14 results (0.014 seconds)

CVSS: 6.8EPSS: 0%CPEs: 5EXPL: 0

Protection mechanism failure in some Intel(R) oneAPI HPC Toolkit 2023.1 and Intel(R)MPI Library software before version 2021.9 may allow a privileged user to potentially enable escalation of privilege via adjacent access. La falla del mecanismo de protección en algunos software Intel(R) oneAPI HPC Toolkit 2023.1 e Intel(R)MPI Library anteriores a la versión 2021.9 puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a través del acceso adyacente. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html • CWE-693: Protection Mechanism Failure •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

Path traversal in the some Intel(R) oneAPI Toolkits and Component software before version 2023.1 may allow authenticated user to potentially enable escalation of privilege via local access. Path Traversal en algunos software Intel(R) oneAPI Toolkits and Component anteriores a la versión 2023.1 puede permitir que el usuario autenticado habilite potencialmente la escalada de privilegios a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 30EXPL: 0

Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.0.251 may allow an authenticated user to potentially enable escalation of privilege via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00819.html • CWE-427: Uncontrolled Search Path Element •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

In the Zingbox Inspector, versions 1.294 and earlier, hardcoded credentials for root and inspector user accounts are present in the system software, which can result in unauthorized users gaining access to the system. En Zingbox Inspector, versiones 1.294 y anteriores, las credenciales embebidas para las cuentas de usuario root e inspector están presentes en el software del sistema, lo que puede resultar en que usuarios no autorizados consigan acceso al sistema. • https://security.paloaltonetworks.com/CVE-2019-15015 • CWE-798: Use of Hard-coded Credentials •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

A security vulnerability exists in the Zingbox Inspector versions 1.280 and earlier, where authentication is not required when binding the Inspector instance to a different customer tenant. Se presenta una vulnerabilidad de seguridad en Zingbox Inspector versiones 1.280 y anteriores, donde no se requiere autenticación cuando se vincula la instancia de Inspector a un inquilino cliente diferente. • https://security.paloaltonetworks.com/CVE-2019-15018 • CWE-306: Missing Authentication for Critical Function •