cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-39805,https://securityvulnerability.io/vulnerability/CVE-2024-39805,Escalation of Privilege Vulnerability in Intel DSA Software,"A critical security issue has been identified in Intel DSA software, which prior to version 23.4.39 exhibits insufficient verification of data authenticity. This vulnerability permits an authenticated user to potentially escalate their privileges with local access, thereby posing significant security risks. It is crucial for users to update to the latest version to mitigate any potential threats stemming from this issue. More detailed information is available in the official Intel advisory.",Intel,Intel(r) Dsa Software,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:51.039Z,0 CVE-2024-32942,https://securityvulnerability.io/vulnerability/CVE-2024-32942,Privilege Escalation Risk in Intel DSA Installer for Windows,"The Intel DSA Installer for Windows before version 24.2.19.5 has a vulnerability stemming from incorrect default permissions. This flaw may enable an authenticated user to exploit local access to potentially escalate privileges, exposing the system to further risks. Users are advised to update to the latest version to mitigate this issue.",Intel,Intel(r) Dsa Installer For Windows,5.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:49.430Z,0 CVE-2023-45743,https://securityvulnerability.io/vulnerability/CVE-2023-45743,Uncontrolled Search Path Vulnerability in Intel DSA Software Uninstallers Could Lead to Escalation of Privilege,"The vulnerability in Intel DSA software uninstallers prior to version 23.4.39.10 arises from an uncontrolled search path that may allow an authenticated user to escalate privileges through local access, potentially compromising system security. This issue necessitates immediate attention to safeguard sensitive information and maintain system integrity.",Intel,Intel(r) Dsa Software Uninstallers,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-16T20:47:28.695Z,0 CVE-2024-21823,https://securityvulnerability.io/vulnerability/CVE-2024-21823,Privilege Escalation Vulnerability in Intel DSA and IAA Products,"A vulnerability exists within the hardware logic of Intel DSA and Intel IAA associated with the 4th and 5th generation Xeon processors that can enable an authorized user to engage in privilege escalation. This issue stems from insecure de-synchronization, which may inadvertently facilitate unauthorized access to sensitive system functions. It underscores the importance of applying necessary mitigations to safeguard systems leveraging these Intel technologies.",Intel,Intel(r) Dsa And Intel(r) Iaa For Some Intel(r) 4th Or 5th Generation Xeon(r) Processors,7.5,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2024-05-16T20:46:57.735Z,0 CVE-2023-25073,https://securityvulnerability.io/vulnerability/CVE-2023-25073,Intel DSA Software Vulnerability Could Lead to Denial of Service,"A vulnerability exists in Intel DSA software versions earlier than 23.4.33 due to improper access control mechanisms. This flaw could potentially allow an authenticated user to exploit the system, resulting in denial of service through local access. It is advised that users upgrade to the latest version to mitigate risks associated with this vulnerability. For detailed information, see Intel's security advisory.",Intel,Intel(R) DSA software,5.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:38:10.459Z,0 CVE-2023-35062,https://securityvulnerability.io/vulnerability/CVE-2023-35062,Potential Escalation of Privilege via Local Access,"An improper access control vulnerability has been identified in Intel Data Streaming Accelerator software, allowing a privileged user the possibility to escalate their privileges through local access. This security flaw affects versions prior to 23.4.33 and poses risks that could lead to unauthorized actions within compromised systems. Users and administrators of affected Intel DSA software should implement mitigation strategies to safeguard against potential exploitation and ensure system integrity.",Intel,Intel(r) Dsa Software,6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:38:09.923Z,0 CVE-2023-39425,https://securityvulnerability.io/vulnerability/CVE-2023-39425,Potential Escalation of Privilege Vulnerability in Intel DSA Software,"The vulnerability in Intel DSA software arises from improper access control practices, which may allow authenticated users to potentially escalate their privileges through local access. This issue affects versions of the software released before 23.4.33, posing a potential security risk if not addressed promptly. Users are encouraged to review their software version and apply necessary security patches to mitigate any risks associated with this vulnerability.",Intel,Intel(r) Dsa Software,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:38:09.371Z,0 CVE-2023-27515,https://securityvulnerability.io/vulnerability/CVE-2023-27515,Cross-Site Scripting Vulnerability in Intel DSA Software,The Intel DSA Software prior to version 23.1.9 is susceptible to a cross-site scripting (XSS) vulnerability. This flaw allows unauthenticated users to potentially exploit the vulnerability to escalate privileges via network access. It is essential for users of the Intel DSA Software to update to the latest version to mitigate this security risk.,Intel,Intel(r) Dsa Software,8.1,HIGH,0.0026499999221414328,false,,false,false,false,,,false,false,,2023-08-11T03:15:00.000Z,0 CVE-2022-32764,https://securityvulnerability.io/vulnerability/CVE-2022-32764,Race Condition Vulnerability in Intel DSA Software,"The Intel DSA software prior to version 22.4.26 contains a race condition vulnerability that may allow an authenticated user to exploit local access, potentially leading to unauthorized privilege escalation. It is important for users to update their software to the latest version to mitigate this issue. For further details, refer to the advisory from Intel.",Intel,Intel(r) Dsa Software,7.5,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-16T20:00:04.076Z,0 CVE-2022-30530,https://securityvulnerability.io/vulnerability/CVE-2022-30530,Privilege Escalation Vulnerability in Intel DSA Software,"A vulnerability in Intel DSA software prior to version 22.4.26 may allow an authenticated user to potentially perform privilege escalation through local access. This could lead to unauthorized actions within the system, increasing the risk of exploitation. It is crucial for users to upgrade to the latest version to mitigate this risk.",Intel,Intel(r) Dsa Software,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-16T20:00:03.469Z,0 CVE-2022-26017,https://securityvulnerability.io/vulnerability/CVE-2022-26017,Improper Access Control in Intel DSA Software Affects Multiple Versions,"The vulnerability in Intel's DSA software prior to version 22.2.14 arises from improper access control mechanisms, potentially allowing an authenticated user to escalate their privileges through adjacent access. This flaw necessitates immediate attention to prevent unauthorized access and potential exploitation.",Intel,Intel(r) Dsa Software For,8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-08-18T19:57:44.000Z,0 CVE-2021-0090,https://securityvulnerability.io/vulnerability/CVE-2021-0090,Uncontrolled Search Path Vulnerability in Intel DSA Software,"The vulnerability involves an uncontrolled search path element in Intel(R) DSA, which, prior to version 20.11.50.9, could permit an authenticated user with local access to exploit the flaw, potentially allowing for escalation of privileges. This misconfiguration can expose systems to risks if not addressed promptly, emphasizing the importance of maintaining software updates and adhering to security best practices.",Intel,Intel(r) Dsa,7.3,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-06-09T19:07:28.000Z,0 CVE-2021-0073,https://securityvulnerability.io/vulnerability/CVE-2021-0073,Insufficient Control Flow Management in Intel DSA Prior to Version 20.11.50.9,"The vulnerability arises from insufficient control flow management in Intel DSA, which can be exploited by an authenticated user. This flaw may allow unauthorized access and enable elevation of privileges through local access, potentially compromising system security.",Intel,Intel(r) Dsa,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-06-09T19:07:22.000Z,0 CVE-2021-0094,https://securityvulnerability.io/vulnerability/CVE-2021-0094,Improper Link Resolution in Intel DSA Affects User Privileges,"An improper link resolution issue was found in Intel DSA versions earlier than 20.11.50.9 which may allow authenticated users to escalate privileges through local access. This vulnerability could be exploited if an attacker gains access to the affected system, potentially allowing them to perform unauthorized actions.",Intel,Intel(r) Dsa,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-06-09T19:05:26.000Z,0 CVE-2020-24460,https://securityvulnerability.io/vulnerability/CVE-2020-24460,Incorrect Permissions in Intel DSA Vulnerability Impacting Local Access,The Intel DSA prior to version 20.8.30.6 possesses incorrect default permissions that could enable an authenticated user to potentially initiate a denial of service. This vulnerability emphasizes the importance of strict permission controls to prevent unauthorized access and maintain system stability. Users and administrators are encouraged to review the security advisory provided by Intel for detailed mitigation steps.,Intel,Intel(r) Dsa,5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-11-12T18:56:38.000Z,0