Filtered by vendor Intel
Subscriptions
Total
1810 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-34164 | 1 Intel | 1 Mas Software | 2024-11-15 | 6.7 Medium |
Uncontrolled search path element in some Intel(R) MAS software before version 2.5 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-34022 | 1 Intel | 1 Thunderbolt Share Software | 2024-11-15 | 6.7 Medium |
Improper Access Control in some Thunderbolt(TM) Share software before version 1.0.49.9 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-28881 | 1 Intel | 1 Fortran Compiler | 2024-11-15 | 6.7 Medium |
Uncontrolled search path for some Intel(R) Fortran Compiler Classic software before version 2021.13 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-26017 | 1 Intel | 1 Rendering Toolkit Software | 2024-11-15 | 6.7 Medium |
Uncontrolled search path in some Intel(R) Rendering Toolkit software before version 2024.1.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-39811 | 1 Intel | 1 M20ntp Firmware | 2024-11-15 | 6.3 Medium |
Improper input validation in firmware for some Intel(R) Server M20NTP Family UEFI may allow a privileged user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-29077 | 1 Intel | 1 Jam Stapl Player Software | 2024-11-15 | 6.7 Medium |
Improper access control in some JAM STAPL Player software before version 2.6.1 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-21820 | 1 Intel | 4 3rd Generation Intel Xeon Scalable Processor Family, 4th Generation Intel Xeon Processor Scalable Family, 5th Generation Intel Xeon Processor Scalable Family and 1 more | 2024-11-15 | 7.2 High |
Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-37024 | 1 Intel | 1 Acat Software | 2024-11-15 | 6.7 Medium |
Uncontrolled search path for some ACAT software maintained by Intel(R) for Windows before version 3.11.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-31158 | 1 Intel | 1 Server Board S2600bp Firmware | 2024-11-15 | 7.5 High |
Improper input validation in UEFI firmware in some Intel(R) Server Board S2600BP Family may allow a privileged user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-24985 | 1 Intel | 2 4th Generation Intel Xeon Processor Scalable Family, 5th Generation Intel Xeon Processor Scalable Family | 2024-11-15 | 7.2 High |
Exposure of resource to wrong sphere in some Intel(R) processors with Intel(R) ACTM may allow a privileged user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-36282 | 1 Intel | 1 Server Board S2600st Firmware | 2024-11-15 | 8.2 High |
Improper input validation in the Intel(R) Server Board S2600ST Family BIOS and Firmware Update software all versions may allow a privileged user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-36242 | 1 Intel | 1 Processors | 2024-11-15 | 8.8 High |
Protection mechanism failure in the SPP for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-34165 | 1 Intel | 1 Oneapi Dpc\+\+\/c\+\+ Compiler | 2024-11-15 | 6.7 Medium |
Uncontrolled search path in some Intel(R) oneAPI DPC++/C++ Compiler before version 2024.2 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-23918 | 1 Intel | 4 3rd Generation Intel Xeon Scalable Processor Family, 4th Generation Intel Xeon Processor Scalable Family, 5th Generation Intel Xeon Processor Scalable Family and 1 more | 2024-11-15 | 8.8 High |
Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-29083 | 1 Intel | 1 Distribution For Python | 2024-11-15 | 6.7 Medium |
Incorrect default permissions in some Intel(R) Distribution for Python software before version 2024.2 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2024-28170 | 1 Intel | 1 Raid Web Console | 2024-09-23 | 3.3 Low |
Improper access control in Intel(R) RAID Web Console all versions may allow an authenticated user to potentially enable information disclosure via local access. | ||||
CVE-2024-32666 | 1 Intel | 1 Raid Web Console | 2024-09-23 | 4.7 Medium |
NULL pointer dereference in Intel(R) RAID Web Console software for all versions may allow an authenticated user to potentially enable denial of service via local access. | ||||
CVE-2024-32940 | 1 Intel | 1 Raid Web Console | 2024-09-23 | 6.5 Medium |
Improper access control in Intel(R) RAID Web Console software for all versions may allow an authenticated user to potentially enable denial of service via adjacent access. | ||||
CVE-2024-33848 | 1 Intel | 1 Raid Web Console | 2024-09-23 | 6.5 Medium |
Uncaught exception in Intel(R) RAID Web Console software all versions may allow an authenticated user to potentially enable denial of service via local access. | ||||
CVE-2024-34153 | 1 Intel | 1 Raid Web Console | 2024-09-23 | 6.7 Medium |
Uncontrolled search path element in Intel(R) RAID Web Console software for all versions may allow an authenticated user to potentially enable escalation of privilege via local access. |