cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2019-0117,https://securityvulnerability.io/vulnerability/CVE-2019-0117,Insufficient Access Control in Protected Memory Subsystem for Intel Processors,"The vulnerability arises from insufficient access control within the protected memory subsystem of Intel's Software Guard Extensions (SGX). This flaw affects a range of Intel Core and Xeon processors, potentially allowing a privileged user to exploit local access and enable unauthorized information disclosure. This poses significant risks to data security in environments utilizing said processors.",Intel,2019.2 Ipu – Intel(r) Sgx With Intel(r) Processor Graphics Update,4.4,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-11-14T19:08:20.000Z,0 CVE-2019-0124,https://securityvulnerability.io/vulnerability/CVE-2019-0124,Insufficient Memory Protection in Intel Core Processors,"A vulnerability exists in Intel 6th Generation Core Processors and newer models, which support Trusted Execution Technology (TXT). This flaw can allow a privileged user with local access to potentially escalate their privileges, compromising system security. Affected users should consider reviewing security practices and updates provided by Intel to mitigate any risks associated with this vulnerability.",Intel,2019.2 Ipu – Intel(r) Sgx And Txt,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-11-14T19:07:54.000Z,0 CVE-2019-0123,https://securityvulnerability.io/vulnerability/CVE-2019-0123,Insufficient Memory Protection in Intel Core Processors Affecting Local Privilege Escalation,"Insufficient memory protection in Intel 6th Generation Core Processors and newer models that support Software Guard Extensions (SGX) may allow a privileged user with local access to enable escalation of privilege. This vulnerability poses a significant risk as it could allow unauthorized access to sensitive data and system control, making it vital for users and organizations to implement recommended security updates and mitigations.",Intel,2019.2 Ipu – Intel(r) Sgx And Txt,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-11-14T19:07:45.000Z,0 CVE-2019-14565,https://securityvulnerability.io/vulnerability/CVE-2019-14565,Insufficient Initialization in Intel SGX SDK for Windows and Linux,"The Intel SGX SDK for Windows and Linux contains a vulnerability due to insufficient initialization in versions 2.4.100.51291 and earlier for Windows, and 2.6.100.51363 and earlier for Linux. This flaw may be exploited by an authenticated user with local access to the system to disclose sensitive information, escalate user privileges, or cause a denial of service. Users and administrators should ensure their systems are updated to mitigate the risk associated with this security issue.",Intel,2019.2 Ipu – Intel(r) Sgx,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-11-14T16:47:32.000Z,0 CVE-2019-14566,https://securityvulnerability.io/vulnerability/CVE-2019-14566,Insufficient Input Validation in Intel SGX SDK for Linux and Windows,"Insufficient input validation in the Intel SGX SDK for Linux and Windows may allow an authenticated user to exploit this vulnerability. By leveraging local access, an attacker could potentially manipulate the input to enable information disclosure or escalate their privileges, which could lead to denial of service. Ensuring proper input validation is essential to mitigate such risks.",Intel,2019.2 Ipu – Intel(r) Sgx,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-11-14T16:46:00.000Z,0