cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-36261,https://securityvulnerability.io/vulnerability/CVE-2024-36261,Improper Access Control in Intel RAID Web Console Software,"The Intel RAID Web Console software is subject to an improper access control vulnerability, which can allow authenticated users to exploit adjacent access points. This flaw potentially enables these users to initiate denial of service scenarios, affecting the availability of the service. Proper access controls should be enforced to mitigate these risks and ensure system integrity.",Intel,Raid Web Console,5.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-16T17:16:00.000Z,0 CVE-2024-34153,https://securityvulnerability.io/vulnerability/CVE-2024-34153,Uncontrolled Search Path Vulnerability in Intel RAID Web Console Software,"A vulnerability exists in Intel RAID Web Console software, which allows an authenticated user to manipulate the search path in an uncontrolled manner. This misconfiguration can potentially lead to privilege escalation through local access. Proper safeguards should be implemented to ensure that authenticated users cannot exploit this vulnerability to gain elevated privileges within the system. Administrators are advised to review security configurations and apply necessary updates or mitigations as recommended by Intel.",Intel,Raid Web Console,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-16T17:16:00.000Z,0 CVE-2024-34543,https://securityvulnerability.io/vulnerability/CVE-2024-34543,Improper Access Control in Intel RAID Web Console Software,"The vulnerability identified in Intel RAID Web Console software stems from improper access control mechanisms, which may permit an authenticated user to exploit local access to elevate privileges. This poses significant risks as it can allow unauthorized actions within the system, potentially leading to data breaches or system compromise. Organizations using this software are encouraged to review their access control protocols to mitigate the risk associated with this vulnerability.",Intel,Raid Web Console,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-16T17:16:00.000Z,0 CVE-2024-34545,https://securityvulnerability.io/vulnerability/CVE-2024-34545,Input Validation Vulnerability in Intel RAID Web Console Software,"An input validation flaw exists within Intel RAID Web Console software, affecting all versions. This vulnerability could allow an authenticated user to potentially access sensitive information through adjacent access, raising significant security concerns. Proper security measures should be taken to mitigate the risks associated with this weakness.",Intel,Raid Web Console,5.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-16T17:16:00.000Z,0 CVE-2024-28170,https://securityvulnerability.io/vulnerability/CVE-2024-28170,Improper Access Control in Intel RAID Web Console,"An access control vulnerability exists in Intel(R) RAID Web Console that may allow an authenticated user to gain unauthorized access to sensitive information via local access. This issue could potentially lead to information disclosure, posing a significant risk to data integrity and confidentiality.",Intel,Raid Web Console,5.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-16T17:16:00.000Z,0 CVE-2024-32666,https://securityvulnerability.io/vulnerability/CVE-2024-32666,NULL Pointer Dereference Vulnerability in Intel RAID Web Console Software,"A NULL pointer dereference vulnerability exists in the Intel RAID Web Console software that could be exploited by an authenticated user. This may lead to a denial of service through local access, allowing the user to disrupt the normal operation of the software without requiring a high level of privilege. Users are urged to monitor their systems and apply any available patches to mitigate the risk.",Intel,Raid Web Console,5.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-16T17:16:00.000Z,0 CVE-2024-36247,https://securityvulnerability.io/vulnerability/CVE-2024-36247,Improper Access Control in Intel RAID Web Console,The Intel RAID Web Console is exposed to a vulnerability due to improper access control mechanisms. This flaw allows an authenticated user to potentially execute a denial of service attack through adjacent access. Organizations using Intel RAID Web Console should take immediate action to evaluate their security posture and implement necessary countermeasures.,Intel,Raid Web Console,5.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-16T17:16:00.000Z,0 CVE-2024-32940,https://securityvulnerability.io/vulnerability/CVE-2024-32940,Improper Access Control in Intel RAID Web Console,"A vulnerability exists in the Intel RAID Web Console software due to improper access control mechanisms. This flaw allows authenticated users to exploit adjacent access to potentially trigger a denial of service condition, impacting the availability of the system. Organizations using Intel RAID Web Console should assess their configurations and ensure that proper access controls are in place to mitigate the risk of exploitation.",Intel,Raid Web Console,5.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-16T17:16:00.000Z,0 CVE-2024-33848,https://securityvulnerability.io/vulnerability/CVE-2024-33848,Denial of Service Vulnerability in Intel RAID Web Console,"An uncaught exception in the Intel RAID Web Console software allows authenticated users to potentially trigger a denial of service scenario through local access. This flaw can compromise the availability of the application by disrupting its normal functionalities, thus impacting users reliant on the RAID management capabilities.",Intel,Raid Web Console,5.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-16T17:16:00.000Z,0 CVE-2020-8688,https://securityvulnerability.io/vulnerability/CVE-2020-8688,Input Validation Flaw in Intel(R) RAID Web Console 3 for Windows,"An improper input validation vulnerability in the Intel(R) RAID Web Console 3 for Windows allows unauthenticated users to exploit the system. This exploitation can lead to a potential denial of service, enabling attackers to disrupt the normal functioning of the application through unauthorized network access.",Intel,Intel(r) Raid Web Console 3 For Windows* Advisory,7.5,HIGH,0.0010999999940395355,false,,false,false,false,,,false,false,,2020-08-13T03:14:50.000Z,0 CVE-2020-0564,https://securityvulnerability.io/vulnerability/CVE-2020-0564,Improper Permissions in Intel RWC3 for Windows by Intel,"The vulnerability arises from flawed permission settings in the installer of Intel(R) RWC3 for Windows, allowing authenticated users to potentially escalate their privileges through local access, jeopardizing system integrity. This can lead to unauthorized actions or access within the system, posing security risks for users.",Intel,IntelĀ® Raid Web Console 3 (rwc3) For Windows,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-02-13T18:20:36.000Z,0 CVE-2019-0173,https://securityvulnerability.io/vulnerability/CVE-2019-0173,Authentication Bypass in Intel Raid Web Console 2,"An authentication bypass vulnerability exists in the web console of Intel Raid Web Console 2, allowing unauthorized access. This flaw may enable an attacker to access sensitive information through network means, compromising the integrity of data. Organizations using any version of Intel Raid Web Console 2 should take immediate action to strengthen their security measures and prevent potential exploitation of this vulnerability.",Intel,Intel(r) Raid Web Console 2 Advisory,7.6,HIGH,0.0009699999936856329,false,,false,false,false,,,false,false,,2019-08-19T16:13:58.000Z,0 CVE-2019-11119,https://securityvulnerability.io/vulnerability/CVE-2019-11119,Insufficient Session Validation in Intel RWC3 Service API,"The Intel RWC3 service API is susceptible to insufficient session validation. An unauthenticated user may exploit this vulnerability to potentially escalate privileges through network access, allowing unauthorized control over the affected system. This flaw emphasizes the need for robust session management practices to prevent unauthorized access and elevation of privileges.",Intel,Intel(r) Raid Web Console 3 For Windows*,9.8,CRITICAL,0.0031799999997019768,false,,false,false,false,,,false,false,,2019-06-13T15:36:25.000Z,0 CVE-2018-3699,https://securityvulnerability.io/vulnerability/CVE-2018-3699,,Cross-site scripting in the Intel RAID Web Console v3 for Windows may allow an unauthenticated user to elevate privilege via remote access.,Intel,Intel Raid Web Console V3,6.1,MEDIUM,0.000699999975040555,false,,false,false,false,,,false,false,,2018-11-14T14:00:00.000Z,0 CVE-2018-3696,https://securityvulnerability.io/vulnerability/CVE-2018-3696,,Authentication bypass in the Intel RAID Web Console 3 for Windows before 4.186 may allow an unprivileged user to potentially gain administrative privileges via local access.,Intel,Intel Raid Web Console V3 For Windows,5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2018-11-14T14:00:00.000Z,0