Vulnerabilities > Low
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-02-14 | CVE-2023-26591 | Unchecked Return Value vulnerability in Intel Thunderbolt DCH Driver 1.41.1054.0/72 Unchecked return value in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an unauthenticated user to potentially enable denial of service via physical access. | 2.0 |
2024-02-14 | CVE-2023-26592 | Deserialization of Untrusted Data vulnerability in Intel Thunderbolt DCH Driver 1.41.1054.0/72 Deserialization of untrusted data in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable a denial of service via local access. | 3.8 |
2024-02-14 | CVE-2023-26596 | Unspecified vulnerability in Intel Thunderbolt DCH Driver 1.41.1054.0/72 Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable denial of service via local access. | 2.5 |
2024-02-14 | CVE-2023-27300 | Unspecified vulnerability in Intel Thunderbolt DCH Driver 1.41.1054.0/72 Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access. | 3.8 |
2024-02-14 | CVE-2023-27303 | Unspecified vulnerability in Intel Thunderbolt DCH Driver 1.41.1054.0/72 Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access. | 3.8 |
2024-02-14 | CVE-2023-27307 | Unspecified vulnerability in Intel Thunderbolt DCH Driver 1.41.1054.0/72 Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access. | 3.8 |
2024-02-13 | CVE-2023-20570 | Insufficient Verification of Data Authenticity vulnerability in AMD products Insufficient verification of data authenticity in the configuration state machine may allow a local attacker to potentially load arbitrary bitstreams. | 3.3 |
2024-02-12 | CVE-2024-1454 | The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. | 3.4 |
2024-02-12 | CVE-2024-23760 | Information Exposure Through Log Files vulnerability in Gambio 4.9.2.0 Cleartext Storage of Sensitive Information in Gambio 4.9.2.0 allows attackers to obtain sensitive information via error-handler.log.json and legacy-error-handler.log.txt under the webroot. | 2.7 |
2024-02-12 | CVE-2024-1439 | Unspecified vulnerability in Moodle Inadequate access control in Moodle LMS. | 3.3 |