Vulnerabilities > Intel > Secl DC
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-06-09 | CVE-2021-0131 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Intel Secl-Dc Use of cryptographically weak pseudo-random number generator (PRNG) in an API for the Intel(R) Security Library before version 3.3 may allow an authenticated user to potentially enable information disclosure via network access. | 6.5 |
2021-06-09 | CVE-2021-0132 | Missing Release of Resource after Effective Lifetime vulnerability in Intel Secl-Dc Missing release of resource after effective lifetime in an API for the Intel(R) Security Library before version 3.3 may allow a privileged user to potentially enable denial of service via network access. | 4.9 |
2021-06-09 | CVE-2021-0133 | Unspecified vulnerability in Intel Secl-Dc Key exchange without entity authentication in the Intel(R) Security Library before version 3.3 may allow an authenticated user to potentially enable escalation of privilege via network access. | 8.1 |
2021-06-09 | CVE-2021-0134 | Improper Input Validation vulnerability in Intel Secl-Dc Improper input validation in an API for the Intel(R) Security Library before version 3.3 may allow a privileged user to potentially enable denial of service via network access. | 4.9 |