cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-29162,https://securityvulnerability.io/vulnerability/CVE-2023-29162,Intel C++ Compiler Classic Vulnerability Could Lead to Escalation of Privilege via Local Access,"The Intel C++ Compiler Classic and Intel oneAPI Toolkits are impacted by improper buffer restrictions, allowing a potential escalation of privilege for users with local access. This vulnerability could permit a privileged user to exploit the flaw, potentially compromising system integrity. It is crucial for organizations utilizing these tools to evaluate their exposure and implement necessary security measures to mitigate any risks associated with this issue, which affects versions preceding 2021.8 for the compiler and 2022.3.1 for the toolkits.",Intel,Intel(r) C++ Compiler Classic,6,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:38:13.744Z,0 CVE-2022-25987,https://securityvulnerability.io/vulnerability/CVE-2022-25987,Improper Unicode Handling Vulnerability in Intel C++ Compiler Classic,"A vulnerability exists in the Intel C++ Compiler Classic and the Intel oneAPI Toolkits due to improper handling of Unicode encoding in source code. An unauthenticated user may exploit this vulnerability via network access, potentially allowing for escalation of privileges. This issue affects versions prior to 2021.6 for the compiler and 2022.2 for the toolkits.",Intel,Intel(r) C++ Compiler Classic,8.3,HIGH,0.0020099999383091927,false,,false,false,false,,,false,false,,2023-02-16T19:59:43.645Z,0 CVE-2022-41342,https://securityvulnerability.io/vulnerability/CVE-2022-41342,Improper Buffer Restrictions in Intel(R) C++ Compiler Classic,"The Intel(R) C++ Compiler Classic has a flaw related to inadequate buffer restrictions that affects versions prior to 2021.7.1. This vulnerability allows privileged users, with local access to a system, to potentially escalate their privileges. Users of the Intel(R) oneAPI Toolkits, specifically those on any version before 2022.3.1, are also at risk. It is crucial for organizations utilizing these tools to apply the necessary updates and mitigate risks to their systems to avoid potential exploitation.",Intel,Intel(r) C++ Compiler Classic Before Version 2021.7.1 For Some Intel(r) Oneapi Toolkits,6,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-06T18:58:01.852Z,0 CVE-2022-40196,https://securityvulnerability.io/vulnerability/CVE-2022-40196,Improper Access Control in Intel oneAPI and C++ Compilers,"The improper access control issue in Intel's oneAPI DPC++/C++ Compiler and C++ Compiler Classic can allow authenticated users to exploit local access, potentially leading to an escalation of privileges. This vulnerability affects multiple versions of the Intel oneAPI Toolkits, paving the way for security concerns if left unaddressed. Users are advised to update to the latest versions to mitigate risks.",Intel,Intel(r) Oneapi Dpc++/c++ Compiler And Intelâ® C++ Compiler Classic For Some Intel(r) Oneapi Toolkits,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-06T18:58:00.801Z,0