Total
306815 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-38665 | 2024-11-15 | N/A | 8.4 HIGH | ||
Out-of-bounds write in some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-25563 | 2024-11-15 | N/A | 3.4 LOW | ||
Improper initialization in firmware for some Intel(R) PROSet/Wireless Software and Intel(R) Killer(TM) Wi-Fi before version 23.40 may allow a privileged user to potentially enable information disclosure via local access. | |||||
CVE-2024-34170 | 2024-11-15 | N/A | 6.6 MEDIUM | ||
Improper buffer restrictions in some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable denial of service via local access. | |||||
CVE-2024-36242 | 2024-11-15 | N/A | 8.8 HIGH | ||
Protection mechanism failure in the SPP for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-52551 | 2024-11-15 | N/A | 8.0 HIGH | ||
Jenkins Pipeline: Declarative Plugin 2.2214.vb_b_34b_2ea_9b_83 and earlier does not check whether the main (Jenkinsfile) script used to restart a build from a specific stage is approved, allowing attackers with Item/Build permission to restart a previous build whose (Jenkinsfile) script is no longer approved. | |||||
CVE-2024-37025 | 2024-11-15 | N/A | 6.7 MEDIUM | ||
Incorrect execution-assigned permissions in some Intel(R) Advanced Link Analyzer Standard Edition software installer before version 23.1.1 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-32044 | 2024-11-15 | N/A | 6.8 MEDIUM | ||
Improper access control for some Intel(R) Arc(TM) Pro Graphics for Windows drivers before version 31.0.101.5319 may allow an authenticated user to potentially enable escalation of privilege via adjacent access. | |||||
CVE-2024-28881 | 2024-11-15 | N/A | 6.7 MEDIUM | ||
Uncontrolled search path for some Intel(R) Fortran Compiler Classic software before version 2021.13 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-34165 | 2024-11-15 | N/A | 6.7 MEDIUM | ||
Uncontrolled search path in some Intel(R) oneAPI DPC++/C++ Compiler before version 2024.2 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-32667 | 2024-11-15 | N/A | 3.9 LOW | ||
Out-of-bounds read for some OpenCL(TM) software may allow an authenticated user to potentially enable denial of service via local access. | |||||
CVE-2024-37024 | 2024-11-15 | N/A | 6.7 MEDIUM | ||
Uncontrolled search path for some ACAT software maintained by Intel(R) for Windows before version 3.11.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-28030 | 2024-11-15 | N/A | 2.2 LOW | ||
NULL pointer dereference in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable denial of service via local access. | |||||
CVE-2024-31074 | 2024-11-15 | N/A | 5.9 MEDIUM | ||
Observable timing discrepancy in some Intel(R) QAT Engine for OpenSSL software before version v1.6.1 may allow information disclosure via network access. | |||||
CVE-2024-28952 | 2024-11-15 | N/A | 6.7 MEDIUM | ||
Uncontrolled search path for some Intel(R) IPP software for Windows before version 2021.12.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-33611 | 2024-11-15 | N/A | 3.4 LOW | ||
Improper input validation for some Intel(R) PROSet/Wireless WiFi software for Windows before version 23.60 may allow a privileged user to potentially enable denial of service via local access. | |||||
CVE-2024-29085 | 2024-11-15 | N/A | 5.5 MEDIUM | ||
Improper access control for some BigDL software maintained by Intel(R) before version 2.5.0 may allow an authenticated user to potentially enable escalation of privilege via adjacent access. | |||||
CVE-2024-11193 | 2024-11-15 | N/A | 6.5 MEDIUM | ||
An information disclosure vulnerability exists in Yugabyte Anywhere, where the LDAP bind password is logged in plaintext within application logs. This flaw results in the unintentional exposure of sensitive information in Yugabyte Anywhere logs, potentially allowing unauthorized users with access to these logs to view the LDAP bind password. An attacker with log access could exploit this vulnerability to gain unauthorized access to the LDAP server, leading to potential exposure or compromise of LDAP-managed resources This issue affects YugabyteDB Anywhere: from 2.20.0.0 before 2.20.7.0, from 2.23.0.0 before 2.23.1.0, from 2024.1.0.0 before 2024.1.3.0. | |||||
CVE-2024-29076 | 2024-11-15 | N/A | 5.5 MEDIUM | ||
Uncaught exception for some Intel(R) CST software before version 8.7.10803 may allow an authenticated user to potentially enable denial of service via local access. | |||||
CVE-2024-34028 | 2024-11-15 | N/A | 6.7 MEDIUM | ||
Uncontrolled search path in some Intel(R) Graphics Offline Compiler for OpenCL(TM) Code software for Windows before version 2024.1.0.142, graphics driver 31.0.101.5445 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2024-32483 | 2024-11-15 | N/A | 8.2 HIGH | ||
Improper access control for some Intel(R) EMA software before version 1.13.1.0 may allow an authenticated user to potentially enable escalation of privilege via local access. |