Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Intel Subscribe
Filtered by product Computing Improvement Program
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-8736 1 Intel 1 Computing Improvement Program 2021-07-21 4.6 MEDIUM 7.8 HIGH
Improper access control in subsystem for the Intel(R) Computing Improvement Program before version 2.4.5718 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2021-0052 1 Intel 1 Computing Improvement Program 2021-06-24 4.6 MEDIUM 7.8 HIGH
Incorrect default privileges in the Intel(R) Computing Improvement Program before version 2.4.6522 may allow an authenticated user to potentially enable an escalation of privilege via local access.
CVE-2021-0074 1 Intel 1 Computing Improvement Program 2021-06-24 4.6 MEDIUM 7.8 HIGH
Improper permissions in the installer for the Intel(R) Computing Improvement Program software before version 2.4.5982 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2020-12308 1 Intel 1 Computing Improvement Program 2020-11-24 4.0 MEDIUM 6.5 MEDIUM
Improper access control for the Intel(R) Computing Improvement Program before version 2.4.5982 may allow an unprivileged user to potentially enable information disclosure via network access.
CVE-2019-11162 1 Intel 1 Computing Improvement Program 2020-08-24 4.6 MEDIUM 7.8 HIGH
Insufficient access control in hardware abstraction in SEMA driver for Intel(R) Computing Improvement Program before version 2.4.0.04733 may allow an authenticated user to potentially enable escalation of privilege, denial of service or information disclosure via local access.
CVE-2018-12168 1 Intel 1 Computing Improvement Program 2019-10-02 7.2 HIGH 7.8 HIGH
Privilege escalation in file permissions in Intel Computing Improvement Program before version 2.2.0.03942 may allow an authenticated user to potentially execute code as administrator via local access.