Security
Headlines
HeadlinesLatestCVEs

Tag

#chrome

Optoma 1080PSTX Firmware C02 Authentication Bypass

Optoma 1080PSTX with firmware C02 suffers from an authentication bypass vulnerability.

Packet Storm
#vulnerability#web#windows#apple#auth#chrome#webkit
Navigating mobile malware trends: Crucial insights and predictions for MSPs

Categories: Business How MSPs can prepare for the complex landscape of mobile malware. (Read more...) The post Navigating mobile malware trends: Crucial insights and predictions for MSPs appeared first on Malwarebytes Labs.

CVE-2022-33894: INTEL-SA-00807

Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

CVE-2023-22447: INTEL-SA-00827

Insertion of sensitive information into log file in the Open CAS software for Linux maintained by Intel before version 22.6.2 may allow a privileged user to potentially enable information disclosure via local access.

CVE-2023-22440: INTEL-SA-00832

Incorrect default permissions in the Intel(R) SCS Add-on software installer for Microsoft SCCM all versions may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE-2022-40207: INTEL-SA-00785

Improper access control in the Intel(R) SUR software before version 2.4.8989 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE-2022-38787: INTEL-SA-00824

Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE-2022-43474: INTEL-SA-00816

Uncontrolled search path for the DSP Builder software installer before version 22.4 for Intel(R) FPGAs Pro Edition may allow an authenticated user to potentially enable escalation of privilege via local access.

CVE-2022-43507: INTEL-SA-00798

Improper buffer restrictions in the Intel(R) QAT Engine for OpenSSL before version 0.6.16 may allow a privileged user to potentially enable escalation of privilege via network access.