Description
Insecure inherited permissions in the Intel(R) oneAPI Toolkits oneapi-cli before version 0.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html
____________________
Description
Improper access control in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 8.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
___________________
Description
Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
________________
Description
Improper neutralization in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html
____________________
Description
Use after free in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
______________________
Description
Protection mechanism failure in the Intel(R) DSA software before version 22.4.26 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.8 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00725.html
__________________
Description
Insufficient visual distinction of homoglyphs presented to user in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.1 for Intel(R) oneAPI Toolkits before version 2022.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Base Score: 8.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html
_______________________
Description
Improper initialization in the Intel(R) TXT SINIT ACM for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
______________________
Description
Improper initialization in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
________________________
Description
Description: Race condition in the Intel(R) DSA software before version 22.4.26 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00725.html
__________________________
Description
Path traversal in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html
_____________________
Description
Insufficient control flow management in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html
_________________________
Description
Active debug code in some Intel (R) SPS firmware before version SPS_E5_04.04.04.300.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.8 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00718.html
_________________________
Description
Insufficient control flow management in the Intel(R) Battery Life Diagnostic Tool software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00726.html
________________________-
Description
Improper initialization in the Intel(R) Battery Life Diagnostic Tool software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00726.html
___________________________
Description
Improper initialization in the Intel(R) Battery Life Diagnostic Tool software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00726.html
______________________________-
Description
Improper access control in the Crypto API Toolkit for Intel(R) SGX before version 2.0 commit ID 91ee496 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.4 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00746.html
________________________
Description
Improper input validation in the Intel(R) SUR software before version 2.4.8902 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.1 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html
________________________
Description
Improper access control in the Intel(R) SUR software before version 2.4.8902 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Base Score: 7.7 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html
____________________________
Description
Improper input validation in the Intel(R) SUR software before version 2.4.8902 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Base Score: 7.4 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html
_________________________________
Description
Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html
_____________________________
Description
Out of bounds read in firmware for OpenBMC in some Intel(R) platforms before version 0.72 may allow unauthenticated user to potentially enable denial of service via network access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html
_______________________________
Description
Incorrect default permissions in the software installer for some Intel(R) QAT drivers for Linux before version 4.17 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00751.html
_______________________________
Description
Improper access control in some QATzip software maintained by Intel(R) before version 1.0.9 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.8 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00765.html
CVE-2023-23560 Description In certain Lexmark products through 2023-01-12, SSRF can occur because of a lack of input validation. Base Score: Critical https://support.lexmark.com/alerts/ ___________________________________ CVE-2016-9244 Description A BIG-IP virtual server configured with a Client SSL profile that has the non-default Session Tickets option enabled may leak up to 31 bytes of uninitialized memory. A remote attacker may […]
CVE-2020-7346 Description Privilege Escalation vulnerability in McAfee Data Loss Prevention (DLP) for Windows prior to 11.6.100 allows a local, low privileged, attacker through the use of junctions to cause the product to load DLLs of the attacker’s choosing. This requires the creation and removal of junctions by the attacker along with sending a specific IOTL […]
CVE-2021-24581 Description The Blue Admin WordPress plugin through 21.06.01 does not sanitise or escape its “Logo Title” setting before outputting in a page, leading to a Stored Cross-Site Scripting issue. Furthermore, the plugin does not have CSRF check in place when saving its settings, allowing the issue to be exploited via a CSRF attack. Base […]
Leave a Reply