
CVE-2024-29015
https://notcve.org/view.php?id=CVE-2024-29015
14 Aug 2024 — Uncontrolled search path in some Intel(R) VTune(TM) Profiler software before versions 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01122.html • CWE-427: Uncontrolled Search Path Element •

CVE-2024-28887
https://notcve.org/view.php?id=CVE-2024-28887
14 Aug 2024 — Uncontrolled search path in some Intel(R) IPP software before version 2021.11 may allow an authenticated user to potentially enable escalation of privilege via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01129.html • CWE-427: Uncontrolled Search Path Element •

CVE-2024-21772
https://notcve.org/view.php?id=CVE-2024-21772
16 May 2024 — Uncontrolled search path in some Intel(R) Advisor software before version 2024.0 may allow an authenticated user to potentially enable escalation of privilege via local access. La ruta de búsqueda no controlada en algunos software Intel(R) Advisor anterior a la versión 2024.0 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01047.html • CWE-427: Uncontrolled Search Path Element •

CVE-2023-29162
https://notcve.org/view.php?id=CVE-2023-29162
14 Feb 2024 — Improper buffer restrictions the Intel(R) C++ Compiler Classic before version 2021.8 for Intel(R) oneAPI Toolkits before version 2022.3.1 may allow a privileged user to potentially enable escalation of privilege via local access. Las restricciones inadecuadas del búfer en algunos compiladores Intel(R) C++ Classic anteriores a la versión 2021.8 pueden permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00988.html • CWE-276: Incorrect Default Permissions •

CVE-2023-35121
https://notcve.org/view.php?id=CVE-2023-35121
14 Feb 2024 — Improper access control in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.2.1 for some Intel(R) oneAPI Toolkits before version 2022.3.1 may allow authenticated user to potentially enable escalation of privilege via local access. El control de acceso inadecuado en algunos software del compilador Intel(R) oneAPI DPC++/C++ anterior a la versión 2023.2.1 puede permitir que el usuario autenticado habilite potencialmente la escalada de privilegios a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00988.html • CWE-284: Improper Access Control •

CVE-2023-32618
https://notcve.org/view.php?id=CVE-2023-32618
14 Feb 2024 — Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.2 may allow an authenticated user to potentially enable escalation of privilege via local access. La ruta de búsqueda no controlada en algunos instaladores de software de componentes y kits de herramientas Intel(R) oneAPI anteriores a la versión 4.3.2 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00956.html • CWE-427: Uncontrolled Search Path Element •

CVE-2023-27383
https://notcve.org/view.php?id=CVE-2023-27383
14 Nov 2023 — Protection mechanism failure in some Intel(R) oneAPI HPC Toolkit 2023.1 and Intel(R)MPI Library software before version 2021.9 may allow a privileged user to potentially enable escalation of privilege via adjacent access. La falla del mecanismo de protección en algunos software Intel(R) oneAPI HPC Toolkit 2023.1 e Intel(R)MPI Library anteriores a la versión 2021.9 puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a través del acceso adyacente. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html • CWE-693: Protection Mechanism Failure •

CVE-2023-24592
https://notcve.org/view.php?id=CVE-2023-24592
14 Nov 2023 — Path traversal in the some Intel(R) oneAPI Toolkits and Component software before version 2023.1 may allow authenticated user to potentially enable escalation of privilege via local access. Path Traversal en algunos software Intel(R) oneAPI Toolkits and Component anteriores a la versión 2023.1 puede permitir que el usuario autenticado habilite potencialmente la escalada de privilegios a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2023-28823
https://notcve.org/view.php?id=CVE-2023-28823
11 Aug 2023 — Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.1.493 may allow an authenticated user to potentially enable escalation of privilege via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00890.html • CWE-427: Uncontrolled Search Path Element •

CVE-2023-27391
https://notcve.org/view.php?id=CVE-2023-27391
11 Aug 2023 — Improper access control in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.1.493 may allow a privileged user to potentially enable escalation of privilege via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00890.html • CWE-284: Improper Access Control •