Description
Insecure inherited permissions in the Intel(R) oneAPI Toolkits oneapi-cli before version 0.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html
____________________
Description
Improper access control in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 8.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
___________________
Description
Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
________________
Description
Improper neutralization in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html
____________________
Description
Use after free in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
______________________
Description
Protection mechanism failure in the Intel(R) DSA software before version 22.4.26 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.8 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00725.html
__________________
Description
Insufficient visual distinction of homoglyphs presented to user in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.1 for Intel(R) oneAPI Toolkits before version 2022.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Base Score: 8.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html
_______________________
Description
Improper initialization in the Intel(R) TXT SINIT ACM for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
______________________
Description
Improper initialization in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
________________________
Description
Description: Race condition in the Intel(R) DSA software before version 22.4.26 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00725.html
__________________________
Description
Path traversal in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html
_____________________
Description
Insufficient control flow management in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html
_________________________
Description
Active debug code in some Intel (R) SPS firmware before version SPS_E5_04.04.04.300.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.8 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00718.html
_________________________
Description
Insufficient control flow management in the Intel(R) Battery Life Diagnostic Tool software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00726.html
________________________-
Description
Improper initialization in the Intel(R) Battery Life Diagnostic Tool software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00726.html
___________________________
Description
Improper initialization in the Intel(R) Battery Life Diagnostic Tool software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00726.html
______________________________-
Description
Improper access control in the Crypto API Toolkit for Intel(R) SGX before version 2.0 commit ID 91ee496 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.4 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00746.html
________________________
Description
Improper input validation in the Intel(R) SUR software before version 2.4.8902 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.1 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html
________________________
Description
Improper access control in the Intel(R) SUR software before version 2.4.8902 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Base Score: 7.7 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html
____________________________
Description
Improper input validation in the Intel(R) SUR software before version 2.4.8902 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Base Score: 7.4 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html
_________________________________
Description
Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html
_____________________________
Description
Out of bounds read in firmware for OpenBMC in some Intel(R) platforms before version 0.72 may allow unauthenticated user to potentially enable denial of service via network access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html
_______________________________
Description
Incorrect default permissions in the software installer for some Intel(R) QAT drivers for Linux before version 4.17 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00751.html
_______________________________
Description
Improper access control in some QATzip software maintained by Intel(R) before version 1.0.9 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.8 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00765.html
CVE-2023-21803 Description Windows iSCSI Discovery Service Remote Code Execution Vulnerability Base Score: 9.8 CRITICAL https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21803 CVE-2023-21804 Description Windows Graphics Component Elevation of Privilege Vulnerability Base Score: 7.8 HIGH https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21804 CVE-2023-21805 Description Windows MSHTML Platform Remote Code Execution Vulnerability Base Score: 7.8 HIGH https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21805 CVE-2023-21806 Description Power BI Report Server Spoofing Vulnerability Base Score: 8.2 HIGH https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21806 […]
CVE-2022-4328 Description The WooCommerce Checkout Field Manager WordPress plugin before 18.0 does not validate files to be uploaded, which could allow unauthenticated attackers to upload arbitrary files such as PHP on the server Base Score: 9.8 CRITICAL https://wpscan.com/vulnerability/4dc72cd2-81d7-4a66-86bd-c9cfaf690eed
CVE-2023-21575 Description Photoshop version 23.5.3 (and earlier), 24.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Base Score: 7.8 HIGH https://helpx.adobe.com/security/products/photoshop/apsb23-11.html ____________ CVE-2023-21576 Description Photoshop […]
Leave a Reply