Description
Insecure inherited permissions in the Intel(R) oneAPI Toolkits oneapi-cli before version 0.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html
____________________
Description
Improper access control in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 8.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
___________________
Description
Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
________________
Description
Improper neutralization in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html
____________________
Description
Use after free in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
______________________
Description
Protection mechanism failure in the Intel(R) DSA software before version 22.4.26 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.8 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00725.html
__________________
Description
Insufficient visual distinction of homoglyphs presented to user in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.1 for Intel(R) oneAPI Toolkits before version 2022.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Base Score: 8.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html
_______________________
Description
Improper initialization in the Intel(R) TXT SINIT ACM for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
______________________
Description
Improper initialization in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
________________________
Description
Description: Race condition in the Intel(R) DSA software before version 22.4.26 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00725.html
__________________________
Description
Path traversal in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html
_____________________
Description
Insufficient control flow management in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html
_________________________
Description
Active debug code in some Intel (R) SPS firmware before version SPS_E5_04.04.04.300.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.8 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00718.html
_________________________
Description
Insufficient control flow management in the Intel(R) Battery Life Diagnostic Tool software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00726.html
________________________-
Description
Improper initialization in the Intel(R) Battery Life Diagnostic Tool software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00726.html
___________________________
Description
Improper initialization in the Intel(R) Battery Life Diagnostic Tool software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00726.html
______________________________-
Description
Improper access control in the Crypto API Toolkit for Intel(R) SGX before version 2.0 commit ID 91ee496 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.4 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00746.html
________________________
Description
Improper input validation in the Intel(R) SUR software before version 2.4.8902 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.1 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html
________________________
Description
Improper access control in the Intel(R) SUR software before version 2.4.8902 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Base Score: 7.7 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html
____________________________
Description
Improper input validation in the Intel(R) SUR software before version 2.4.8902 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Base Score: 7.4 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html
_________________________________
Description
Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html
_____________________________
Description
Out of bounds read in firmware for OpenBMC in some Intel(R) platforms before version 0.72 may allow unauthenticated user to potentially enable denial of service via network access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html
_______________________________
Description
Incorrect default permissions in the software installer for some Intel(R) QAT drivers for Linux before version 4.17 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00751.html
_______________________________
Description
Improper access control in some QATzip software maintained by Intel(R) before version 1.0.9 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.8 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00765.html
CVE-2022-4328 Description The WooCommerce Checkout Field Manager WordPress plugin before 18.0 does not validate files to be uploaded, which could allow unauthenticated attackers to upload arbitrary files such as PHP on the server Base Score: 9.8 CRITICAL https://wpscan.com/vulnerability/4dc72cd2-81d7-4a66-86bd-c9cfaf690eed
CVE-2022-46328 Description Some smartphones have the input validation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Base Score: 7.5 HIGH https://consumer.huawei.com/en/support/bulletin/2022/12/ ______________________________ CVE-2022-46327 Description Some smartphones have configuration issues. Successful exploitation of this vulnerability may cause privilege escalation, which results in system service exceptions. Base Score: 9.8 CRITICAL https://consumer.huawei.com/en/support/bulletin/2022/12/ _____________________________ CVE-2022-46326 Description Some smartphones have […]
CVE-2019-17621 Description The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network. Base Score: 9.8 CRITICAL https://www.dlink.com/en/security-bulletin
Leave a Reply