CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-42410

Description: Improper input validation in some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable denial of service via local access.

CVSS: MEDIUM (6.8)

EPSS Score: 0.04%

Source: CVE
February 13th, 2025 (5 months ago)

CVE-2024-42405

Description: Uncontrolled search path for some Intel(R) Quartus(R) Prime Software before version 23.1.1 Patch 1.01std may allow an authenticated user to potentially enable escalation of privilege via local access.

CVSS: MEDIUM (5.4)

EPSS Score: 0.04%

Source: CVE
February 13th, 2025 (5 months ago)

CVE-2024-41934

Description: Improper access control in some Intel(R) GPA software before version 2024.3 may allow an authenticated user to potentially enable denial of service via local access.

CVSS: MEDIUM (4.1)

EPSS Score: 0.04%

Source: CVE
February 13th, 2025 (5 months ago)

CVE-2024-41917

Description: Time-of-check time-of-use race condition for some Intel(R) Battery Life Diagnostic Tool software before version 2.4.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVSS: MEDIUM (5.4)

EPSS Score: 0.04%

Source: CVE
February 13th, 2025 (5 months ago)

CVE-2024-41710

🚨 Marked as known exploited on January 30th, 2025 (5 months ago).
Description: A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an authenticated attacker with administrative privilege to conduct an argument injection attack, due to insufficient parameter sanitization during the boot process. A successful exploit could allow an attacker to execute arbitrary commands within the context of the system.

CVSS: HIGH (7.2)

EPSS Score: 1.18%

Source: CVE
February 13th, 2025 (5 months ago)

CVE-2024-41168

Description: Use after free in some Intel(R) PROSet/Wireless WiFi and Killerâ„¢ WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

CVSS: HIGH (7.1)

EPSS Score: 0.04%

Source: CVE
February 13th, 2025 (5 months ago)

CVE-2024-41166

Description: Stack-based buffer overflow in some Intel(R) PROSet/Wireless WiFi and Killerâ„¢ WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

CVSS: MEDIUM (6.0)

EPSS Score: 0.04%

Source: CVE
February 13th, 2025 (5 months ago)

CVE-2024-40887

Description: Race condition in some Intel(R) PROSet/Wireless WiFi and Killerâ„¢ WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

CVSS: MEDIUM (6.0)

EPSS Score: 0.04%

Source: CVE
February 13th, 2025 (5 months ago)

CVE-2024-39813

Description: Uncontrolled search path for some EPCT software before version 1.42.8.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVSS: MEDIUM (5.4)

EPSS Score: 0.04%

Source: CVE
February 13th, 2025 (5 months ago)

CVE-2024-39805

Description: Insufficient verification of data authenticity in some Intel(R) DSA software before version 23.4.39 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVSS: HIGH (7.3)

EPSS Score: 0.04%

Source: CVE
February 13th, 2025 (5 months ago)