cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-28050,https://securityvulnerability.io/vulnerability/CVE-2024-28050,Improper Access Control in Intel Arc and Iris Graphics Software,"An improper access control vulnerability in Intel Arc and Iris Xe Graphics software has been identified, which may enable authenticated users to trigger a denial of service condition via local access. This vulnerability affects all versions prior to 31.0.101.4824, necessitating immediate attention from users to mitigate potential risks.",Intel,Intel(r) Arc(tm) & Iris(r) Xe Graphics Software,5.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:16.572Z,0 CVE-2024-21864,https://securityvulnerability.io/vulnerability/CVE-2024-21864,Privilege Escalation Vulnerability in Intel Graphics Software,"An improper neutralization vulnerability exists in Intel Arc and Iris Xe Graphics software that affects versions prior to 31.0.101.5081. This flaw may allow an unauthenticated user with adjacent network access to enable a potential escalation of privilege. This vulnerability can lead to unauthorized control over system resources or sensitive data, impacting the overall security of affected systems. Recommended actions include updating to the latest versions of the software to mitigate potential risks and vulnerabilities.",Intel,Intel(r) Arc(tm) & Iris(r) Xe Graphics Software,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-16T20:47:07.857Z,0 CVE-2023-29165,https://securityvulnerability.io/vulnerability/CVE-2023-29165,Unquoted Search Path Vulnerability in Intel Arc Control Software,The Intel Arc Control Software prior to version 1.73.5335.2 contains a vulnerability that arises from an unquoted search path issue. This flaw could allow an authenticated user with local access to potentially escalate their privileges. Proper patching and version updates are essential to mitigate the risks associated with this vulnerability.,Intel,Intel(r) Arc(tm) Control Software,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2023-11-14T19:15:00.000Z,0 CVE-2023-25071,https://securityvulnerability.io/vulnerability/CVE-2023-25071,NULL Pointer Dereference in Intel Arc and Iris Xe Graphics Drivers,"A NULL pointer dereference vulnerability exists in Intel Arc and Iris Xe Graphics Windows drivers prior to version 31.0.101.4255, which may allow an authenticated user to trigger a denial of service through local access. This vulnerability emphasizes the need for users to update their graphics drivers to ensure optimal security and performance.",Intel,Intel(r) Arc(tm) & Iris(r) Xe Graphics - Whql - Windows Drviers,5.6,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2023-11-14T19:15:00.000Z,0 CVE-2023-28401,https://securityvulnerability.io/vulnerability/CVE-2023-28401,Out-of-Bounds Write Vulnerability in Intel Graphics Drivers,"An out-of-bounds write vulnerability exists in specific Intel Arc and Iris Xe Graphics drivers prior to version 31.0.101.4255. This flaw may allow an authenticated user to exploit local access to potentially escalate privileges within Windows. The weakness arises from improper handling of memory bounds, leading to unintended consequences that could be leveraged to compromise system security.",Intel,Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2023-11-14T19:15:00.000Z,0 CVE-2023-25952,https://securityvulnerability.io/vulnerability/CVE-2023-25952,Out-of-Bounds Write Vulnerability in Intel Arc Control Software,"The vulnerability in Intel Arc Control Software prior to version 1.73.5335.2 occurs due to an out-of-bounds write condition. This flaw may allow an authenticated user to exploit the software, potentially leading to a denial of service by executing malicious actions with local access. It highlights the necessity for users to update their software promptly to safeguard against this risk.",Intel,Intel(r) Arc(tm) Control Software,5.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2023-11-14T19:15:00.000Z,0 CVE-2023-27305,https://securityvulnerability.io/vulnerability/CVE-2023-27305,Privilege Escalation in Intel Arc Control Software,The Intel Arc Control software before version 1.73.5335.2 contains incorrect default permissions that may permit an authenticated user to elevate their privileges through local access. This issue poses a significant risk as it could allow attackers to gain unauthorized access to sensitive areas of the system. Users are advised to update their software to mitigate potential exploitation.,Intel,Intel(r) Arc(tm) Control Software,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2023-11-14T19:15:00.000Z,0 CVE-2023-28404,https://securityvulnerability.io/vulnerability/CVE-2023-28404,Out-of-Bounds Read Vulnerability in Intel Arc and Iris Xe Graphics Windows Drivers,"The out-of-bounds read vulnerability in Intel Arc and Iris Xe Graphics Windows drivers prior to version 31.0.101.4255 can be exploited by an authenticated user. This vulnerability potentially allows the attacker to disclose sensitive information through local access, posing a risk to user confidentiality. To mitigate this issue, users are encouraged to upgrade to the latest driver versions.",Intel,Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers,5.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2023-11-14T19:15:00.000Z,0 CVE-2022-42879,https://securityvulnerability.io/vulnerability/CVE-2022-42879,NULL Pointer Dereference in Intel Arc Control Software,"A NULL pointer dereference vulnerability exists in Intel Arc Control software prior to version 1.73.5335.2, which could allow an authenticated user to potentially cause a denial of service. This issue arises when the software fails to adequately handle null pointer dereference scenarios, leading to unpredictable behavior in the application.",Intel,Intel(r) Arc(tm) Control Software,6.1,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2023-11-14T19:04:22.757Z,0 CVE-2022-38973,https://securityvulnerability.io/vulnerability/CVE-2022-38973,Improper Access Control in Intel Arc Graphics Cards from Intel,"The access control vulnerability affects certain Intel Arc graphics cards, specifically the A770 and A750 Limited Edition models, which were sold between October and December 2022. This flaw permits authenticated users to exploit local access, potentially leading to denial of service incidents or unauthorized information disclosure. Users of these graphics cards should review the relevant security advisory to mitigate risks associated with this vulnerability.",Intel,Intel(r) Arc(tm) Graphics Cards A770 And A750 Limited Edition,3.3,LOW,0.0004299999854993075,false,,false,false,false,,,false,false,,2023-08-11T02:36:59.521Z,0 CVE-2022-41984,https://securityvulnerability.io/vulnerability/CVE-2022-41984,Protection Mechanism Failure in Intel Arc Graphics Cards,"The vulnerability affects certain Intel Arc A770 and A750 Limited Edition graphics cards, which were sold between October 2022 and December 2022. Due to a failure in the protection mechanism, a local privileged user could exploit this weakness to potentially create a denial of service situation. This could result in the disruption of service for users. It is crucial for users of these graphics cards to apply any pending updates and review their security settings to mitigate possible risks.",Intel,Intel(r) Arc(tm) Graphics Cards A770 And A750 Limited Edition,4.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2023-08-11T02:36:58.992Z,0