CVE-2023-22841
https://notcve.org/view.php?id=CVE-2023-22841
Unquoted search path in the software installer for the System Firmware Update Utility (SysFwUpdt) for some Intel(R) Server Boards and Intel(R) Server Systems Based on Intel(R) 621A Chipset before version 16.0.7 may allow an authenticated user to potentially enable escalation of privilege via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00830.html • CWE-427: Uncontrolled Search Path Element CWE-428: Unquoted Search Path or Element •
CVE-2022-29493
https://notcve.org/view.php?id=CVE-2022-29493
Uncaught exception in webserver for the Integrated BMC in some Intel(R) platforms before versions 2.86, 2.09 and 2.78 may allow a privileged user to potentially enable denial of service via network access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html • CWE-755: Improper Handling of Exceptional Conditions •
CVE-2022-29494
https://notcve.org/view.php?id=CVE-2022-29494
Improper input validation in firmware for OpenBMC in some Intel(R) platforms before versions egs-0.91-179 and bhs-04-45 may allow an authenticated user to potentially enable denial of service via network access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html • CWE-20: Improper Input Validation •
CVE-2022-35729
https://notcve.org/view.php?id=CVE-2022-35729
Out of bounds read in firmware for OpenBMC in some Intel(R) platforms before version 0.72 may allow unauthenticated user to potentially enable denial of service via network access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html • CWE-125: Out-of-bounds Read •
CVE-2022-0004
https://notcve.org/view.php?id=CVE-2022-0004
Hardware debug modes and processor INIT setting that allow override of locks for some Intel(R) Processors in Intel(R) Boot Guard and Intel(R) TXT may allow an unauthenticated user to potentially enable escalation of privilege via physical access. Los modos de depuración de hardware y la configuración INIT del procesador que permiten la anulación de bloqueos para algunos procesadores Intel(R) en Intel(R) Boot Guard e Intel(R) TXT pueden permitir que un usuario no autenticado permita potencialmente una escalada de privilegios por medio del acceso físico • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00613.html •