Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-5740

EPSS 0.06% · P20
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2013-5740

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Unspecified vulnerability in the Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) before 1.2, as used by the Intel QM77, QS77, Q77 Express, C216, Q67 Express, C202, C204, and C206 chipsets and Mobile Intel QM67 and QS67 chipsets, when the measured launch environment (MLE) is invoked, allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Intel和Mobile Intel芯片Intel Trusted Execution Technology 提权漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Intel Trusted Execution Technology(TXT,英特尔可信任执行技术)是美国英特尔(Intel)公司酷睿2双核处理器中的一项硬件延伸技术,主要用于保护虚拟化计算环境中的数据,可避免受到间谍软件攻击、病毒入侵等威胁。 Intel和Mobile Intel芯片中使用的Intel TXT中的SINIT Authenticated Code Modules (ACM)组件1.2之前的版本中存在提权漏洞。当已度量加载环境(measured launch environment,简称ML
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2013-5740

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2013-5740

登录查看更多情报信息。

Same Patch Batch · n/a · 2013-09-12 · 23 CVEs total

CVE-2013-4338WordPress wp-includes/functions.php脚本远程任意代码执行漏洞
CVE-2013-5488多款Cisco产品Cisco Common Services ActiveMQ组件拒绝服务漏洞
CVE-2013-3446Cisco Digital Media Manager 登录页面开放重定向漏洞
CVE-2013-3039IBM Rational Requirements Composer 授权问题漏洞
CVE-2013-3038IBM Rational Requirements Composer 信任管理漏洞
CVE-2013-3037IBM Rational Requirements Composer 权限许可和访问控制漏洞
CVE-2013-3036IBM Rational Requirements Composer 开放重定向漏洞
CVE-2013-5739WordPress ‘get_allowed_mime_types’函数安全漏洞
CVE-2013-5738WordPress ‘get_allowed_mime_types’函数安全漏洞
CVE-2013-4340WordPress wp-admin/includes/post.php脚本安全漏洞
CVE-2013-4339WordPress 开放重定向漏洞
CVE-2013-2601Citrix XenClient XT NDVM连接处理器组件任意命令执行漏洞
CVE-2013-5216CapaSystems Performance Guard 目录遍历漏洞
CVE-2013-4329Xen xenlight库权限许可和访问控制漏洞
CVE-2013-2940Citrix CloudPortal Services Manager 安全漏洞
CVE-2013-2939Citrix CloudPortal Services Manager 安全漏洞
CVE-2013-2938Citrix CloudPortal Services Manager 安全漏洞
CVE-2013-2937Citrix CloudPortal Services Manager 安全漏洞
CVE-2013-2936Citrix CloudPortal Services Manager 安全漏洞
CVE-2013-2935Citrix CloudPortal Services Manager 安全漏洞

Showing top 20 of 23 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2013-5740

No comments yet


Leave a comment