Page 2 of 348 results (0.012 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1360EXPL: 0

09 Feb 2022 — Pointer issues in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access. Unos problemas de punteros en el firmware de algunos procesadores Intel(R) pueden permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de acceso local • https://security.netapp.com/advisory/ntap-20220210-0007 •

CVSS: 4.4EPSS: 0%CPEs: 681EXPL: 0

09 Feb 2022 — Improper access control in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a denial of service via local access. Un control de acceso incorrecto en el firmware de algunos procesadores Intel(R) puede permitir a un usuario privilegiado habilitar potencialmente una denegación de servicio por acceso local • https://security.netapp.com/advisory/ntap-20220210-0007 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 6.7EPSS: 0%CPEs: 681EXPL: 0

09 Feb 2022 — Insufficient control flow management in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access. Una administración no suficiente del flujo de control en el firmware de algunos procesadores Intel(R) puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios a través del acceso local • https://security.netapp.com/advisory/ntap-20220210-0007 •

CVSS: 7.8EPSS: 0%CPEs: 681EXPL: 0

09 Feb 2022 — Improper access control in the firmware for some Intel(R) Processors may allow an unauthenticated user to potentially enable an escalation of privilege via local access. Un control de acceso inapropiado en el firmware de algunos procesadores Intel(R) puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de acceso local • https://security.netapp.com/advisory/ntap-20220210-0007 •

CVSS: 4.4EPSS: 0%CPEs: 681EXPL: 0

09 Feb 2022 — Incorrect default permissions in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a denial of service via local access. Unos permisos predeterminados incorrectos en el firmware para algunos procesadores Intel(R) pueden permitir a un usuario privilegiado habilitar potencialmente una denegación de servicio por medio de acceso local • https://security.netapp.com/advisory/ntap-20220210-0007 • CWE-276: Incorrect Default Permissions •

CVSS: 7.2EPSS: 0%CPEs: 190EXPL: 0

09 Feb 2022 — Insufficient compartmentalization in HECI subsystem for the Intel(R) SPS before versions SPS_E5_04.01.04.516.0, SPS_E5_04.04.04.033.0, SPS_E5_04.04.03.281.0, SPS_E5_03.01.03.116.0, SPS_E3_05.01.04.309.0, SPS_02.04.00.101.0, SPS_SoC-A_05.00.03.114.0, SPS_SoC-X_04.00.04.326.0, SPS_SoC-X_03.00.03.117.0, IGN_E5_91.00.00.167.0, SPS_PHI_03.01.03.078.0 may allow an authenticated user to potentially enable escalation of privilege via physical access. Una Compartimentación no suficiente en el subsistema HECI para el... • https://security.netapp.com/advisory/ntap-20220210-0005 •

CVSS: 7.8EPSS: 0%CPEs: 681EXPL: 0

09 Feb 2022 — Insufficient control flow management in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable an escalation of privilege via local access. Una administración no suficiente del flujo de control en el firmware de algunos procesadores Intel(R) puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de acceso local • https://security.netapp.com/advisory/ntap-20220210-0007 •

CVSS: 9.8EPSS: 15%CPEs: 42EXPL: 3

18 Jan 2022 — By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not... • https://github.com/HynekPetrak/log4shell-finder • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 40EXPL: 0

18 Jan 2022 — JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which i... • http://www.openwall.com/lists/oss-security/2022/01/18/3 • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.8EPSS: 79%CPEs: 35EXPL: 3

20 Dec 2021 — A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier. Un cuerpo de petición cuidadosamente diseñado puede causar un desbordamiento de búfer en el analizador multiparte mod_lua (r:parsebody() llamado desde scripts Lua). El equipo de Apache httpd no presenta const... • https://packetstorm.news/files/id/171631 • CWE-787: Out-of-bounds Write •