![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-27383
https://notcve.org/view.php?id=CVE-2023-27383
14 Nov 2023 — Protection mechanism failure in some Intel(R) oneAPI HPC Toolkit 2023.1 and Intel(R)MPI Library software before version 2021.9 may allow a privileged user to potentially enable escalation of privilege via adjacent access. La falla del mecanismo de protección en algunos software Intel(R) oneAPI HPC Toolkit 2023.1 e Intel(R)MPI Library anteriores a la versión 2021.9 puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a través del acceso adyacente. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html • CWE-693: Protection Mechanism Failure •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-24592
https://notcve.org/view.php?id=CVE-2023-24592
14 Nov 2023 — Path traversal in the some Intel(R) oneAPI Toolkits and Component software before version 2023.1 may allow authenticated user to potentially enable escalation of privilege via local access. Path Traversal en algunos software Intel(R) oneAPI Toolkits and Component anteriores a la versión 2023.1 puede permitir que el usuario autenticado habilite potencialmente la escalada de privilegios a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-22355
https://notcve.org/view.php?id=CVE-2023-22355
10 May 2023 — Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.0.251 may allow an authenticated user to potentially enable escalation of privilege via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00819.html • CWE-427: Uncontrolled Search Path Element •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-1767
https://notcve.org/view.php?id=CVE-2023-1767
20 Apr 2023 — The Snyk Advisor website (https://snyk.io/advisor/) was vulnerable to a stored XSS prior to 28th March 2023. A feature of Snyk Advisor is to display the contents of a scanned package's Readme on its package health page. An attacker could create a package in NPM with an associated markdown README file containing XSS-able HTML tags. Upon Snyk Advisor importing the package, the XSS would run each time an end user browsed to the package's page on Snyk Advisor. • https://github.com/weizman/CVE-2023-1767 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-21128
https://notcve.org/view.php?id=CVE-2022-21128
12 May 2022 — Insufficient control flow management in the Intel(R) Advisor software before version 7.6.0.37 may allow an authenticated user to potentially enable escalation of privilege via local access. Una administración insuficiente del flujo de control en el software Intel(R) Advisor versiones anteriores a 7.6.0.37 puede permitir que un usuario autenticado permita potencialmente una escalada de privilegios por medio del acceso local • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00661.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-33129
https://notcve.org/view.php?id=CVE-2021-33129
09 Feb 2022 — Incorrect default permissions in the software installer for the Intel(R) Advisor before version 2021.4.0 may allow an authenticated user to potentially enable escalation of privilege via local access. Unos permisos predeterminados incorrectos en el instalador de software para el Intel(R) Advisor versiones anteriores a 2021.4.0, pueden permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de acceso local • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00594.html • CWE-276: Incorrect Default Permissions •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-23152
https://notcve.org/view.php?id=CVE-2021-23152
09 Feb 2022 — Improper access control in the Intel(R) Advisor software before version 2021.2 may allow an authenticated user to potentially enable escalation of privilege via local access. Un control de acceso inapropiado en el software Intel(R) Advisor versiones anteriores a 2021.2, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de acceso local • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00622.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-5682
https://notcve.org/view.php?id=CVE-2017-5682
28 Feb 2017 — Intel PSET Application Install wrapper of Intel Parallel Studio XE, Intel System Studio, Intel VTune Amplifier, Intel Inspector, Intel Advisor, Intel MPI Library, Intel Trace Analyzer and Collector, Intel Integrated Performance Primitives, Cryptography for Intel Integrated Performance Primitives, Intel Math Kernel Library, Intel Data Analytics Acceleration Library, and Intel Threading Building Blocks before 2017 Update 2 allows an attacker to launch a process with escalated privileges. Intel PSET Applicatio... • http://www.securityfocus.com/bid/96482 •