4725 results (0.002 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

12 Aug 2025 — Improperly implemented security check for standard in the DDRIO configuration for some Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html • CWE-358: Improperly Implemented Security Check for Standard •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

12 Aug 2025 — Out-of-bounds write in the memory subsystem for some Intel(R) Xeon(R) 6 processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html • CWE-787: Out-of-bounds Write •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

12 Aug 2025 — Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html • CWE-691: Insufficient Control Flow Management •

CVSS: 7.9EPSS: 0%CPEs: 2EXPL: 0

12 Aug 2025 — Improper handling of overlap between protected memory ranges for some Intel(R) Xeon(R) 6 processor with Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01311.html • CWE-1260: Improper Handling of Overlap Between Protected Memory Ranges •

CVSS: 7.4EPSS: 0%CPEs: 2EXPL: 0

12 Aug 2025 — Sequence of processor instructions leads to unexpected behavior for some Intel(R) Xeon(R) 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01308.html • CWE-1281: Sequence of Processor Instructions Leads to Unexpected Behavior •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

12 Aug 2025 — Insufficient granularity of access control in the OOB-MSM for some Intel(R) Xeon(R) 6 Scalable processors may allow a privileged user to potentially enable escalation of privilege via adjacent access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01310.html • CWE-1220: Insufficient Granularity of Access Control •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

12 Aug 2025 — Missing reference to active allocated resource for some Intel(R) Xeon(R) processors may allow an authenticated user to potentially enable denial of service via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html • CWE-771: Missing Reference to Active Allocated Resource •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

12 Aug 2025 — Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01249.html • CWE-653: Improper Isolation or Compartmentalization •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

12 Aug 2025 — Improper buffer restrictions for some Intel(R) Xeon(R) Processor firmware with SGX enabled may allow a privileged user to potentially enable escalation of privilege via local access. • https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 0

11 Aug 2025 — A vulnerability was determined in LibTIFF up to 4.5.1. Affected by this issue is the function readSeparateStripsetoBuffer of the file tools/tiffcrop.c of the component tiffcrop. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The patch is identified as 8a7a48d7a645992ca83062b3a1873c951661e2b3. • http://www.libtiff.org • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •