Show filters
164 Total Results
Displaying 101-110 of 164
Sort by:
Attacker Value
Unknown

CVE-2021-0101

Disclosure Date: June 09, 2021 (last updated February 22, 2025)
Buffer overflow in the BMC firmware for Intel(R) Server BoardM10JNP2SB before version EFI BIOS 7215, BMC 8100.01.08 may allow an unauthenticated user to potentially enable an escalation of privilege via adjacent access.
Attacker Value
Unknown

CVE-2020-24511

Disclosure Date: June 09, 2021 (last updated February 22, 2025)
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Attacker Value
Unknown

CVE-2021-31642

Disclosure Date: June 01, 2021 (last updated February 22, 2025)
A denial of service condition exists after an integer overflow in several IoT devices from CHIYU Technology, including BIOSENSE, Webpass, and BF-630, BF-631, and SEMAC. The vulnerability can be explored by sending an unexpected integer (> 32 bits) on the page parameter that will crash the web portal and making it unavailable until a reboot of the device.
Attacker Value
Unknown

CVE-2021-31643

Disclosure Date: June 01, 2021 (last updated February 22, 2025)
An XSS vulnerability exists in several IoT devices from CHIYU Technology, including SEMAC, Biosense, BF-630, BF-631, and Webpass due to a lack of sanitization on the component if.cgi - username parameter.
Attacker Value
Unknown

CVE-2021-26943

Disclosure Date: March 31, 2021 (last updated November 28, 2024)
The UX360CA BIOS through 303 on ASUS laptops allow an attacker (with the ring 0 privilege) to overwrite nearly arbitrary physical memory locations, including SMRAM, and execute arbitrary code in the SMM (issue 3 of 3).
Attacker Value
Unknown

CVE-2020-8672

Disclosure Date: February 02, 2021 (last updated February 22, 2025)
Out of bound read in BIOS firmware for 8th, 9th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 Series Processors may allow an unauthenticated user to potentially enable elevation of privilege or denial of service via local access.
Attacker Value
Unknown

CVE-2020-5361

Disclosure Date: December 18, 2020 (last updated February 22, 2025)
Select Dell Client Commercial and Consumer platforms support a BIOS password reset capability that is designed to assist authorized customers who forget their passwords. Dell is aware of unauthorized password generation tools that can generate BIOS recovery passwords. The tools, which are not authorized by Dell, can be used by a physically present attacker to reset BIOS passwords and BIOS-managed Hard Disk Drive (HDD) passwords. An unauthenticated attacker with physical access to the system could potentially exploit this vulnerability to bypass security restrictions for BIOS Setup configuration, HDD access and BIOS pre-boot authentication.
Attacker Value
Unknown

CVE-2020-29569

Disclosure Date: December 15, 2020 (last updated February 22, 2025)
An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.
Attacker Value
Unknown

CVE-2020-29374

Disclosure Date: November 28, 2020 (last updated February 22, 2025)
An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.
Attacker Value
Unknown

CVE-2020-12927

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
A potential vulnerability in a dynamically loaded AMD driver in AMD VBIOS Flash Tool SDK may allow any authenticated user to escalate privileges to NT authority system.