17 results (0.012 seconds)

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

14 Aug 2024 — Incorrect default permissions in some Intel(R) Distribution for GDB software before version 2024.0.1 may allow an authenticated user to potentially enable escalation of privilege via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01075.html • CWE-276: Incorrect Default Permissions •

CVSS: 3.3EPSS: 0%CPEs: 2EXPL: 0

14 Aug 2024 — Improper input validation for some Intel(R) Distribution for GDB software before version 2024.0.1 may allow an authenticated user to potentially enable denial of service via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01075.html • CWE-20: Improper Input Validation •

CVSS: 7.3EPSS: 0%CPEs: 3EXPL: 0

14 Aug 2024 — Uncontrolled search path in some Intel(R) Distribution for GDB software before version 2024.0.1 may allow an authenticated user to potentially enable escalation of privilege via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01075.html • CWE-427: Uncontrolled Search Path Element •

CVSS: 6.6EPSS: 0%CPEs: 2EXPL: 0

14 Aug 2024 — Improper buffer restrictions in some Intel(R) Distribution for GDB software before version 2024.0.1 may allow an authenticated user to potentially enable denial of service via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01075.html • CWE-92: DEPRECATED: Improper Sanitization of Custom Special Characters •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

14 Aug 2024 — Incorrect default permissions for some Intel(R) Advisor software before version 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01110.html • CWE-276: Incorrect Default Permissions •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

14 Aug 2024 — Uncontrolled search path in some Intel(R) VTune(TM) Profiler software before versions 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01122.html • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

14 Aug 2024 — Uncontrolled search path in some Intel(R) IPP software before version 2021.11 may allow an authenticated user to potentially enable escalation of privilege via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01129.html • CWE-427: Uncontrolled Search Path Element •

CVSS: 6.7EPSS: 0%CPEs: 2EXPL: 0

16 May 2024 — Uncontrolled search path in some Intel(R) Advisor software before version 2024.0 may allow an authenticated user to potentially enable escalation of privilege via local access. La ruta de búsqueda no controlada en algunos software Intel(R) Advisor anterior a la versión 2024.0 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01047.html • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

14 Feb 2024 — Improper access control in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.2.1 for some Intel(R) oneAPI Toolkits before version 2022.3.1 may allow authenticated user to potentially enable escalation of privilege via local access. El control de acceso inadecuado en algunos software del compilador Intel(R) oneAPI DPC++/C++ anterior a la versión 2023.2.1 puede permitir que el usuario autenticado habilite potencialmente la escalada de privilegios a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00988.html • CWE-284: Improper Access Control •

CVSS: 6.7EPSS: 0%CPEs: 7EXPL: 0

14 Feb 2024 — Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.2 may allow an authenticated user to potentially enable escalation of privilege via local access. La ruta de búsqueda no controlada en algunos instaladores de software de componentes y kits de herramientas Intel(R) oneAPI anteriores a la versión 4.3.2 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00956.html • CWE-427: Uncontrolled Search Path Element •