Show filters
219 Total Results
Displaying 71-80 of 219
Sort by:
Attacker Value
Unknown
CVE-2020-36318
Disclosure Date: April 11, 2021 (last updated February 22, 2025)
In the standard library in Rust before 1.49.0, VecDeque::make_contiguous has a bug that pops the same element more than once under certain condition. This bug could result in a use-after-free or double free.
0
Attacker Value
Unknown
CVE-2020-35875
Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the tokio-rustls crate before 0.13.1 for Rust. Excessive memory usage may occur when data arrives quickly.
0
Attacker Value
Unknown
CVE-2020-35857
Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the trust-dns-server crate before 0.18.1 for Rust. DNS MX and SRV null targets are mishandled, causing stack consumption.
0
Attacker Value
Unknown
CVE-2020-26933
Disclosure Date: November 18, 2020 (last updated February 22, 2025)
Trusted Computing Group (TCG) Trusted Platform Module Library Family 2.0 Library Specification Revisions 1.38 through 1.59 has Incorrect Access Control during a non-orderly TPM shut-down that uses USE_DA_USED. Improper initialization of this shut-down may result in susceptibility to a dictionary attack.
0
Attacker Value
Unknown
CVE-2020-12926
Disclosure Date: November 12, 2020 (last updated February 22, 2025)
The Trusted Platform Modules (TPM) reference software may not properly track the number of times a failed shutdown happens. This can leave the TPM in a state where confidential key material in the TPM may be able to be compromised. AMD believes that the attack requires physical access of the device because the power must be repeatedly turned on and off. This potential attack may be used to change confidential information, alter executables signed by key material in the TPM, or create a denial of service of the device.
0
Attacker Value
Unknown
CVE-2020-8750
Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Use after free in Kernel Mode Driver for Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2020-12303
Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Use after free in DAL subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access.
0
Attacker Value
Unknown
CVE-2020-8745
Disclosure Date: November 12, 2020 (last updated November 28, 2024)
Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
0
Attacker Value
Unknown
CVE-2020-12297
Disclosure Date: November 12, 2020 (last updated November 28, 2024)
Improper access control in Installer for Intel(R) CSME Driver for Windows versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access.
0
Attacker Value
Unknown
CVE-2020-12355
Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Authentication bypass by capture-replay in RPMB protocol message authentication subsystem in Intel(R) TXE versions before 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
0