CVE-2024-28950
- EPSS 0.03%
- Veröffentlicht 13.11.2024 21:15:15
- Zuletzt bearbeitet 15.11.2024 14:00:09
Uncontrolled search path for some Intel(R) oneAPI Math Kernel Library software for Windows before version 2024.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2024-21766
- EPSS 0.02%
- Veröffentlicht 14.08.2024 14:15:15
- Zuletzt bearbeitet 14.08.2024 17:49:14
Uncontrolled search path for some Intel(R) oneAPI Math Kernel Library software before version 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-28823
- EPSS 0.06%
- Veröffentlicht 11.08.2023 03:15:26
- Zuletzt bearbeitet 21.11.2024 07:56:05
Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.1.493 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-28658
- EPSS 0.05%
- Veröffentlicht 11.08.2023 03:15:25
- Zuletzt bearbeitet 21.11.2024 07:55:45
Insecure inherited permissions in some Intel(R) oneMKL software before version 2022.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-27391
- EPSS 0.04%
- Veröffentlicht 11.08.2023 03:15:21
- Zuletzt bearbeitet 21.11.2024 07:52:48
Improper access control in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.1.493 may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2022-25864
- EPSS 0.05%
- Veröffentlicht 11.08.2023 03:15:10
- Zuletzt bearbeitet 21.11.2024 06:53:08
Uncontrolled search path in some Intel(R) oneMKL software before version 2022.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-22355
- EPSS 0.08%
- Veröffentlicht 10.05.2023 14:15:27
- Zuletzt bearbeitet 21.11.2024 07:44:37
Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.0.251 may allow an authenticated user to potentially enable escalation of privilege via local access.