Page 3 of 8140 results (0.142 seconds)

CVSS: 7.3EPSS: 0%CPEs: -EXPL: 0

13 May 2025 — Race condition in some Administrative Tools for some Intel(R) Network Adapters package before version 29.4 may allow an authenticated user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01293.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 8.7EPSS: 0%CPEs: -EXPL: 0

13 May 2025 — Improper access control in the memory controller configurations for some Intel(R) Xeon(R) 6 processor with E-cores may allow a privileged user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01278.html • CWE-284: Improper Access Control •

CVSS: 6.7EPSS: 0%CPEs: -EXPL: 0

13 May 2025 — Incorrect Default Permissions for some Intel(R) RealSense™ SDK software before version 2.56.2 may allow an authenticated user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01305.html • CWE-276: Incorrect Default Permissions •

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 0

13 May 2025 — Improper authentication in the firmware for the Intel(R) Slim Bootloader may allow a privileged user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01290.html • CWE-287: Improper Authentication •

CVSS: 8.7EPSS: 0%CPEs: -EXPL: 0

13 May 2025 — Time-of-check time-of-use race condition in the UEFI firmware SmiVariable driver for the Intel(R) Server D50DNP and M50FCP boards may allow a privileged user to enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01269.html • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 6.7EPSS: 0%CPEs: -EXPL: 0

13 May 2025 — Uncontrolled search path for some Intel(R) Advisor software may allow an authenticated user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01263.html • CWE-427: Uncontrolled Search Path Element •

CVSS: 6.7EPSS: 0%CPEs: -EXPL: 0

13 May 2025 — Uncontrolled search path for some Intel(R) RealSense™ SDK software before version 2.56.2 may allow an authenticated user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01305.html • CWE-427: Uncontrolled Search Path Element •

CVSS: 6.7EPSS: 0%CPEs: -EXPL: 0

13 May 2025 — Uncontrolled search path for some Intel(R) Graphics software for Intel(R) Arc™ graphics and Intel(R) Iris(R) Xe graphics before version 32.0.101.6325/32.0.101.6252 may allow an authenticated user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html • CWE-427: Uncontrolled Search Path Element •

CVSS: 8.4EPSS: 0%CPEs: -EXPL: 0

13 May 2025 — Untrusted pointer dereference for some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html • CWE-822: Untrusted Pointer Dereference •

CVSS: 6.7EPSS: 0%CPEs: -EXPL: 0

13 May 2025 — Uncontrolled search path element for some Intel(R) Ethernet Connection software before version 29.4 may allow an authenticated user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01294.html • CWE-427: Uncontrolled Search Path Element •