cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-43489,https://securityvulnerability.io/vulnerability/CVE-2023-43489,Access Control Vulnerability in Intel CIP Software,"The vulnerability arises due to improper access control mechanisms in Intel's CIP software, which prior to version 2.4.10717 allows authenticated users to exploit the system. This exploitation can potentially lead to denial of service situations through local access, impacting the overall system's functionality and availability. Organizations relying on affected versions should consider upgrading to mitigate these risks. For comprehensive details, refer to Intel's official advisory.",Intel,Intel(r) Cip Software,5.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:24.379Z,0 CVE-2023-35769,https://securityvulnerability.io/vulnerability/CVE-2023-35769,Uncontrolled Search Path Vulnerability in Intel CIP Software Could Lead to Escalation of Privilege,"An uncontrolled search path vulnerability in Intel CIP software versions prior to 2.4.10577 enables authenticated users to leverage local access for potential privilege escalation. This flaw can be exploited by users with legitimate access, posing a significant risk to system security and integrity. Users are advised to review Intel's advisory for necessary mitigation strategies and further information.",Intel,Intel(r) Cip Software,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:38:07.684Z,0