{"vulnerability": "CVE-2020-1233", "sightings": [{"uuid": "560e2533-6c38-40d7-9425-b1878f398ade", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12333", "type": "seen", "source": "https://t.me/cibsecurity/16263", "content": "\u203c CVE-2020-12333 \u203c\n\nInsufficiently protected credentials in the Intel(R) QAT for Linux before version 1.7.l.4.10.0 may allow an authenticated user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-12T22:32:10.000000Z"}, {"uuid": "eb5817dd-7e35-4e94-8d36-43939099db24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12332", "type": "seen", "source": "https://t.me/cibsecurity/16253", "content": "\u203c CVE-2020-12332 \u203c\n\nImproper permissions in the installer for the Intel(R) HID Event Filter Driver, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-12T22:31:58.000000Z"}, {"uuid": "a3edd992-6d91-4364-bfc5-697e8b4d72d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12334", "type": "seen", "source": "https://t.me/cibsecurity/16258", "content": "\u203c CVE-2020-12334 \u203c\n\nImproper permissions in the installer for the Intel(R) Advisor tools before version 2020 Update 2 may allow an authenticated user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-12T22:32:04.000000Z"}, {"uuid": "fde89920-970c-4b05-9e43-310e260ee5b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12335", "type": "seen", "source": "https://t.me/cibsecurity/16251", "content": "\u203c CVE-2020-12335 \u203c\n\nImproper permissions in the installer for the Intel(R) Processor Identification Utility before version 6.4.0603 may allow an authenticated user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-12T22:31:56.000000Z"}, {"uuid": "dfc11711-ba99-491e-b63d-45cb3ecea613", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12338", "type": "seen", "source": "https://t.me/cibsecurity/16320", "content": "\u203c CVE-2020-12338 \u203c\n\nInsufficient control flow management in the Open WebRTC Toolkit before version 4.3.1 may allow an unauthenticated user to potentially enable escalation of privilege via network access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-13T22:33:55.000000Z"}]}