Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-5715

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-04 Jan, 2018 | 13:00
Updated At-06 May, 2025 | 14:59
Rejected At-
Credits

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:04 Jan, 2018 | 13:00
Updated At:06 May, 2025 | 14:59
Rejected At:
â–¼CVE Numbering Authority (CNA)

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

Affected Products
Vendor
Intel CorporationIntel Corporation
Product
Microprocessors with Speculative Execution
Versions
Affected
  • All
Problem Types
TypeCWE IDDescription
textN/AInformation Disclosure
Type: text
CWE ID: N/A
Description: Information Disclosure
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://nvidia.custhelp.com/app/answers/detail/a_id/4609
x_refsource_CONFIRM
https://usn.ubuntu.com/3560-1/
vendor-advisory
x_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
mailing-list
x_refsource_MLIST
https://www.debian.org/security/2018/dsa-4187
vendor-advisory
x_refsource_DEBIAN
https://usn.ubuntu.com/3542-2/
vendor-advisory
x_refsource_UBUNTU
https://security.gentoo.org/glsa/201810-06
vendor-advisory
x_refsource_GENTOO
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
x_refsource_CONFIRM
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
x_refsource_CONFIRM
https://usn.ubuntu.com/3540-2/
vendor-advisory
x_refsource_UBUNTU
https://access.redhat.com/security/vulnerabilities/speculativeexecution
x_refsource_CONFIRM
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
x_refsource_CONFIRM
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
mailing-list
x_refsource_MLIST
https://usn.ubuntu.com/3597-1/
vendor-advisory
x_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
mailing-list
x_refsource_MLIST
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
vendor-advisory
x_refsource_SUSE
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
vendor-advisory
x_refsource_SUSE
http://nvidia.custhelp.com/app/answers/detail/a_id/4611
x_refsource_CONFIRM
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
x_refsource_MISC
https://www.debian.org/security/2018/dsa-4213
vendor-advisory
x_refsource_DEBIAN
https://cert.vde.com/en-us/advisories/vde-2018-002
x_refsource_CONFIRM
https://www.debian.org/security/2018/dsa-4120
vendor-advisory
x_refsource_DEBIAN
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
vendor-advisory
x_refsource_SUSE
https://usn.ubuntu.com/3580-1/
vendor-advisory
x_refsource_UBUNTU
https://support.f5.com/csp/article/K91229003
x_refsource_CONFIRM
https://usn.ubuntu.com/3531-3/
vendor-advisory
x_refsource_UBUNTU
https://usn.ubuntu.com/3620-2/
vendor-advisory
x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
vendor-advisory
x_refsource_SUSE
https://usn.ubuntu.com/3582-1/
vendor-advisory
x_refsource_UBUNTU
https://www.debian.org/security/2018/dsa-4188
vendor-advisory
x_refsource_DEBIAN
https://access.redhat.com/errata/RHSA-2018:0292
vendor-advisory
x_refsource_REDHAT
http://xenbits.xen.org/xsa/advisory-254.html
x_refsource_CONFIRM
https://security.netapp.com/advisory/ntap-20180104-0001/
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
vendor-advisory
x_refsource_SUSE
https://www.synology.com/support/security/Synology_SA_18_01
x_refsource_CONFIRM
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
x_refsource_MISC
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
x_refsource_CONFIRM
http://www.securityfocus.com/bid/102376
vdb-entry
x_refsource_BID
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
x_refsource_CONFIRM
https://usn.ubuntu.com/3594-1/
vendor-advisory
x_refsource_UBUNTU
http://www.kb.cert.org/vuls/id/584653
third-party-advisory
x_refsource_CERT-VN
https://www.kb.cert.org/vuls/id/180049
third-party-advisory
x_refsource_CERT-VN
https://cert.vde.com/en-us/advisories/vde-2018-003
x_refsource_CONFIRM
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
vendor-advisory
x_refsource_SUSE
https://usn.ubuntu.com/3690-1/
vendor-advisory
x_refsource_UBUNTU
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
x_refsource_CONFIRM
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
x_refsource_CONFIRM
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
x_refsource_CONFIRM
https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
x_refsource_CONFIRM
https://usn.ubuntu.com/3549-1/
vendor-advisory
x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
vendor-advisory
x_refsource_SUSE
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
x_refsource_CONFIRM
https://support.citrix.com/article/CTX231399
x_refsource_CONFIRM
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
x_refsource_CONFIRM
https://spectreattack.com/
x_refsource_MISC
https://usn.ubuntu.com/3531-1/
vendor-advisory
x_refsource_UBUNTU
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
vendor-advisory
x_refsource_FREEBSD
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
vendor-advisory
x_refsource_SUSE
https://usn.ubuntu.com/3581-1/
vendor-advisory
x_refsource_UBUNTU
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
x_refsource_CONFIRM
http://www.securitytracker.com/id/1040071
vdb-entry
x_refsource_SECTRACK
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
mailing-list
x_refsource_MLIST
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
x_refsource_CONFIRM
https://usn.ubuntu.com/3597-2/
vendor-advisory
x_refsource_UBUNTU
https://usn.ubuntu.com/3581-2/
vendor-advisory
x_refsource_UBUNTU
http://nvidia.custhelp.com/app/answers/detail/a_id/4614
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
vendor-advisory
x_refsource_SUSE
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
mailing-list
x_refsource_MLIST
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
vendor-advisory
x_refsource_CISCO
https://usn.ubuntu.com/usn/usn-3516-1/
vendor-advisory
x_refsource_UBUNTU
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
x_refsource_CONFIRM
https://www.exploit-db.com/exploits/43427/
exploit
x_refsource_EXPLOIT-DB
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
vendor-advisory
x_refsource_SUSE
https://usn.ubuntu.com/3541-2/
vendor-advisory
x_refsource_UBUNTU
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
x_refsource_MISC
https://support.lenovo.com/us/en/solutions/LEN-18282
x_refsource_CONFIRM
https://usn.ubuntu.com/3777-3/
vendor-advisory
x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
vendor-advisory
x_refsource_SUSE
https://www.vmware.com/security/advisories/VMSA-2018-0007.html
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
vendor-advisory
x_refsource_SUSE
http://nvidia.custhelp.com/app/answers/detail/a_id/4613
x_refsource_CONFIRM
https://usn.ubuntu.com/3561-1/
vendor-advisory
x_refsource_UBUNTU
https://usn.ubuntu.com/3582-2/
vendor-advisory
x_refsource_UBUNTU
https://seclists.org/bugtraq/2019/Jun/36
mailing-list
x_refsource_BUGTRAQ
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
x_refsource_CONFIRM
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
x_refsource_MISC
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
x_refsource_CONFIRM
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
vendor-advisory
x_refsource_FREEBSD
https://seclists.org/bugtraq/2019/Nov/16
mailing-list
x_refsource_BUGTRAQ
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
x_refsource_MISC
https://security.paloaltonetworks.com/CVE-2017-5715
x_refsource_CONFIRM
https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
mailing-list
x_refsource_MLIST
https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
mailing-list
x_refsource_MLIST
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4609
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3560-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://www.debian.org/security/2018/dsa-4187
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: https://usn.ubuntu.com/3542-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://security.gentoo.org/glsa/201810-06
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3540-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://access.redhat.com/security/vulnerabilities/speculativeexecution
Resource:
x_refsource_CONFIRM
Hyperlink: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Resource:
x_refsource_CONFIRM
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://usn.ubuntu.com/3597-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4611
Resource:
x_refsource_CONFIRM
Hyperlink: https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
Resource:
x_refsource_MISC
Hyperlink: https://www.debian.org/security/2018/dsa-4213
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-002
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.debian.org/security/2018/dsa-4120
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://usn.ubuntu.com/3580-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://support.f5.com/csp/article/K91229003
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3531-3/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://usn.ubuntu.com/3620-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://usn.ubuntu.com/3582-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://www.debian.org/security/2018/dsa-4188
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: https://access.redhat.com/errata/RHSA-2018:0292
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://xenbits.xen.org/xsa/advisory-254.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://security.netapp.com/advisory/ntap-20180104-0001/
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://www.synology.com/support/security/Synology_SA_18_01
Resource:
x_refsource_CONFIRM
Hyperlink: http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
Resource:
x_refsource_MISC
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/102376
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3594-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.kb.cert.org/vuls/id/584653
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: https://www.kb.cert.org/vuls/id/180049
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-003
Resource:
x_refsource_CONFIRM
Hyperlink: https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://usn.ubuntu.com/3690-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
Resource:
x_refsource_CONFIRM
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3549-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
Resource:
x_refsource_CONFIRM
Hyperlink: https://support.citrix.com/article/CTX231399
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://spectreattack.com/
Resource:
x_refsource_MISC
Hyperlink: https://usn.ubuntu.com/3531-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://usn.ubuntu.com/3581-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securitytracker.com/id/1040071
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3597-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://usn.ubuntu.com/3581-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4614
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: https://usn.ubuntu.com/usn/usn-3516-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.exploit-db.com/exploits/43427/
Resource:
exploit
x_refsource_EXPLOIT-DB
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://usn.ubuntu.com/3541-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
Resource:
x_refsource_MISC
Hyperlink: https://support.lenovo.com/us/en/solutions/LEN-18282
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3777-3/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://www.vmware.com/security/advisories/VMSA-2018-0007.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4613
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3561-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://usn.ubuntu.com/3582-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://seclists.org/bugtraq/2019/Jun/36
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Resource:
x_refsource_MISC
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
Resource:
x_refsource_CONFIRM
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: https://seclists.org/bugtraq/2019/Nov/16
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
Resource:
x_refsource_MISC
Hyperlink: https://security.paloaltonetworks.com/CVE-2017-5715
Resource:
x_refsource_CONFIRM
Hyperlink: https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
Resource:
mailing-list
x_refsource_MLIST
â–¼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://nvidia.custhelp.com/app/answers/detail/a_id/4609
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3560-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
mailing-list
x_refsource_MLIST
x_transferred
https://www.debian.org/security/2018/dsa-4187
vendor-advisory
x_refsource_DEBIAN
x_transferred
https://usn.ubuntu.com/3542-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://security.gentoo.org/glsa/201810-06
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
x_refsource_CONFIRM
x_transferred
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3540-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://access.redhat.com/security/vulnerabilities/speculativeexecution
x_refsource_CONFIRM
x_transferred
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
x_refsource_CONFIRM
x_transferred
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
mailing-list
x_refsource_MLIST
x_transferred
https://usn.ubuntu.com/3597-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
mailing-list
x_refsource_MLIST
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://nvidia.custhelp.com/app/answers/detail/a_id/4611
x_refsource_CONFIRM
x_transferred
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
x_refsource_MISC
x_transferred
https://www.debian.org/security/2018/dsa-4213
vendor-advisory
x_refsource_DEBIAN
x_transferred
https://cert.vde.com/en-us/advisories/vde-2018-002
x_refsource_CONFIRM
x_transferred
https://www.debian.org/security/2018/dsa-4120
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://usn.ubuntu.com/3580-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://support.f5.com/csp/article/K91229003
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3531-3/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://usn.ubuntu.com/3620-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://usn.ubuntu.com/3582-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://www.debian.org/security/2018/dsa-4188
vendor-advisory
x_refsource_DEBIAN
x_transferred
https://access.redhat.com/errata/RHSA-2018:0292
vendor-advisory
x_refsource_REDHAT
x_transferred
http://xenbits.xen.org/xsa/advisory-254.html
x_refsource_CONFIRM
x_transferred
https://security.netapp.com/advisory/ntap-20180104-0001/
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://www.synology.com/support/security/Synology_SA_18_01
x_refsource_CONFIRM
x_transferred
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
x_refsource_MISC
x_transferred
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/102376
vdb-entry
x_refsource_BID
x_transferred
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3594-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.kb.cert.org/vuls/id/584653
third-party-advisory
x_refsource_CERT-VN
x_transferred
https://www.kb.cert.org/vuls/id/180049
third-party-advisory
x_refsource_CERT-VN
x_transferred
https://cert.vde.com/en-us/advisories/vde-2018-003
x_refsource_CONFIRM
x_transferred
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://usn.ubuntu.com/3690-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
x_refsource_CONFIRM
x_transferred
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
x_refsource_CONFIRM
x_transferred
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
x_refsource_CONFIRM
x_transferred
https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3549-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
x_refsource_CONFIRM
x_transferred
https://support.citrix.com/article/CTX231399
x_refsource_CONFIRM
x_transferred
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
x_refsource_CONFIRM
x_transferred
https://spectreattack.com/
x_refsource_MISC
x_transferred
https://usn.ubuntu.com/3531-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://usn.ubuntu.com/3581-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
x_refsource_CONFIRM
x_transferred
http://www.securitytracker.com/id/1040071
vdb-entry
x_refsource_SECTRACK
x_transferred
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
mailing-list
x_refsource_MLIST
x_transferred
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3597-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://usn.ubuntu.com/3581-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://nvidia.custhelp.com/app/answers/detail/a_id/4614
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
mailing-list
x_refsource_MLIST
x_transferred
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
vendor-advisory
x_refsource_CISCO
x_transferred
https://usn.ubuntu.com/usn/usn-3516-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
x_refsource_CONFIRM
x_transferred
https://www.exploit-db.com/exploits/43427/
exploit
x_refsource_EXPLOIT-DB
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://usn.ubuntu.com/3541-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
x_refsource_MISC
x_transferred
https://support.lenovo.com/us/en/solutions/LEN-18282
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3777-3/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://www.vmware.com/security/advisories/VMSA-2018-0007.html
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://nvidia.custhelp.com/app/answers/detail/a_id/4613
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3561-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://usn.ubuntu.com/3582-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://seclists.org/bugtraq/2019/Jun/36
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
x_refsource_CONFIRM
x_transferred
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
x_refsource_MISC
x_transferred
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
x_refsource_CONFIRM
x_transferred
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
https://seclists.org/bugtraq/2019/Nov/16
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
x_refsource_MISC
x_transferred
https://security.paloaltonetworks.com/CVE-2017-5715
x_refsource_CONFIRM
x_transferred
https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
mailing-list
x_refsource_MLIST
x_transferred
https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4609
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3560-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://www.debian.org/security/2018/dsa-4187
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: https://usn.ubuntu.com/3542-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://security.gentoo.org/glsa/201810-06
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3540-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://access.redhat.com/security/vulnerabilities/speculativeexecution
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://usn.ubuntu.com/3597-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4611
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.debian.org/security/2018/dsa-4213
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-002
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.debian.org/security/2018/dsa-4120
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://usn.ubuntu.com/3580-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://support.f5.com/csp/article/K91229003
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3531-3/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://usn.ubuntu.com/3620-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://usn.ubuntu.com/3582-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://www.debian.org/security/2018/dsa-4188
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2018:0292
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://xenbits.xen.org/xsa/advisory-254.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20180104-0001/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://www.synology.com/support/security/Synology_SA_18_01
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/102376
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3594-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/584653
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: https://www.kb.cert.org/vuls/id/180049
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-003
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://usn.ubuntu.com/3690-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3549-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://support.citrix.com/article/CTX231399
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://spectreattack.com/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://usn.ubuntu.com/3531-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://usn.ubuntu.com/3581-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securitytracker.com/id/1040071
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3597-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://usn.ubuntu.com/3581-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4614
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: https://usn.ubuntu.com/usn/usn-3516-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.exploit-db.com/exploits/43427/
Resource:
exploit
x_refsource_EXPLOIT-DB
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://usn.ubuntu.com/3541-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://support.lenovo.com/us/en/solutions/LEN-18282
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3777-3/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://www.vmware.com/security/advisories/VMSA-2018-0007.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4613
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3561-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://usn.ubuntu.com/3582-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://seclists.org/bugtraq/2019/Jun/36
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: https://seclists.org/bugtraq/2019/Nov/16
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://security.paloaltonetworks.com/CVE-2017-5715
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-203CWE-203 Observable Discrepancy
Type: CWE
CWE ID: CWE-203
Description: CWE-203 Observable Discrepancy
Metrics
VersionBase scoreBase severityVector
3.15.6MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Version: 3.1
Base score: 5.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:04 Jan, 2018 | 13:29
Updated At:06 May, 2025 | 15:15

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.6MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Secondary3.15.6MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Primary2.01.9LOW
AV:L/AC:M/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 5.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 1.9
Base severity: LOW
Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CPE Matches

Intel Corporation
intel
>>atom_c>>c2308
cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2316
cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2338
cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2350
cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2358
cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2508
cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2516
cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2518
cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2530
cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2538
cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2550
cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2558
cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2718
cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2730
cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2738
cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2750
cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2758
cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3308
cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3338
cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3508
cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3538
cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3558
cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3708
cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3750
cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3758
cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3808
cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3830
cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3850
cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3858
cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3950
cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3955
cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3958
cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3805
cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3815
cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3825
cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3826
cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3827
cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3845
cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3130
cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3200rk
cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3205rk
cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3230rk
cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3235rk
cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3265rk
cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3295rk
cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3405
cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3445
cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x5-e3930>>-
cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x5-e3940>>-
cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x7-e3950>>-
cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-203Primarynvd@nist.gov
CWE-203Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-203
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-203
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.htmlsecure@intel.com
Broken Link
http://nvidia.custhelp.com/app/answers/detail/a_id/4609secure@intel.com
Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4611secure@intel.com
Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4613secure@intel.com
Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4614secure@intel.com
Third Party Advisory
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.htmlsecure@intel.com
Exploit
Third Party Advisory
VDB Entry
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.htmlsecure@intel.com
Third Party Advisory
VDB Entry
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txtsecure@intel.com
Third Party Advisory
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txtsecure@intel.com
Third Party Advisory
http://www.kb.cert.org/vuls/id/584653secure@intel.com
Third Party Advisory
US Government Resource
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlsecure@intel.com
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlsecure@intel.com
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlsecure@intel.com
Third Party Advisory
http://www.securityfocus.com/bid/102376secure@intel.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1040071secure@intel.com
Third Party Advisory
VDB Entry
http://xenbits.xen.org/xsa/advisory-254.htmlsecure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0292secure@intel.com
Third Party Advisory
https://access.redhat.com/security/vulnerabilities/speculativeexecutionsecure@intel.com
Third Party Advisory
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/secure@intel.com
Third Party Advisory
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/secure@intel.com
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdfsecure@intel.com
Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-002secure@intel.com
Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-003secure@intel.com
Third Party Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerabilitysecure@intel.com
Third Party Advisory
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.htmlsecure@intel.com
Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixessecure@intel.com
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/03/msg00025.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/08/msg00019.htmlsecure@intel.com
N/A
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002secure@intel.com
Patch
Third Party Advisory
Vendor Advisory
https://seclists.org/bugtraq/2019/Jun/36secure@intel.com
Issue Tracking
Mailing List
Third Party Advisory
https://seclists.org/bugtraq/2019/Nov/16secure@intel.com
Issue Tracking
Mailing List
Third Party Advisory
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-frsecure@intel.com
Vendor Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.ascsecure@intel.com
Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.ascsecure@intel.com
Third Party Advisory
https://security.gentoo.org/glsa/201810-06secure@intel.com
Third Party Advisory
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.htmlsecure@intel.com
Third Party Advisory
https://security.netapp.com/advisory/ntap-20180104-0001/secure@intel.com
Third Party Advisory
https://security.paloaltonetworks.com/CVE-2017-5715secure@intel.com
Third Party Advisory
https://spectreattack.com/secure@intel.com
Third Party Advisory
https://support.citrix.com/article/CTX231399secure@intel.com
Third Party Advisory
https://support.f5.com/csp/article/K91229003secure@intel.com
Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_ussecure@intel.com
Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_ussecure@intel.com
Third Party Advisory
https://support.lenovo.com/us/en/solutions/LEN-18282secure@intel.com
Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannelsecure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3531-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3531-3/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3540-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3541-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3542-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3549-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3560-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3561-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3580-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3581-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3581-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3582-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3582-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3594-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3597-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3597-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3620-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3690-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3777-3/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/usn/usn-3516-1/secure@intel.com
Third Party Advisory
https://www.debian.org/security/2018/dsa-4120secure@intel.com
Third Party Advisory
https://www.debian.org/security/2018/dsa-4187secure@intel.com
Third Party Advisory
https://www.debian.org/security/2018/dsa-4188secure@intel.com
Third Party Advisory
https://www.debian.org/security/2018/dsa-4213secure@intel.com
Third Party Advisory
https://www.exploit-db.com/exploits/43427/secure@intel.com
Exploit
Third Party Advisory
VDB Entry
https://www.kb.cert.org/vuls/id/180049secure@intel.com
Third Party Advisory
US Government Resource
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001secure@intel.com
Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlsecure@intel.com
Third Party Advisory
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/secure@intel.com
Third Party Advisory
https://www.synology.com/support/security/Synology_SA_18_01secure@intel.com
Third Party Advisory
https://www.vmware.com/security/advisories/VMSA-2018-0007.htmlsecure@intel.com
Third Party Advisory
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.htmlsecure@intel.com
Third Party Advisory
https://www.vmware.com/us/security/advisories/VMSA-2018-0004.htmlsecure@intel.com
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://nvidia.custhelp.com/app/answers/detail/a_id/4609af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4611af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4613af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4614af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txtaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txtaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.kb.cert.org/vuls/id/584653af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/102376af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1040071af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://xenbits.xen.org/xsa/advisory-254.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0292af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/security/vulnerabilities/speculativeexecutionaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdfaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-002af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-003af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerabilityaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixesaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/03/msg00025.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/08/msg00019.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002af854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
Vendor Advisory
https://seclists.org/bugtraq/2019/Jun/36af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mailing List
Third Party Advisory
https://seclists.org/bugtraq/2019/Nov/16af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mailing List
Third Party Advisory
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fraf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.ascaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.ascaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.gentoo.org/glsa/201810-06af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.netapp.com/advisory/ntap-20180104-0001/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.paloaltonetworks.com/CVE-2017-5715af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://spectreattack.com/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.citrix.com/article/CTX231399af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.f5.com/csp/article/K91229003af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_usaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_usaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.lenovo.com/us/en/solutions/LEN-18282af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannelaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3531-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3531-3/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3540-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3541-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3542-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3549-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3560-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3561-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3580-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3581-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3581-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3582-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3582-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3594-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3597-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3597-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3620-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3690-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3777-3/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/usn/usn-3516-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.debian.org/security/2018/dsa-4120af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.debian.org/security/2018/dsa-4187af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.debian.org/security/2018/dsa-4188af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.debian.org/security/2018/dsa-4213af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.exploit-db.com/exploits/43427/af854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
https://www.kb.cert.org/vuls/id/180049af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.synology.com/support/security/Synology_SA_18_01af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.vmware.com/security/advisories/VMSA-2018-0007.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.vmware.com/us/security/advisories/VMSA-2018-0004.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4609
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4611
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4613
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4614
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
Source: secure@intel.com
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
Source: secure@intel.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://www.kb.cert.org/vuls/id/584653
Source: secure@intel.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/102376
Source: secure@intel.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1040071
Source: secure@intel.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://xenbits.xen.org/xsa/advisory-254.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:0292
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/security/vulnerabilities/speculativeexecution
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-002
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-003
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
Source: secure@intel.com
Resource: N/A
Hyperlink: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Source: secure@intel.com
Resource:
Patch
Third Party Advisory
Vendor Advisory
Hyperlink: https://seclists.org/bugtraq/2019/Jun/36
Source: secure@intel.com
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: https://seclists.org/bugtraq/2019/Nov/16
Source: secure@intel.com
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
Source: secure@intel.com
Resource:
Vendor Advisory
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://security.gentoo.org/glsa/201810-06
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20180104-0001/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://security.paloaltonetworks.com/CVE-2017-5715
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://spectreattack.com/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://support.citrix.com/article/CTX231399
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://support.f5.com/csp/article/K91229003
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://support.lenovo.com/us/en/solutions/LEN-18282
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3531-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3531-3/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3540-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3541-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3542-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3549-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3560-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3561-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3580-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3581-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3581-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3582-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3582-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3594-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3597-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3597-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3620-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3690-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3777-3/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/usn/usn-3516-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4120
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4187
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4188
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4213
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.exploit-db.com/exploits/43427/
Source: secure@intel.com
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: https://www.kb.cert.org/vuls/id/180049
Source: secure@intel.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.synology.com/support/security/Synology_SA_18_01
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.vmware.com/security/advisories/VMSA-2018-0007.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4609
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4611
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4613
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4614
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.kb.cert.org/vuls/id/584653
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/102376
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1040071
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://xenbits.xen.org/xsa/advisory-254.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:0292
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/security/vulnerabilities/speculativeexecution
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-002
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-003
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Third Party Advisory
Vendor Advisory
Hyperlink: https://seclists.org/bugtraq/2019/Jun/36
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: https://seclists.org/bugtraq/2019/Nov/16
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.gentoo.org/glsa/201810-06
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20180104-0001/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.paloaltonetworks.com/CVE-2017-5715
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://spectreattack.com/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://support.citrix.com/article/CTX231399
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://support.f5.com/csp/article/K91229003
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://support.lenovo.com/us/en/solutions/LEN-18282
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3531-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3531-3/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3540-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3541-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3542-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3549-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3560-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3561-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3580-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3581-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3581-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3582-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3582-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3594-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3597-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3597-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3620-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3690-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3777-3/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/usn/usn-3516-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4120
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4187
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4188
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4213
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.exploit-db.com/exploits/43427/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: https://www.kb.cert.org/vuls/id/180049
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.synology.com/support/security/Synology_SA_18_01
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.vmware.com/security/advisories/VMSA-2018-0007.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

206Records found

CVE-2019-18222
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.13% / 31.87%
||
7 Day CHG~0.00%
Published-23 Jan, 2020 | 00:00
Updated-05 Aug, 2024 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ECDSA signature implementation in ecdsa.c in Arm Mbed Crypto 2.1 and Mbed TLS through 2.19.1 does not reduce the blinded scalar before computing the inverse, which allows a local attacker to recover the private key via side-channel attacks.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectArm Limited
Product-mbed_tlsdebian_linuxfedorambed_crypton/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2018-0495
Matching Score-10
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-10
Assigner-Debian GNU/Linux
CVSS Score-4.7||MEDIUM
EPSS-0.26% / 49.94%
||
7 Day CHG~0.00%
Published-13 Jun, 2018 | 23:00
Updated-05 Aug, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

Action-Not Available
Vendor-gnupgn/aOracle CorporationRed Hat, Inc.Canonical Ltd.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxlibgcryptenterprise_linux_workstationtraffic_directorenterprise_linux_desktopansible_towerLibgcrypt before 1.7.10 and 1.8.x before 1.8.3
CWE ID-CWE-203
Observable Discrepancy
CVE-2017-5753
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-5.6||MEDIUM
EPSS-94.33% / 99.95%
||
7 Day CHG~0.00%
Published-04 Jan, 2018 | 13:00
Updated-14 Jan, 2025 | 19:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

Action-Not Available
Vendor-pepperl-fuchsIntel CorporationCanonical Ltd.openSUSENetApp, Inc.Synology, Inc.VMware (Broadcom Inc.)SUSEPhoenix Contact GmbH & Co. KGDebian GNU/LinuxArm LimitedSiemens AGOracle Corporation
Product-xeon_e3_1271_v3simatic_itc1900xeon_e7xeon_e5_1660_v4xeon_e5_2640_v4cortex-a8_firmwarexeon_e5_1620_v4bl_rackmount_4u_firmwarexeon_silvercortex-a76xeon_e5_2630lcortex-a15_firmwarexeon_e3_1230_v2cortex-r8xeon_e3_1260l_v5bl_ppc15_1000_firmwarecore_m3xeon_e3_1505l_v6xeon_e5_2403_v2xeon_e5_2430l_v2bl2_ppc_1000cortex-a72pentium_jxeon_e5_2428l_v2xeon_e5_2609_v3xeon_e5_2630_v4btc12vl2_ppc_3000xeon_e-1105cxeon_e5_1620xeon_e3_1230_v3xeon_e3_1220_v2xeon_e3_1268l_v3cortex-a73xeon_e3_1270_v5vl2_bpc_7000_firmwarexeon_e3_12201cortex-a77xeon_e3_1258l_v4xeon_e5_1650_v4simatic_winac_rtx_\(f\)_2010_firmwareatom_x5-e3940simatic_itc2200_firmwarexeon_e5_2630l_v2xeon_e5_1620_v3xeon_e3_1275l_v3bl_bpc_3001simatic_itc1500_firmwarecortex-a12_firmwarexeon_e3_1220_v5bl_ppc17_7000dl_ppc15m_7000xeon_e3_1260lvl2_ppc_9000xeon_e5_2630_v2bl_ppc17_1000vl2_bpc_3000_firmwarexeon_e5_2418l_v3bl_ppc_1000bl_rackmount_4ubl2_ppc_1000_firmwarexeon_e5_2418lxeon_e3_1285_v6el_ppc_1000\/m_firmwarexeon_e5_1650xeon_e5_2408l_v3vl2_bpc_1000_firmwarexeon_e5_2420xeon_e5_2608l_v3bl_bpc_2001xeon_e3_1265l_v3xeon_e5_2623_v3xeon_e3_1275_v6xeon_e3_1285_v4simatic_itc1900_firmwarevl2_ppc_1000cortex-a9_firmwarexeon_e5_2430xeon_e5_1428lvs360hd_firmwarexeon_e5_2440xeon_e5_2648l_v4xeon_platinumsuse_linux_enterprise_serverxeon_e3_1280_v3bl_ppc12_1000_firmwarexeon_e5_2407xeonvl2_ppc9_1000_firmwarecortex-a9neoverse_n1_firmwarexeon_e3_1240_v6xeon_e3_1275_v5xeon_e5_1680_v3xeon_e5_2428lxeon_e3_1220cortex-x1_firmwarexeon_e5_2650l_v2vl2_ppc_7000_firmwarexeon_e3_1105c_v2bl_ppc15_7000_firmwarebl2_bpc_2000vs960hd_firmwarecortex-a57xeon_e3_1265l_v2cortex-r7_firmwarevl_ipc_p7000_firmwarexeon_e5_2648lxeon_e5_1660_v3xeon_e3_1280_v2core_i3vl2_ppc_9000_firmwarevl2_ppc_2000_firmwarexeon_e5_2440_v2xeon_e5_2603_v2cortex-a77_firmwarexeon_e3_1240_v5xeon_e3_1241_v3vl2_ppc_1000_firmwarecortex-r7xeon_e5_1428l_v3xeon_e5_2430_v2xeon_e3_1240_v2xeon_e5_2620bl_bpc_3000_firmwarefusionxeon_e5_1650_v3xeon_e5_2609_v2diskstation_managerxeon_e3_1225_v2btc14bl_bpc_7001_firmwarexeon_e5_2430lvl2_bpc_1000xeon_e5_1650_v2xeon_e5_2438l_v3vl_bpc_2000_firmwarexeon_e5_2650xeon_e5_2407_v2xeon_e5_1620_v2cortex-a78ae_firmwarecore_i5xeon_e3_1240_v3workstationbl_ppc15_1000atom_x3el_ppc_1000\/wtxeon_e5_2650lcortex-a72_firmwarebl_ppc17_7000_firmwareceleron_jvl2_ppc7_1000bl_bpc_7000cortex-a78bl_bpc_2000bl2_bpc_1000_firmwarevl2_ppc_2000xeon_e3_1246_v3suse_linux_enterprise_desktopvirtual_machine_managerbtc14_firmwarexeon_e5_2603_v3bl2_ppc_7000xeon_e5_2637xeon_e3xeon_e3_1290_v2xeon_e5_2623_v4dl_ppc15m_7000_firmwarexeon_e5_2637_v4bl2_ppc_2000core_m7xeon_e5_2470el_ppc_1000\/mxeon_e5_2637_v3valueline_ipc_firmwarexeon_e3_1270neoverse_n2bl_ppc15_3000vl_bpc_3000xeon_e3_1225_v3xeon_e5_2450_v2cortex-a17bl_ppc17_1000_firmwarexeon_e3_1285l_v3xeon_e3_1220l_v3xeon_e5_2418l_v2xeon_e5_2603xeon_e5_2648l_v3core_m5xeon_e5_2630_v3xeon_e3_1230l_v3xeon_e3_1268l_v5vl2_ppc9_1000xeon_e3_1278l_v4vl_ipc_p7000vl2_bpc_9000_firmwarebl_ppc_1000_firmwarexeon_e5_2637_v2vl2_ppc12_1000_firmwarexeon_e5dl_ppc18.5m_7000vl2_ppc12_1000xeon_goldxeon_e3_1501l_v6cortex-a57_firmwarexeon_e3_1501m_v6xeon_e5_1680_v4xeon_e5_2650_v3visunet_rm_shellxeon_e3_1226_v3dl_ppc15_1000_firmwarexeon_e5_1660solarisxeon_e5_2630l_v3btc12_firmwarexeon_e3_1280_v5bl_bpc_2001_firmwarexeon_e5_1428l_v2vl_ppc_2000_firmwarerouter_managerbl2_ppc_7000_firmwarexeon_e3_1280xeon_e3_1235skynasdl_ppc21.5m_7000_firmwarexeon_e3_1230_v6xeon_e5_2643xeon_e5_2628l_v3debian_linuxbl_bpc_7000_firmwareel_ppc_1000_firmwarexeon_e3_1240l_v5cortex-a76_firmwarecortex-a73_firmwarevl2_bpc_9000xeon_e5_2618l_v3xeon_bronze_3104xeon_e5_1630_v3vl2_bpc_2000xeon_e3_1270_v2xeon_e5_1660_v2xeon_e5_2420_v2simatic_itc2200_proxeon_e3_1290bl_ppc17_3000_firmwarexeon_e5_2450xeon_e5_2618l_v4el_ppc_1000xeon_e5_2448lxeon_e3_1275_v2dl_ppc18.5m_7000_firmwarevl_ppc_2000leapel_ppc_1000\/wt_firmwarebl_ppc_7000xeon_e5_2650_v2xeon_e5_2403xeon_e5_2428l_v3simatic_itc1900_pro_firmwarecortex-a17_firmwarexeon_e5_2620_v2xeon_bronze_3106xeon_e5_2609neoverse_n1bl_ppc15_3000_firmwarecore_mbl2_ppc_2000_firmwaresimatic_winac_rtx_\(f\)_2010simatic_itc1500vl2_ppc_3000_firmwarexeon_e5_2603_v4esxixeon_e5_2630l_v4xeon_e3_1245_v6xeon_e3_1270_v6xeon_e5_2640_v2simatic_itc1500_proxeon_e3_1231_v3vl_bpc_3000_firmwarevs360hdxeon_e3_1125cbl_bpc_3001_firmwarehcivl2_ppc_7000xeon_e3_1505l_v5simatic_itc1500_pro_firmwarexeon_e5_2643_v3xeon_e5_2620_v4valueline_ipcbl_rackmount_2u_firmwarepentium_nubuntu_linuxbl2_bpc_7000atom_zxeon_e5_2450lcortex-r8_firmwarexeon_e3_1230vl_ppc_3000xeon_e5_2450l_v2xeon_e5_1630_v4bl_bpc_7001simatic_itc2200atom_evl_ppc_3000_firmwareatom_x7-e3950bl2_bpc_2000_firmwarebl2_bpc_7000_firmwarexeon_e3_1230_v5xeon_e5_2648l_v2vl_bpc_1000xeon_e5_2618l_v2xeon_e3_1265l_v4xeon_e3_1281_v3xeon_e3_1276_v3dl_ppc21.5m_7000xeon_e3_1225_v5xeon_e3_1245_v5xeon_e3_1275_v3vl2_bpc_2000_firmwarecortex-a15xeon_e5_2643_v4xeon_e3_1505m_v5atom_cxeon_e3_1286_v3xeon_e3_1245_v2bl_ppc15_7000xeon_e3_1125c_v2atom_x5-e3930vl_bpc_1000_firmwarevl2_bpc_7000xeon_e5_2609_v4vl2_bpc_3000xeon_e5_2650l_v3bl_ppc12_1000vl_bpc_2000xeon_e5_2640xeon_e3_1280_v6bl_bpc_2000_firmwarexeon_e3_1220_v6xeon_e5_2630cortex-x1cortex-a78aexeon_e5_2628l_v2simatic_itc1900_probl_rackmount_2uxeon_e3_1245xeon_e5_2650_v4dl_ppc15_1000xeon_e3_1245_v3xeon_e3_1235l_v5bl_ppc17_3000xeon_e3_1240l_v3local_service_management_systemxeon_e3_1285_v3cortex-a12cortex-a75_firmwarecortex-a75vs960hdxeon_phixeon_e3_1286l_v3cortex-a78_firmwaresimatic_itc2200_pro_firmwarexeon_e5_2628l_v4xeon_e5_2640_v3bl2_bpc_1000xeon_e5_2448l_v2vl2_ppc7_1000_firmwarebl_bpc_3000xeon_e3_1285l_v4xeon_e3_12201_v2xeon_e5_2470_v2xeon_e3_1220_v3xeon_e3_1270_v3celeron_nxeon_e5_2608l_v4xeon_e3_1275xeon_e3_1225xeon_e3_1240cortex-a8bl_ppc_7000_firmwareneoverse_n2_firmwarexeon_e5_2620_v3xeon_e5_2643_v2core_i7xeon_e3_1225_v6solidfiresuse_linux_enterprise_software_development_kitMost Modern Operating Systems
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-36424
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.13% / 32.64%
||
7 Day CHG~0.00%
Published-19 Jul, 2021 | 00:00
Updated-04 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Arm Mbed TLS before 2.24.0. An attacker can recover a private key (for RSA or static Diffie-Hellman) via a side-channel attack against generation of base blinding/unblinding values.

Action-Not Available
Vendor-n/aDebian GNU/LinuxArm Limited
Product-mbed_tlsdebian_linuxn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-27170
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.15% / 35.76%
||
7 Day CHG~0.00%
Published-20 Mar, 2021 | 21:30
Updated-04 Aug, 2024 | 16:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncFedora ProjectDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kernelfedoran/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-10932
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.05% / 14.49%
||
7 Day CHG~0.00%
Published-15 Apr, 2020 | 00:00
Updated-04 Aug, 2024 | 11:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Arm Mbed TLS before 2.16.6 and 2.7.x before 2.7.15. An attacker that can get precise enough side-channel measurements can recover the long-term ECDSA private key by (1) reconstructing the projective coordinate of the result of scalar multiplication by exploiting side channels in the conversion to affine coordinates; (2) using an attack described by Naccache, Smart, and Stern in 2003 to recover a few bits of the ephemeral scalar from those projective coordinates via several measurements; and (3) using a lattice attack to get from there to the long-term ECDSA private key used for the signatures. Typically an attacker would have sufficient access when attacking an SGX enclave and controlling the untrusted OS.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectArm Limited
Product-mbed_tlsdebian_linuxfedoran/a
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-1998
Matching Score-10
Assigner-Google LLC
ShareView Details
Matching Score-10
Assigner-Google LLC
CVSS Score-5.6||MEDIUM
EPSS-0.05% / 14.49%
||
7 Day CHG-0.00%
Published-21 Apr, 2023 | 14:51
Updated-13 Feb, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Spectre v2 SMT mitigations problem in Linux kernel

The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line. This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.

Action-Not Available
Vendor-Debian GNU/LinuxLinux Kernel Organization, Inc
Product-linux_kerneldebian_linuxLinux Kernel
CWE ID-CWE-1303
Non-Transparent Sharing of Microarchitectural Resources
CWE ID-CWE-203
Observable Discrepancy
CVE-2018-5407
Matching Score-10
Assigner-CERT/CC
ShareView Details
Matching Score-10
Assigner-CERT/CC
CVSS Score-4.7||MEDIUM
EPSS-0.84% / 74.82%
||
7 Day CHG+0.20%
Published-15 Nov, 2018 | 21:00
Updated-05 Aug, 2024 | 05:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

Action-Not Available
Vendor-N/ACanonical Ltd.Debian GNU/LinuxNode.js (OpenJS Foundation)OpenSSLTenable, Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxpeoplesoft_enterprise_peopletoolstuxedoenterprise_linux_server_eusopensslenterprise_linux_server_ausenterprise_manager_base_platformmysql_enterprise_backupnode.jsprimavera_p6_enterprise_project_portfolio_managementvm_virtualboxdebian_linuxenterprise_linux_workstationapplication_serverenterprise_linux_server_tusenterprise_manager_ops_centerenterprise_linux_desktopnessusapi_gatewayProcessors supporting Simultaneous Multi-Threading
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-203
Observable Discrepancy
CVE-2019-18660
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.03% / 8.16%
||
7 Day CHG~0.00%
Published-27 Nov, 2019 | 22:11
Updated-05 Aug, 2024 | 01:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.

Action-Not Available
Vendor-n/aFedora ProjectCanonical Ltd.Red Hat, Inc.openSUSELinux Kernel Organization, Inc
Product-ubuntu_linuxlinux_kernelenterprise_linuxfedoraleapn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-19039
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.43% / 62.51%
||
7 Day CHG~0.00%
Published-21 Nov, 2019 | 01:40
Updated-05 Aug, 2024 | 02:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

__btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program. NOTE: The BTRFS development team disputes this issues as not being a vulnerability because “1) The kernel provide facilities to restrict access to dmesg - dmesg_restrict=1 sysctl option. So it's really up to the system administrator to judge whether dmesg access shall be disallowed or not. 2) WARN/WARN_ON are widely used macros in the linux kernel. If this CVE is considered valid this would mean there are literally thousands CVE lurking in the kernel - something which clearly is not the case.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kerneln/a
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2019-15902
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.6||MEDIUM
EPSS-0.09% / 25.05%
||
7 Day CHG~0.00%
Published-04 Sep, 2019 | 05:50
Updated-05 Aug, 2024 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream "x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.

Action-Not Available
Vendor-n/aopenSUSELinux Kernel Organization, IncNetApp, Inc.Debian GNU/Linux
Product-baseboard_management_controllerdebian_linuxlinux_kernelservice_processorbaseboard_management_controller_firmwareactive_iq_performance_analytics_servicesleapn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-14615
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-4.50% / 89.14%
||
7 Day CHG~0.00%
Published-17 Jan, 2020 | 17:36
Updated-05 Aug, 2024 | 00:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-Canonical Ltd.Intel Corporation
Product-xeon_e3-1501m_firmwareatom_z3745d_firmwareatom_z2480_firmwarecore_i3-9100_firmwarexeon_e3-1235lcore_i3-6300celeron_j1900_firmwareatom_z2460_firmwarecore_i5-1035g7core_i5-6585rcore_i3-6100e_firmwarecore_i3-8350k_firmwarecore_i3-9350k_firmwarexeon_e-2124g_firmwarecore_i7-9700kfcore_i5-8305g_firmwarecore_i5-7500_firmwarecore_i5-8400hceleron_j1850core_i5-7y54xeon_e3-1535m_firmwarecore_i7-1060g7_firmwareceleron_n2815core_i7-9700atom_e3826atom_z2580_firmwarecore_i7-6650u_firmwarexeon_e-2226gxeon_e3-1268lcore_i5-1035g4core_i3-8145ucore_i7-6822eqatom_x3-c3230rkcore_i5-9600_firmwarecore_i5-9600t_firmwarecore_i7-6700tecore_i3-7020uxeon_e3-1285_firmwarecore_i7-6567u_firmwarecore_i7-9700tecore_i3-8109uxeon_e3-1565l_firmwareatom_z3460_firmwarecore_i7-7600ucore_i5-9400f_firmwarexeon_e-2224core_i5-7y57_firmwarecore_i7-9700f_firmwarecore_i3-6100t_firmwarecore_i5-9500e_firmwarecore_i3-7100e_firmwarecore_i3-7100ecore_i3-7300xeon_e3-1275_firmwareatom_z3530_firmwarecore_i5-6442eq_firmwarecore_i5-8269u_firmwareceleron_ncore_i3-6098pxeon_e3-1268l_firmwarecore_i5-6287u_firmwarexeon_e-2134_firmwarexeon_e3-1578l_firmwarecore_i3-9100hlceleron_n3150core_i5-6600katom_e660_firmwareceleron_n3060core_i7-7600u_firmwarecore_i5-8400bcore_i3-9300t_firmwarexeon_e3-1285atom_z3775_firmwarecore_i7-10710u_firmwarecore_i5-6500te_firmwarecore_i7-7820hkcore_i5-9500_firmwareatom_z2480atom_z3745_firmwarecore_i5-8400h_firmwareceleron_n4120core_i7-6970hqcore_i3-9100tecore_i7-9700fxeon_e3-1225core_i5-8600xeon_e-2136core_i7-10510ucore_i7-9700kcore_i5-9400_firmwarecore_i7-8500y_firmwareatom_z3570core_i5-6402pcore_i3-8100core_i7-1060g7atom_z3735e_firmwarexeon_e3-1545mxeon_e3-1270_firmwarecore_i5-6600t_firmwareatom_z3785celeron_g4900tcore_i3-7300_firmwareatom_z3735d_firmwareatom_z2420atom_z2580atom_e3805_firmwarecore_i5-7287u_firmwarecore_i7-7700atom_e3845_firmwarecore_i7-7820hq_firmwareatom_e640t_firmwarecore_i3-7102eatom_e680tcore_i7-7920hq_firmwarecore_i5-8600katom_z3736fcore_i7-8700k_firmwarexeon_e-2124_firmwarecore_i7-8700_firmwarexeon_e3-1220core_i7-8750hceleron_g3900_firmwarecore_i5-8365uatom_e3815_firmwareatom_e660t_firmwarecore_i5-9600kfcore_i5-8500b_firmwareceleron_n3160atom_z3580_firmwarecore_i3-7100u_firmwareceleron_g4930core_i3-6100h_firmwarecore_i5-7600atom_x5-z8330core_i5-1030g4_firmwarecore_i7-9850he_firmwarecore_i7-8557u_firmwarecore_i7-7820eq_firmwarexeon_e-2276gcore_i3-8300core_i3-1000g4xeon_e-2186gcore_i5-7400tcore_i5-7267u_firmwarexeon_e3-1535mxeon_e3-1505m_firmwarexeon_e-2174gatom_x3-c3445_firmwarecore_i3-7100core_i7-8809gcore_i3-8145uecore_i5-7260ucore_i7-8700bceleron_j1800core_i7-7500u_firmwarecore_i5-7267uatom_z2520core_i5-10210ycore_i7-7820hk_firmwarecore_i7-6560ucore_i5-9400txeon_e3-1505lcore_i5-10210u_firmwarecore_i5-9500fcore_i5-8600t_firmwarecore_i5-8300hcore_i7-9850hecore_i3-10110ycore_i3-7300t_firmwarecore_i5-6600_firmwareceleron_j3355ecore_i3-6006u_firmwarecore_i5-9600atom_e3826_firmwareceleron_j4125_firmwarexeon_e3-1565lcore_i5-7300u_firmwarecore_i5-8600_firmwarecore_i3-9100fxeon_e3-1260lcore_i5-9600kf_firmwarexeon_e-2224_firmwareatom_x5-z8300core_i7-9750hfceleron_g4920core_i5-9300h_firmwarecore_i3-6167uxeon_e-2274gcore_i3-9320_firmwarecore_i5-9500atom_e620core_i3-8145ue_firmwarecore_i5-8400b_firmwarecore_i7-6700t_firmwarecore_i3-8100_firmwareceleron_n2807atom_e3827_firmwarexeon_e3-1240_firmwarecore_i7-6500ucore_i7-6500u_firmwareatom_z2760atom_e680xeon_e-2124core_i5-7287ucore_i7-10710ucore_i5-8500t_firmwarexeon_e3-1558lcore_i3-7100h_firmwarecore_i5-8300h_firmwareatom_z3745xeon_e-2136_firmwarexeon_e-2276g_firmwarecore_i5-6300ucore_i7-8565uatom_x3-c3200rk_firmwarecore_i5-7300hq_firmwarexeon_e-2274g_firmwareceleron_n2820xeon_e3-1245core_i5-7300hqcore_i7-8706g_firmwarecore_i7-7560uatom_z3460core_i5-6600k_firmwarecore_i3-6100hcore_i5-7400t_firmwarecore_i5-6200u_firmwarecore_i3-8100t_firmwarecore_i5-8259ucore_i3-6098p_firmwareceleron_j3355e_firmwareceleron_jcore_i7-10510y_firmwarecore_i7-9850hl_firmwareatom_z3735dceleron_n2806xeon_e-2146g_firmwarecore_i7-8850h_firmwarecore_i7-6700hqcore_i7-9700kf_firmwarecore_i7-9850h_firmwarecore_i5-6350hqxeon_e3-1515m_firmwarecore_i7-6660u_firmwarecore_i3-7100_firmwarecore_i5-7600tatom_e620t_firmwarecore_i3-6100te_firmwarecore_i5-6350hq_firmwarexeon_e-2278g_firmwarecore_i7-7500ucore_i7-8550uubuntu_linuxceleron_n3010xeon_e-2224gxeon_e3-1505mcore_i3-9100tceleron_j4025core_i5-8310y_firmwareatom_z3590core_i5-6400_firmwarecore_i7-6650ucore_i5-9300hxeon_e3-1240core_i3-7167u_firmwarecore_i7-8559u_firmwarecore_i7-8086k_firmwarecore_i5-6585r_firmwarecore_i5-1035g1_firmwarecore_i7-8665u_firmwarecore_i3-7167ucore_i3-6100txeon_e-2176g_firmwarecore_i7-8500ycore_i5-9400hcore_i7-7567uxeon_e3-1240l_firmwarecore_i3-8145u_firmwareceleron_n3160_firmwarecore_i7-9700e_firmwarecore_i7-7660u_firmwarecore_i7-7820hqceleron_n2820_firmwarecore_i5-6260u_firmwarecore_i5-8210ycore_i7-8750h_firmwarecore_i3-7300tcore_i3-6100ecore_i3-8300t_firmwarecore_i3-8109u_firmwarexeon_e3-1280core_i5-7400_firmwarexeon_e3-1260l_firmwareatom_e640_firmwareceleron_n3010_firmwarecore_i7-9700k_firmwareceleron_n3060_firmwareatom_x3-c3130_firmwarexeon_e-2288g_firmwarecore_i5-7y54_firmwarecore_i3-9100f_firmwarexeon_e-2246g_firmwarecore_i7-6567uxeon_e-2174g_firmwarecore_i3-7101ecore_i3-8100b_firmwareceleron_n2805_firmwarecore_i5-8500celeron_g3930_firmwarecore_i7-6870hq_firmwarecore_i5-7600_firmwarecore_i5-9500te_firmwareceleron_n2810atom_x5-z8330_firmwarecore_i5-6267u_firmwareceleron_n2808_firmwarecore_i5-8265ucore_i5-6300hqcore_i7-9750hcore_i5-6440hqcore_i7-7y75core_i7-7560u_firmwarexeon_e-2286g_firmwarecore_i7-6700core_i5-7y57core_i3-8350kcore_i5-7500tcore_i3-9100core_i5-9600k_firmwareatom_z3560xeon_e-2224g_firmwareceleron_j4125core_i3-6102e_firmwarexeon_e3-1230_firmwareceleron_g4950_firmwareceleron_j1750core_i7-7700kcore_i7-8705gcore_i7-8665uatom_z3530core_i5-9500eatom_x7-z8700_firmwarecore_i3-8300tcore_i7-7660ucore_i7-6600ucore_i3-6100u_firmwarecore_i7-8706gatom_z3770datom_x5-z8300_firmwarexeon_e-2236celeron_j_firmwarecore_i7-8700t_firmwarecore_i3-6006uxeon_e-2236_firmwarexeon_e-2126g_firmwarecore_i7-8700atom_z3775celeron_g3950xeon_e3-1501lcore_i3-6300tcore_i5-8259u_firmwarecore_i7-8665ue_firmwarecore_i3-7130u_firmwarecore_i5-8400core_i7-8705g_firmwareatom_x3-c3405_firmwareatom_z3795_firmwarecore_i3-7100tcore_i7-7700tcore_i7-8086kcore_i5-7260u_firmwareceleroncore_i5-10210ucore_i7-6600u_firmwarecore_i5-7600k_firmwarecore_i7-6770hqcore_i5-8257ucore_i5-8365ue_firmwarecore_i7-8700kcore_i5-8600k_firmwarecore_i5-7200u_firmwareatom_z3745dcore_i5-7442eqcore_i7-10510u_firmwarexeon_e-2134atom_z3770d_firmwarexeon_e3-1545m_firmwarexeon_e-2226g_firmwarexeon_e3-1515mcore_i5-1030g7celeron_n2807_firmwarecore_i5-7442eq_firmwareatom_z3735gcore_i5-10310y_firmwarecore_i7-8569u_firmwareatom_e680_firmwarexeon_e-2144g_firmwarecore_i3-1000g1core_i7-10510yatom_e660core_i5-7360u_firmwarecore_i3-10110ucore_i5-8210y_firmwarecore_i5-6442eqceleron_n3150_firmwarecore_i3-9100e_firmwareceleron_g3900core_i5-9600katom_x5-z8500core_i3-6300_firmwarecore_i7-7700hqcore_i3-9100hl_firmwareceleron_g4900t_firmwareatom_e660tcore_i3-8100hcore_i3-9100t_firmwarexeon_e3-1225_firmwarecore_i7-6870hqatom_e3805core_i5-8350uceleron_n3050_firmwarecore_i3-1005g1_firmwarecore_i5-7300ucore_i5-6440hq_firmwareceleron_g3930atom_e3825core_i5-8500txeon_e-2246gatom_z3740_firmwareceleron_g3930t_firmwarecore_i5-7500celeron_n2806_firmwareatom_z3740dceleron_n2910atom_e3845core_i5-6400atom_e680t_firmwareceleron_j1800_firmwarecore_i5-7200uatom_x7-z8700core_i5-8350u_firmwareatom_z3735f_firmwareatom_e3825_firmwarecore_i7-8700b_firmwarexeon_e-2104g_firmwarecore_i3-6320_firmwarecore_i7-6820hq_firmwarecore_i7-7920hqxeon_e3-1575m_firmwarecore_i5-9300hf_firmwareatom_e620_firmwareatom_z3480_firmwarecore_i5-8400tcore_i3-9300_firmwareceleron_g3930txeon_e3-1578lcore_i3-6100_firmwarecore_i3-9100te_firmwarecore_i7-6660ucore_i3-7350k_firmwarexeon_e3-1240lceleron_g4920_firmwareatom_z3775dcore_i5-6500_firmwarecore_i3-7100hcore_i3-7101te_firmwarexeon_e3-1220_firmwareceleron_n_firmwarecore_i5-6500t_firmwarecore_i3-9300xeon_e3-1501l_firmwarexeon_e-2244gceleron_n3350e_firmwarecore_i3-9350kf_firmwarexeon_e-2176gatom_z3775d_firmwarecore_i7-8709gcore_i5-6685r_firmwarecore_i7-7y75_firmwarecore_i5-8200y_firmwarecore_i7-8550u_firmwarecore_i5-6287ucore_i5-1035g7_firmwareceleron_j4025_firmwareceleron_j1900core_i5-9400atom_x3-c3200rkcore_i3-8100txeon_e-2104gcore_i5-6500tatom_z2460core_i5-6260ucore_i7-6700k_firmwarecore_i7-8557uceleron_g4930_firmwarecore_i5-9500tcore_i5-7500t_firmwarecore_i7-6820hk_firmwarecore_i7-8700tatom_e3827core_i7-6820hqceleron_g4930t_firmwareatom_e640core_i5-7400xeon_e3-1501mcore_i7-8650uceleron_n2810_firmwareatom_z3580xeon_e3-1585_firmwarecore_i3-7102e_firmwarexeon_e3-1245_firmwareatom_z3735fcore_i5-6600core_i3-7320core_i7-6700tcore_i7-6920hqcore_i7-9750h_firmwarecore_i3-6167u_firmwarexeon_e3-1585atom_z3736gcore_i3-6100uceleron_j1850_firmwarecore_i7-6700_firmwarexeon_e-2234_firmwarecore_i5-1035g1xeon_e3-1280_firmwarecore_i7-8565u_firmwarecore_i7-6822eq_firmwareatom_z2420_firmwarexeon_e-2186g_firmwareceleron_n2920_firmwarecore_i5-1035g4_firmwarecore_i3-10110y_firmwarecore_i5-8500bcore_i5-7600t_firmwarexeon_e-2124gceleron_n3050core_i5-8269ucore_i5-6402p_firmwarecore_i3-6157uatom_e3815core_i5-7440hq_firmwarecore_i5-1030g4core_i5-6300hq_firmwarexeon_e-2288gcore_i3-9100exeon_e-2234core_i7-8709g_firmwarecore_i3-6320core_i7-6700kcore_i7-9850hcore_i7-9700t_firmwarecore_i5-9400fcore_i7-6820eq_firmwarecore_i5-7440eqcore_i5-8279ucore_i5-8279u_firmwarecore_i3-8130u_firmwarecore_i5-9500f_firmwarecore_i5-6400tcore_i5-9300hfcore_i3-7100ucore_i5-10210y_firmwarecore_i3-7101tecore_i3-7350kcore_i5-7600kcore_i5-8250ucore_i3-1000g4_firmwarexeon_e-2126gatom_z3560_firmwareatom_z3795core_i7-6920hq_firmwarecore_i7-9700tcore_i3-7100t_firmwarecore_i7-7820eqxeon_e3-1275core_i7-9850hlcore_i5-7360uatom_z3480celeron_firmwareatom_z3770atom_z3590_firmwarecore_i5-6500celeron_n2805core_i7-8650u_firmwareceleron_j1750_firmwarexeon_e3-1235l_firmwarecore_i3-6157u_firmwarecore_i3-9350kfcore_i7-6785r_firmwareatom_z3735g_firmwarecore_i5-6200ucore_i7-6700hq_firmwarecore_i7-7700k_firmwareatom_z3785_firmwarecore_i5-8250u_firmwareceleron_n4120_firmwarecore_i7-7567u_firmwarecore_i7-9700ecore_i3-7320_firmwarecore_i5-8400_firmwarecore_i7-6970hq_firmwarecore_i7-6785rceleron_n3350ecore_i7-7700hq_firmwareatom_z3736f_firmwarecore_i7-6820hkcore_i5-7440eq_firmwarecore_i3-1000g1_firmwarecore_i7-9750hf_firmwarecore_i5-10310ycore_i5-8400t_firmwarexeon_e-2286gcore_i3-6102ecore_i5-6400t_firmwarecore_i5-8365u_firmwareceleron_n2808core_i7-6700te_firmwareatom_x3-c3230rk_firmwarecore_i5-6600tcore_i3-9300txeon_e-2244g_firmwarecore_i5-6360u_firmwarecore_i3-8100h_firmwarexeon_e-2278gcore_i7-8850hcore_i3-7130ucore_i5-8265u_firmwarecore_i7-6560u_firmwarecore_i3-8300_firmwareceleron_g4930tcore_i7-6820eqceleron_n2920atom_z3740core_i7-1065g7_firmwarexeon_e3-1558l_firmwareceleron_n2815_firmwareatom_e620tcore_i5-6500teatom_x3-c3405core_i5-8257u_firmwareatom_z2520_firmwarecore_i3-9350katom_z3570_firmwarecore_i5-8500_firmwareceleron_n4020_firmwarecore_i5-8365uecore_i7-8665uecore_i5-6300u_firmwarecore_i7-8809g_firmwarexeon_e3-1575mxeon_e3-1230celeron_g4950core_i5-6685rcore_i7-7700t_firmwareceleron_g4900core_i5-1030g7_firmwarecore_i5-9400h_firmwareatom_z2560core_i5-8200yatom_z2760_firmwarecore_i3-6100core_i5-8310ycore_i3-10110u_firmwareceleron_n4020core_i5-9500tecore_i5-7440hqceleron_g4900_firmwarecore_i5-6360uxeon_e-2144gxeon_e3-1505l_firmwarecore_i5-9500t_firmwarecore_i3-6300t_firmwarecore_i7-8569uatom_z3736g_firmwarecore_i7-9700te_firmwarecore_i7-7700_firmwarecore_i7-6770hq_firmwareceleron_g3950_firmwareatom_z3740d_firmwarecore_i5-6267ucore_i3-1005g1core_i3-8100bcore_i5-9600tatom_z3770_firmwarecore_i3-7101e_firmwarecore_i3-7020u_firmwareatom_e640tatom_x3-c3445atom_z3735ecore_i3-9320core_i5-6440eqatom_x5-z8500_firmwareatom_z2560_firmwarecore_i5-6440eq_firmwarecore_i5-8600tcore_i5-8305gcore_i7-1065g7core_i5-9400t_firmwareceleron_n2910_firmwarecore_i7-8559uatom_x3-c3130core_i3-6100tecore_i7-9700_firmwarecore_i3-8130uxeon_e-2146gxeon_e3-1270xeon_e3-1585l_firmwarexeon_e3-1585lIntel(R) Processors
CVE-2017-10252
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-4.7||MEDIUM
EPSS-0.12% / 31.19%
||
7 Day CHG~0.00%
Published-08 Aug, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Updates Change Assistant). Supported versions that are affected are 8.54 and 8.55. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where PeopleSoft Enterprise PeopleTools executes to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-peoplesoft_enterprise_peopletoolsPeopleSoft Enterprise PT PeopleTools
CVE-2019-11482
Matching Score-8
Assigner-Canonical Ltd.
ShareView Details
Matching Score-8
Assigner-Canonical Ltd.
CVSS Score-4.2||MEDIUM
EPSS-0.09% / 25.03%
||
7 Day CHG~0.00%
Published-08 Feb, 2020 | 04:50
Updated-17 Sep, 2024 | 00:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Race condition between reading current working directory and writing a core dump

Sander Bos discovered a time of check to time of use (TOCTTOU) vulnerability in apport that allowed a user to cause core files to be written in arbitrary directories.

Action-Not Available
Vendor-apport_projectCanonical Ltd.
Product-ubuntu_linuxapportapport
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2010-3542
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-1.9||LOW
EPSS-0.14% / 34.09%
||
7 Day CHG~0.00%
Published-14 Oct, 2010 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Oracle Solaris 8, 9, and 10, and OpenSolaris, allows local users to affect confidentiality, related to USB.

Action-Not Available
Vendor-n/aOracle Corporation
Product-solarisopensolarisn/a
CVE-2016-8305
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-2.1||LOW
EPSS-0.08% / 23.41%
||
7 Day CHG~0.00%
Published-27 Jan, 2017 | 22:01
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Core). Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0 and 12.2.0. Easily exploitable vulnerability allows physical access to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS v3.0 Base Score 2.1 (Confidentiality impacts).

Action-Not Available
Vendor-Oracle Corporation
Product-flexcube_universal_bankingFLEXCUBE Universal Banking
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-7959
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.06% / 19.69%
||
7 Day CHG~0.00%
Published-13 Oct, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Siemens SIMATIC STEP 7 (TIA Portal) before 14 improperly stores pre-shared key data in TIA project files, which makes it easier for local users to obtain sensitive information by leveraging access to a file and conducting a brute-force attack.

Action-Not Available
Vendor-n/aSiemens AG
Product-simatic_step_7n/a
CVE-2017-10020
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-4.7||MEDIUM
EPSS-0.12% / 31.19%
||
7 Day CHG~0.00%
Published-08 Aug, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Updates Change Assistant). Supported versions that are affected are 8.54 and 8.55. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where PeopleSoft Enterprise PeopleTools executes to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-peoplesoft_enterprise_peopletoolsPeopleSoft Enterprise PT PeopleTools
CVE-2016-7960
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.5||LOW
EPSS-0.09% / 25.07%
||
7 Day CHG~0.00%
Published-13 Oct, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Siemens SIMATIC STEP 7 (TIA Portal) before 14 uses an improper format for managing TIA project files during version updates, which makes it easier for local users to obtain sensitive configuration information via unspecified vectors.

Action-Not Available
Vendor-n/aSiemens AG
Product-simatic_step_7n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-5849
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.5||LOW
EPSS-0.09% / 25.07%
||
7 Day CHG~0.00%
Published-04 Jul, 2016 | 16:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Siemens SICAM PAS through 8.07 allows local users to obtain sensitive configuration information by leveraging database stoppage.

Action-Not Available
Vendor-n/aSiemens AG
Product-sicam_pas\/pqsn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-23239
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.5||LOW
EPSS-0.15% / 35.97%
||
7 Day CHG~0.00%
Published-12 Jan, 2021 | 00:00
Updated-03 Aug, 2024 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.

Action-Not Available
Vendor-sudo_projectn/aNetApp, Inc.Debian GNU/LinuxFedora Project
Product-debian_linuxcloud_backuphci_management_nodefedorasolidfiresudon/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2021-2297
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 25.85%
||
7 Day CHG~0.00%
Published-22 Apr, 2021 | 21:54
Updated-26 Sep, 2024 | 14:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-vm_virtualboxVM VirtualBox
CVE-2021-2291
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-4.7||MEDIUM
EPSS-0.17% / 38.21%
||
7 Day CHG~0.00%
Published-22 Apr, 2021 | 21:54
Updated-26 Sep, 2024 | 14:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-vm_virtualboxVM VirtualBox
CVE-2021-21290
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-6.2||MEDIUM
EPSS-0.03% / 7.23%
||
7 Day CHG~0.00%
Published-08 Feb, 2021 | 20:10
Updated-03 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Information Disclosure Vulnerability in Netty on Unix-Like systems due temporary files

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty before version 4.1.59.Final there is a vulnerability on Unix-like systems involving an insecure temp file. When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. On unix-like systems, the temporary directory is shared between all user. As such, writing to this directory using APIs that do not explicitly set the file/directory permissions can lead to information disclosure. Of note, this does not impact modern MacOS Operating Systems. The method "File.createTempFile" on unix-like systems creates a random file, but, by default will create this file with the permissions "-rw-r--r--". Thus, if sensitive information is written to this file, other local users can read this information. This is the case in netty's "AbstractDiskHttpData" is vulnerable. This has been fixed in version 4.1.59.Final. As a workaround, one may specify your own "java.io.tmpdir" when you start the JVM or use "DefaultHttpDataFactory.setBaseDir(...)" to set the directory to something that is only readable by the current user.

Action-Not Available
Vendor-quarkusThe Netty ProjectNetApp, Inc.Debian GNU/LinuxOracle Corporation
Product-banking_trade_finance_process_managementdebian_linuxquarkuscommunications_messaging_servernettynosql_databasecommunications_design_studioactive_iq_unified_managerbanking_corporate_lending_process_managementcloud_secure_agentbanking_credit_facilities_process_managementcommunications_brm_-_elastic_charging_enginesnapcenternetty
CWE ID-CWE-378
Creation of Temporary File With Insecure Permissions
CWE ID-CWE-379
Creation of Temporary File in Directory with Insecure Permissions
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2016-6130
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.06% / 18.78%
||
7 Day CHG~0.00%
Published-03 Jul, 2016 | 21:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability.

Action-Not Available
Vendor-n/aDebian GNU/LinuxLinux Kernel Organization, Inc
Product-debian_linuxlinux_kerneln/a
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2016-5551
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-2.8||LOW
EPSS-0.15% / 35.32%
||
7 Day CHG~0.00%
Published-24 Apr, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Solaris Cluster component of Oracle Sun Systems Products Suite (subcomponent: NAS device addition). The supported version that is affected is 4.3. Easily "exploitable" vulnerability allows unauthenticated attacker with logon to the infrastructure where Solaris Cluster executes to compromise Solaris Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Solaris Cluster accessible data. CVSS 3.0 Base Score 3.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-solaris_clusterSolaris Cluster
CWE ID-CWE-284
Improper Access Control
CVE-2020-8833
Matching Score-8
Assigner-Canonical Ltd.
ShareView Details
Matching Score-8
Assigner-Canonical Ltd.
CVSS Score-5.6||MEDIUM
EPSS-0.03% / 9.93%
||
7 Day CHG~0.00%
Published-22 Apr, 2020 | 21:15
Updated-16 Sep, 2024 | 20:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apport race condition in crash report permissions

Time-of-check Time-of-use Race Condition vulnerability on crash report ownership change in Apport allows for a possible privilege escalation opportunity. If fs.protected_symlinks is disabled, this can be exploited between the os.open and os.chown calls when the Apport cron script clears out crash files of size 0. A symlink with the same name as the deleted file can then be created upon which chown will be called, changing the file owner to root. Fixed in versions 2.20.1-0ubuntu2.23, 2.20.9-0ubuntu7.14, 2.20.11-0ubuntu8.8 and 2.20.11-0ubuntu22.

Action-Not Available
Vendor-apport_projectCanonical Ltd.
Product-ubuntu_linuxapportApport
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-2374
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-4.1||MEDIUM
EPSS-0.16% / 37.37%
||
7 Day CHG~0.00%
Published-20 Jul, 2021 | 22:43
Updated-26 Sep, 2024 | 13:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).

Action-Not Available
Vendor-NetApp, Inc.Oracle CorporationFedora Project
Product-fedoramysql_serveroncommand_insightMySQL Server
CVE-2021-2296
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 25.85%
||
7 Day CHG~0.00%
Published-22 Apr, 2021 | 21:54
Updated-26 Sep, 2024 | 14:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-vm_virtualboxVM VirtualBox
CVE-2018-3626
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.13% / 32.32%
||
7 Day CHG~0.00%
Published-20 Mar, 2018 | 20:00
Updated-16 Sep, 2024 | 20:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Edger8r tool in the Intel SGX SDK before version 2.1.2 (Linux) and 1.9.6 (Windows) may generate code that is susceptible to a side channel potentially allowing a local user to access unauthorized information.

Action-Not Available
Vendor-Linux Kernel Organization, IncIntel CorporationMicrosoft Corporation
Product-windowssgx_sdklinux_kernelSGX SDK
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-2874
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-4.3||MEDIUM
EPSS-0.14% / 34.08%
||
7 Day CHG~0.00%
Published-19 Apr, 2018 | 02:00
Updated-03 Oct, 2024 | 20:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: Logging). The supported version that is affected is 12.1.3. Easily exploitable vulnerability allows physical access to compromise Oracle Application Object Library. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Application Object Library accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-e-business_suiteApplication Object Library
CVE-2018-3091
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-6.3||MEDIUM
EPSS-0.25% / 47.91%
||
7 Day CHG~0.00%
Published-18 Jul, 2018 | 13:00
Updated-02 Oct, 2024 | 19:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-vm_virtualboxVM VirtualBox
CVE-2018-3665
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.6||MEDIUM
EPSS-1.26% / 79.42%
||
7 Day CHG~0.00%
Published-21 Jun, 2018 | 20:00
Updated-17 Sep, 2024 | 01:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.

Action-Not Available
Vendor-Intel CorporationDebian GNU/LinuxFreeBSD FoundationRed Hat, Inc.Citrix (Cloud Software Group, Inc.)Canonical Ltd.
Product-core_m7ubuntu_linuxfreebsdxenservercore_m3debian_linuxenterprise_linux_desktopenterprise_linux_workstationcore_i5enterprise_linuxcore_mcore_i7core_m5core_i3Intel Core-based microprocessors
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-3691
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.06% / 19.30%
||
7 Day CHG~0.00%
Published-05 Jun, 2018 | 21:00
Updated-16 Sep, 2024 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Some implementations in Intel Integrated Performance Primitives Cryptography Library before version 2018 U3.1 do not properly ensure constant execution time.

Action-Not Available
Vendor-Intel Corporation
Product-integrated_performance_primitives_cryptographyIntegrated Performance Primitives Cryptography Library
CVE-2016-5105
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.07% / 21.93%
||
7 Day CHG~0.00%
Published-02 Sep, 2016 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command.

Action-Not Available
Vendor-n/aQEMUDebian GNU/LinuxCanonical Ltd.
Product-debian_linuxubuntu_linuxqemun/a
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2018-1882
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.03% / 8.05%
||
7 Day CHG~0.00%
Published-08 Apr, 2019 | 14:50
Updated-17 Sep, 2024 | 00:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In a certain atypical IBM Spectrum Protect 7.1 and 8.1 configurations, the node password could be displayed in plain text in the IBM Spectrum Protect client trace file. IBM X-Force ID: 151968.

Action-Not Available
Vendor-IBM CorporationApple Inc.Microsoft CorporationLinux Kernel Organization, IncOracle Corporation
Product-solarislinux_kernelspectrum_protect_for_virtual_environmentsspectrum_protect_backup-archive_clientwindowsmacosaixSpectrum ProtectSpectrum Protect for Space Management
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2018-19608
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.24% / 47.12%
||
7 Day CHG~0.00%
Published-05 Dec, 2018 | 22:00
Updated-05 Aug, 2024 | 11:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Arm Mbed TLS before 2.14.1, before 2.7.8, and before 2.1.17 allows a local unprivileged attacker to recover the plaintext of RSA decryption, which is used in RSA-without-(EC)DH(E) cipher suites.

Action-Not Available
Vendor-n/aArm Limited
Product-mbed_tlsn/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2022-24448
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-3.3||LOW
EPSS-0.02% / 3.74%
||
7 Day CHG~0.00%
Published-04 Feb, 2022 | 19:45
Updated-03 Aug, 2024 | 04:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/Linux
Product-debian_linuxlinux_kerneln/a
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2018-10846
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 2.51%
||
7 Day CHG~0.00%
Published-22 Aug, 2018 | 13:00
Updated-05 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.

Action-Not Available
Vendor-[UNKNOWN]Canonical Ltd.GNUFedora ProjectRed Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxenterprise_linux_workstationfedoragnutlsenterprise_linux_desktopgnutls
CWE ID-CWE-385
Covert Timing Channel
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2018-10545
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.04% / 13.70%
||
7 Day CHG~0.00%
Published-29 Apr, 2018 | 21:00
Updated-05 Aug, 2024 | 07:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.

Action-Not Available
Vendor-n/aNetApp, Inc.Canonical Ltd.Debian GNU/LinuxThe PHP Group
Product-ubuntu_linuxphpdebian_linuxstorage_automation_storen/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-10472
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.6||MEDIUM
EPSS-0.09% / 25.06%
||
7 Day CHG~0.00%
Published-27 Apr, 2018 | 15:00
Updated-05 Aug, 2024 | 07:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.

Action-Not Available
Vendor-n/aDebian GNU/LinuxXen Project
Product-xendebian_linuxn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-0498
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-4.7||MEDIUM
EPSS-0.21% / 43.19%
||
7 Day CHG~0.00%
Published-28 Jul, 2018 | 17:00
Updated-05 Aug, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ARM mbed TLS before 2.12.0, before 2.7.5, and before 2.1.14 allows local users to achieve partial plaintext recovery (for a CBC based ciphersuite) via a cache-based side-channel attack.

Action-Not Available
Vendor-n/aDebian GNU/LinuxArm Limited
Product-mbed_tlsdebian_linuxARM mbed TLS before 2.12.0, before 2.7.5, and before 2.1.14
CVE-2022-0563
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 6.95%
||
7 Day CHG~0.00%
Published-21 Feb, 2022 | 00:00
Updated-09 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.

Action-Not Available
Vendor-n/aNetApp, Inc.Linux Kernel Organization, Inc
Product-ontap_select_deploy_administration_utilityutil-linuxutil-linux
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2016-0702
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.1||MEDIUM
EPSS-0.46% / 64.18%
||
7 Day CHG~0.00%
Published-03 Mar, 2016 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.

Action-Not Available
Vendor-n/aNode.js (OpenJS Foundation)OpenSSLDebian GNU/LinuxCanonical Ltd.
Product-openssldebian_linuxnode.jsubuntu_linuxn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-0434
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-1.9||LOW
EPSS-0.28% / 51.76%
||
7 Day CHG~0.00%
Published-21 Jan, 2016 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Oracle Retail Point-of-Service component in Oracle Retail Applications 13.4, 14.0, and 14.1 allows local users to affect confidentiality via vectors related to Mobile POS, a different vulnerability than CVE-2016-0436, CVE-2016-0437, and CVE-2016-0438.

Action-Not Available
Vendor-n/aOracle Corporation
Product-retail_applicationsn/a
CVE-2020-17489
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.15% / 35.44%
||
7 Day CHG~0.00%
Published-11 Aug, 2020 | 20:07
Updated-04 Aug, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in certain configurations of GNOME gnome-shell through 3.36.4. When logging out of an account, the password box from the login dialog reappears with the password still visible. If the user had decided to have the password shown in cleartext at login time, it is then visible for a brief moment upon a logout. (If the password were never shown in cleartext, only the password length is revealed.)

Action-Not Available
Vendor-n/aCanonical Ltd.Debian GNU/LinuxopenSUSEThe GNOME Project
Product-gnome-shelldebian_linuxubuntu_linuxleapn/a
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2016-0437
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-1.9||LOW
EPSS-0.28% / 51.76%
||
7 Day CHG~0.00%
Published-21 Jan, 2016 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Oracle Retail Point-of-Service component in Oracle Retail Applications 13.4, 14.0, and 14.1 allows local users to affect confidentiality via vectors related to Mobile POS, a different vulnerability than CVE-2016-0434, CVE-2016-0436, and CVE-2016-0438.

Action-Not Available
Vendor-n/aOracle Corporation
Product-retail_applicationsn/a
CVE-2016-0438
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-1.9||LOW
EPSS-0.12% / 30.31%
||
7 Day CHG~0.00%
Published-21 Jan, 2016 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Oracle Retail Point-of-Service component in Oracle Retail Applications 13.4, 14.0, and 14.1 allows local users to affect confidentiality via vectors related to Mobile POS, a different vulnerability than CVE-2016-0434, CVE-2016-0436, and CVE-2016-0437.

Action-Not Available
Vendor-n/aOracle Corporation
Product-retail_applicationsn/a
CVE-2016-0436
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-1.9||LOW
EPSS-0.28% / 51.76%
||
7 Day CHG~0.00%
Published-21 Jan, 2016 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Oracle Retail Point-of-Service component in Oracle Retail Applications 13.4, 14.0, and 14.1 allows local users to affect confidentiality via vectors related to Mobile POS, a different vulnerability than CVE-2016-0434, CVE-2016-0437, and CVE-2016-0438.

Action-Not Available
Vendor-n/aOracle Corporation
Product-retail_applicationsn/a
CVE-2015-7511
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-2||LOW
EPSS-0.05% / 15.02%
||
7 Day CHG~0.00%
Published-19 Apr, 2016 | 21:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.

Action-Not Available
Vendor-gnupgn/aDebian GNU/LinuxCanonical Ltd.
Product-libgcryptdebian_linuxubuntu_linuxn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found