Page 12 of 200 results (0.015 seconds)

CVSS: 6.7EPSS: 0%CPEs: 370EXPL: 0

12 Nov 2020 — Out of bounds write in Intel BIOS platform sample code for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. Una escritura fuera de límites en el código de muestra de la plataforma Intel BIOS para algunos Intel® Processors puede habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local • https://security.netapp.com/advisory/ntap-20210122-0008 • CWE-787: Out-of-bounds Write •

CVSS: 6.7EPSS: 0%CPEs: 347EXPL: 0

12 Nov 2020 — Improper conditions check in Intel BIOS platform sample code for some Intel(R) Processors before may allow a privileged user to potentially enable escalation of privilege via local access. Una comprobación de condiciones inapropiadas en el código de muestra de la plataforma Intel BIOS para algunos Intel® Processors antes puede habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local • https://security.netapp.com/advisory/ntap-20210122-0008 • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVSS: 6.7EPSS: 0%CPEs: 383EXPL: 0

12 Nov 2020 — Improper access control in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. Un control de acceso inapropiado en el firmware del BIOS para algunos Intel® Processors, puede habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local • https://security.netapp.com/advisory/ntap-20210122-0008 •

CVSS: 5.5EPSS: 0%CPEs: 502EXPL: 0

11 Nov 2020 — Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Una eliminación inapropiada de información confidencial antes del almacenamiento o transferencia en algunos Intel® Processors, puede habilitar a un usuario autenticado para permitir potencialmente una divulgación de información por medio de un acceso local A flaw was found in the Intel Advanced Vector Extensions (AVX) ... • https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html • CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer •

CVSS: 5.5EPSS: 0%CPEs: 49EXPL: 0

11 Nov 2020 — Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Un aislamiento inapropiado de los recursos compartidos en algunos Intel® Processors, puede habilitar a un usuario autenticado para permitir potencialmente una divulgación de información por medio de un acceso local A flaw was found in the CPU microarchitecture where a local attacker is able to abuse a timing issue which may allow them to infer inte... • https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf • CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 5.3EPSS: 0%CPEs: 30EXPL: 0

21 Oct 2020 — Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applicati... • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 4.3EPSS: 0%CPEs: 22EXPL: 0

21 Oct 2020 — Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and... • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 5.8EPSS: 0%CPEs: 32EXPL: 0

21 Oct 2020 — Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, in... • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html • CWE-190: Integer Overflow or Wraparound •

CVSS: 3.1EPSS: 0%CPEs: 23EXPL: 0

21 Oct 2020 — Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read acc... • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html •

CVSS: 4.3EPSS: 0%CPEs: 23EXPL: 0

21 Oct 2020 — Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: ... • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html • CWE-20: Improper Input Validation •