Filtered by vendor Intel Subscriptions
Filtered by product Computing Improvement Program Subscriptions
Total 7 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-35769 1 Intel 1 Computing Improvement Program 2024-11-21 6.7 Medium
Uncontrolled search path in some Intel(R) CIP software before version 2.4.10577 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2021-0074 1 Intel 1 Computing Improvement Program 2024-11-21 7.8 High
Improper permissions in the installer for the Intel(R) Computing Improvement Program software before version 2.4.5982 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2021-0052 1 Intel 1 Computing Improvement Program 2024-11-21 7.8 High
Incorrect default privileges in the Intel(R) Computing Improvement Program before version 2.4.6522 may allow an authenticated user to potentially enable an escalation of privilege via local access.
CVE-2020-8736 1 Intel 1 Computing Improvement Program 2024-11-21 7.8 High
Improper access control in subsystem for the Intel(R) Computing Improvement Program before version 2.4.5718 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2020-12308 1 Intel 1 Computing Improvement Program 2024-11-21 6.5 Medium
Improper access control for the Intel(R) Computing Improvement Program before version 2.4.5982 may allow an unprivileged user to potentially enable information disclosure via network access.
CVE-2019-11162 1 Intel 1 Computing Improvement Program 2024-11-21 N/A
Insufficient access control in hardware abstraction in SEMA driver for Intel(R) Computing Improvement Program before version 2.4.0.04733 may allow an authenticated user to potentially enable escalation of privilege, denial of service or information disclosure via local access.
CVE-2018-12168 1 Intel 1 Computing Improvement Program 2024-11-21 N/A
Privilege escalation in file permissions in Intel Computing Improvement Program before version 2.2.0.03942 may allow an authenticated user to potentially execute code as administrator via local access.