9320_firmwarecore_i9-11980hk_firmwarewi-fi_6_ax411_firmwarecore_i7-11700_firmwarecore_i9-12900_firmwarekiller_wi-fi_6e_ax1690core_i5-12500_firmwarecore_i5-1035g7_firmwarecore_i7-8750h_firmwarecore_i5-9500e_firmwarekiller_wi-fi_6_ax1650core_i5-10400t_firmwarecore_i3-10110u_firmwarecore_i5-9600kf_firmwarecore_i9-10980hk_firmwarecore_i9-11900f_firmwarecore_i7-9700te_firmwarecore_i5-10210y_firmwarecore_i5-10400_firmwarecore_i7-10750h_firmwarecore_i5-9600k_firmwarecore_i5-8305g_firmwarecore_i5-8400b_firmwarecore_i3-1220p_firmwarecore_i9-9880h_firmwarecore_i5-8650_firmwarecore_i9-9900k_firmwarecore_i7-12650h_firmwarecore_i5-8257u_firmwarecore_i5-12600kf_firmwarecore_i3-9130u_firmwarecore_i3-8100t_firmwarecore_i7-1060g7_firmwarecore_i5-1130g7_firmwarecore_i9-10850h_firmwarecore_i3-12100t_firmwarecore_i7-12850hx_firmwarecore_i7-9850h_firmwarecore_i5-8550u_firmwarecore_i5-8400_firmwarecore_i5-12600t_firmwarekiller_wifi_softwarecore_i3-12300_firmwarecore_i5-8300h_firmwarecore_i7-1160g7_firmwarecore_i3-1005g1_firmwarecore_i7-8700k_firmwarecore_i5-11500h_firmwarecore_i7-10700te_firmwarecore_i3-9100e_firmwarecore_i7-8670t_firmwarecore_i7-9750h_firmwarecore_i9-12900hk_firmwarecore_i7-8086k_firmwarewi-fi_6_ax201_firmwarecore_i5-8400t_firmwarecore_i5-9600_firmwarecore_i7-10700t_firmwarecore_i7-1068ng7_firmwarecore_i5-8269u_firmwarecore_i5-11500b_firmwarecore_i3-10100y_firmwarecore_i5-10505_firmwarecore_i7-8510y_firmwarecore_i5-9600t_firmwarecore_i7-11850h_firmwarecore_i7-12700k_firmwarecore_i3-10100e_firmwarecore_i5-1235u_firmwarecore_i3-8020_firmwarecore_i5-8365ue_firmwarecore_i9-9960x_firmwarecore_i3-10100f_firmwarecore_i5-10500e_firmwarecore_i3-1210u_firmwarecore_i5-9400_firmwarewi-fi_6_ax411core_i7-1280p_firmwarecore_i7-9700e_firmwarewi-fi_6_ax211_firmwarecore_i7-9850hl_firmwarecore_i9-11900h_firmwarecore_i9-10900e_firmwarecore_i9-12900k_firmwarecore_i5-12400f_firmwarecore_i5-11600k_firmwarecore_i9-10900k_firmwarecore_i7-8706g_firmwarecore_i3-9350kf_firmwarecore_i5-9500t_firmwarecore_i5-1030ng7_firmwarecore_i5-9500f_firmwarecore_i7-12700kf_firmwarecore_i7-9750hf_firmwarecore_i3-8130u_firmwarecore_i7-1260u_firmwarecore_i9-11900kf_firmwarecore_i9-12900kf_firmwarecore_i7-10700e_firmwarecore_i3-9100f_firmwarecore_i5-8265u_firmwarecore_i5-10500h_firmwarecore_i5-8365u_firmwarecore_i3-1120g4_firmwarecore_i7-11370h_firmwarecore_i5-12600hx_firmwarecore_i5-1240u_firmwarecore_i7-8650u_firmwarecore_i3-1115g4_firmwarecore_i3-8100b_firmwarecore_i7-10700kf_firmwarecore_i5-10600_firmwarecore_i9-12900hx_firmwarecore_i5-1030g4_firmwarecore_i9-9800x_firmwarecore_i9-9900_firmwarecore_i7-8700_firmwarecore_i5-11400h_firmwarecore_i5-10110y_firmwarecore_i3-1110g4_firmwarecore_i3-10300_firmwarecore_i3-1000g1_firmwareconverged_security_and_manageability_engineIntel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CWE ID-CWE-20
Improper Input Validation
CVE-2023-26587
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.98%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-10 Oct, 2024 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for the Intel(R) Easy Streaming Wizard software may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-easy_streaming_wizardIntel(R) Easy Streaming Wizard software
CWE ID-CWE-20
Improper Input Validation
CVE-2023-25951
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6||MEDIUM
EPSS-0.07% / 20.91%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 13:37
Updated-29 Oct, 2024 | 15:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-killer_wi-fi_6e_ax1690proset\/wirelesswi-fi_6e_ax211killerkiller_wi-fi_6e_ax1675wi-fi_6e_ax411proset_wi-fi_6e_ax210Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi softwareproset\/wirelesskiller_wifi_software
CWE ID-CWE-20
Improper Input Validation
CVE-2023-25776
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.3||MEDIUM
EPSS-0.09% / 25.20%
||
7 Day CHG+0.01%
Published-10 May, 2023 | 13:17
Updated-27 Jan, 2025 | 18:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_system_d50tnp1mhcpacserver_system_d50tnp2mhsvac_firmwareserver_system_m50cyp2ur312_firmwareserver_system_d50tnp2mhsvacserver_system_d50tnp1mhcrac_firmwareserver_system_d50tnp2mhstacserver_system_d50tnp2mfalacserver_system_m50cyp2ur208server_system_d50tnp1mhcrlc_firmwareserver_system_m50cyp1ur212_firmwareserver_system_m50cyp2ur208_firmwareserver_system_m50cyp2ur312server_system_m50cyp1ur204_firmwareserver_system_d50tnp1mhcracserver_system_d50tnp1mhcrlcserver_system_d50tnp2mhstac_firmwareserver_system_m50cyp1ur204server_system_d50tnp1mhcpac_firmwareserver_system_d50tnp2mfalac_firmwareserver_system_m50cyp1ur212Intel(R) Server Board BMC firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2023-25772
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5||MEDIUM
EPSS-0.05% / 16.82%
||
7 Day CHG-0.01%
Published-10 May, 2023 | 13:40
Updated-24 Jan, 2025 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the Intel(R) Retail Edge Mobile Android application before version 3.0.301126-RELEASE may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-retail_edge_programIntel(R) Retail Edge Mobile Android application
CWE ID-CWE-20
Improper Input Validation
CVE-2023-24463
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.08% / 23.20%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 13:37
Updated-10 Oct, 2024 | 21:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an unauthenticated user to potentially enable information disclosure via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-thunderbolt_dch_driverIntel(R) Thunderbolt(TM) DCH drivers for Windows
CWE ID-CWE-20
Improper Input Validation
CVE-2023-25175
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.11% / 29.67%
||
7 Day CHG+0.07%
Published-10 May, 2023 | 13:17
Updated-27 Jan, 2025 | 18:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_system_d50tnp1mhcpacserver_system_d50tnp2mhsvac_firmwareserver_system_m50cyp2ur312_firmwareserver_system_d50tnp2mhsvacserver_system_d50tnp1mhcrac_firmwareserver_system_d50tnp2mhstacserver_system_d50tnp2mfalacserver_system_m50cyp2ur208server_system_d50tnp1mhcrlc_firmwareserver_system_m50cyp1ur212_firmwareserver_system_m50cyp2ur208_firmwareserver_system_m50cyp2ur312server_system_m50cyp1ur204_firmwareserver_system_d50tnp1mhcracserver_system_d50tnp1mhcrlcserver_system_d50tnp2mhstac_firmwareserver_system_m50cyp1ur204server_system_d50tnp1mhcpac_firmwareserver_system_d50tnp2mfalac_firmwareserver_system_m50cyp1ur212Intel(R) Server Board BMC firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2023-22379
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.09% / 25.69%
||
7 Day CHG+0.02%
Published-10 May, 2023 | 13:17
Updated-27 Jan, 2025 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_system_d50tnp1mhcpacserver_system_d50tnp2mhsvac_firmwareserver_system_m50cyp2ur312_firmwareserver_system_d50tnp2mhsvacserver_system_d50tnp1mhcrac_firmwareserver_system_d50tnp2mhstacserver_system_d50tnp2mfalacserver_system_m50cyp2ur208server_system_d50tnp1mhcrlc_firmwareserver_system_m50cyp1ur212_firmwareserver_system_m50cyp2ur208_firmwareserver_system_m50cyp2ur312server_system_m50cyp1ur204_firmwareserver_system_d50tnp1mhcracserver_system_d50tnp1mhcrlcserver_system_d50tnp2mhstac_firmwareserver_system_m50cyp1ur204server_system_d50tnp1mhcpac_firmwareserver_system_d50tnp2mfalac_firmwareserver_system_m50cyp1ur212Intel(R) Server Board BMC firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2023-22342
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.7||HIGH
EPSS-0.07% / 22.43%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 13:37
Updated-12 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-thunderbolt_dch_driverIntel(R) Thunderbolt(TM) DCH drivers for Windows
CWE ID-CWE-20
Improper Input Validation
CVE-2023-22329
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-2.6||LOW
EPSS-0.04% / 13.18%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:05
Updated-13 Feb, 2025 | 16:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i7-1365u_firmwarepentium_gold_g4600core_i7-11850he_firmwarecore_i5-12600hecore_i7-1280pcore_i7-1068ng7core_i5-1035g7core_i5-12600tcore_i5-13600kcore_i3-8350k_firmwarecore_i3-9350k_firmwareceleron_5305upentium_gold_g6600_firmwareceleron_g3940pentium_gold_g6400t_firmwarepentium_n6415_firmwarecore_i9-12900te_firmwarecore_i5-11600_firmwareceleron_g1610t_firmwareceleron_4305uceleron_b800_firmwarecore_i7-1060g7_firmwareceleron_n2815core_i7-9700core_i7-1370pcore_i5-12500hl_firmwarecore_i9-9900kfceleron_2961ypentium_gold_g5400tcore_i5-1035g4core_i5-10400hceleron_4205uceleron_n5105core_i7-10700k_firmwareceleron_2002e_firmwareceleron_n3000_firmwarecore_i5-9600t_firmwarecore_i3-10100ycore_i5-1345ucore_i7-9700tecore_i5-10400tcore_i5-13500hcore_i7-11370hcore_i5-10310ucore_i5-9400f_firmwarecore_i7-1270pcore_i7-10700t_firmwarecore_i7-1270p_firmwareceleron_g1830core_i5-11600tcore_i5-1235ul_firmwarecore_i5-8269u_firmwarecore_i7-13700core_i5-12500te_firmwareceleron_b720core_i7-13800h_firmwareceleron_n4100celeron_g6900celeron_g3940_firmwareceleron_n3060core_i5-10400celeron_1020ecore_i5-12600k_firmwarepentium_gold_g6605_firmwareceleron_g5920core_i7-10710u_firmwareceleron_1020mcore_i5-10500teceleron_g5305ucore_i5-11600core_i7-12800hl_firmwareceleron_5305u_firmwarecore_i5-13505h_firmwarepentium_gold_g6405t_firmwarecore_i9-13980hx_firmwareceleron_g1820te_firmwareceleron_3865u_firmwarecore_i5-8600core_i7-12800he_firmwarecore_i5-1345ue_firmwarecore_i5-9400_firmwareceleron_5205ucore_i7-8500y_firmwareceleron_3865ucore_i5-1245ulceleron_g4930e_firmwarecore_i3-10100ecore_i5-13600hxcore_i7-1060g7core_i5-13500tecore_i9-10900celeron_n2930celeron_n2840_firmwarecore_i5-11600k_firmwareceleron_g4900tcore_i3-10100tceleron_g3900te_firmwarepentium_gold_g7400ecore_i9-10900kceleron_797_firmwarecore_i3-10325_firmwareceleron_g4932ecore_i5-8600kpentium_gold_g7400tcore_i7-10700te_firmwarecore_i9-10900fcore_i5-12600he_firmwarecore_i7-8700k_firmwarecore_i5-11500t_firmwarecore_i5-13400tcore_i7-8750hcore_i3-10105t_firmwarecore_i9-13900tceleron_927ueceleron_g465core_i5-10400_firmwarecore_i3-1115gre_firmwareceleron_2002eceleron_n4505_firmwarecore_i7-1180g7_firmwarecore_i7-9850he_firmwarecore_i3-1125g4core_i5-13600h_firmwarecore_i3-1000g4core_i3-12300_firmwareceleron_6600he_firmwareceleron_j6413_firmwarecore_i7-13700tcore_i7-8809gcore_i3-8145ueceleron_j4105celeron_887core_i5-10400h_firmwareceleron_807_firmwarecore_i9-12900h_firmwarecore_i5-10500_firmwarepentium_gold_g6505celeron_j6412_firmwareceleron_g5900t_firmwarecore_i9-13900kscore_i5-1245ul_firmwarecore_i7-1260u_firmwarecore_i7-13700_firmwarecore_i7-1370pe_firmwarecore_i7-1265uecore_i9-13900kf_firmwarepentium_gold_g6400te_firmwarecore_i5-10500eceleron_2970mcore_i5-9400tceleron_j3355core_i5-8600t_firmwarecore_i5-8300hcore_i7-12700e_firmwarecore_i9-13905h_firmwarecore_i3-10110yatom_x6414re_firmwarecore_i5-10600kfceleron_1005m_firmwareceleron_j3355eceleron_1047ue_firmwarecore_i7-12650h_firmwarecore_i5-11600kfceleron_j4125_firmwarecore_i7-11700kfpentium_gold_g5500tcore_i7-10870hcore_i5-12600t_firmwareceleron_3205ucore_i5-8600_firmwarecore_i5-1245u_firmwarecore_i3-13300hre_firmwarecore_i5-9600kf_firmwareatom_x6212re_firmwarecore_i7-1250uceleron_g4920celeron_3215u_firmwarecore_i7-13620h_firmwarecore_i5-11500tpentium_gold_g6405uceleron_n4504core_i5-9500core_i3-8145ue_firmwarecore_i5-1250pecore_i5-10500te_firmwarecore_i7-1366ure_firmwareceleron_n2807celeron_g540t_firmwarecore_i5-1130g7_firmwareceleron_g3902ecore_i7-1366urepentium_gold_7505_firmwarecore_i5-8300h_firmwarecore_i3-1220pepentium_gold_8505_firmwarecore_i7-8565ucore_i7-1365ureceleron_n3350_firmwarepentium_gold_g6400e_firmwareceleron_1019yceleron_n2820core_i3-10300_firmwareceleron_b815pentium_gold_g5420tcore_i3-8100t_firmwarecore_i5-8259ucore_i9-11900fceleron_787_firmwareceleron_g5900tcore_i7-11600hcore_i9-12900f_firmwarecore_i9-12900hk_firmwarepentium_gold_g5500core_i7-1370pecore_i7-13700kf_firmwarecore_i7-8850h_firmwareceleron_2980u_firmwarecore_i7-9700kf_firmwareceleron_g460_firmwarecore_i3-10105core_i7-9850h_firmwarepentium_gold_g6405_firmwareceleron_b830core_i3-13100celeron_b810e_firmwarepentium_gold_6500y_firmwarepentium_gold_g6500_firmwareceleron_g1630_firmwareceleron_n3700_firmwarecore_i9-10900k_firmwarecore_i9-12900e_firmwarecore_i7-1280p_firmwarecore_i5-1350p_firmwareceleron_g540atom_x6211ecore_i7-1185g7_firmwareceleron_g530t_firmwarecore_i5-11320hceleron_b810celeron_j4115_firmwarecore_i3-10300t_firmwarecore_i7-13700hxcore_i5-9300hpentium_gold_g6500core_i5-13450hx_firmwareceleron_n4000c_firmwarecore_i7-8559u_firmwarecore_i7-8086k_firmwarecore_i7-10610uceleron_g540tcore_i5-1035g1_firmwarecore_i7-12850hx_firmwarecore_i7-8665u_firmwareceleron_g1620core_i5-9400hcore_i7-8500ycore_i9-9900tcore_i9-13900hxceleron_1037u_firmwarecore_i7-9700e_firmwarecore_i3-13100f_firmwarecore_i9-12900tecore_i7-12700kf_firmwarecore_i5-11300h_firmwarecore_i3-8300t_firmwarecore_i3-8109u_firmwareceleron_n3060_firmwareceleron_3955ucore_i7-9700k_firmwareceleron_n4000celeron_n2830core_i5-13500hxceleron_7300core_i5-1145g7e_firmwarecore_i3-12100te_firmwarecore_i7-12800hcore_i3-10300tcore_i3-8100b_firmwareceleron_n3450celeron_n5100celeron_n2805_firmwarecore_i9-8950hk_firmwareceleron_g3930_firmwarecore_i7-1265ue_firmwarecore_i5-13600k_firmwareceleron_j6412pentium_j6425_firmwarepentium_gold_g6600celeron_n2810atom_x6200feceleron_g1610tcore_i5-8265ucore_i9-13905hcore_i5-13400t_firmwarecore_i7-13700k_firmwarepentium_gold_g6605celeron_g470_firmwareceleron_g5925atom_x6413e_firmwarepentium_gold_g5400t_firmwarepentium_gold_4410y_firmwarecore_i5-13600hceleron_g3920_firmwarecore_i7-10700_firmwareceleron_g530tcore_i3-8350kcore_i5-13500_firmwarecore_i7-1365ue_firmwarecore_i3-9100core_i9-12900hxcore_i5-9600k_firmwarecore_i5-1250pcore_i7-12700h_firmwarepentium_gold_g5600celeron_j4125core_i5-1145gre_firmwarecore_i3-1215ue_firmwareceleron_g4950_firmwareceleron_j1750core_i7-8705gcore_i5-9500eceleron_7305lcore_i5-12450h_firmwarecore_i7-8706gcore_i7-12700hcore_i5-12500t_firmwarecore_i9-9880h_firmwarecore_i7-8700t_firmwarecore_i7-1185grepentium_gold_4415u_firmwarecore_i7-11375hcore_i3-13300hrecore_i5-12600hx_firmwareceleron_n6210core_i5-10400fcore_i5-8259u_firmwarecore_i7-8665ue_firmwarecore_i7-13800hre_firmwarecore_i7-8700atom_x6200fe_firmwarecore_i5-1245ue_firmwarecore_i7-8705g_firmwareceleron_b840_firmwarecore_i9-10900te_firmwarepentium_gold_8500core_i7-10700tceleron_g5205u_firmwarecore_i5-10210ucore_i5-12450hcore_i5-8257ucore_i7-8700kcore_i5-12500tecore_i7-1260pcore_i5-1345urepentium_gold_g6405tcore_i5-1155g7_firmwareceleron_n2830_firmwarecore_i7-10510u_firmwarecore_i5-13600he_firmwareceleron_g1610_firmwareceleron_3867u_firmwareceleron_g440_firmwarecore_i3-10100_firmwareceleron_2000ecore_i5-10505celeron_725ccore_i5-1030g7pentium_gold_g7400e_firmwarecore_i5-1345ure_firmwarecore_i7-8569u_firmwarepentium_n6415core_i7\+8700_firmwarecore_i3-13300hecore_i7-1185g7e_firmwareceleron_g1620t_firmwareceleron_g1820_firmwarecore_i3-10110ucore_i5-10600kf_firmwarecore_i9-12900fcore_i7-11800hceleron_1000m_firmwarecore_i5-12400celeron_867_firmwarecore_i5-10310u_firmwareceleron_g465_firmwareceleron_g4900t_firmwarecore_i3-10105fcore_i3-9100hl_firmwarecore_i3-8100hceleron_n4020c_firmwarepentium_gold_4415ycore_i5-13600t_firmwarecore_i9-11950hceleron_g5900tecore_i5-10300hcore_i7-13850hxcore_i5-1345ueceleron_n3050_firmwarecore_i3-1005g1_firmwareceleron_j3455_firmwarecore_i3-12300he_firmwareceleron_g550_firmwarecore_i5-8500tceleron_1017u_firmwarecore_i7-12700hl_firmwareceleron_n2910celeron_j1800_firmwarepentium_gold_g7400_firmwarepentium_gold_g6500tcore_i5-11500h_firmwarecore_i9-11900kceleron_877core_i5-8350u_firmwareceleron_g1820tceleron_g3930ecore_i9-10850kpentium_gold_8505pentium_gold_g5600_firmwareceleron_g5905_firmwarecore_i9-9900ks_firmwarecore_i7-12700tepentium_gold_g6400tceleron_1019y_firmwarecore_i3-9300_firmwarecore_i5-8400tpentium_gold_g5600tceleron_g3930tcore_i7-10700core_i7-11600h_firmwarecore_i3-9100te_firmwareceleron_g550tceleron_j4105_firmwarecore_i7-10750h_firmwareceleron_847_firmwareceleron_3965uceleron_g4920_firmwarecore_i5-1240p_firmwarecore_i3-10105tatom_x6211e_firmwarecore_i5-11400tcore_i5-11300hcore_i9-11900kfcore_i3-10325core_i7-13700hcore_i9-12950hxcore_i3-12100ecore_i9-12900kscore_i7-10875hcore_i5-13500t_firmwarecore_i5-1340peceleron_n3350e_firmwarecore_i7-1370prepentium_gold_g5400_firmwarecore_i7-12700te_firmwarecore_i9-11900k_firmwareceleron_6305_firmwarecore_i3-10100core_i5-8200y_firmwarecore_i7-8550u_firmwarecore_i5-1035g7_firmwarecore_i7-10700f_firmwareceleron_j1900celeron_6305core_i5-9400core_i3-8100tceleron_n4505core_i3-13100t_firmwarecore_i5-13400_firmwarecore_i7-12700fcore_i3-1210u_firmwareceleron_g4930t_firmwarecore_i5-13600hecore_i9-12900core_i7-8650ucore_i5-13500tcore_i9-13900_firmwarecore_i9-10900e_firmwarecore_i5-1145greatom_x6414recore_i5-1340pcore_i7-9750h_firmwarecore_i7-12700t_firmwarecore_i5-1345u_firmwareatom_x6425re_firmwarepentium_gold_g4620_firmwarecore_i7-13700te_firmwareceleron_j1850_firmwarepentium_gold_4415ucore_i5-1038ng7core_i9-13900h_firmwarecore_i5-11260h_firmwarecore_i7-10700e_firmwareceleron_g1850_firmwarecore_i3-10110y_firmwareceleron_n2920_firmwarecore_i5-1035g4_firmwarecore_i5-8500bcore_i7-1185g7core_i7-1195g7core_i7-12700_firmwarecore_i7-13850hx_firmwarecore_i7-13800hrecore_i5-8269uceleron_927ue_firmwarecore_i5-12400f_firmwareceleron_n3520celeron_b810ecore_i7-10700tecore_i5-1350peceleron_n3000core_i7-1355u_firmwarecore_i9-13900fcore_i7-8709g_firmwarecore_i3-13100tcore_i7-11700_firmwarecore_i9-13900hx_firmwarecore_i7-1265ulceleron_n4100_firmwarecore_i5-10500e_firmwareceleron_1007uceleron_867celeron_g3900tcore_i5-11500he_firmwarecore_i5-8279u_firmwarecore_i5-1145g7_firmwarecore_i5-9500f_firmwarecore_i5-10600t_firmwarecore_i5-10210y_firmwarecore_i5-13400e_firmwarecore_i7-1250u_firmwarecore_i5-13600kfcore_i5-8250uatom_x6425recore_i3-10305celeron_g5900_firmwareceleron_g5920_firmwarecore_i7-9700tcore_i5-12600hl_firmwarecore_i9-12900ks_firmwarecore_i5-1230u_firmwareceleron_n3450_firmwarecore_i3-1215u_firmwarecore_i3-1315u_firmwarecore_i5-13500hx_firmwareceleron_n2805core_i7-8650u_firmwarecore_i7-1365ure_firmwareceleron_j1750_firmwareceleron_4305uecore_i3-9350kfcore_i9-9900k_firmwareceleron_b820_firmwareceleron_g3902e_firmwarecore_i3-1115g4e_firmwareceleron_g530core_i5-1130g7core_i5-12400t_firmwarecore_i5-13500eceleron_1020m_firmwareceleron_4205u_firmwarecore_i5-1245ucore_i5-8365u_firmwarecore_i5-10500hceleron_2950mcore_i3-9300tcore_i3-8100h_firmwarecore_i3-1115g4_firmwareceleron_j6413core_i3-1320pre_firmwarecore_i7-10875h_firmwarecore_i5-10500t_firmwareceleron_j4005_firmwarecore_i5-8265u_firmwarecore_i7-12800h_firmwareceleron_j3060_firmwarecore_i7-1375pre_firmwarecore_i9-13900kpentium_gold_g6400eceleron_g5305u_firmwareceleron_n2920atom_x6413epentium_gold_7505core_i5-10600celeron_g3930te_firmwarecore_i3-12100tecore_i3-1115g4ecore_i7\+8700celeron_3755u_firmwarecore_i9-12900hcore_i5-13500core_i3-9350kceleron_7300_firmwarecore_i5-8500_firmwarecore_i5-13600kf_firmwarecore_i7-13700hx_firmwarecore_i9-11980hk_firmwarecore_i7-8665ueceleron_g4950celeron_6305eceleron_j3455ecore_i5-1145g7ecore_i7-1265u_firmwarecore_i5-11500heceleron_g5900e_firmwarecore_i3-10320core_i5-8200yceleron_g3900t_firmwareceleron_g470core_i5-12600kfceleron_n4020celeron_g4900_firmwareceleron_g1620tpentium_gold_g6405u_firmwarecore_i7-8569ucore_i5-13500te_firmwareceleron_g3900eceleron_g1820teceleron_g3950_firmwarecore_i5-10500tcore_i7-13700t_firmwarecore_i7-12850hxcore_i5-1350pcore_i7-1185g7ecore_i7-1265ul_firmwarecore_i9-13900ks_firmwareceleron_j3355_firmwarecore_i5-12600hxcore_i3-8100bcore_i5-9600tcore_i5-12600_firmwarecore_i3-9320core_i5-11400celeron_n2910_firmwarecore_i7-1065g7core_i5-13500h_firmwareceleron_g440core_i9-10900tecore_i9-10980hk_firmwarepentium_gold_g6400tecore_i5-1230ucore_i3-8130ucore_i7-13700f_firmwareceleron_2957ucore_i5-13600hx_firmwarecore_i3-9100_firmwareceleron_847eceleron_3955u_firmwareceleron_n4504_firmwareceleron_g1620_firmwareceleron_g550core_i7-11370h_firmwareceleron_j1900_firmwarecore_i3-13300he_firmwarecore_i7-1160g7core_i3-10105f_firmwarecore_i9-13900k_firmwarepentium_gold_g5420core_i7-9700kfcore_i7-13700kfpentium_gold_g5420t_firmwarecore_i5-8305g_firmwarecore_i3-13100e_firmwarecore_i7-10870h_firmwarecore_i5-8400hceleron_j1850core_i7-1260uceleron_b815_firmwarepentium_gold_g5420_firmwarecore_i3-1110g4_firmwarecore_i3-1110g4core_i5-12500tcore_i5-10200hcore_i9-13900eceleron_g3920t_firmwarecore_i3-10100f_firmwarepentium_gold_g4560_firmwarecore_i5-12500hcore_i3-8145ucore_i7-11700core_i3-1220pcore_i5-9600_firmwarecore_i3-8109ucore_i5-1250pe_firmwarecore_i3-12300t_firmwarecore_i9-11900tcore_i7-9700f_firmwareceleron_n4500core_i7-1195g7_firmwarecore_i5-9500e_firmwarecore_i7-11850hcore_i5-12600hcore_i9-11900core_i7-12800hxcore_i5-10600_firmwarecore_i3-9100hlceleron_g550t_firmwareceleron_n3150core_i7-12700eceleron_n5100_firmwarecore_i3-12100tcore_i5-8400bcore_i7-13800he_firmwarecore_i3-9300t_firmwarecore_i7-10610u_firmwarecore_i9-13900hkcore_i5-9500_firmwarecore_i5-1240pcore_i5-12500pentium_gold_g5620core_i5-13600hre_firmwareceleron_1020e_firmwarecore_i7-11850hecore_i7-13650hxcore_i5-8400h_firmwareceleron_n4120pentium_gold_g7400te_firmwarecore_i3-9100tepentium_gold_g6505tcore_i7-9700fcore_i9-10980hkcore_i5-1350pe_firmwarecore_i5-13420h_firmwareceleron_g3930tepentium_gold_6405u_firmwarecore_i7-10510ucore_i7-9700kceleron_n2840core_i5-10400t_firmwarecore_i3-8100core_i9-13900kfcore_i9-11900hcore_i3-11100hecore_i7-1370pre_firmwarecore_i7-12700core_i5-1235u_firmwareceleron_3855u_firmwarecore_i7-11700k_firmwarepentium_gold_g6505t_firmwarecore_i9-13950hxcore_i5-13500e_firmwareceleron_2955uceleron_5205u_firmwarecore_i7-1160g7_firmwareceleron_6305e_firmwarecore_i7-8700_firmwareceleron_g3900_firmwarecore_i5-8365uceleron_g6900t_firmwareceleron_j3060core_i5-9600kfcore_i9-13900f_firmwarecore_i5-8500b_firmwareceleron_n3160core_i3-10100teceleron_7305core_i7-1255ul_firmwareceleron_g6900_firmwareceleron_g4930core_i7-10700fcore_i5-12400tcore_i5-1030g4_firmwareceleron_725c_firmwarecore_i5-12400_firmwarecore_i7-8557u_firmwarepentium_gold_g4600_firmwareceleron_n4000ccore_i5-1145g7core_i7-1068ng7_firmwarecore_i7-10750hceleron_3867ucore_i3-8300atom_x6427fecore_i9-13980hxcore_i3-1220pe_firmwareceleron_g4932e_firmwarecore_i5-13420hcore_i7-1360pcore_i5-12500e_firmwarecore_i7-8700bcore_i9-12950hx_firmwareceleron_j1800core_i5-11400t_firmwarecore_i3-1115g4core_i7-11700f_firmwarecore_i7-12650hcore_i3-1215ucore_i5-10210ycore_i5-1140g7core_i7-13650hx_firmwarecore_i5-12500hlcore_i3-1215ul_firmwarecore_i9-9900kf_firmwarecore_i5-9500fcore_i5-10210u_firmwareceleron_807uecore_i5-10600tcore_i7-9850hecore_i7-1375precore_i7-10700ecore_i5-1245uecore_i5-12600hlceleron_g4930epentium_gold_4410ycore_i5-10500h_firmwarecore_i9-9900kscore_i5-9600pentium_gold_g6500t_firmwarecore_i3-1315upentium_gold_g7400tecore_i3-9100fceleron_827e_firmwarecore_i9-11900_firmwarepentium_gold_g5600t_firmwarecore_i3-12300hl_firmwarecore_i7-9750hfpentium_gold_6405uceleron_n3350core_i5-9300h_firmwarecore_i7-12700k_firmwarecore_i7-10700kceleron_g1820core_i9-12900k_firmwareceleron_g5925_firmwarecore_i9-12900kcore_i3-9320_firmwarecore_i3-13100fcore_i5-8400b_firmwarecore_i3-8100_firmwarecore_i7-11700kceleron_g555_firmwarecore_i3-1215ulcore_i3-12100_firmwarecore_i9-9880hcore_i3-13100ecore_i7-10710ucore_i5-8500t_firmwarecore_i7-10700kfcore_i3-11100he_firmwarecore_i7-1255u_firmwareceleron_g6900tcore_i7-13700teceleron_1047ueceleron_877_firmwarepentium_gold_g4560core_i9-13900tecore_i7-12800hecore_i9-13900hk_firmwarecore_i7-8706g_firmwarecore_i9-13900e_firmwarecore_i9-11900t_firmwareceleron_n4500_firmwareceleron_827epentium_gold_4415y_firmwarecore_i9-9900celeron_j3355e_firmwarecore_i7-10510y_firmwarecore_i5-12600core_i3-10100e_firmwarecore_i7-9850hl_firmwarecore_i7-11390h_firmwareceleron_n2806core_i3-13100_firmwareceleron_3765ucore_i3-8140ucore_i5-1038ng7_firmwareceleron_g5905tceleron_797core_i3-10100te_firmwarecore_i5-12400fcore_i5-1340pe_firmwarecore_i3-1120g4_firmwarecore_i5-13600tceleron_g1840_firmwarecore_i7-8550ucore_i7-13705hceleron_n3010core_i3-9100tceleron_j4025celeron_b820core_i5-8310y_firmwareceleron_g460core_i5-12600h_firmwareceleron_857core_i5-1235ulpentium_gold_4425yceleron_3205u_firmwarecore_i3-1320precore_i7-11375h_firmwarecore_i5-1335ueceleron_847core_i9-10900_firmwarecore_i5-10505_firmwarecore_i5-1334u_firmwareceleron_g6900tecore_i3-12300tcore_i9-12900t_firmwareceleron_g3900e_firmwarecore_i3-8145u_firmwarecore_i9-12900kfceleron_n3160_firmwareceleron_3755ucore_i3-1305ucore_i5-11260hcore_i3-1315urecore_i3-12100f_firmwarecore_i5-10300h_firmwarecore_i7-11850h_firmwareceleron_n2820_firmwareceleron_g3920tcore_i5-8210yceleron_n6211core_i7-8750h_firmwarecore_i5-10200h_firmwareceleron_1007u_firmwarecore_i9-11900f_firmwareceleron_2955u_firmwareceleron_2980uceleron_n6210_firmwarecore_i7-11700t_firmwareceleron_n6211_firmwareceleron_857_firmwareceleron_n3010_firmwarecore_i5-12600kf_firmwarecore_i5-13400fcore_i3-9100f_firmwarecore_i7-1185gre_firmwarepentium_gold_g6400_firmwarecore_i5-1350pre_firmwarecore_i5-11500core_i5-1135g7core_i5-8500core_i5-9500te_firmwarecore_i7-13800heceleron_n2808_firmwarecore_i7-1260p_firmwarecore_i7-10700kf_firmwarecore_i7-9750hceleron_n4020ccore_i7-12700f_firmwarepentium_gold_g6405core_i7-13700fceleron_787core_i3-10305tcore_i9-9900t_firmwarepentium_gold_g7400t_firmwarepentium_gold_g5500_firmwarecore_i5-13450hxcore_i7-13620hatom_x6212recore_i7-8665uceleron_n2940_firmwarecore_i3-8300tcore_i7-11700fcore_i7-12650hxceleron_b810_firmwarepentium_gold_g5620_firmwarecore_i7-10850hcore_i3-1210ucore_i3-1125g4_firmwareceleron_g1820t_firmwarecore_i7-11800h_firmwareceleron_g5905celeron_g3950celeron_2981ucore_i5-8400celeron_j4115celeron_7305l_firmwarecore_i3-10300core_i7-13705h_firmwarecore_i5-1140g7_firmwareceleron_n2930_firmwarecore_i7-8086kcore_i3-1320pe_firmwarepentium_gold_g5500t_firmwarepentium_gold_5405u_firmwareceleron_807core_i5-8365ue_firmwarecore_i5-1240u_firmwarecore_i5-12500h_firmwarecore_i9-11900kf_firmwareceleron_b710celeron_n2940core_i5-1335ucore_i5-8600k_firmwareceleron_b710_firmwarecore_i7-13800hceleron_j3455celeron_n5095_firmwareceleron_887_firmwareceleron_n2807_firmwarecore_i5-10310y_firmwarecore_i7-13700h_firmwarepentium_gold_4417ucore_i7-12700hlcore_i3-1000g1core_i7-10510yceleron_j3160core_i7-12700kcore_i5-8210y_firmwarecore_i9-13900te_firmwareceleron_n3150_firmwarecore_i3-9100e_firmwarecore_i7-1255ulceleron_g3900core_i5-9600kceleron_g5905t_firmwarecore_i3-10305t_firmwareceleron_n3520_firmwarecore_i3-12300hlceleron_7305e_firmwareceleron_n5105_firmwarecore_i5-1335ue_firmwarecore_i9-10900f_firmwarecore_i3-13100te_firmwarecore_i7-1270pecore_i9-12900hkcore_i9-12900ecore_i5-1155g7core_i3-9100t_firmwarecore_i5-11320h_firmwarecore_i9-12900_firmwareceleron_3215ucore_i3-1220p_firmwareceleron_g5900celeron_1005mcore_i5-8350uceleron_n4000_firmwareceleron_2950m_firmwareceleron_g1830_firmwarecore_i7-11700tcore_i3-13100teceleron_g3930celeron_g3930t_firmwarecore_i3-10100y_firmwareceleron_3965y_firmwareceleron_n2806_firmwarecore_i5-11400h_firmwarecore_i9-12900hx_firmwareceleron_g5900ecore_i5-13400ecore_i3-12100e_firmwarecore_i7-8700b_firmwarecore_i5-13600core_i9-8950hkcore_i9-10900ecore_i5-9300hf_firmwarecore_i7-12800hx_firmwarecore_i3-12100fceleron_g555celeron_b720_firmwarecore_i9-10885hpentium_j6425core_i3-1320peceleron_g1840t_firmwareceleron_g1840core_i3-12300hecore_i5-12500ecore_i3-9300celeron_1037ucore_i3-9350kf_firmwarecore_i9-9900kceleron_4305ue_firmwarecore_i9-12900tceleron_g1630core_i7-8709gceleron_j4025_firmwarepentium_gold_4417u_firmwarecore_m3-8100y_firmwarecore_i7-1355ucore_i3-12100core_i5-1335u_firmwarecore_i7-8557uceleron_g4930_firmwarecore_i5-9500tceleron_g1610core_i5-8260u_firmwarecore_i7-8700tcore_i3-10305_firmwareceleron_n2810_firmwarecore_i5-11400fcore_i5-11500_firmwarecore_i7-13700ecore_i7-1180g7celeron_2970m_firmwarecore_i5-13505hcore_i3-1215ueceleron_6600heceleron_n3700pentium_gold_g7400core_i9-11950h_firmwarecore_i9-13900core_i9-13900hceleron_2961y_firmwarecore_i5-1035g1core_i7-1370p_firmwarecore_i7-8565u_firmwareceleron_7305_firmwarepentium_gold_4425y_firmwarecore_i5-11400f_firmwarecore_i9-12900kf_firmwarecore_i7-12800hlceleron_b830_firmwarecore_i5-1250p_firmwarecore_i7-1165g7celeron_n3050celeron_n5095core_i5-11600katom_x6427fe_firmwarecore_i7-11390hcore_i9-11900h_firmwarecore_i5-1030g4pentium_gold_8500_firmwarecore_i3-9100ecore_i3-12100t_firmwarecore_i5-10500celeron_b800atom_x6425eceleron_3965u_firmwareceleron_g3930e_firmwarecore_i5-1350precore_i7-9850hcore_i5-9400fcore_i7-9700t_firmwarecore_i5-13400f_firmwarecore_i7-1265uceleron_2981u_firmwarecore_i5-8279ucore_i3-8130u_firmwareceleron_g3920core_i5-13400core_i5-9300hfceleron_g1850pentium_gold_g6505_firmwarecore_i5-11400hcore_i7-13700e_firmwarecore_i3-8140u_firmwarecore_i3-1000g4_firmwarecore_i5-11400_firmwarecore_i7-1360p_firmwarecore_i7-9850hlceleron_g1840tcore_i7-13700kcore_i7-1255ucore_i5-13600_firmwarecore_i3-1315ueceleron_1017ucore_i9-11980hkcore_i5-10600kceleron_g5205uceleron_847e_firmwarecore_i3-1315ue_firmwarecore_m3-8100ycore_i7-1165g7_firmwarecore_i5-8250u_firmwarecore_i9-10900kfceleron_n4120_firmwarecore_i7-9700epentium_gold_g4620core_i5-8400_firmwareceleron_n3350ecore_i3-1120g4core_i3-1000g1_firmwarecore_i5-10600k_firmwarecore_i7-9750hf_firmwarecore_i5-10310ycore_i5-8400t_firmwareceleron_4305u_firmwarecore_i7-12700tceleron_g540_firmwarecore_i5-8260ucore_i9-13900t_firmwareceleron_n2808celeron_b840core_i3-10100t_firmwarecore_i7-10810u_firmwarecore_i9-10900t_firmwarecore_i3-12300core_i5-11600kf_firmwarecore_i5-12450hx_firmwarecore_i5-1340p_firmwarecore_i7-10810ucore_i5-10400f_firmwarecore_i7-11700kf_firmwarecore_i5-12600kcore_i3-10105_firmwareceleron_j3160_firmwarecore_i3-1115greceleron_g5900te_firmwarecore_i7-8850hceleron_807ue_firmwareceleron_j3455e_firmwarecore_i5-11500hcore_i3-10100fcore_i3-8300_firmwareceleron_g4930tatom_x6425e_firmwarecore_i7-1365uecore_i7-12700kfcore_i7-1065g7_firmwarecore_i9-9900_firmwarecore_i5-1135g7_firmwarecore_i5-12500_firmwareceleron_n2815_firmwarecore_i5-8257u_firmwarecore_i9-10900kf_firmwareceleron_7305ecore_i5-11600t_firmwarecore_i5-12450hxceleron_g530_firmwarecore_i9-10850k_firmwareceleron_n4020_firmwarecore_i5-8365uecore_i7-8809g_firmwarecore_i9-10885h_firmwarecore_i5-1235uceleron_1000mcore_i7-12650hx_firmwarecore_i9-9980hk_firmwarecore_i5-1240uceleron_g4900core_i5-1030g7_firmwarecore_i5-9400h_firmwarecore_i9-10900tpentium_gold_g5400core_i7-1365ucore_i3-1305u_firmwarecore_i5-8310ycore_i3-1315ure_firmwarecore_i3-10110u_firmwarecore_i5-9500teceleron_2957u_firmwareceleron_2000e_firmwarecore_i5-9500t_firmwarecore_i7-9700te_firmwareceleron_3765u_firmwarecore_i3-10320_firmwareceleron_3965ypentium_gold_5405uceleron_g3900tecore_i3-1005g1celeron_j4005core_i9-13950hx_firmwareceleron_3855ucore_i5-8600tcore_i5-8305gcore_i7-10850h_firmwarecore_i5-9400t_firmwareceleron_g6900ecore_i7-8559ucore_i9-9980hkcore_i5-13600hreceleron_g6900te_firmwareceleron_g6900e_firmwarecore_i7-9700_firmwarepentium_gold_6500ypentium_gold_g6400core_i5-1334ucore_i7-1270pe_firmwareIntel(R) Processors
CWE ID-CWE-20
Improper Input Validation
CVE-2025-33000
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.3||HIGH
EPSS-0.03% / 8.06%
||
7 Day CHG~0.00%
Published-11 Nov, 2025 | 16:51
Updated-26 Nov, 2025 | 15:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel QuickAssist Technology before version 2.6.0 within Ring 3: User Applications may allow an escalation of privilege. System software adversary with an authenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

Action-Not Available
Vendor-n/aIntel Corporation
Product-quickassist_technologyIntel QuickAssist Technology
CWE ID-CWE-20
Improper Input Validation
CVE-2021-44454
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.98%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in a third-party component for Intel(R) Quartus(R) Prime Pro Edition before version 21.3 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-quartus_primeIntel(R) Quartus(R) Prime Pro Edition
CWE ID-CWE-20
Improper Input Validation
CVE-2026-34980
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 7.49%
||
7 Day CHG~0.00%
Published-03 Apr, 2026 | 21:18
Updated-16 Apr, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenPrinting CUPS: Shared PostScript queue lets anonymous Print-Job requests reach `lp` code execution over the network

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, in a network-exposed cupsd with a shared target queue, an unauthorized client can send a Print-Job to that shared PostScript queue without authentication. The server accepts a page-border value supplied as textWithoutLanguage, preserves an embedded newline through option escaping and reparse, and then reparses the resulting second-line PPD: text as a trusted scheduler control record. A follow-up raw print job can therefore make the server execute an attacker-chosen existing binary such as /usr/bin/vim as lp. At time of publication, there are no publicly available patches.

Action-Not Available
Vendor-openprintingOpenPrinting
Product-cupscups
CWE ID-CWE-20
Improper Input Validation
CVE-2026-2970
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-2.1||LOW
EPSS-0.04% / 13.27%
||
7 Day CHG~0.00%
Published-23 Feb, 2026 | 04:02
Updated-03 Mar, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
datapizza-labs datapizza-ai cache.py RedisCache deserialization

A vulnerability has been found in datapizza-labs datapizza-ai 0.0.2. Affected by this vulnerability is the function RedisCache of the file datapizza-ai-cache/redis/datapizza/cache/redis/cache.py. Such manipulation leads to deserialization. The attack requires being on the local network. A high complexity level is associated with this attack. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-datapizzadatapizza-labs
Product-datapizza_aidatapizza-ai
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2025-12946
Matching Score-4
Assigner-a2826606-91e7-4eb6-899e-8484bd4575d5
ShareView Details
Matching Score-4
Assigner-a2826606-91e7-4eb6-899e-8484bd4575d5
CVSS Score-4.4||MEDIUM
EPSS-0.05% / 15.47%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 17:02
Updated-26 Feb, 2026 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper input validation in NETGEAR Nighthawk routers

A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router's WAN side, using attacker-in-the-middle techniques (MiTM) to manipulate DNS responses and execute commands when speedtests are run. This issue affects RS700: through 1.0.7.82; RAX54Sv2 : before V1.1.6.36; RAX41v2: before V1.1.6.36; RAX50: before V1.2.14.114; RAXE500: before V1.2.14.114; RAX41: before V1.0.17.142; RAX43: before V1.0.17.142; RAX35v2: before V1.0.17.142; RAXE450: before V1.2.14.114; RAX43v2: before V1.1.6.36; RAX42: before V1.0.17.142; RAX45: before V1.0.17.142; RAX50v2: before V1.1.6.36; MR90: before V1.0.2.46; MS90: before V1.0.2.46; RAX42v2: before V1.1.6.36; RAX49S: before V1.1.6.36.

Action-Not Available
Vendor-NETGEAR, Inc.
Product-rax45v2_firmwarerax35v2_firmwarerax42v2rax50v2rax45rax43v2rax45_firmwarerax54sv2_firmwarerax50rax49sms90rax50_firmwarerax41_firmwareraxe500_firmwarerax35v2rax42rax50v2_firmwarerax49s_firmwarerax41rax45v2rax42v2_firmwaremr90_firmwarers700ms90_firmwarers700_firmwareraxe500rax41v2_firmwarerax43_firmwarerax41v2rax42_firmwarerax43v2_firmwarerax43mr90rax54sv2raxe450_firmwareraxe450RS700RAX35v2RAX50RAX41v2RAX41RAX49SRAX42v2RAX54Sv2RAX50v2RAXE500RAXE450RAX43v2RAX42RAX43MR90RAX45MS90
CWE ID-CWE-20
Improper Input Validation
CVE-2025-12942
Matching Score-4
Assigner-a2826606-91e7-4eb6-899e-8484bd4575d5
ShareView Details
Matching Score-4
Assigner-a2826606-91e7-4eb6-899e-8484bd4575d5
CVSS Score-4.8||MEDIUM
EPSS-0.03% / 8.12%
||
7 Day CHG~0.00%
Published-11 Nov, 2025 | 16:17
Updated-26 Feb, 2026 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper input validation in NETGEAR R6260 and R6850

Improper Input Validation vulnerability in NETGEAR R6260 and NETGEAR R6850 allows unauthenticated attackers connected to LAN with ability to perform MiTM attacks and control over DNS Server to perform command execution.This issue affects R6260: through 1.1.0.86; R6850: through 1.1.0.86.

Action-Not Available
Vendor-NETGEAR, Inc.
Product-r6850r6260r6850_firmwarer6260_firmwareR6850R6260
CWE ID-CWE-20
Improper Input Validation
CVE-2019-19163
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.14% / 33.17%
||
7 Day CHG~0.00%
Published-30 Jun, 2020 | 13:31
Updated-05 Aug, 2024 | 02:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Commax WallPad Remote Code Execution Vulnerability

A Vulnerability in the firmware of COMMAX WallPad(CDP-1020MB) allow an unauthenticated adjacent attacker to execute arbitrary code, because of a using the old version of MySQL.

Action-Not Available
Vendor-commaxCOMMAX
Product-cdp-1020mb_firmwareWallpad
CWE ID-CWE-20
Improper Input Validation
CVE-2024-30092
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8||HIGH
EPSS-0.40% / 60.76%
||
7 Day CHG~0.00%
Published-08 Oct, 2024 | 17:35
Updated-08 Jul, 2025 | 15:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Hyper-V Remote Code Execution Vulnerability

Windows Hyper-V Remote Code Execution Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1607windows_11_23h2windows_11_24h2windows_10_1507windows_10_1809windows_server_2022windows_11_22h2windows_server_2022_23h2windows_10_22h2windows_server_2016windows_server_2019Windows Server 2022Windows Server 2019 (Server Core installation)Windows 11 Version 24H2Windows 10 Version 1809Windows 10 Version 1507Windows 10 Version 1607Windows 10 Version 22H2Windows 11 version 22H3Windows 10 Version 21H2Windows Server 2019Windows 11 version 22H2Windows Server 2016Windows Server 2016 (Server Core installation)Windows 11 Version 23H2Windows 11 version 21H2Windows Server 2022, 23H2 Edition (Server Core installation)
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-829
Inclusion of Functionality from Untrusted Control Sphere
CVE-2025-27211
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-0.14% / 33.66%
||
7 Day CHG~0.00%
Published-04 Aug, 2025 | 22:12
Updated-05 Aug, 2025 | 14:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Improper Input Validation in EdgeMAX EdgeSwitch (Version 1.10.4 and earlier) could allow a Command Injection by a malicious actor with access to EdgeSwitch adjacent network.

Action-Not Available
Vendor-Ubiquiti Inc.
Product-EdgeMAX EdgeSwitch
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
Details not found