Vulnerabilities (CVE)

Filtered by vendor Intel Subscribe
Total 1663 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-21801 1 Intel 1 Tdx Module 2025-09-02 N/A 7.1 HIGH
Insufficient control flow management in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable denial of service via local access.
CVE-2024-33607 1 Intel 1 Tdx Module 2025-09-02 N/A 5.6 MEDIUM
Out-of-bounds read in some Intel(R) TDX module software before version TDX_1.5.07.00.774 may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2023-41234 2 Intel, Microsoft 2 Power Gadget, Windows 2025-08-28 N/A 5.0 MEDIUM
NULL pointer dereference in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable denial of service via local access.
CVE-2023-42773 2 Intel, Microsoft 2 Power Gadget, Windows 2025-08-28 N/A 8.8 HIGH
Improper neutralization in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-45217 2 Intel, Microsoft 2 Power Gadget, Windows 2025-08-28 N/A 8.8 HIGH
Improper access control in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-45221 1 Intel 1 Media Sdk 2025-08-28 N/A 4.8 MEDIUM
Improper buffer restrictions in Intel(R) Media SDK all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-45315 2 Intel, Microsoft 2 Power Gadget, Windows 2025-08-28 N/A 5.5 MEDIUM
Improper initialization in some Intel(R) Power Gadget software for Windwos all versions may allow an authenticated user to potentially enable denial of service via local access.
CVE-2023-45320 1 Intel 1 Vtune Profiler 2025-08-28 N/A 6.7 MEDIUM
Uncontrolled search path element in some Intel(R) VTune(TM) Profiler software before version 2024.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-45736 2 Intel, Microsoft 2 Power Gadget, Windows 2025-08-28 N/A 6.7 MEDIUM
Insecure inherited permissions in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-45846 2 Apple, Intel 2 Macos, Power Gadget 2025-08-28 N/A 5.5 MEDIUM
Incomplete cleanup in Intel(R) Power Gadget software for macOS all versions may allow an authenticated user to potentially enable denial of service via local access.
CVE-2023-46689 2 Apple, Intel 2 Macos, Power Gadget 2025-08-28 N/A 8.8 HIGH
Improper neutralization in Intel(R) Power Gadget software for macOS all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-46691 2 Intel, Microsoft 2 Power Gadget, Windows 2025-08-28 N/A 7.9 HIGH
Use after free in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2024-21784 1 Intel 2 Integrated Performance Primitives Cryptography, Oneapi Base Toolkit 2025-08-27 N/A 6.7 MEDIUM
Uncontrolled search path for some Intel(R) IPP Cryptography software before version 2021.11 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2024-21772 1 Intel 2 Advisor, Oneapi Base Toolkit 2025-08-27 N/A 6.7 MEDIUM
Uncontrolled search path in some Intel(R) Advisor software before version 2024.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2024-21831 1 Intel 1 Processor Diagnostic Tool 2025-08-27 N/A 6.7 MEDIUM
Uncontrolled search path in some Intel(R) Processor Diagnostic Tool software before version 4.1.9.41 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-48368 1 Intel 1 Media Sdk 2025-08-27 N/A 5.9 MEDIUM
Improper input validation in Intel(R) Media SDK software all versions may allow an authenticated user to potentially enable denial of service via local access.
CVE-2023-47169 1 Intel 1 Media Sdk 2025-08-27 N/A 3.3 LOW
Improper buffer restrictions in Intel(R) Media SDK software all versions may allow an authenticated user to potentially enable denial of service via local access.
CVE-2023-50197 1 Intel 1 Driver \& Support Assistant 2025-08-14 N/A 7.8 HIGH
Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver & Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to write a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21845.
CVE-2023-42099 1 Intel 1 Driver \& Support Assistant 2025-08-12 N/A 7.8 HIGH
Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver & Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21846.
CVE-2021-44228 12 Apache, Apple, Bentley and 9 more 167 Log4j, Xcode, Synchro and 164 more 2025-08-08 9.3 HIGH 10.0 CRITICAL
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.