Show filters
82 Total Results
Displaying 61-70 of 82
Sort by:
Attacker Value
Unknown
CVE-2019-0151
Disclosure Date: November 14, 2019 (last updated November 08, 2023)
Insufficient memory protection in Intel(R) TXT for certain Intel(R) Core Processors and Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2019-0124
Disclosure Date: November 14, 2019 (last updated November 08, 2023)
Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting TXT, may allow a privileged user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2019-0117
Disclosure Date: November 14, 2019 (last updated November 08, 2023)
Insufficient access control in protected memory subsystem for Intel(R) SGX for 6th, 7th, 8th, 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5, v6 Families; Intel(R) Xeon(R) E-2100 & E-2200 Processor Families with Intel(R) Processor Graphics may allow a privileged user to potentially enable information disclosure via local access.
0
Attacker Value
Unknown
CVE-2019-11135
Disclosure Date: November 14, 2019 (last updated November 08, 2023)
TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
0
Attacker Value
Unknown
CVE-2019-0154
Disclosure Date: November 14, 2019 (last updated November 08, 2023)
Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.
0
Attacker Value
Unknown
CVE-2019-0174
Disclosure Date: June 13, 2019 (last updated November 27, 2024)
Logic condition in specific microprocessors may allow an authenticated user to potentially enable partial physical address information disclosure via local access.
0
Attacker Value
Unknown
CVE-2017-2751
Disclosure Date: October 03, 2018 (last updated November 27, 2024)
A BIOS password extraction vulnerability has been reported on certain consumer notebooks with firmware F.22 and others. The BIOS password was stored in CMOS in a way that allowed it to be extracted. This applies to consumer notebooks launched in early 2014.
0
Attacker Value
Unknown
CVE-2017-14443
Disclosure Date: September 17, 2018 (last updated November 27, 2024)
An exploitable information leak vulnerability exists in Insteon Hub running firmware version 1012. The HTTP server implementation incorrectly checks the number of GET parameters supplied, leading to an arbitrarily controlled information leak on the whole device memory. An attacker can send an authenticated HTTP request to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-14453
Disclosure Date: August 23, 2018 (last updated November 27, 2024)
On Insteon Hub 2245-222 devices with firmware version 1012, specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. A strcpy overflows the buffer insteon_pubnub.channel_ad_r, which has a size of 16 bytes. An attacker can send an arbitrarily long "ad_r" parameter in order to exploit this vulnerability.
0
Attacker Value
Unknown
CVE-2017-16337
Disclosure Date: August 23, 2018 (last updated November 27, 2024)
On Insteon Hub 2245-222 devices with firmware version 1012, specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. At 0x9d01ef24 the value for the s_offset key is copied using strcpy to the buffer at $sp+0x2b0. This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.
0