Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
CVE-2022-34841 CVSS:5.7
Intel Media SDK software could allow a local authenticated attacker to gain elevated privileges on the system, caused by Improper buffer restrictions. By sending a specially-crafted request, an attacker could exploit this vulnerability to escalate privileges.
CVE-2022-26421 CVSS:6.7
Intel oneAPI Toolkits could allow a local authenticated attacker to gain elevated privileges on the system, caused by uncontrolled search path element. By sending a specially-crafted request, an attacker could exploit this vulnerability to escalate privileges.
CVE-2022-26076 CVSS:6.7
Intel oneAPI Toolkits could allow a local authenticated attacker to gain elevated privileges on the system, caused by uncontrolled search path element. By sending a specially-crafted request, an attacker could exploit this vulnerability to escalate privileges.
CVE-2022-26032 CVSS:6.7
Intel oneAPI Toolkits could allow a local authenticated attacker to gain elevated privileges on the system, caused by uncontrolled search path element. By sending a specially-crafted request, an attacker could exploit this vulnerability to escalate privileges.
CVE-2022-26425 CVSS:6.7
Intel oneAPI Toolkits could allow a local authenticated attacker to gain elevated privileges on the system, caused by uncontrolled search path element. By sending a specially-crafted request, an attacker could exploit this vulnerability to escalate privileges.
CVE-2022-25905 CVSS:6.7
Intel oneAPI Toolkits could allow a local authenticated attacker to gain elevated privileges on the system, caused by uncontrolled search path element. By sending a specially-crafted request, an attacker could exploit this vulnerability to escalate privileges.
CVE-2022-26062 CVSS:6.7
Intel oneAPI Toolkits could allow a local authenticated attacker to gain elevated privileges on the system, caused by uncontrolled search path element. By sending a specially-crafted request, an attacker could exploit this vulnerability to escalate privileges.
CVE-2022-26345 CVSS:6.7
Intel oneAPI Toolkits could allow a local authenticated attacker to gain elevated privileges on the system, caused by uncontrolled search path element. By sending a specially-crafted request, an attacker could exploit this vulnerability to escalate privileges.
CVE-2022-26512 CVSS:6.7
Intel oneAPI Toolkits could allow a local authenticated attacker to gain elevated privileges on the system, caused by uncontrolled search path element. By sending a specially-crafted request, an attacker could exploit this vulnerability to escalate privileges.
CVE-2022-25992 CVSS:6.1
Intel oneAPI Toolkits could allow a local authenticated attacker to gain elevated privileges on the system, caused by insecure inherited permissions. By sending a specially-crafted request, an attacker could exploit this vulnerability to escalate privileges.
CVE-2022-25987 CVSS:8.3
Intel oneAPI Toolkits could allow a remote attacker to gain elevated privileges on the system, caused by improper handling of Unicode encoding in source code. By sending a specially-crafted request, an attacker could exploit this vulnerability to escalate privileges.
Intel
Refer to Intel Security Advisory for patch, upgrade or suggested workaround information.