[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31294 Download | Alert*

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.

Insufficient input validation in Intel(R) SGX SDK versions shown below may allow an authenticated user to enable information disclosure, escalation of privilege or denial of service via local access.

Insufficient initialization in Intel(R) SGX SDK versions shown below may allow an authenticated user to enable information disclosure, escalation of privilege or denial of service via local access.

Insufficient input validation in system firmware for Intel(R) Xeon(R) Scalable Processors, Intel(R) Xeon(R) Processors D Family, Intel(R) Xeon(R) Processors E5 v4 Family, Intel(R) Xeon(R) Processors E7 v4 Family and Intel(R) Atom(R) processor C Series may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.

Insufficient access control in system firmware for Intel(R) Xeon(R) Scalable Processors, 2nd Generation Intel(R) Xeon(R) Scalable Processors and Intel(R) Xeon(R) Processors D Family may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.

Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting TXT, may allow a privileged user to potentially enable escalation of privilege via local access.

Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting SGX, may allow a privileged user to potentially enable escalation of privilege via local access.

The host is installed with Apache Jena 4.4.0 or Apache Jena before 4.2.0 or and is prone to an XML external entity (XXE) vulnerability. A flaw is present in the application, which fails to properly handle the RDF/XML parser. Successful exploitation could allow an attacker to cause an external DTD to be retrieved.

The host is installed with WinRAR before 5.30.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle a trojan horse file. Successful exploitation allows local users to gain privileges.

The host is installed with WinRAR before 3.71 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to handle crafted ACE, ARJ, BZ2, CAB, GZ, LHA, RAR, TAR or ZIP files. Successful exploitation have unknown impact and attack vectors.


Pages:      Start    1898    1899    1900    1901    1902    1903    1904    1905    1906    1907    1908    1909    1910    1911    ..   3129

© SecPod Technologies