{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T10:34:59.013","vulnerabilities":[{"cve":{"id":"CVE-2005-4175","sourceIdentifier":"cve@mitre.org","published":"2005-12-11T21:03:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Insyde BIOS V190 does not clear the keyboard buffer after reading the BIOS password during system startup, which allows local administrators or users to read the password directly from physical memory."},{"lang":"es","value":"Insyde BIOS V190 no borra el búfer del teclado después de leer la contraseña de la BIOS durante el arranque del sistema, lo que permite a administradores o usuarios locales leer directamente la contraseña de la memoria física."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:insyde:insyde_bios:v190:*:*:*:*:*:*:*","matchCriteriaId":"12B464EA-B99F-4E76-97F6-9CD16B6F06D7"}]}]}],"references":[{"url":"http://www.ivizsecurity.com/preboot-patch.html","source":"cve@mitre.org"},{"url":"http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf","source":"cve@mitre.org"},{"url":"http://www.kb.cert.org/vuls/id/847537","source":"cve@mitre.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.pulltheplug.org/users/endrazine/Bios.Information.Leakage.txt","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/419610/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/15751","source":"cve@mitre.org"},{"url":"http://www.ivizsecurity.com/preboot-patch.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.kb.cert.org/vuls/id/847537","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.pulltheplug.org/users/endrazine/Bios.Information.Leakage.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/419610/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/15751","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}