📦 Computing Improvement Program
by Intel
🔍 What is Computing Improvement Program?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in Intel CIP software allows unprivileged authenticated users to escalate privileges via network access without user interaction. It affects systems running vulnerable versions of I...
An improper input validation vulnerability in Intel CIP software allows authenticated attackers to escalate privileges via network access without user interaction. This affects systems running vulnera...
This vulnerability in Intel CIP software allows a privileged user with local access to potentially escalate privileges through improper input validation. It affects systems running vulnerable versions...
This vulnerability in Intel's Computing Improvement Program allows authenticated local users to escalate privileges due to incorrect default permissions. It affects systems running vulnerable versions...
This vulnerability in Intel CIP software allows unprivileged software combined with a privileged user to potentially disclose information via improper input validation. It affects systems running Inte...
This vulnerability in Intel CIP software allows local attackers to escalate privileges from unprivileged to privileged access. It affects systems running vulnerable versions of Intel CIP software on W...
This vulnerability in Intel CIP software allows unprivileged authenticated users to potentially access sensitive information they shouldn't have access to. It affects systems running vulnerable versio...
An information disclosure vulnerability in Intel CIP software allows unprivileged local attackers to access sensitive data from user applications. This affects systems running vulnerable Intel CIP sof...
This vulnerability in Intel CIP software allows local attackers to escalate privileges via DLL hijacking. Attackers with authenticated access can execute arbitrary code with higher privileges through ...
This vulnerability in Intel CIP software allows local attackers to escalate privileges by controlling file paths. It affects systems running vulnerable versions of Intel CIP software on Windows. Attac...
This vulnerability in Intel CIP software allows authenticated local users to escalate privileges due to insecure inherited permissions. It affects systems running vulnerable versions of Intel CIP soft...
This vulnerability in Intel CIP software allows an attacker with local access and special internal knowledge to upload dangerous file types, potentially enabling privilege escalation and data manipula...
This vulnerability in Intel CIP software allows authenticated users to potentially manipulate data through a complex attack chain. It affects systems running Intel CIP software versions before WIN_DCA...
An improper access control vulnerability in Intel CIP software allows unprivileged software running with a privileged user to potentially expose data via network access. This affects systems running I...