Page 2 of 23 results (0.002 seconds)

CVSS: 5.5EPSS: 0%CPEs: 153EXPL: 0

Invalid pointer for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable denial of service via local access. Un puntero no válido para algunos Intel® Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario no autenticado habilitar potencialmente una denegación de servicio por medio de un acceso local • https://security.netapp.com/advisory/ntap-20200814-0002 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html • CWE-763: Release of Invalid Pointer or Reference •

CVSS: 7.8EPSS: 0%CPEs: 153EXPL: 0

Buffer copy without checking size of input for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access. La copia del búfer sin comprobar el tamaño de entrada para algunos Intel® Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local • https://security.netapp.com/advisory/ntap-20200814-0002 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 8.8EPSS: 0%CPEs: 153EXPL: 0

Buffer overflow in a daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. Un desbordamiento del búfer en un demonio para algunos Intel® Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente • https://security.netapp.com/advisory/ntap-20200814-0002 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 8.8EPSS: 0%CPEs: 153EXPL: 0

Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. Una autenticación inapropiada para algunos Intel® Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente • https://security.netapp.com/advisory/ntap-20200814-0002 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html • CWE-287: Improper Authentication •

CVSS: 6.3EPSS: 0%CPEs: 153EXPL: 0

Cross-site scripting for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. Una vulnerabilidad de tipo cross-site scripting para algunos Intel® Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente • https://security.netapp.com/advisory/ntap-20200814-0002 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •