Page 2 of 21 results (0.002 seconds)

CVSS: 6.0EPSS: 0%CPEs: 454EXPL: 0

Improper isolation of shared resources in some Intel(R) Processors when using Intel(R) Software Guard Extensions may allow a privileged user to potentially enable information disclosure via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00767.html •

CVSS: 7.2EPSS: 0%CPEs: 272EXPL: 0

Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access. A flaw was found in the Linux kernel. Some Intel(R) Xeon(R) processors with Intel® Software Guard Extensions (SGX) may allow privilege escalation. This issue may allow a privileged user to enable privilege escalation via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html https://access.redhat.com/security/cve/CVE-2022-33196 https://bugzilla.redhat.com/show_bug.cgi?id=2171252 • CWE-276: Incorrect Default Permissions •

CVSS: 4.9EPSS: 0%CPEs: 250EXPL: 0

Uncaught exception in webserver for the Integrated BMC in some Intel(R) platforms before versions 2.86, 2.09 and 2.78 may allow a privileged user to potentially enable denial of service via network access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html • CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 6.1EPSS: 0%CPEs: 106EXPL: 0

Incorrect calculation in microcode keying mechanism for some 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable information disclosure via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00730.html • CWE-682: Incorrect Calculation •

CVSS: 7.5EPSS: 0%CPEs: 466EXPL: 0

Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html • CWE-20: Improper Input Validation •