Incorrect default permissions in some memory controller configurations for Intel(R) Xeon(R) Processors may allow escalation of privilege
Reporter | Title | Published | Views | Family All 51 |
---|---|---|---|---|
![]() | CVE-2022-33196 | 16 Feb 202321:15 | – | osv |
![]() | ucode-intel-20230214-1.1 on GA media | 15 Jun 202400:00 | – | osv |
![]() | Red Hat Security Advisory: Red Hat Virtualization Host 4.4.z SP 1 security update | 16 Sep 202412:59 | – | osv |
![]() | intel-microcode vulnerabilities | 27 Feb 202305:12 | – | osv |
![]() | intel-microcode - security update | 1 Apr 202300:00 | – | osv |
![]() | CVE-2022-33196 | 16 Feb 202320:00 | – | vulnrichment |
![]() | Design/Logic Flaw | 16 Feb 202321:15 | – | prion |
![]() | CVE-2022-33196 | 16 Feb 202321:15 | – | alpinelinux |
![]() | Privilege Escalation | 19 Feb 202310:27 | – | veracode |
![]() | 2023.1 IPU - Intel® Xeon® Processor Advisory | 15 Feb 202300:00 | – | intel |
[
{
"vendor": "n/a",
"product": "Intel(R) Xeon(R) Processors with Intel® Software Guard Extensions (SGX)",
"versions": [
{
"version": "See references",
"status": "affected"
}
],
"defaultStatus": "unaffected"
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo