Page 3 of 34 results (0.011 seconds)

CVSS: 6.1EPSS: 0%CPEs: 106EXPL: 0

Incorrect calculation in microcode keying mechanism for some 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable information disclosure via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00730.html • CWE-682: Incorrect Calculation •

CVSS: 7.5EPSS: 0%CPEs: 466EXPL: 0

Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 362EXPL: 0

Improper initialization in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html • CWE-665: Improper Initialization •

CVSS: 7.5EPSS: 0%CPEs: 106EXPL: 0

Use after free in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html • CWE-416: Use After Free •

CVSS: 7.5EPSS: 0%CPEs: 132EXPL: 0

Insufficient granularity of access control in out-of-band management in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a privileged user to potentially enable escalation of privilege via adjacent network access. A flaw was found in the Linux kernel. A potential security vulnerability in some Intel(R) Atom(R) and Intel(R) Xeon(R) Scalable Processors may allow privilege escalation. This flaw may allow a privileged user to enable privilege escalation via adjacent network access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00700.html https://security.netapp.com/advisory/ntap-20230601-0005 https://access.redhat.com/security/cve/CVE-2022-21216 https://bugzilla.redhat.com/show_bug.cgi?id=2171227 •