Page 17 of 91 results (0.005 seconds)

CVSS: 7.0EPSS: 0%CPEs: 25EXPL: 0

Race condition in software installer for some Intel(R) Wireless Bluetooth(R) products on Windows* 7, 8.1 and 10 may allow an unprivileged user to potentially enable escalation of privilege via local access. Una condición de carrera en el instalador del software para algunos productos Intel® Wireless Bluetooth® en Windows* versiones 7, 8.1 y 10, puede permitir a un usuario poco privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00337.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.8EPSS: 0%CPEs: 78EXPL: 0

Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access. Unos permisos heredados no seguros en algunos productos Intel® PROSet/Wireless WiFi en Windows* versiones 7 y 8.1 anteriores a versión 21.40.5.1, pueden permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 8.8EPSS: 0%CPEs: 14EXPL: 0

Insecure inherited permissions in Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access. Los permisos heredados no seguros en los productos Intel® PROSet/Wireless WiFi versiones anteriores a la versión 21.70, en Windows 10 pueden permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Intel Wi-Fi Link Driver. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of 802.11 frames. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 8.8EPSS: 0%CPEs: 14EXPL: 0

Improper buffer restrictions in kernel mode driver for Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an unprivileged user to potentially enable denial of service via adjacent access. Unas restricciones inapropiadas del búfer en el controlador del modo kernel para los productos Intel® PROSet/Wireless WiFi versiones anteriores a la versión 21.70 en Windows 10, pueden permitir a un usuario no privilegiado habilitar potencialmente una denegación de servicio por medio de un acceso adyacente. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Intel Wi-Fi Link Driver. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of 802.11 frames. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html •

CVSS: 7.3EPSS: 0%CPEs: 30EXPL: 0

Out of bounds write in Intel(R) PROSet/Wireless WiFi products on Windows 10 may allow an authenticated user to potentially enable denial of service via local access. Una escritura fuera de límites en los productos Intel® PROSet/Wireless WiFi en Windows 10 puede habilitar a un usuario autenticado para permitir potencialmente una denegación de servicio por medio de un acceso local • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html https://access.redhat.com/security/cve/CVE-2020-0569 https://bugzilla.redhat.com/show_bug.cgi?id=1800600 • CWE-73: External Control of File Name or Path CWE-787: Out-of-bounds Write •