Show filters
219 Total Results
Displaying 71-80 of 219
Sort by:
Attacker Value
Unknown

CVE-2020-36318

Disclosure Date: April 11, 2021 (last updated February 22, 2025)
In the standard library in Rust before 1.49.0, VecDeque::make_contiguous has a bug that pops the same element more than once under certain condition. This bug could result in a use-after-free or double free.
Attacker Value
Unknown

CVE-2020-35875

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the tokio-rustls crate before 0.13.1 for Rust. Excessive memory usage may occur when data arrives quickly.
Attacker Value
Unknown

CVE-2020-35857

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the trust-dns-server crate before 0.18.1 for Rust. DNS MX and SRV null targets are mishandled, causing stack consumption.
Attacker Value
Unknown

CVE-2020-26933

Disclosure Date: November 18, 2020 (last updated February 22, 2025)
Trusted Computing Group (TCG) Trusted Platform Module Library Family 2.0 Library Specification Revisions 1.38 through 1.59 has Incorrect Access Control during a non-orderly TPM shut-down that uses USE_DA_USED. Improper initialization of this shut-down may result in susceptibility to a dictionary attack.
Attacker Value
Unknown

CVE-2020-12926

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
The Trusted Platform Modules (TPM) reference software may not properly track the number of times a failed shutdown happens. This can leave the TPM in a state where confidential key material in the TPM may be able to be compromised. AMD believes that the attack requires physical access of the device because the power must be repeatedly turned on and off. This potential attack may be used to change confidential information, alter executables signed by key material in the TPM, or create a denial of service of the device.
Attacker Value
Unknown

CVE-2020-8750

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Use after free in Kernel Mode Driver for Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2020-12303

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Use after free in DAL subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access.
Attacker Value
Unknown

CVE-2020-8745

Disclosure Date: November 12, 2020 (last updated November 28, 2024)
Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Attacker Value
Unknown

CVE-2020-12297

Disclosure Date: November 12, 2020 (last updated November 28, 2024)
Improper access control in Installer for Intel(R) CSME Driver for Windows versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access.
Attacker Value
Unknown

CVE-2020-12355

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Authentication bypass by capture-replay in RPMB protocol message authentication subsystem in Intel(R) TXE versions before 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.