Show filters
75 Total Results
Displaying 11-20 of 75
Sort by:
Attacker Value
Unknown

CVE-2023-27305

Disclosure Date: November 14, 2023 (last updated May 16, 2024)
Incorrect default permissions in some Intel(R) Arc(TM) Control software before version 1.73.5335.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2023-25952

Disclosure Date: November 14, 2023 (last updated May 16, 2024)
Out-of-bounds write in some Intel(R) Arc(TM) Control software before version 1.73.5335.2 may allow an authenticated user to potentially enable denial of service via local access.
Attacker Value
Unknown

CVE-2023-25071

Disclosure Date: November 14, 2023 (last updated November 23, 2023)
NULL pointer dereference in some Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows Drviers before version 31.0.101.4255 may allow authenticated user to potentially enable denial of service via local access.
Attacker Value
Unknown

CVE-2023-5946

Disclosure Date: November 03, 2023 (last updated November 14, 2023)
The Digirisk plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'current_group_id' parameter in version 6.0.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Attacker Value
Unknown

CVE-2023-30615

Disclosure Date: May 25, 2023 (last updated October 08, 2023)
Iris is a web collaborative platform aiming to help incident responders sharing technical details during investigations. A stored Cross-Site Scripting (XSS) vulnerability has been identified in iris-web, affecting multiple locations . The vulnerability in allows an attacker to inject malicious scripts into the application, which are then executed when a user visits the affected locations. This can lead to unauthorized access, data theft, or other malicious activities. An attacker need to be authenticated on the application to exploit this vulnerability. The issue was patched in version 2.2.1 of iris-web.
Attacker Value
Unknown

CVE-2022-34849

Disclosure Date: February 16, 2023 (last updated October 08, 2023)
Uncaught exception in the Intel(R) Iris(R) Xe MAX drivers for Windows before version 100.0.5.1436(v2) may allow a privileged user to potentially enable denial of service via local access.
Attacker Value
Unknown

CVE-2022-30531

Disclosure Date: February 16, 2023 (last updated October 08, 2023)
Out-of-bounds read in the Intel(R) Iris(R) Xe MAX drivers for Windows before version 100.0.5.1474 may allow a privileged user to potentially enable information disclosure via local access.
Attacker Value
Unknown

CVE-2022-26111

Disclosure Date: April 25, 2022 (last updated October 07, 2023)
The BeanShell components of IRISNext through 9.8.28 allow execution of arbitrary commands on the target server by creating a custom search (or editing an existing/predefined search) of the documents. The search components permit adding BeanShell expressions that result in Remote Code Execution in the context of the IRISNext application user, running on the web server.
Attacker Value
Unknown

CVE-2021-23772

Disclosure Date: December 24, 2021 (last updated February 23, 2025)
This affects all versions of package github.com/kataras/iris; all versions of package github.com/kataras/iris/v12. The unsafe handling of file names during upload using UploadFormFiles method may enable attackers to write to arbitrary locations outside the designated target folder.
Attacker Value
Unknown

CVE-2021-0121

Disclosure Date: November 17, 2021 (last updated February 23, 2025)
Improper access control in the installer for some Intel(R) Iris(R) Xe MAX Dedicated Graphics Drivers for Windows 10 before version 27.20.100.9466 may allow authenticated user to potentially enable escalation of privilege via local access.