cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-38090,https://securityvulnerability.io/vulnerability/CVE-2022-38090,Improper Isolation Vulnerability in Intel Processors with Software Guard Extensions,"This vulnerability arises from improper isolation of shared resources in certain Intel processors when utilizing Intel Software Guard Extensions (SGX). A privileged user could exploit this flaw to potentially disclose sensitive information through local access, posing privacy risks and security concerns for affected systems. It underscores the necessity for robust security measures to prevent unauthorized access and maintain data integrity.",Intel,Intel(r) Processors With Intel(r) Software Guard Extensions (sgx),4.4,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-16T20:00:29.274Z,0 CVE-2022-33196,https://securityvulnerability.io/vulnerability/CVE-2022-33196,Privilege Escalation Vulnerability in Intel Xeon Processors,"This vulnerability arises from incorrect default permissions in certain memory controller configurations for specific Intel Xeon processors utilizing Intel Software Guard Extensions. A privileged user can potentially leverage local access to escalate their privileges, posing a security risk for affected systems. It is crucial for users of the affected processors to apply the necessary updates and configurations as recommended by Intel to mitigate this risk.",Intel,Intel(r) Xeon(r) Processors With Intelâ® Software Guard Extensions (sgx),7.2,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-16T20:00:22.704Z,0