
CVE-2023-47210
https://notcve.org/view.php?id=CVE-2023-47210
16 May 2024 — Improper input validation for some Intel(R) PROSet/Wireless WiFi software for linux before version 23.20 may allow an unauthenticated user to potentially enable denial of service via adjacent access. La validación de entrada incorrecta para algunos software Intel(R) PROSet/Wireless WiFi para Linux anteriores a la versión 23.20 puede permitir que un usuario no autenticado habilite potencialmente la denegación de servicio a través del acceso adyacente. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01039.html • CWE-20: Improper Input Validation •

CVE-2023-25951
https://notcve.org/view.php?id=CVE-2023-25951
14 Feb 2024 — Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow a privileged user to potentially enable escalation of privilege via local access. La validación de entrada incorrecta para algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versión 22.240 puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html • CWE-20: Improper Input Validation •

CVE-2022-38076 – hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi
https://notcve.org/view.php?id=CVE-2022-38076
11 Aug 2023 — Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access. Una validación de entrada incorrecta en algunos programas Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario autenticado habilite potencialmente una escalada de privilegios mediante acceso local. An improper input validation flaw was found in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiF... • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html • CWE-20: Improper Input Validation •

CVE-2022-36351 – hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi
https://notcve.org/view.php?id=CVE-2022-36351
11 Aug 2023 — Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access. La validación de entrada incorrecta en algunos programas Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario no autenticado habilite potencialmente la denegación de servicio a través del acceso adyacente. An improper input validation flaw was found in some Intel(R) PROSet/Wireless WiFi and Killer(... • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html • CWE-20: Improper Input Validation •

CVE-2022-40964 – hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi
https://notcve.org/view.php?id=CVE-2022-40964
11 Aug 2023 — Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access. Un control de acceso inadecuado para algunos programas Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario con privilegios habilite potencialmente una escalada de privilegios mediante acceso local. An improper access control flaw was found in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi soft... • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html • CWE-284: Improper Access Control •

CVE-2022-46329 – hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi
https://notcve.org/view.php?id=CVE-2022-46329
11 Aug 2023 — Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege via local access. Un fallo en el mecanismo de protección de algunos software de Intel(R) PROSet/Wireless WiFi puede permitir que un usuario con privilegios habilite potencialmente una escalada de privilegios mediante acceso local. Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to enable escalation of p... • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html • CWE-693: Protection Mechanism Failure •

CVE-2022-27635 – hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi
https://notcve.org/view.php?id=CVE-2022-27635
11 Aug 2023 — Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access. Un control de acceso inadecuado para algunos programas Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario con privilegios habilite potencialmente una escalada de privilegios mediante acceso local. Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a ... • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html • CWE-284: Improper Access Control •

CVE-2022-26047
https://notcve.org/view.php?id=CVE-2022-26047
11 Nov 2022 — Improper input validation for some Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products may allow unauthenticated user to potentially enable denial of service via local access. La validación de entrada incorrecta para algunos productos Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi y Killer(TM) WiFi puede permitir que usuarios no autenticados habiliten potencialmente la Denegación de Servicio (DoS) a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html • CWE-20: Improper Input Validation CWE-1284: Improper Validation of Specified Quantity in Input •

CVE-2021-23179
https://notcve.org/view.php?id=CVE-2021-23179
18 Aug 2022 — Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow a privileged user to potentially enable information disclosure via local access. Una lectura fuera de límites en el firmware de algunos productos Intel(R) Wireless Bluetooth(R) y Killer(TM) Bluetooth(R) versiones anteriores a 22.120, puede permitir que un usuario privilegiado permita potencialmente la divulgación de información por medio del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html • CWE-125: Out-of-bounds Read •

CVE-2021-26950
https://notcve.org/view.php?id=CVE-2021-26950
18 Aug 2022 — Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access. Una lectura fuera de límites en el firmware de algunos productos Intel(R) Wireless Bluetooth(R) y Killer(TM) Bluetooth(R) versiones anteriores a 22.120 puede permitir a un usuario autenticado habilitar potencialmente la denegación de servicio por acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html • CWE-125: Out-of-bounds Read •