Описание
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.
Ссылки
- PatchVendor Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing List
- Mailing List
- PatchVendor Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing List
- Mailing List
Уязвимые конфигурации
Одновременно
Одно из
Одно из
Одно из
EPSS
3.8 Low
CVSS3
7.8 High
CVSS3
Дефекты
Связанные уязвимости
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Ki ...
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.
Уязвимость утилиты для подключения к сети Intel PROSet/Wireless WiFi и Killer WiFii, связанная с недостаточной проверкой входных данных, позволяющая нарушителю повысить свои привилегии
EPSS
3.8 Low
CVSS3
7.8 High
CVSS3