Vulnerabilities (CVE)

Filtered by vendor Intel Subscribe
Total 1670 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-41658 1 Intel 1 Vtune Profiler 2024-11-21 N/A 6.7 MEDIUM
Insecure inherited permissions in the Intel(R) VTune(TM) Profiler software before version 2023.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-41646 1 Intel 1 Integrated Performance Primitives Cryptography 2024-11-21 N/A 4.7 MEDIUM
Insufficient control flow management in the Intel(R) IPP Cryptography software before version 2021.6 may allow an unauthenticated user to potentially enable information disclosure via local access.
CVE-2022-41628 2 Intel, Microsoft 15 Nuc P14e Laptop Element, Windows 10 1507, Windows 10 1511 and 12 more 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path element in the HotKey Services for some Intel(R) NUC P14E Laptop Element software for Windows 10 before version 1.1.44 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-41621 1 Intel 1 Quickassist Technology 2024-11-21 N/A 3.3 LOW
Improper access control in some Intel(R) QAT drivers for Windows before version 1.9.0 may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2022-41614 1 Intel 1 On Event Series 2024-11-21 N/A 5.5 MEDIUM
Insufficiently protected credentials in the Intel(R) ON Event Series Android application before version 2.0 may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2022-41610 1 Intel 2 Endpoint Management Assistant Configuration Tool, Manageability Commander 2024-11-21 N/A 5.0 MEDIUM
Improper authorization in Intel(R) EMA Configuration Tool before version 1.0.4 and Intel(R) MC before version 2.4 software may allow an authenticated user to potentially enable denial of service via local access.
CVE-2022-41342 1 Intel 1 C\+\+ Compiler 2024-11-21 N/A 6.0 MEDIUM
Improper buffer restrictions in the Intel(R) C++ Compiler Classic before version 2021.7.1 for some Intel(R) oneAPI Toolkits before version 2022.3.1 may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2022-41314 1 Intel 16 Administrative Tools For Intel Network Adapters, Ethernet Controller E810, Ethernet Network Adapter E810-cqda1 and 13 more 2024-11-21 N/A 6.7 MEDIUM
Uncontrolled search path in some Intel(R) Network Adapter installer software may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-40982 5 Debian, Intel, Netapp and 2 more 1052 Debian Linux, Celeron 5205u, Celeron 5205u Firmware and 1049 more 2024-11-21 N/A 6.5 MEDIUM
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2022-40974 1 Intel 1 Integrated Performance Primitives Cryptography 2024-11-21 N/A 1.8 LOW
Incomplete cleanup in the Intel(R) IPP Cryptography software before version 2021.6 may allow a privileged user to potentially enable information disclosure via local access.
CVE-2022-40972 1 Intel 1 Quickassist Technology 2024-11-21 N/A 6.7 MEDIUM
Improper access control in some Intel(R) QAT drivers for Windows before version 1.9.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-40971 1 Intel 1 Nuc Hdmi Firmware Update Tool 2024-11-21 N/A 6.7 MEDIUM
Incorrect default permissions for the Intel(R) HDMI Firmware Update Tool for NUC before version 1.79.1.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-40964 3 Debian, Fedoraproject, Intel 17 Debian Linux, Fedora, Killer and 14 more 2024-11-21 N/A 7.9 HIGH
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2022-40685 1 Intel 1 Data Center Manager 2024-11-21 N/A 6.5 MEDIUM
Insufficiently protected credentials in the Intel(R) DCM software before version 5.0.1 may allow an authenticated user to potentially enable information disclosure via network access.
CVE-2022-40210 1 Intel 1 Data Center Manager 2024-11-21 N/A 6.8 MEDIUM
Exposure of data element to wrong session in the Intel DCM software before version 5.0.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-40207 1 Intel 1 System Usage Report 2024-11-21 N/A 8.2 HIGH
Improper access control in the Intel(R) SUR software before version 2.4.8989 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-40196 1 Intel 1 Oneapi Dpc\+\+\/c\+\+ Compiler 2024-11-21 N/A 7.8 HIGH
Improper access control in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.2.1 and Intel C++ Compiler Classic before version 2021.7.1 for some Intel(R) oneAPI Toolkits before version 2022.3.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-38973 1 Intel 4 Arc A750, Arc A750 Firmware, Arc A770 and 1 more 2024-11-21 N/A 3.3 LOW
Improper access control for some Intel(R) Arc(TM) graphics cards A770 and A750 Limited Edition sold between October of 2022 and December of 2022 may allow an authenticated user to potentially enable denial of service or infomation disclosure via local access.
CVE-2022-38787 1 Intel 96 Agilex 7 Fpga F-series 006, Agilex 7 Fpga F-series 006 Firmware, Agilex 7 Fpga F-series 008 and 93 more 2024-11-21 N/A 5.7 MEDIUM
Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2022-38786 1 Intel 1 Battery Life Diagnostic Tool 2024-11-21 N/A 6.7 MEDIUM
Improper access control in some Intel Battery Life Diagnostic Tool software before version 2.2.1 may allow an authenticated user to potentially enable escalation of privilege via local access.