Intel Xeon processors with SGX privilege escalation | CVE-2022-41804
NAME__________Intel Xeon processors with SGX privilege escalationPlatforms Affected:Intel Xeon D Processors Intel 3rd Generation Intel Xeon Scalable Processor Family Intel...
NAME__________Intel Xeon processors with SGX privilege escalationPlatforms Affected:Intel Xeon D Processors Intel 3rd Generation Intel Xeon Scalable Processor Family Intel...
NAME__________SAP NetWeaver Process Integration cross-site scriptingPlatforms Affected:SAP NetWeaver Process Integration SAP_XIESR 7.50 SAP NetWeaver Process Integration SAP_XITOOL 7.50 SAP NetWeaver...
NAME__________Zoom Rooms for Windows denial of servicePlatforms Affected:Zoom Zoom Rooms for Windows 5.15.4Risk Level:7.9Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Zoom Rooms for Windows...
NAME__________Microsoft Windows Kernel privilege escalationPlatforms Affected:Microsoft Windows Server 2019 Microsoft Windows 10 1809 for x64-based Systems Microsoft Windows 10 1809...
NAME__________Intel ethernet controllers and adapters E810 Series denial of servicePlatforms Affected:Intel Ethernet controllers and adapters E810 SeriesRisk Level:6.5Exploitability:UnprovenConsequences:Denial of Service...
NAME__________Intel Ethernet Controller Remote Direct Memory Access (RDMA) driver for Linux escalationPlatforms Affected:Intel Ethernet Controller Remote Direct Memory Access (RDMA)...
NAME__________Zoom Client SDK for Windows information disclosurePlatforms Affected:Zoom Client SDK for Windows 5.14.0Risk Level:5.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Zoom Client SDK for Windows...
NAME__________AMD uProf denial of servicePlatforms Affected:AMD uProf toolRisk Level:5.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________AMD uProf is vulnerable to a denial of service,...
NAME__________SAP PowerDesigner code executionPlatforms Affected:SAP PowerDesigner Proxy 16.7Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________SAP PowerDesigner could allow a local authenticated attacker to execute...
NAME__________Softing edgeConnector Siemens denial of servicePlatforms Affected:Softing edgeConnector Siemens 3.40Risk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Softing edgeConnector Siemens is vulnerable to a...
NAME__________Softing edgeAggregator code executionPlatforms Affected:Softing edgeAggregatorRisk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Softing edgeAggregator could allow a remote authenticated attacker to execute arbitrary code...
NAME__________Softing edgeConnector Siemens denial of servicePlatforms Affected:Softing edgeConnector SiemensRisk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Softing edgeConnector Siemens is vulnerable to a denial...
NAME__________Softing Secure Integration Server code executionPlatforms Affected:Softing Secure Integration ServerRisk Level:6.6Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Softing Secure Integration Server could allow a remote...
NAME__________Node.js security bypassPlatforms Affected:Node.js Node.js 16.0 Node.js Node.js 18.0 Node.js Node.js 20.0Risk Level:7.5Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Node.js could allow a remote attacker...
NAME__________Node.js security bypassPlatforms Affected:Node.js Node.js 16.0 Node.js Node.js 18.0 Node.js Node.js 20.0Risk Level:5.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Node.js could allow a remote attacker...
NAME__________Apache Traffic Server denial of servicePlatforms Affected:Apache Traffic Server 8.0.0 Apache Traffic Server 9.0.0 Apache Traffic Server 8.1.7 Apache Traffic...
NAME__________Rikunabi NEXT open redirectPlatforms Affected:Rikunabi NEXT 11.5.0Risk Level:4.3Exploitability:UnprovenConsequences:Other DESCRIPTION__________Rikunabi NEXT could allow a remote attacker to conduct phishing attacks, caused...
NAME__________Node.js security bypassPlatforms Affected:Node.js Node.js 20.0Risk Level:7.5Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Node.js could allow a remote attacker to bypass security restrictions, caused by...
NAME__________Node.js security bypassPlatforms Affected:Node.js Node.js 20.0Risk Level:5.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Node.js could allow a remote attacker to bypass security restrictions, caused by...
NAME__________Softing Secure Integration Server code executionPlatforms Affected:Softing Secure Integration ServerRisk Level:6.6Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Softing Secure Integration Server could allow a remote...
NAME__________Node.js information disclosurePlatforms Affected:Node.js Node.js 20.0Risk Level:3.7Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Node.js could allow a remote attacker to obtain sensitive information, caused by...
NAME__________Softing Secure Integration Server security bypassPlatforms Affected:Softing Secure Integration ServerRisk Level:4.4Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Softing Secure Integration Server could allow a remote...
NAME__________Softing Secure Integration Server security bypassPlatforms Affected:Softing Secure Integration ServerRisk Level:6.6Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Softing Secure Integration Server could allow a remote...
NAME__________Softing edgeAggregator code executionPlatforms Affected:Softing edgeAggregatorRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Softing edgeAggregator could allow a remote authenticated attacker to execute arbitrary code...