5 results (0.004 seconds)

CVSS: 5.5EPSS: 0%CPEs: 16EXPL: 0

Observable behavioral discrepancy in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. Una discrepancia de comportamiento observable en algunos procesadores Intel(R) puede permitir que un usuario autorizado permita potencialmente una divulgación de información por medio del acceso local • https://security.netapp.com/advisory/ntap-20220818-0002 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00648.html • CWE-203: Observable Discrepancy •

CVSS: 6.5EPSS: 0%CPEs: 13EXPL: 0

Observable response discrepancy in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. Una discrepancia de respuesta observable en algunos Intel® Processors puede permitir a un usuario autorizado permitir potencialmente una divulgación de información por medio de un acceso local • http://www.openwall.com/lists/oss-security/2021/06/10/1 http://www.openwall.com/lists/oss-security/2021/06/10/10 http://www.openwall.com/lists/oss-security/2021/06/10/11 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H36U6CNREC436W6GYO7QUMJIVEA35SCV https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVA2NY26MMXOODUMYZN5DCU3FXMBMBOB https://security.gentoo.org/glsa/202107-30 https://www.debian.org/security/2021/ • CWE-203: Observable Discrepancy •

CVSS: 6.5EPSS: 0%CPEs: 13EXPL: 0

Observable response discrepancy in floating-point operations for some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. La discrepancia de respuesta observable en las operaciones de punto flotante para algunos procesadores Intel(R) puede permitir que un usuario autorizado permita potencialmente la divulgación de información a través del acceso local • http://www.openwall.com/lists/oss-security/2021/06/08/7 http://www.openwall.com/lists/oss-security/2021/06/09/2 http://www.openwall.com/lists/oss-security/2021/06/10/1 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H36U6CNREC436W6GYO7QUMJIVEA35SCV https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVA2NY26MMXOODUMYZN5DCU3FXMBMBOB https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00516.html& • CWE-203: Observable Discrepancy •

CVSS: 7.2EPSS: 0%CPEs: 184EXPL: 0

Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. Una vulnerabilidad de desbordamiento de búfer en el firmware del sistema para Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module, puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios y/o Denegación de Servicio (DoS) por medio del acceso local. • http://www.securityfocus.com/bid/108485 https://support.f5.com/csp/article/K85585101 https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.2EPSS: 0%CPEs: 96EXPL: 0

Insufficient access control in silicon reference firmware for Intel(R) Xeon(R) Scalable Processor, Intel(R) Xeon(R) Processor D Family may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. Control de acceso insuficiente en el firmware Silicon Reference para el Intel(R) Xeon(R) Scalable Processor, Intel(R) Xeon(R) Processor D Family puede permitir a un usuario privilegiado habilitar potencialmente un aumento de privilegios y/o la denegación de servicio mediante un acceso local . • http://www.securityfocus.com/bid/108485 https://support.f5.com/csp/article/K37428370 https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html •