mirror of
https://github.com/0xMarcio/cve.git
synced 2025-12-30 04:49:42 +00:00
1.8 KiB
1.8 KiB
CVE-2020-0551
Description
Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html
POC
Reference
No PoCs from references.
Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AngrySilver/incubator-teaclave-sgx-sdk
- https://github.com/UzL-ITS/util-lookup
- https://github.com/VXAPPS/sgx-benchmark
- https://github.com/apache/incubator-teaclave-sgx-sdk
- https://github.com/bitdefender/lvi-lfb-attack-poc
- https://github.com/codexlynx/hardware-attacks-state-of-the-art
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/initc3/sgx-ipp-crypto
- https://github.com/intel-secl/crypto-api-toolkit
- https://github.com/intel/crypto-api-toolkit
- https://github.com/intel/intel-sgx-ssl
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance
- https://github.com/orgTestCodacy11KRepos110MB/repo-4646-incubator-teaclave-sgx-sdk
- https://github.com/peshwar9/teaclave-sdk-sample
- https://github.com/savchenko/windows10
- https://github.com/sbellem/_sgx-ipp-crypto
- https://github.com/soosmile/POC
- https://github.com/xtyi/intel-sgx-ssl