Page 8 of 8650 results (0.014 seconds)

CVSS: 6.7EPSS: 0%CPEs: -EXPL: 0

12 Aug 2025 — Uncontrolled search path for some Clock Jitter Tool software before version 6.0.1 may allow an authenticated user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01316.html • CWE-427: Uncontrolled Search Path Element •

CVSS: 6.7EPSS: 0%CPEs: -EXPL: 0

12 Aug 2025 — Incorrect default permissions for some Intel(R) oneAPI DPC++/C++ Compiler software installers may allow an authenticated user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01285.html • CWE-276: Incorrect Default Permissions •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

12 Aug 2025 — Time-of-check Time-of-use race condition for some Intel(R) Connectivity Performance Suite software installers before version 40.24.11210 may allow an authenticated user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01286.html • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

12 Aug 2025 — Improper buffer restrictions for some Intel(R) Xeon(R) Processor firmware with SGX enabled may allow a privileged user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.7EPSS: 0%CPEs: -EXPL: 0

12 Aug 2025 — Uncontrolled search path for the Intel(R) Trace Analyzer and Collector software all verions may allow an authenticated user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01266.html • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.2EPSS: 0%CPEs: -EXPL: 0

12 Aug 2025 — Time-of-check time-of-use race condition in firmware for some Intel(R) Converged Security and Management Engine may allow a privileged user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01280.html • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 6.7EPSS: 0%CPEs: -EXPL: 0

12 Aug 2025 — Incorrect default permissions for some Intel(R) Graphics Driver software installers may allow an authenticated user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01299.html • CWE-276: Incorrect Default Permissions •

CVSS: 6.7EPSS: 0%CPEs: -EXPL: 0

12 Aug 2025 — Uncontrolled search path for some Intel(R) oneAPI Toolkit and component software installers may allow an authenticated user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01285.html • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

12 Aug 2025 — A low-privileged local attacker can exploit improper permissions on nssm.exe to escalate their privileges and gain administrative access. Un atacante local con pocos privilegios puede explotar permisos inadecuados en nssm.exe para aumentar sus privilegios y obtener acceso administrativo. • https://certvde.com/de/advisories/VDE-2025-063 • CWE-306: Missing Authentication for Critical Function •

CVSS: 9.4EPSS: 0%CPEs: -EXPL: 3

11 Aug 2025 — Due to misconfigured sudoers, the openfiler user can escalate privileges to root via sudo /bin/bash without a password. • http://web.archive.org/web/20210922060411/https://itsecuritysolutions.org/2012-09-06-Openfiler-v2.x-multiple-vulnerabilities • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •