cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-36392,https://securityvulnerability.io/vulnerability/CVE-2022-36392,Improper Input Validation in Intel AMT and Standard Manageability Firmware,"The vulnerability arises from improper input validation present in specific firmware versions for Intel(R) AMT and Intel(R) Standard Manageability. This flaw may allow an unauthenticated user to perform actions that could result in a denial of service via network access, potentially disrupting the functionality of affected systems. Users and administrators should ensure their firmware is updated to the latest versions to mitigate this risk and maintain secure operations.",Intel,Intel(r) Amt And Intel(r) Standard Manageability In Intel (r) Csme,8.6,HIGH,0.001069999998435378,false,,false,false,false,,,false,false,,2023-08-11T02:36:55.653Z,0 CVE-2020-0539,https://securityvulnerability.io/vulnerability/CVE-2020-0539,Path Traversal in Intel DAL and TXE Software,"The vulnerability allows an unprivileged user to exploit a path traversal issue within the Intel DAL and TXE software. This security flaw may result in the potential enablement of denial of service through local access, impacting system stability and performance. The affected software versions prior to specified thresholds must be updated to protect against this issue.",Intel,Intel(r) Amt And Intel(r) Csme,5.5,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2020-06-15T14:01:05.000Z,0