Page 61 of 1497 results (0.004 seconds)

CVSS: 7.3EPSS: 0%CPEs: 2EXPL: 0

Uncontrolled search path in some Intel(R) QAT drivers for Windows before version 1.6 may allow an authenticated user to potentially enable escalation of privilege via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00751.html • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Incorrect default permissions in the software installer for some Intel(R) QAT drivers for Linux before version 4.17 may allow an authenticated user to potentially enable escalation of privilege via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00751.html • CWE-276: Incorrect Default Permissions •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

Improper access control in the Crypto API Toolkit for Intel(R) SGX before version 2.0 commit ID 91ee496 may allow an authenticated user to potentially enable escalation of privilege via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00746.html •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Uncaught exception in the FCS Server software maintained by Intel before version 1.1.79.3 may allow a privileged user to potentially enable denial of service via physical access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00739.html • CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 7.2EPSS: 0%CPEs: 272EXPL: 0

Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access. A flaw was found in the Linux kernel. Some Intel(R) Xeon(R) processors with Intel® Software Guard Extensions (SGX) may allow privilege escalation. This issue may allow a privileged user to enable privilege escalation via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html https://access.redhat.com/security/cve/CVE-2022-33196 https://bugzilla.redhat.com/show_bug.cgi?id=2171252 • CWE-276: Incorrect Default Permissions •