{"vulnerability": "cve-2020-0551", "sightings": [{"uuid": "f4c8c238-7a6a-4254-b447-a228b88bdb86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0551", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/774", "content": "#exploit\nCVE-2020-0551:\nLoad Value Injection\u00a0in the Line Fill Buffers\n]-&gt; LVI-LFB Side-Channel/Control Flow Hijacking Attack:\nhttps://www.bitdefender.com/business/cyber-threats/lvi-lfb-attack.html\n]-&gt; PoC for LVI-LFB Control Flow Hijacking attack:\nhttps://github.com/bitdefender/lvi-lfb-attack-poc\n]-&gt; SGX-Step - A Practical Attack Framework for Precise Enclave Execution Control\nhttps://github.com/jovanbulck/sgx-step", "creation_timestamp": "2024-10-10T02:42:11.000000Z"}, {"uuid": "e1257b9d-2065-4c1b-a96b-670a854ffce0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0551", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/775", "content": "#Research\nCVE-2020-0551. \nLVI: Hijacking Transient Execution through Microarchitectural Load Value Injection", "creation_timestamp": "2020-12-20T21:57:56.000000Z"}, {"uuid": "d1c0bb00-fcb6-478d-b847-cf6b557c1e0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0551", "type": "seen", "source": "https://t.me/thehackernews/632", "content": "LVI Attacks \ud83d\udd25 CVE-2020-0551\n\nA new hardware vulnerability affecting modern Intel CPUs puts virtual workloads and data centers at risk of hacking.\n\nRead details: https://thehackernews.com/2020/03/intel-load-value-injection.html\n\nIt involves reversely exploiting Meltdown and MDS-type flaws to bypass existing defenses.", "creation_timestamp": "2020-03-10T18:19:39.000000Z"}]}