Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag:
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
_markel___ | https://www.intel.com/content/www/us/en/security-center/adv... | Source _markel___ 1535049062927704065 | 2022/06/10 |
_markel___ | https://twitter.com/_markel___/status/1535049062927704065/p... | Source _markel___ 1535049062927704065 | 2022/06/10 |
ipssignatures | https://twitter.com/_markel___/status/1535049062927704065 | Source ipssignatures 1535292204461305859 | 2022/06/11 |
benderbreizh | https://ubuntu.com/security/notices/USN-5486-1 | Source benderbreizh 1538757310356520962 | 2022/06/20 |
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
mi6rogue.com | 3 |
threatpost.com | 3 |
www.disoftin.com | 3 |
feedproxy.google.com | 3 |
www.helpnetsecurity.com | 3 |
User | URL | Info Source |
---|---|---|
_markel___ | intel.com | Show Tweet |
_markel___ | twitter.com | Show Tweet |
ipssignatures | twitter.com | Show Tweet |
benderbreizh | ubuntu.com | Show Tweet |
Name | URL |
---|---|
No Data |
Name | URL |
---|---|
No Data |