cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-41082,https://securityvulnerability.io/vulnerability/CVE-2023-41082,Intel CST Software Vulnerability Could Lead to Denial of Service,"A vulnerability in Intel's CST software prior to version 2.1.10300 allows an authenticated user to exploit a null pointer dereference. This can result in conditions that may induce a denial of service when local access is obtained. Protection against this potential threat requires upgrading to the latest software version provided by Intel. For more detailed insights, please reference Intel's security advisory.",Intel,Intel(r) Cst Software,4.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-16T20:47:31.064Z,0 CVE-2023-39433,https://securityvulnerability.io/vulnerability/CVE-2023-39433,Potential Escalation of Privilege via Local Access,"An improper access control issue exists in Intel CST Software that may permit an authenticated user to escalate privileges when accessing the system locally. This vulnerability affects versions of the software prior to 2.1.10300, potentially exposing systems to unauthorized actions by users who should have limited access. Users and administrators should apply the latest updates to ensure that security measures are fully effective and that the risk of privilege escalation is mitigated.",Intel,Intel(r) Cst Software,4.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-16T20:47:30.516Z,0 CVE-2023-40155,https://securityvulnerability.io/vulnerability/CVE-2023-40155,Potential Escalation of Privilege via Local Access in Uncontrolled Search Path,"The vulnerability identified in Intel CST Software prior to version 2.1.10300 is characterized by an uncontrolled search path issue that permits authenticated users to exploit the flaw through local access. This could lead to unnecessary privilege escalation, allowing a user to potentially gain elevated permissions beyond their standard access level. Addressing this vulnerability is crucial for protecting systems and maintaining security protocols.",Intel,Intel(r) Cst Software,6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-16T20:47:29.343Z,0