Description
Insecure inherited permissions in the Intel(R) oneAPI Toolkits oneapi-cli before version 0.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html
____________________
Description
Improper access control in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 8.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
___________________
Description
Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
________________
Description
Improper neutralization in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html
____________________
Description
Use after free in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
______________________
Description
Protection mechanism failure in the Intel(R) DSA software before version 22.4.26 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.8 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00725.html
__________________
Description
Insufficient visual distinction of homoglyphs presented to user in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.1 for Intel(R) oneAPI Toolkits before version 2022.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Base Score: 8.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html
_______________________
Description
Improper initialization in the Intel(R) TXT SINIT ACM for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
______________________
Description
Improper initialization in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html
________________________
Description
Description: Race condition in the Intel(R) DSA software before version 22.4.26 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00725.html
__________________________
Description
Path traversal in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html
_____________________
Description
Insufficient control flow management in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html
_________________________
Description
Active debug code in some Intel (R) SPS firmware before version SPS_E5_04.04.04.300.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.8 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00718.html
_________________________
Description
Insufficient control flow management in the Intel(R) Battery Life Diagnostic Tool software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00726.html
________________________-
Description
Improper initialization in the Intel(R) Battery Life Diagnostic Tool software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00726.html
___________________________
Description
Improper initialization in the Intel(R) Battery Life Diagnostic Tool software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00726.html
______________________________-
Description
Improper access control in the Crypto API Toolkit for Intel(R) SGX before version 2.0 commit ID 91ee496 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 8.4 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00746.html
________________________
Description
Improper input validation in the Intel(R) SUR software before version 2.4.8902 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.1 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html
________________________
Description
Improper access control in the Intel(R) SUR software before version 2.4.8902 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Base Score: 7.7 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html
____________________________
Description
Improper input validation in the Intel(R) SUR software before version 2.4.8902 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Base Score: 7.4 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html
_________________________________
Description
Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.
Base Score: 7.2 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html
_____________________________
Description
Out of bounds read in firmware for OpenBMC in some Intel(R) platforms before version 0.72 may allow unauthenticated user to potentially enable denial of service via network access.
Base Score: 7.5 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html
_______________________________
Description
Incorrect default permissions in the software installer for some Intel(R) QAT drivers for Linux before version 4.17 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.3 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00751.html
_______________________________
Description
Improper access control in some QATzip software maintained by Intel(R) before version 1.0.9 may allow an authenticated user to potentially enable escalation of privilege via local access.
Base Score: 7.8 HIGH
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00765.html
CVE-2019-17621 Description The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network. Base Score: 9.8 CRITICAL https://www.dlink.com/en/security-bulletin
CVE-2022-43883 Description IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 could be vulnerable to a Log Injection attack by constructing URLs from user-controlled data. This could enable attackers to make arbitrary requests to the internal network or to the local file system. IBM X-Force ID: 240266. Base Score: 7.5 HIGH https://www.ibm.com/support/pages/node/6841801 ____________________ CVE-2022-38708 Description IBM Cognos Analytics […]
CVE-2023-21589 Description Adobe InDesign version 18.0 (and earlier), 17.4 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Base Score: 7.8 HIGH https://helpx.adobe.com/security/products/indesign/apsb23-07.html _____________________________________________________________________ CVE-2023-21588 […]
Leave a Reply