Page 171 of 14922 results (0.016 seconds)

CVSS: 9.8EPSS: 0%CPEs: 82EXPL: 0

.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en .NET, .NET Framework y Visual Studio A vulnerability was found in FormatFtpCommand in the .NET package that may result in a CRLF injection arbitrary file write and deletion. This vulnerability allows remote attackers to create or delete arbitrary files on FTP servers implemented using affected versions of Microsoft .NET. Interaction with the .NET framework is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the FormatFtpCommand method. The issue results from the incorrect neutralization of CRLF sequences. An attacker can leverage this vulnerability to write or delete files in the context of the FTP server. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36049 https://access.redhat.com/security/cve/CVE-2023-36049 https://bugzilla.redhat.com/show_bug.cgi?id=2248883 • CWE-20: Improper Input Validation CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.9EPSS: 0%CPEs: 6EXPL: 0

Buffer overflow in some Intel(R) QAT drivers for Windows - HW Version 1.0 before version 1.10 may allow an authenticated user to potentially enable escalation of privilege via local access. Desbordamiento de búfer en algunos controladores Intel(R) QAT para Windows: la versión de hardware 1.0 anterior a la 1.10 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00861.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

Uncontrolled search path element in some Intel(R) QAT drivers for Windows - HW Version 2.0 before version 2.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access. Elemento de ruta de búsqueda no controlado en Intel(R) QAT drivers for Windows - HW Version 2.0 anterior a la versión 2.0.4 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00861.html • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

Improper authorization in some Intel(R) QAT drivers for Windows - HW Version 2.0 before version 2.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access. La autorización inadecuada en algunos controladores Intel(R) QAT para Windows - HW versión 2.0 anterior a la versión 2.0.4 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00861.html • CWE-285: Improper Authorization •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

Exposure of sensitive information to an unauthorized actor in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable information disclosure via local access. La exposición de información confidencial a un actor no autorizado en Intel(R) Aptio* V UEFI Firmware Integrator Tools puede permitir que un usuario autenticado potencialmente habilite la divulgación de información a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •