Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-5715

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-04 Jan, 2018 | 13:00
Updated At-06 May, 2025 | 14:59
Rejected At-
Credits

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:04 Jan, 2018 | 13:00
Updated At:06 May, 2025 | 14:59
Rejected At:
â–¼CVE Numbering Authority (CNA)

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

Affected Products
Vendor
Intel CorporationIntel Corporation
Product
Microprocessors with Speculative Execution
Versions
Affected
  • All
Problem Types
TypeCWE IDDescription
textN/AInformation Disclosure
Type: text
CWE ID: N/A
Description: Information Disclosure
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://nvidia.custhelp.com/app/answers/detail/a_id/4609
x_refsource_CONFIRM
https://usn.ubuntu.com/3560-1/
vendor-advisory
x_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
mailing-list
x_refsource_MLIST
https://www.debian.org/security/2018/dsa-4187
vendor-advisory
x_refsource_DEBIAN
https://usn.ubuntu.com/3542-2/
vendor-advisory
x_refsource_UBUNTU
https://security.gentoo.org/glsa/201810-06
vendor-advisory
x_refsource_GENTOO
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
x_refsource_CONFIRM
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
x_refsource_CONFIRM
https://usn.ubuntu.com/3540-2/
vendor-advisory
x_refsource_UBUNTU
https://access.redhat.com/security/vulnerabilities/speculativeexecution
x_refsource_CONFIRM
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
x_refsource_CONFIRM
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
mailing-list
x_refsource_MLIST
https://usn.ubuntu.com/3597-1/
vendor-advisory
x_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
mailing-list
x_refsource_MLIST
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
vendor-advisory
x_refsource_SUSE
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
vendor-advisory
x_refsource_SUSE
http://nvidia.custhelp.com/app/answers/detail/a_id/4611
x_refsource_CONFIRM
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
x_refsource_MISC
https://www.debian.org/security/2018/dsa-4213
vendor-advisory
x_refsource_DEBIAN
https://cert.vde.com/en-us/advisories/vde-2018-002
x_refsource_CONFIRM
https://www.debian.org/security/2018/dsa-4120
vendor-advisory
x_refsource_DEBIAN
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
vendor-advisory
x_refsource_SUSE
https://usn.ubuntu.com/3580-1/
vendor-advisory
x_refsource_UBUNTU
https://support.f5.com/csp/article/K91229003
x_refsource_CONFIRM
https://usn.ubuntu.com/3531-3/
vendor-advisory
x_refsource_UBUNTU
https://usn.ubuntu.com/3620-2/
vendor-advisory
x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
vendor-advisory
x_refsource_SUSE
https://usn.ubuntu.com/3582-1/
vendor-advisory
x_refsource_UBUNTU
https://www.debian.org/security/2018/dsa-4188
vendor-advisory
x_refsource_DEBIAN
https://access.redhat.com/errata/RHSA-2018:0292
vendor-advisory
x_refsource_REDHAT
http://xenbits.xen.org/xsa/advisory-254.html
x_refsource_CONFIRM
https://security.netapp.com/advisory/ntap-20180104-0001/
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
vendor-advisory
x_refsource_SUSE
https://www.synology.com/support/security/Synology_SA_18_01
x_refsource_CONFIRM
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
x_refsource_MISC
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
x_refsource_CONFIRM
http://www.securityfocus.com/bid/102376
vdb-entry
x_refsource_BID
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
x_refsource_CONFIRM
https://usn.ubuntu.com/3594-1/
vendor-advisory
x_refsource_UBUNTU
http://www.kb.cert.org/vuls/id/584653
third-party-advisory
x_refsource_CERT-VN
https://www.kb.cert.org/vuls/id/180049
third-party-advisory
x_refsource_CERT-VN
https://cert.vde.com/en-us/advisories/vde-2018-003
x_refsource_CONFIRM
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
vendor-advisory
x_refsource_SUSE
https://usn.ubuntu.com/3690-1/
vendor-advisory
x_refsource_UBUNTU
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
x_refsource_CONFIRM
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
x_refsource_CONFIRM
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
x_refsource_CONFIRM
https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
x_refsource_CONFIRM
https://usn.ubuntu.com/3549-1/
vendor-advisory
x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
vendor-advisory
x_refsource_SUSE
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
x_refsource_CONFIRM
https://support.citrix.com/article/CTX231399
x_refsource_CONFIRM
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
x_refsource_CONFIRM
https://spectreattack.com/
x_refsource_MISC
https://usn.ubuntu.com/3531-1/
vendor-advisory
x_refsource_UBUNTU
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
vendor-advisory
x_refsource_FREEBSD
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
vendor-advisory
x_refsource_SUSE
https://usn.ubuntu.com/3581-1/
vendor-advisory
x_refsource_UBUNTU
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
x_refsource_CONFIRM
http://www.securitytracker.com/id/1040071
vdb-entry
x_refsource_SECTRACK
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
mailing-list
x_refsource_MLIST
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
x_refsource_CONFIRM
https://usn.ubuntu.com/3597-2/
vendor-advisory
x_refsource_UBUNTU
https://usn.ubuntu.com/3581-2/
vendor-advisory
x_refsource_UBUNTU
http://nvidia.custhelp.com/app/answers/detail/a_id/4614
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
vendor-advisory
x_refsource_SUSE
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
mailing-list
x_refsource_MLIST
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
vendor-advisory
x_refsource_CISCO
https://usn.ubuntu.com/usn/usn-3516-1/
vendor-advisory
x_refsource_UBUNTU
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
x_refsource_CONFIRM
https://www.exploit-db.com/exploits/43427/
exploit
x_refsource_EXPLOIT-DB
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
vendor-advisory
x_refsource_SUSE
https://usn.ubuntu.com/3541-2/
vendor-advisory
x_refsource_UBUNTU
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
x_refsource_MISC
https://support.lenovo.com/us/en/solutions/LEN-18282
x_refsource_CONFIRM
https://usn.ubuntu.com/3777-3/
vendor-advisory
x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
vendor-advisory
x_refsource_SUSE
https://www.vmware.com/security/advisories/VMSA-2018-0007.html
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
vendor-advisory
x_refsource_SUSE
http://nvidia.custhelp.com/app/answers/detail/a_id/4613
x_refsource_CONFIRM
https://usn.ubuntu.com/3561-1/
vendor-advisory
x_refsource_UBUNTU
https://usn.ubuntu.com/3582-2/
vendor-advisory
x_refsource_UBUNTU
https://seclists.org/bugtraq/2019/Jun/36
mailing-list
x_refsource_BUGTRAQ
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
x_refsource_CONFIRM
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
x_refsource_MISC
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
x_refsource_CONFIRM
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
vendor-advisory
x_refsource_FREEBSD
https://seclists.org/bugtraq/2019/Nov/16
mailing-list
x_refsource_BUGTRAQ
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
x_refsource_MISC
https://security.paloaltonetworks.com/CVE-2017-5715
x_refsource_CONFIRM
https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
mailing-list
x_refsource_MLIST
https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
mailing-list
x_refsource_MLIST
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4609
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3560-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://www.debian.org/security/2018/dsa-4187
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: https://usn.ubuntu.com/3542-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://security.gentoo.org/glsa/201810-06
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3540-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://access.redhat.com/security/vulnerabilities/speculativeexecution
Resource:
x_refsource_CONFIRM
Hyperlink: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Resource:
x_refsource_CONFIRM
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://usn.ubuntu.com/3597-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4611
Resource:
x_refsource_CONFIRM
Hyperlink: https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
Resource:
x_refsource_MISC
Hyperlink: https://www.debian.org/security/2018/dsa-4213
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-002
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.debian.org/security/2018/dsa-4120
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://usn.ubuntu.com/3580-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://support.f5.com/csp/article/K91229003
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3531-3/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://usn.ubuntu.com/3620-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://usn.ubuntu.com/3582-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://www.debian.org/security/2018/dsa-4188
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: https://access.redhat.com/errata/RHSA-2018:0292
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://xenbits.xen.org/xsa/advisory-254.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://security.netapp.com/advisory/ntap-20180104-0001/
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://www.synology.com/support/security/Synology_SA_18_01
Resource:
x_refsource_CONFIRM
Hyperlink: http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
Resource:
x_refsource_MISC
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/102376
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3594-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.kb.cert.org/vuls/id/584653
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: https://www.kb.cert.org/vuls/id/180049
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-003
Resource:
x_refsource_CONFIRM
Hyperlink: https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://usn.ubuntu.com/3690-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
Resource:
x_refsource_CONFIRM
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3549-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
Resource:
x_refsource_CONFIRM
Hyperlink: https://support.citrix.com/article/CTX231399
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://spectreattack.com/
Resource:
x_refsource_MISC
Hyperlink: https://usn.ubuntu.com/3531-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://usn.ubuntu.com/3581-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securitytracker.com/id/1040071
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3597-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://usn.ubuntu.com/3581-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4614
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: https://usn.ubuntu.com/usn/usn-3516-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.exploit-db.com/exploits/43427/
Resource:
exploit
x_refsource_EXPLOIT-DB
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://usn.ubuntu.com/3541-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
Resource:
x_refsource_MISC
Hyperlink: https://support.lenovo.com/us/en/solutions/LEN-18282
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3777-3/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://www.vmware.com/security/advisories/VMSA-2018-0007.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4613
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3561-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://usn.ubuntu.com/3582-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://seclists.org/bugtraq/2019/Jun/36
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Resource:
x_refsource_MISC
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
Resource:
x_refsource_CONFIRM
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: https://seclists.org/bugtraq/2019/Nov/16
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
Resource:
x_refsource_MISC
Hyperlink: https://security.paloaltonetworks.com/CVE-2017-5715
Resource:
x_refsource_CONFIRM
Hyperlink: https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
Resource:
mailing-list
x_refsource_MLIST
â–¼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://nvidia.custhelp.com/app/answers/detail/a_id/4609
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3560-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
mailing-list
x_refsource_MLIST
x_transferred
https://www.debian.org/security/2018/dsa-4187
vendor-advisory
x_refsource_DEBIAN
x_transferred
https://usn.ubuntu.com/3542-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://security.gentoo.org/glsa/201810-06
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
x_refsource_CONFIRM
x_transferred
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3540-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://access.redhat.com/security/vulnerabilities/speculativeexecution
x_refsource_CONFIRM
x_transferred
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
x_refsource_CONFIRM
x_transferred
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
mailing-list
x_refsource_MLIST
x_transferred
https://usn.ubuntu.com/3597-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
mailing-list
x_refsource_MLIST
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://nvidia.custhelp.com/app/answers/detail/a_id/4611
x_refsource_CONFIRM
x_transferred
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
x_refsource_MISC
x_transferred
https://www.debian.org/security/2018/dsa-4213
vendor-advisory
x_refsource_DEBIAN
x_transferred
https://cert.vde.com/en-us/advisories/vde-2018-002
x_refsource_CONFIRM
x_transferred
https://www.debian.org/security/2018/dsa-4120
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://usn.ubuntu.com/3580-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://support.f5.com/csp/article/K91229003
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3531-3/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://usn.ubuntu.com/3620-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://usn.ubuntu.com/3582-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://www.debian.org/security/2018/dsa-4188
vendor-advisory
x_refsource_DEBIAN
x_transferred
https://access.redhat.com/errata/RHSA-2018:0292
vendor-advisory
x_refsource_REDHAT
x_transferred
http://xenbits.xen.org/xsa/advisory-254.html
x_refsource_CONFIRM
x_transferred
https://security.netapp.com/advisory/ntap-20180104-0001/
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://www.synology.com/support/security/Synology_SA_18_01
x_refsource_CONFIRM
x_transferred
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
x_refsource_MISC
x_transferred
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/102376
vdb-entry
x_refsource_BID
x_transferred
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3594-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.kb.cert.org/vuls/id/584653
third-party-advisory
x_refsource_CERT-VN
x_transferred
https://www.kb.cert.org/vuls/id/180049
third-party-advisory
x_refsource_CERT-VN
x_transferred
https://cert.vde.com/en-us/advisories/vde-2018-003
x_refsource_CONFIRM
x_transferred
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://usn.ubuntu.com/3690-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
x_refsource_CONFIRM
x_transferred
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
x_refsource_CONFIRM
x_transferred
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
x_refsource_CONFIRM
x_transferred
https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3549-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
x_refsource_CONFIRM
x_transferred
https://support.citrix.com/article/CTX231399
x_refsource_CONFIRM
x_transferred
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
x_refsource_CONFIRM
x_transferred
https://spectreattack.com/
x_refsource_MISC
x_transferred
https://usn.ubuntu.com/3531-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://usn.ubuntu.com/3581-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
x_refsource_CONFIRM
x_transferred
http://www.securitytracker.com/id/1040071
vdb-entry
x_refsource_SECTRACK
x_transferred
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
mailing-list
x_refsource_MLIST
x_transferred
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3597-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://usn.ubuntu.com/3581-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://nvidia.custhelp.com/app/answers/detail/a_id/4614
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
mailing-list
x_refsource_MLIST
x_transferred
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
vendor-advisory
x_refsource_CISCO
x_transferred
https://usn.ubuntu.com/usn/usn-3516-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
x_refsource_CONFIRM
x_transferred
https://www.exploit-db.com/exploits/43427/
exploit
x_refsource_EXPLOIT-DB
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://usn.ubuntu.com/3541-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
x_refsource_MISC
x_transferred
https://support.lenovo.com/us/en/solutions/LEN-18282
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3777-3/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://www.vmware.com/security/advisories/VMSA-2018-0007.html
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://nvidia.custhelp.com/app/answers/detail/a_id/4613
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3561-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://usn.ubuntu.com/3582-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://seclists.org/bugtraq/2019/Jun/36
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
x_refsource_CONFIRM
x_transferred
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
x_refsource_MISC
x_transferred
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
x_refsource_CONFIRM
x_transferred
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
https://seclists.org/bugtraq/2019/Nov/16
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
x_refsource_MISC
x_transferred
https://security.paloaltonetworks.com/CVE-2017-5715
x_refsource_CONFIRM
x_transferred
https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
mailing-list
x_refsource_MLIST
x_transferred
https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4609
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3560-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://www.debian.org/security/2018/dsa-4187
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: https://usn.ubuntu.com/3542-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://security.gentoo.org/glsa/201810-06
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3540-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://access.redhat.com/security/vulnerabilities/speculativeexecution
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://usn.ubuntu.com/3597-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4611
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.debian.org/security/2018/dsa-4213
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-002
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.debian.org/security/2018/dsa-4120
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://usn.ubuntu.com/3580-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://support.f5.com/csp/article/K91229003
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3531-3/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://usn.ubuntu.com/3620-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://usn.ubuntu.com/3582-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://www.debian.org/security/2018/dsa-4188
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2018:0292
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://xenbits.xen.org/xsa/advisory-254.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20180104-0001/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://www.synology.com/support/security/Synology_SA_18_01
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/102376
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3594-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/584653
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: https://www.kb.cert.org/vuls/id/180049
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-003
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://usn.ubuntu.com/3690-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3549-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://support.citrix.com/article/CTX231399
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://spectreattack.com/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://usn.ubuntu.com/3531-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://usn.ubuntu.com/3581-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securitytracker.com/id/1040071
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3597-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://usn.ubuntu.com/3581-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4614
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: https://usn.ubuntu.com/usn/usn-3516-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.exploit-db.com/exploits/43427/
Resource:
exploit
x_refsource_EXPLOIT-DB
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://usn.ubuntu.com/3541-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://support.lenovo.com/us/en/solutions/LEN-18282
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3777-3/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://www.vmware.com/security/advisories/VMSA-2018-0007.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4613
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3561-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://usn.ubuntu.com/3582-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://seclists.org/bugtraq/2019/Jun/36
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: https://seclists.org/bugtraq/2019/Nov/16
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://security.paloaltonetworks.com/CVE-2017-5715
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-203CWE-203 Observable Discrepancy
Type: CWE
CWE ID: CWE-203
Description: CWE-203 Observable Discrepancy
Metrics
VersionBase scoreBase severityVector
3.15.6MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Version: 3.1
Base score: 5.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:04 Jan, 2018 | 13:29
Updated At:06 May, 2025 | 15:15

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.6MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Secondary3.15.6MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Primary2.01.9LOW
AV:L/AC:M/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 5.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 1.9
Base severity: LOW
Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CPE Matches

Intel Corporation
intel
>>atom_c>>c2308
cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2316
cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2338
cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2350
cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2358
cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2508
cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2516
cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2518
cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2530
cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2538
cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2550
cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2558
cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2718
cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2730
cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2738
cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2750
cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2758
cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3308
cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3338
cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3508
cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3538
cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3558
cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3708
cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3750
cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3758
cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3808
cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3830
cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3850
cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3858
cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3950
cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3955
cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3958
cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3805
cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3815
cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3825
cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3826
cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3827
cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3845
cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3130
cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3200rk
cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3205rk
cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3230rk
cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3235rk
cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3265rk
cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3295rk
cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3405
cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3445
cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x5-e3930>>-
cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x5-e3940>>-
cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x7-e3950>>-
cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-203Primarynvd@nist.gov
CWE-203Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-203
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-203
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.htmlsecure@intel.com
Broken Link
http://nvidia.custhelp.com/app/answers/detail/a_id/4609secure@intel.com
Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4611secure@intel.com
Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4613secure@intel.com
Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4614secure@intel.com
Third Party Advisory
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.htmlsecure@intel.com
Exploit
Third Party Advisory
VDB Entry
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.htmlsecure@intel.com
Third Party Advisory
VDB Entry
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txtsecure@intel.com
Third Party Advisory
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txtsecure@intel.com
Third Party Advisory
http://www.kb.cert.org/vuls/id/584653secure@intel.com
Third Party Advisory
US Government Resource
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlsecure@intel.com
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlsecure@intel.com
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlsecure@intel.com
Third Party Advisory
http://www.securityfocus.com/bid/102376secure@intel.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1040071secure@intel.com
Third Party Advisory
VDB Entry
http://xenbits.xen.org/xsa/advisory-254.htmlsecure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0292secure@intel.com
Third Party Advisory
https://access.redhat.com/security/vulnerabilities/speculativeexecutionsecure@intel.com
Third Party Advisory
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/secure@intel.com
Third Party Advisory
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/secure@intel.com
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdfsecure@intel.com
Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-002secure@intel.com
Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-003secure@intel.com
Third Party Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerabilitysecure@intel.com
Third Party Advisory
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.htmlsecure@intel.com
Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixessecure@intel.com
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/03/msg00025.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/08/msg00019.htmlsecure@intel.com
N/A
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002secure@intel.com
Patch
Third Party Advisory
Vendor Advisory
https://seclists.org/bugtraq/2019/Jun/36secure@intel.com
Issue Tracking
Mailing List
Third Party Advisory
https://seclists.org/bugtraq/2019/Nov/16secure@intel.com
Issue Tracking
Mailing List
Third Party Advisory
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-frsecure@intel.com
Vendor Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.ascsecure@intel.com
Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.ascsecure@intel.com
Third Party Advisory
https://security.gentoo.org/glsa/201810-06secure@intel.com
Third Party Advisory
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.htmlsecure@intel.com
Third Party Advisory
https://security.netapp.com/advisory/ntap-20180104-0001/secure@intel.com
Third Party Advisory
https://security.paloaltonetworks.com/CVE-2017-5715secure@intel.com
Third Party Advisory
https://spectreattack.com/secure@intel.com
Third Party Advisory
https://support.citrix.com/article/CTX231399secure@intel.com
Third Party Advisory
https://support.f5.com/csp/article/K91229003secure@intel.com
Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_ussecure@intel.com
Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_ussecure@intel.com
Third Party Advisory
https://support.lenovo.com/us/en/solutions/LEN-18282secure@intel.com
Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannelsecure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3531-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3531-3/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3540-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3541-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3542-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3549-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3560-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3561-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3580-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3581-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3581-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3582-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3582-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3594-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3597-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3597-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3620-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3690-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3777-3/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/usn/usn-3516-1/secure@intel.com
Third Party Advisory
https://www.debian.org/security/2018/dsa-4120secure@intel.com
Third Party Advisory
https://www.debian.org/security/2018/dsa-4187secure@intel.com
Third Party Advisory
https://www.debian.org/security/2018/dsa-4188secure@intel.com
Third Party Advisory
https://www.debian.org/security/2018/dsa-4213secure@intel.com
Third Party Advisory
https://www.exploit-db.com/exploits/43427/secure@intel.com
Exploit
Third Party Advisory
VDB Entry
https://www.kb.cert.org/vuls/id/180049secure@intel.com
Third Party Advisory
US Government Resource
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001secure@intel.com
Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlsecure@intel.com
Third Party Advisory
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/secure@intel.com
Third Party Advisory
https://www.synology.com/support/security/Synology_SA_18_01secure@intel.com
Third Party Advisory
https://www.vmware.com/security/advisories/VMSA-2018-0007.htmlsecure@intel.com
Third Party Advisory
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.htmlsecure@intel.com
Third Party Advisory
https://www.vmware.com/us/security/advisories/VMSA-2018-0004.htmlsecure@intel.com
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://nvidia.custhelp.com/app/answers/detail/a_id/4609af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4611af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4613af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4614af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txtaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txtaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.kb.cert.org/vuls/id/584653af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/102376af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1040071af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://xenbits.xen.org/xsa/advisory-254.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0292af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/security/vulnerabilities/speculativeexecutionaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdfaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-002af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-003af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerabilityaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixesaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/03/msg00025.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/08/msg00019.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002af854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
Vendor Advisory
https://seclists.org/bugtraq/2019/Jun/36af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mailing List
Third Party Advisory
https://seclists.org/bugtraq/2019/Nov/16af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mailing List
Third Party Advisory
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fraf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.ascaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.ascaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.gentoo.org/glsa/201810-06af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.netapp.com/advisory/ntap-20180104-0001/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.paloaltonetworks.com/CVE-2017-5715af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://spectreattack.com/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.citrix.com/article/CTX231399af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.f5.com/csp/article/K91229003af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_usaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_usaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.lenovo.com/us/en/solutions/LEN-18282af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannelaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3531-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3531-3/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3540-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3541-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3542-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3549-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3560-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3561-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3580-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3581-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3581-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3582-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3582-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3594-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3597-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3597-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3620-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3690-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3777-3/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/usn/usn-3516-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.debian.org/security/2018/dsa-4120af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.debian.org/security/2018/dsa-4187af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.debian.org/security/2018/dsa-4188af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.debian.org/security/2018/dsa-4213af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.exploit-db.com/exploits/43427/af854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
https://www.kb.cert.org/vuls/id/180049af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.synology.com/support/security/Synology_SA_18_01af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.vmware.com/security/advisories/VMSA-2018-0007.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.vmware.com/us/security/advisories/VMSA-2018-0004.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4609
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4611
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4613
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4614
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
Source: secure@intel.com
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
Source: secure@intel.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://www.kb.cert.org/vuls/id/584653
Source: secure@intel.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/102376
Source: secure@intel.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1040071
Source: secure@intel.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://xenbits.xen.org/xsa/advisory-254.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:0292
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/security/vulnerabilities/speculativeexecution
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-002
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-003
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
Source: secure@intel.com
Resource: N/A
Hyperlink: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Source: secure@intel.com
Resource:
Patch
Third Party Advisory
Vendor Advisory
Hyperlink: https://seclists.org/bugtraq/2019/Jun/36
Source: secure@intel.com
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: https://seclists.org/bugtraq/2019/Nov/16
Source: secure@intel.com
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
Source: secure@intel.com
Resource:
Vendor Advisory
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://security.gentoo.org/glsa/201810-06
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20180104-0001/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://security.paloaltonetworks.com/CVE-2017-5715
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://spectreattack.com/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://support.citrix.com/article/CTX231399
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://support.f5.com/csp/article/K91229003
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://support.lenovo.com/us/en/solutions/LEN-18282
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3531-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3531-3/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3540-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3541-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3542-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3549-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3560-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3561-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3580-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3581-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3581-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3582-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3582-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3594-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3597-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3597-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3620-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3690-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3777-3/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/usn/usn-3516-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4120
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4187
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4188
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4213
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.exploit-db.com/exploits/43427/
Source: secure@intel.com
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: https://www.kb.cert.org/vuls/id/180049
Source: secure@intel.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.synology.com/support/security/Synology_SA_18_01
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.vmware.com/security/advisories/VMSA-2018-0007.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4609
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4611
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4613
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4614
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.kb.cert.org/vuls/id/584653
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/102376
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1040071
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://xenbits.xen.org/xsa/advisory-254.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:0292
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/security/vulnerabilities/speculativeexecution
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-002
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-003
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Third Party Advisory
Vendor Advisory
Hyperlink: https://seclists.org/bugtraq/2019/Jun/36
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: https://seclists.org/bugtraq/2019/Nov/16
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.gentoo.org/glsa/201810-06
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20180104-0001/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.paloaltonetworks.com/CVE-2017-5715
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://spectreattack.com/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://support.citrix.com/article/CTX231399
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://support.f5.com/csp/article/K91229003
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://support.lenovo.com/us/en/solutions/LEN-18282
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3531-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3531-3/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3540-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3541-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3542-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3549-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3560-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3561-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3580-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3581-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3581-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3582-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3582-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3594-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3597-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3597-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3620-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3690-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3777-3/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/usn/usn-3516-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4120
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4187
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4188
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4213
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.exploit-db.com/exploits/43427/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: https://www.kb.cert.org/vuls/id/180049
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.synology.com/support/security/Synology_SA_18_01
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.vmware.com/security/advisories/VMSA-2018-0007.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

206Records found

CVE-2014-8134
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-3.3||LOW
EPSS-0.08% / 22.81%
||
7 Day CHG~0.00%
Published-12 Dec, 2014 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux kernel through 3.18 uses an improper paravirt_enabled setting for KVM guest kernels, which makes it easier for guest OS users to bypass the ASLR protection mechanism via a crafted application that reads a 16-bit value.

Action-Not Available
Vendor-n/aopenSUSELinux Kernel Organization, IncSUSEOracle CorporationCanonical Ltd.
Product-linux_kernelopensuseevergreenubuntu_linuxsuse_linux_enterprise_serverlinuxn/a
CVE-2014-5233
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-1.9||LOW
EPSS-0.06% / 19.61%
||
7 Day CHG~0.00%
Published-14 Jan, 2015 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Siemens SIMATIC WinCC Sm@rtClient app before 1.0.2 for iOS allows physically proximate attackers to discover Sm@rtServer credentials by leveraging an error in the credential-processing mechanism.

Action-Not Available
Vendor-n/aApple Inc.Siemens AG
Product-simatic_wincc_sm\@rtclientiphone_osn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2014-5030
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-1.9||LOW
EPSS-0.05% / 16.13%
||
7 Day CHG~0.00%
Published-29 Jul, 2014 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py.

Action-Not Available
Vendor-n/aApple Inc.Canonical Ltd.
Product-cupsubuntu_linuxn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2014-3591
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.2||MEDIUM
EPSS-0.14% / 34.39%
||
7 Day CHG~0.00%
Published-29 Nov, 2019 | 21:02
Updated-06 Aug, 2024 | 10:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.

Action-Not Available
Vendor-gnupgDebian GNU/LinuxGNU
Product-gnupglibgcryptdebian_linuxLibgcryptGnuPG
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-3753
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.02% / 3.34%
||
7 Day CHG~0.00%
Published-16 Feb, 2022 | 00:00
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.

Action-Not Available
Vendor-n/aNetApp, Inc.Linux Kernel Organization, IncRed Hat, Inc.
Product-bootstrap_osh500senterprise_linuxactive_iq_unified_managerh300s_firmwareh410c_firmwareh410sh300shci_compute_nodeelement_softwaresolidfirelinux_kernelhci_management_nodeh410s_firmwareh700s_firmwareh500s_firmwareh410ch700skernel
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2014-1422
Matching Score-8
Assigner-Canonical Ltd.
ShareView Details
Matching Score-8
Assigner-Canonical Ltd.
CVSS Score-5||MEDIUM
EPSS-0.04% / 12.57%
||
7 Day CHG~0.00%
Published-22 Jul, 2020 | 18:05
Updated-17 Sep, 2024 | 03:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Location service uses cached authorization even after revocation

In Ubuntu's trust-store, if a user revokes location access from an application, the location is still available to the application because the application will honour incorrect, cached permissions. This is because the cache was not ordered by creation time by the Select struct in src/core/trust/impl/sqlite3/store.cpp. Fixed in trust-store (Ubuntu) version 1.1.0+15.04.20150123-0ubuntu1 and trust-store (Ubuntu RTM) version 1.1.0+15.04.20150123~rtm-0ubuntu1.

Action-Not Available
Vendor-Canonical Ltd.
Product-trust-store_\(ubuntu\)trust-store_\(ubuntu_rtm\)trust-store (Ubuntu)trust-store (Ubuntu RTM)
CWE ID-CWE-275
Not Available
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2006-6614
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-1.9||LOW
EPSS-0.07% / 21.19%
||
7 Day CHG~0.00%
Published-18 Dec, 2006 | 02:00
Updated-07 Aug, 2024 | 20:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The save_log_local function in Fully Automatic Installation (FAI) 2.10.1, and possibly 3.1.2, when verbose mode is enabled, stores the root password hash in /var/log/fai/current/fai.log, whose file permissions allow it to be copied to other hosts when fai-savelog is called and allows attackers to obtain the hash.

Action-Not Available
Vendor-thomas_langen/aDebian GNU/Linux
Product-debian_linuxfully_automated_installationn/a
CVE-2013-4242
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-1.9||LOW
EPSS-0.09% / 26.08%
||
7 Day CHG~0.00%
Published-19 Aug, 2013 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.

Action-Not Available
Vendor-gnupgn/aDebian GNU/LinuxopenSUSECanonical Ltd.
Product-libgcryptgnupgopensuseubuntu_linuxdebian_linuxn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-4788
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-5.1||MEDIUM
EPSS-0.20% / 41.84%
||
7 Day CHG~0.00%
Published-20 Nov, 2020 | 03:45
Updated-16 Sep, 2024 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.

Action-Not Available
Vendor-Oracle CorporationFedora ProjectIBM Corporation
Product-viosfedoracommunications_cloud_native_core_network_exposure_functioncommunications_cloud_native_core_binding_support_functionpower9aixcommunications_cloud_native_core_policyVIOSAIX
CVE-2017-3513
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-2.5||LOW
EPSS-0.07% / 20.36%
||
7 Day CHG~0.00%
Published-24 Apr, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 2.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-vm_virtualboxOracle VM VirtualBox
CVE-2013-2162
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-1.9||LOW
EPSS-0.06% / 17.10%
||
7 Day CHG~0.00%
Published-19 Aug, 2013 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in the post-installation script (mysql-server-5.5.postinst) for MySQL Server 5.5 for Debian GNU/Linux and Ubuntu Linux creates a configuration file with world-readable permissions before restricting the permissions, which allows local users to read the file and obtain sensitive information such as credentials.

Action-Not Available
Vendor-n/aCanonical Ltd.
Product-ubuntu_linuxn/a
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2017-2624
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.05% / 14.17%
||
7 Day CHG~0.00%
Published-27 Jul, 2018 | 18:00
Updated-29 Aug, 2025 | 13:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack.

Action-Not Available
Vendor-X.Org FoundationDebian GNU/Linux
Product-debian_linuxx_serverxorg-x11-server
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-385
Covert Timing Channel
CVE-2017-10250
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-4.7||MEDIUM
EPSS-0.12% / 31.19%
||
7 Day CHG~0.00%
Published-08 Aug, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Tuxedo). Supported versions that are affected are 8.54 and 8.55. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where PeopleSoft Enterprise PeopleTools executes to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-peoplesoft_enterprise_peopletoolsPeopleSoft Enterprise PT PeopleTools
CVE-2012-4693
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-1.9||LOW
EPSS-0.08% / 22.91%
||
7 Day CHG~0.00%
Published-18 Dec, 2012 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Invensys Wonderware InTouch 2012 R2 and earlier and Siemens ProcessSuite use a weak encryption algorithm for data in Ps_security.ini, which makes it easier for local users to discover passwords by reading this file.

Action-Not Available
Vendor-invensysn/aSiemens AG
Product-processsuitewonderware_intouchn/a
CVE-2020-2599
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-4.2||MEDIUM
EPSS-0.25% / 47.91%
||
7 Day CHG~0.00%
Published-15 Jan, 2020 | 16:34
Updated-30 Sep, 2024 | 16:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle Hospitality Cruise Materials Management product of Oracle Hospitality Applications (component: MMS All). The supported version that is affected is 7.30.567. Difficult to exploit vulnerability allows physical access to compromise Oracle Hospitality Cruise Materials Management. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Cruise Materials Management accessible data. CVSS 3.0 Base Score 4.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-hospitality_cruise_materials_managementHospitality Cruise Materials Management
CVE-2020-2693
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.15% / 35.87%
||
7 Day CHG~0.00%
Published-15 Jan, 2020 | 16:34
Updated-30 Sep, 2024 | 15:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36, prior to 6.0.16 and prior to 6.1.2. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-vm_virtualboxVM VirtualBox
CVE-2020-25656
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.1||MEDIUM
EPSS-0.02% / 4.87%
||
7 Day CHG+0.01%
Published-02 Dec, 2020 | 00:00
Updated-04 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.

Action-Not Available
Vendor-starwindsoftwaren/aLinux Kernel Organization, IncDebian GNU/LinuxRed Hat, Inc.
Product-debian_linuxlinux_kernelstarwind_virtual_sanenterprise_linuxkernel
CWE ID-CWE-416
Use After Free
CVE-2020-24491
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.07% / 20.28%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:44
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Debug message containing addresses of memory transactions in some Intel(R) 10th Generation Core Processors supporting SGX may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i7core_i5core_i3Intel(R) 10th Generation Core Processors supporting SGX
CWE ID-CWE-20
Improper Input Validation
CVE-2011-3153
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-1.9||LOW
EPSS-0.04% / 13.28%
||
7 Day CHG~0.00%
Published-06 Mar, 2014 | 15:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

dmrc.c in Light Display Manager (aka LightDM) before 1.1.1 allows local users to read arbitrary files via a symlink attack on ~/.dmrc.

Action-Not Available
Vendor-robert_ancelln/aCanonical Ltd.
Product-ubuntu_linuxlightdmn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2011-3154
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-1.9||LOW
EPSS-0.11% / 29.68%
||
7 Day CHG~0.00%
Published-17 Apr, 2014 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DistUpgrade/DistUpgradeViewKDE.py in Update Manager before 1:0.87.31.1, 1:0.134.x before 1:0.134.11.1, 1:0.142.x before 1:0.142.23.1, 1:0.150.x before 1:0.150.5.1, and 1:0.152.x before 1:0.152.25.5 does not properly create temporary files, which allows local users to obtain the XAUTHORITY file content for a user via a symlink attack on the temporary file.

Action-Not Available
Vendor-n/aCanonical Ltd.
Product-update-managerubuntu_linuxn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2017-10251
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-4.7||MEDIUM
EPSS-0.12% / 31.19%
||
7 Day CHG~0.00%
Published-08 Aug, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Test Framework). Supported versions that are affected are 8.54 and 8.55. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where PeopleSoft Enterprise PeopleTools executes to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-peoplesoft_enterprise_peopletoolsPeopleSoft Enterprise PT PeopleTools
CVE-2020-1746
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-0.06% / 18.93%
||
7 Day CHG~0.00%
Published-12 May, 2020 | 17:30
Updated-04 Aug, 2024 | 06:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to stdout or a log file if a playbook task is written using the bind_pw in the parameters field. The highest threat from this vulnerability is data confidentiality.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.
Product-ansible_enginedebian_linuxansible_toweransible
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-1740
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-3.9||LOW
EPSS-0.03% / 8.06%
||
7 Day CHG~0.00%
Published-16 Mar, 2020 | 15:07
Updated-04 Aug, 2024 | 06:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.Fedora Project
Product-cloudforms_management_enginedebian_linuxopenstackfedoraansibleansible_toweransible
CWE ID-CWE-377
Insecure Temporary File
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-4081
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-1.9||LOW
EPSS-0.08% / 23.94%
||
7 Day CHG~0.00%
Published-30 Nov, 2010 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The snd_hdspm_hwdep_ioctl function in sound/pci/rme9652/hdspm.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSPM_IOCTL_GET_CONFIG_INFO ioctl call.

Action-Not Available
Vendor-n/aSUSELinux Kernel Organization, IncDebian GNU/LinuxopenSUSE
Product-linux_kernelopensusedebian_linuxlinux_enterprise_software_development_kitlinux_enterprise_serverlinux_enterprise_real_time_extensionlinux_enterprise_desktopn/a
CWE ID-CWE-909
Missing Initialization of Resource
CVE-2020-14753
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.9||MEDIUM
EPSS-0.11% / 29.93%
||
7 Day CHG~0.00%
Published-21 Oct, 2020 | 14:04
Updated-26 Sep, 2024 | 20:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle Hospitality Reporting and Analytics product of Oracle Food and Beverage Applications (component: Installation). The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Hospitality Reporting and Analytics executes to compromise Oracle Hospitality Reporting and Analytics. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Hospitality Reporting and Analytics, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Reporting and Analytics accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-hospitality_reporting_and_analyticsHospitality Reporting and Analytics
CVE-2020-15250
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.08% / 22.73%
||
7 Day CHG~0.00%
Published-12 Oct, 2020 | 17:55
Updated-04 Aug, 2024 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information disclosure in JUnit4

In JUnit4 from version 4.7 and before 4.13.1, the test rule TemporaryFolder contains a local information disclosure vulnerability. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. This vulnerability impacts you if the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder, and the JUnit tests execute in an environment where the OS has other untrusted users. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. For Java 1.7 and higher users: this vulnerability is fixed in 4.13.1. For Java 1.6 and lower users: no patch is available, you must use the workaround below. If you are unable to patch, or are stuck running on Java 1.6, specifying the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability. For more information, including an example of vulnerable code, see the referenced GitHub Security Advisory.

Action-Not Available
Vendor-junitjunit-teamThe Apache Software FoundationDebian GNU/LinuxOracle Corporation
Product-junit4communications_cloud_native_core_policydebian_linuxplutojunit4
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2020-14740
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-2.8||LOW
EPSS-0.09% / 25.12%
||
7 Day CHG~0.00%
Published-21 Oct, 2020 | 14:04
Updated-26 Sep, 2024 | 20:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the SQL Developer Install component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1 and 18c. Easily exploitable vulnerability allows low privileged attacker having Client Computer User Account privilege with logon to the infrastructure where SQL Developer Install executes to compromise SQL Developer Install. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of SQL Developer Install accessible data. CVSS 3.1 Base Score 2.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-sql_developerSQL Developer
CVE-2010-4074
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-1.9||LOW
EPSS-0.07% / 22.70%
||
7 Day CHG~0.00%
Published-29 Nov, 2010 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The USB subsystem in the Linux kernel before 2.6.36-rc5 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to TIOCGICOUNT ioctl calls, and the (1) mos7720_ioctl function in drivers/usb/serial/mos7720.c and (2) mos7840_ioctl function in drivers/usb/serial/mos7840.c.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/Linux
Product-linux_kerneldebian_linuxn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-4078
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-1.9||LOW
EPSS-0.07% / 21.84%
||
7 Day CHG~0.00%
Published-29 Nov, 2010 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sisfb_ioctl function in drivers/video/sis/sis_main.c in the Linux kernel before 2.6.36-rc6 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FBIOGET_VBLANK ioctl call.

Action-Not Available
Vendor-n/aSUSELinux Kernel Organization, IncDebian GNU/LinuxopenSUSE
Product-linux_kernelopensusedebian_linuxlinux_enterprise_software_development_kitlinux_enterprise_serverlinux_enterprise_real_time_extensionlinux_enterprise_desktopn/a
CWE ID-CWE-909
Missing Initialization of Resource
CVE-2010-4079
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-1.9||LOW
EPSS-0.07% / 22.70%
||
7 Day CHG~0.00%
Published-29 Nov, 2010 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ivtvfb_ioctl function in drivers/media/video/ivtv/ivtvfb.c in the Linux kernel before 2.6.36-rc8 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FBIOGET_VBLANK ioctl call.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/Linux
Product-linux_kerneldebian_linuxn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-4083
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-1.9||LOW
EPSS-0.09% / 24.89%
||
7 Day CHG~0.00%
Published-30 Nov, 2010 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.

Action-Not Available
Vendor-n/aSUSELinux Kernel Organization, IncDebian GNU/LinuxopenSUSE
Product-linux_kernelopensusedebian_linuxlinux_enterprise_software_development_kitlinux_enterprise_serverlinux_enterprise_real_time_extensionlinux_enterprise_desktopn/a
CWE ID-CWE-909
Missing Initialization of Resource
CVE-2020-10685
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-0.19% / 40.74%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 00:00
Updated-04 Aug, 2024 | 11:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s3 or copy modules. The temporary directory is created in /tmp leaves the s ts unencrypted. On Operating Systems which /tmp is not a tmpfs but part of the root partition, the directory is only cleared on boot and the decryp emains when the host is switched off. The system will be vulnerable when the system is not running. So decrypted data must be cleared as soon as possible and the data which normally is encrypted ble.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.
Product-ceph_storagedebian_linuxopenstackstorageansible_engineansible_towerAnsible
CWE ID-CWE-459
Incomplete Cleanup
CVE-2010-4072
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-1.9||LOW
EPSS-0.07% / 21.53%
||
7 Day CHG~0.00%
Published-29 Nov, 2010 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface."

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncSUSEDebian GNU/LinuxCanonical Ltd.openSUSE
Product-linux_kernelubuntu_linuxopensusedebian_linuxlinux_enterprise_software_development_kitlinux_enterprise_serverlinux_enterprise_real_time_extensionlinux_enterprise_desktopn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-0551
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.6||MEDIUM
EPSS-1.45% / 80.83%
||
7 Day CHG~0.00%
Published-12 Mar, 2020 | 21:04
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html

Action-Not Available
Vendor-Intel Corporation
Product-xeon_e7-8893_v3core_i3-2102core_i7-2637mxeon_e3-1558l_v5xeon_e7-8894_v4pentium_j2850xeon_gold_6146xeon_e5-2660_v3xeon_e5-2450_v2core_i7-4790tcore_m-5y3core_i7-5775rxeon_e5-2448lceleron_5305ucore_i7-4765txeon_d-1527core_i3-4025uxeon_e5-2697_v4xeon_silver_4208rxeon_platinum_8170core_i7-4785txeon_w-2125core_i9-10940xceleron_g3940core_i3-3250xeon_e7-8880_v4pentium_g632xeon_platinum_8164celeron_n2815core_i3-2115ccore_i7-3960xxeon_e3-1280_v5core_i9-9900kfxeon_gold_6234xeon_e5-2699r_v4pentium_g4400txeon_e3-1265l_v2pentium_gold_g5400tcore_i7-8670xeon_w-2255xeon_d-1518core_i7-6822eqcore_i5-4258uxeon_e5-2687wcore_i9-7920xxeon_e5-2683_v4core_i7-7600ucore_i5-4260uxeon_e5-2608l_v4core_i5-4670kxeon_e-2224core_i3-2120xeon_gold_5218celeron_g1830core_i3-7100exeon_d-1567core_i3-2370mpentium_g840core_i7-2617mxeon_e-2278gexeon_e3-1505l_v6celeron_b720xeon_w-2245core_i5-4690txeon_d-1587core_i3-4360xeon_e5-2648lxeon_e5-2699_v3xeon_e5-4650celeron_1020ecore_i7-4980hqpentium_g645tcore_i5-5250uxeon_e3-1285xeon_e5-4640_v2xeon_e5-1650celeron_1020mcore_i7-7820hkpentium_d1517xeon_e5-4657l_v2core_i7-5850hqcore_i7-6900kcore_i3-4170core_i9-9940xxeon_gold_6240core_i7-6970hqcore_i5-3340mcore_i3-6120tcore_i5-8600celeron_3865upentium_3755uceleron_n2930xeon_e5-4650lcore_i7-2960xmcore_m7-6y75xeon_e5-2450lcore_i3-2330mcore_i3-3220pentium_g3440xeon_d-1539core_m3-6y30celeron_g4900tcore_i5-4570rxeon_e3-1535m_v5xeon_gold_5220rxeon_e7-4809_v3xeon_d-2146ntxeon_e5-2609_v2xeon_e3-1268l_v5core_i5-8600kxeon_platinum_8160fatom_z3736fxeon_e5-2630lxeon_platinum_p-8136pentium_n3520xeon_e5-4603core_i7-8750hatom_c2738pentium_4410ycore_i7-2675qmceleron_927ueceleron_g465core_i3-3227uxeon_e5-2640xeon_platinum_8160mcore_i5-4460xeon_e5-2680_v2xeon_d-2166ntcore_i5-2510exeon_e3-1270_v6pentium_g3220core_i7-3920xmxeon_e3-1505m_v5pentium_g2120_v2xeon_e-2286mxeon_silver_4216core_i3-5006upentium_3561yxeon_gold_6230xeon_w-2195core_i7-5650uxeon_e5-2628l_v4xeon_e-2276gxeon_e5-2658_v2xeon_d-2183itcore_i3-5020upentium_g3440txeon_e5-2687w_v2core_i7-8809gcore_i7-2629mxeon_e5-4667_v3celeron_887core_i5-5257ucore_m-5y70xeon_e3-1280_v2xeon_e3-1220_v2core_i5-2540mcore_i5-4440score_i5-7267uxeon_silver_4208xeon_e3-1585_v5celeron_2970mcore_i7-6560upentium_g4420txeon_w-2123xeon_gold_5220spentium_g3460xeon_platinum_9282core_i5-8300hcore_i3-4020yxeon_e5-2683_v3core_i3-4160xeon_e5-2658core_i3-3229yxeon_e5-2670_v3_core_i7-5600uxeon_silver_4108xeon_gold_6130txeon_silver_4210xeon_e3-1280_v3pentium_gold_g5500txeon_4880_v2xeon_e5-2428l_v2core_i5-3450pentium_3805uxeon_platinum_8276matom_c2338atom_x5-z8300xeon_gold_6238mceleron_g4920xeon_e-2274gxeon_e5-2620core_i7-3517ucore_i3-6167uxeon_e-2278gelxeon_e3-1270_v2xeon_d-1540xeon_e3-1290xeon_e5-1650_v2xeon_e5-2698_v4xeon_platinum_8160tceleron_n2807core_i7-7740xxeon_d-1528pentium_1405_v2core_i7-6500ucore_i3-7110uceleron_g3902exeon_e5-2660_v4core_i7-3940xmcore_i7-4950hqatom_z3745xeon_platinum_8268pentium_n3530core_i7-3740qmcore_i5-6300uxeon_e5-1660_v2core_i7-4930kcore_i7-8565ucore_i7-4770hqcore_i7-4910mqceleron_1019yceleron_n2820atom_c2516core_i3-2367mcore_i5-7300hqceleron_b815core_i7-7560uxeon_e3-1271_v3xeon_gold_6240mpentium_g630pentium_gold_g5420tpentium_b940core_i5-8259uxeon_e5-4607core_i7-4820kxeon_d-1529xeon_e3-1265l_v3core_i7-2760qmpentium_gold_g5500pentium_g860core_i7-2600xeon_e7-4809_v4pentium_2127u_v2core_i7-4850hqpentium_g3260core_i3-3240celeron_b830atom_c2750core_i5-6350hqxeon_gold_6132pentium_3215ucore_i5-7600tpentium_g2030_v2core_i5-3360matom_c2316xeon_e5-2618l_v4core_i7-4702mqcore_i3-4100ucore_i5-2500kxeon_e-2224gceleron_g540xeon_w-2135atom_c2358core_i5-2400core_i7-3687ucore_i7-4558ucore_i7-4550uxeon_e-2226gecore_i3-4340celeron_b810xeon_gold_6142core_i3-2350mxeon_e5-2403celeron_g540tceleron_g1620core_i5-9400hcore_i7-8500ycore_i7-5557upentium_1405core_i7-4960hqxeon_e3-1286_v3pentium_g2020_v2xeon_e3-1230_v3xeon_e5-2450core_i3-2365mcore_i7-7820hqxeon_e5-2620_v3pentium_b915ccore_i7-3520mxeon_gold_6142mcore_i3-6100exeon_e3-1280xeon_e5-2609_v3celeron_3955uxeon_e3-1275_v5pentium_987xeon_2870_v2xeon_e3-1221_v3xeon_e5-1660xeon_e3-1240_v5celeron_n2830xeon_e5-2418lxeon_e3-1230l_v3xeon_e5-2650_v3core_i7-6567ucore_i7-5775ccore_i3-7101ecore_i7-3770tcore_i9-7900xxeon_silver_4112xeon_w-3223xeon_d-1559core_i7-4790score_i7-7510uceleron_n2810core_i5-4570score_i7-8510ypentium_g850xeon_d-1519celeron_g1610tcore_i5-8265uxeon_platinum_9220core_i7-5700eqcore_i3-4012yxeon_e-2254mecore_i5-6300hqxeon_e5-2448l_v2core_i7-5930kcore_i7-7y75xeon_e5-2430core_i7-2677mcore_i7-6700xeon_e3-1220_v3core_i5-7y57xeon_e5-4627_v3xeon_e7-4850_v4celeron_g530txeon_gold_6148core_i3-8350kcore_i5-3337ucore_i5-7500txeon_gold_6144xeon_e3-1505m_v6xeon_e3-1120core_i5-2515epentium_gold_g5600xeon_gold_5220txeon_platinum_8276lceleron_j1750core_i7-7700kcore_i7-8705gxeon_e5-2679_v4xeon_platinum_9222atom_c2730xeon_e5-4640xeon_gold_6230tcore_i7-7660uxeon_e3-1220l_v2xeon_gold_6126tcore_i7-8706gatom_z3770dxeon_w-3225xeon_e3-1565l_v5xeon_e3-1240_v6core_i5-6310ucore_i7-8700core_i5-2520matom_z3775pentium_g3260tcore_i3-6300tcore_i5-3330core_i5-3380mcore_i7-3720qmcore_i7-7700tcore_i7-3517uecore_i5-2410mxeon_e5-4660_v3xeon_e5-1428l_v2xeon_w-2295core_i5-10210ucore_i7-6770hqcore_i7-8700kxeon_e5-2407_v2xeon_e3-1268l_v3core_m-5y10axeon_gold_5215mcore_i5-7442eqxeon_gold_5215xeon_e5-2667_v3pentium_2129y_v2core_i5-3550sxeon_2880_v2xeon_e5-2650_v2xeon_d-2143itxeon_e7-4820_v3core_i3-4130tcore_i3-2120txeon_e5-2699_v4core_i5-4590sxeon_e3-1285_v6core_i7-3667uceleron_725cxeon_e3-1278l_v4pentium_d1509core_i3-3120mcore_i5-4250uxeon_e3-1225_v6xeon_e3-1220l_v3xeon_silver_4109txeon_e3-1240l_v5xeon_e5-2690_v3core_i7-4722hqxeon_gold_6138fxeon_e5-1630_v3core_i7-4790core_i5-8420txeon_e3-1290_v2xeon_e3-1286l_v3xeon_e5-2680_v3core_i5-3340xeon_platinum_8280mcore_i9-7980xexeon_silver_4114core_i7-3540mcore_i7-3610qecore_i3-8100hcore_i7-6870hqxeon_e3-1230_v2pentium_3556upentium_g4500xeon_bronze_3104atom_e3805xeon_gold_6238lxeon_e5-2637_v3pentium_g3220tcore_i7-4750hqcore_i5-7300uatom_e3825core_i5-8500txeon_w-3265mcore_i5-7500xeon_d-1627xeon_4809_v2pentium_b925ccore_i5-3610meceleron_n2910core_i5-4690core_i3-4370tcore_i5-6400core_i7-2700kpentium_3825uxeon_d-1602xeon_e5-2650xeon_e5-2470xeon_e7-8890_v4core_i5-7200uceleron_877core_i5-3570spentium_g2030t_v2celeron_g1820tceleron_g3930ecore_i7-4702hqxeon_gold_6150xeon_e5-2690_v4core_i5-5350xeon_e-2254mlxeon_e3-1545m_v5core_i5-8400tcore_i3-5015ucore_i5-2467mpentium_b980pentium_d1508core_i5-4590core_i9-10920xcore_i5-8420celeron_g550tcore_i3-2125core_i7-6660uceleron_3965ucore_i7-5500uxeon_e3-1260l_v5core_i5-2310xeon_e5-2407pentium_b970core_i3-7100hcore_i3-3245xeon_8857_v2xeon_e3-1235_v2xeon_e-2276mlcore_i7-4610ycore_i5-4460txeon_d-1533xeon_e3-1275l_v3core_i3-4350core_i5-6287ucore_i5-4210yxeon_e5-4650_v3core_i7-4712mqceleron_j1900xeon_platinum_8260mxeon_8870_v2core_i5-9400core_i3-8100tpentium_4415uxeon_platinum_8260core_i3-7120tcore_i7-5550uxeon_e3-1245_v2xeon_e5-2470_v2core_i3-4150tcore_i7-4770kxeon_e5-2420_v2core_i7-6820hqatom_e3827xeon_silver_4110core_i7-8650uatom_x5-z8550xeon_bronze_3204xeon_e5-2430_v2atom_z3735fcore_i5-4200uxeon_8850_v2xeon_gold_5119txeon_e5-2643core_i7-6920hqpentium_997xeon_4820_v2core_i3-3115ccore_i3-6100uxeon_gold_5217core_i3-4330tpentium_g4400tecore_i3-3110mcore_i9-9800xxeon_w-3245core_i5-8500bxeon_d-1523nxeon_e3-1270_v3core_i3-2357matom_e3815core_i5-3230mceleron_b810exeon_e-2288gxeon_d-1653ncore_i5-3475sxeon_e5-4650_v2core_i7-4900mqpentium_g4520txeon_silver_4114txeon_gold_6240ycore_i7-6700kcore_i3-8000pentium_3560yxeon_e5-2660core_i7-2710qeceleron_1007uceleron_867core_i7-8560uceleron_g3900tcore_i3-8000tpentium_g2130_v2xeon_e5-1650_v3xeon_e5-2630_v2xeon_8890_v2core_i5-3570txeon_e3-1105c_v2xeon_e7-8891_v3xeon_e5-2690core_i5-8250upentium_g2010_v2core_i5-3340satom_z3795core_i7-7820eqxeon_gold_6252ncore_i5-3570kxeon_e3-1240_v3xeon_gold_6244xeon_e5-2695_v3atom_z3770celeron_n2805xeon_4830_v2core_i3-5157uxeon_silver_4216rcore_i5-6200ucore_i5-3339yatom_c2558xeon_e3-1225_v2atom_x5-z8350xeon_e5-1660_v3xeon_d-1520celeron_g530core_i3-3250tpuma_7_home_gatewayxeon_platinum_8256xeon_4890_v2xeon_e5-2623_v3xeon_platinum_8158core_i5-4570tcore_i9-9900xcore_i7-3630qmcore_i3-2105xeon_e-2284gcore_i5-2550kcore_i5-4430core_i3-8020core_i5-3439yxeon_d-1531atom_c2518xeon_e3-1275_v6core_i7-6510uxeon_e-2278gxeon_platinum_8260yxeon_e3-1505l_v5xeon_e7-8867_v3core_i5-2400sxeon_e5-2450l_v2xeon_gold_6128xeon_d-2142itxeon_platinum_8180mcore_i3-7130uxeon_gold_6130fcore_i5-5350ucore_i7-4700eccore_i7-6800kxeon_e5-4624l_v2celeron_n2920core_i7-2720qmxeon_platinum_8276core_i5-6500texeon_e3-1235l_v5core_i7-5700hqxeon_e5-4628l_v4pentium_967core_m3-7y30xeon_e5-2418l_v2xeon_e3-1285l_v3xeon_e5-2650l_v2core_i5-4202ycore_i5-4302yxeon_e3-1230pentium_g2120t_v2core_i3-3225xeon_e7-8890_v3xeon_e3-1275_v2core_i5-8200yxeon_w-2275celeron_g470xeon_d-1543ncore_i5-2405score_i5-7440hqceleron_g1620tcore_i5-6360uxeon_e-2144gxeon_d-1521core_i7-5960xcore_i7-8569ucore_i5-3350ppentium_g3470core_i5-3450sxeon_bronze_3206rxeon_e5-1620core_i5-6440eqcore_i5-4200yxeon_e5-2609celeron_g440core_i7-4870hqxeon_platinum_8170mxeon_platinum_8180core_i3-6100tepentium_g3250core_i3-8130uxeon_e5-2650l_v3celeron_2957uxeon_platinum_8153xeon_e5-2667xeon_e3-1230_v5xeon_w-3245mceleron_847eceleron_g550pentium_4415ycore_i3-6300pentium_g870xeon_e5-1680_v3xeon_e5-2670_v2pentium_gold_g5420core_i7-9700kfxeon_gold_5115core_i5-2450mcore_i7-7640xxeon_gold_6136xeon_2890_v2core_i5-8400hceleron_j1850core_i3-4120uxeon_e5-2690_v2xeon_e5-2648l_v2xeon_e5-4610_v3xeon_e7-8870_v3core_i5-7y54xeon_gold_6138core_i5-4440core_i3-2100txeon_e7-8891_v4core_i5-3470satom_e3826xeon_e5-1620_v2xeon_e-2226gxeon_e3-1226_v3core_i3-2330epentium_a1018_v2core_i3-8145uatom_c2550core_i7-6700tecore_i3-7020ucore_i7-4770rxeon_e3-1501l_v6xeon_gold_6262vcore_i3-8109uxeon_platinum_8168xeon_e5-2640_v3core_i5-10110yxeon_e7-8880l_v3core_i7-3770core_i7-4770pentium_g3258xeon_e5-2630l_v3core_m5-6y54xeon_gold_5122xeon_e5-2603core_i5-6600kcore_i5-5675ccore_i7-4600ucore_i5-8400bcore_i7-4710hqpentium_g4420core_m-5y10ccore_i5-8550xeon_e7-8870_v4core_i3-4160txeon_e-2184gxeon_e3-1265l_v4core_i5-7500uxeon_platinum_8156xeon_e3-1225celeron_g3930texeon_e-2136core_i5-3317ucore_i7-10510ucore_i7-9700kceleron_n2840core_i3-8100xeon_w-2265core_i7-2670qmxeon_e5-2667_v4pentium_g3460tpentium_n3510atom_z3785xeon_e5-2628l_v2xeon_gold_6126fcore_4205ucore_i7-7700core_m-5y10core_i5-2500tcore_i3-7102ecore_i7-4712hqceleron_2955ucore_i5-2450pcore_i5-3550xeon_e3-1501m_v6core_i5-8365ucore_i5-4278uxeon_d-2187ntcore_i5-9600kfxeon_e5-1428lcore_i5-7600core_i5-3437ucore_i9-7940xatom_x5-z8330core_i9-9960xpentium_g2020t_v2pentium_n3540core_i5-2390tpentium_3560mxeon_platinum_8253xeon_e5-2630l_v4xeon_e5-2440pentium_b950core_i3-8300xeon_e-2186gcore_i5-7400tcore_i3-5005uxeon_silver_4116txeon_e-2174gxeon_e5-2630_v4xeon_d-1622xeon_e5-2650lxeon_e3-1105ccore_i5-7260ucore_i7-8700bxeon_e5-2643_v3xeon_d-2145ntxeon_d-1581xeon_gold_6238celeron_j1800core_i7-3612qexeon_e5-2630_v3core_3930kpentium_g3430core_i7-7800xcore_i5-5300ucore_i3-2328mcore_i5-10210ycore_i5-4402ecxeon_e5-2623_v4xeon_w-3275mxeon_gold_5215rceleron_807uecore_i7-3820pentium_3558uxeon_e3-1285_v3xeon_e7-8867_v4core_i7-4960xxeon_e3-1260lxeon_e3-1281_v3xeon_bronze_3106pentium_977core_i7-2820qmcore_i7-3632qmxeon_e3-1240l_v3pentium_gold_6405uceleron_g1820xeon_e7-8880_v3core_i5-3570xeon_e3-1280_v6xeon_e3-1225_v3core_i5-5200uxeon_silver_4214rcore_i7-5820kcore_i3-3240tcore_i5-2537mxeon_e5-2697_v3xeon_e5-4603_v2core_i3-8120pentium_j2900xeon_e-2124core_i9-9880hcore_i5-7287ucore_i7-10710uxeon_d-1541xeon_d-2141ipentium_957xeon_e3-1275_v3xeon_e7-4830_v4celeron_1047uecore_i7-4700hqxeon_platinum_8176mxeon_e-2276mexeon_gold_5222xeon_e5-4617xeon_e3-1125ccore_i7-2715qexeon_e3-1245xeon_e5-4607_v2celeron_827ecore_i3-6100hxeon_e3-1535m_v6xeon_d-1548core_i7-6950kxeon_d-1649nxeon_platinum_9221xeon_e3-1220_v5core_i3-2340uecore_i3-2375mxeon_platinum_8160core_i7-4860hqatom_z3735dceleron_n2806core_i7-3770kceleron_3765uxeon_e5-2403_v2core_i5-4300ucore_i3-3130mcore_i7-6700hqpentium_3665ucore_i3-3217ueceleron_797atom_c2718core_i7-3840qmxeon_gold_6148fxeon_e5-2640_v2pentium_d1519core_i3-4150core_i9-9820xxeon_4870_v2xeon_e3-1258l_v4core_i5-4220yxeon_w-2155pentium_g3240core_i7-7500ucore_i7-8550uxeon_d-1623nceleron_b820core_i7-2920xmxeon_w-2145celeron_g460celeron_857core_i7-4770score_i7-6650ucore_i3-4005ucore_m-5y71core_i5-6210uxeon_e3-1240celeron_847core_i7-3612qmpentium_g2140_v2core_i3-2332mcore_i3-7167ucore_i3-6100tcore_i7-2860qmatom_c2538xeon_e5-2620_v2core_i7-7567uxeon_silver_4214core_i5-4308ucore_i7-4710mqxeon_d-2161ixeon_silver_4210rxeon_e3-1585l_v5celeron_g3920tcore_i5-8210yxeon_gold_5218bceleron_2980ucore_i5-4210ucore_i7-6850pentium_g860txeon_e5-2648l_v4xeon_e7-8855_v4xeon_8880_v2xeon_d-1513nxeon_d-1537core_i7-2640mxeon_e3-1515m_v5xeon_e3-1225_v5xeon_e5-2630l_v2core_i5-8500core_i7-3635qmcore_9300hxeon_e5-2667_v2xeon_e5-2618l_v2xeon_gold_5120txeon_gold_6134core_i3-4350tpentium_3765ucore_i3-6110ucore_i3-7007uxeon_w-3235core_i3-2310ecore_i5-6440hqxeon_e3-1235core_i7-4702ecxeon_e5-4669_v3xeon_w-2225celeron_787xeon_w-2133xeon_d-1557xeon_gold_6140mxeon_e5-4610xeon_e5-4627_v2core_i5-3470xeon_w-2223core_i7-3689yxeon_e-2276mpentium_g3450core_i7-8665uxeon_e5-4620_v2core_i3-8300tcore_i7-6600ucore_i3-4330core_i3-4170txeon_e-2236core_i7-3537ucore_i7-4500uceleron_2981uxeon_e5-2637core_i3-6120core_i5-8400pentium_g622pentium_g3250txeon_gold_6246pentium_2030m_v2atom_c2758core_i5-4350uxeon_e5-2603_v2celeron_807xeon_4860_v2xeon_e5-2603_v3celeron_b710celeron_n2940core_i7-5850eqcore_i5-2380pcore_i7-4578uatom_z3745dxeon_e-2134xeon_e5-4655_v3pentium_g4500txeon_d-2163itcore_i3-3220tcore_i7-4771atom_z3735gcore_i3-4100mxeon_8880l_v2core_i7-2649mcore_i7-10510yxeon_gold_5215lxeon_e5-2658_v4core_i5-4430sxeon_8891_v2xeon_e5-2440_v2core_i5-6442eqcore_i9-7960xceleron_g3900core_i7-7820xcore_i5-9600katom_x5-z8500pentium_3205uxeon_e5-2420xeon_e3-1125c_v2core_i7-7700hqxeon_e7-4830_v3atom_x7-z8750xeon_e3-1245_v3xeon_e5-2698_v3xeon_e3-1245_v5celeron_1005mxeon_e5-2670xeon_d-1571xeon_gold_6240latom_z3680core_i5-3330score_i5-4210hcore_i5-2300xeon_e5-1620_v3core_i5-8350ucore_i7-4800mqcore_i3-4010yxeon_d-2173itpentium_2117u_v2xeon_e3-1240_v2xeon_d-2123itxeon_e-2246gcore_8269ucore_i5-4670ratom_z3740dcore_i3-4110mcore_i5-4670txeon_e5-2637_v4xeon_e3-1241_v3core_i7-4700eqatom_e3845xeon_e5-2687w_v3core_i5-3427uxeon_e5-2428lpentium_g4540xeon_e5-2680_v4atom_x7-z8700xeon_platinum_p-8124xeon_gold_5218tcore_i9-8950hkxeon_e5-2697a_v4pentium_g4520pentium_b960xeon_gold_6140core_i7-3820qmpentium_4405uxeon_2286gxeon_e5-2609_v4core_i7-7920hqxeon_e5-2660_v2core_i3-4158ucore_m-5y51xeon_silver_4214ccore_i7-8670tceleron_g555xeon_e3-1578l_v5xeon_e3-1270_v5xeon_gold_6126core_i7-4720hqcore_i5-4570atom_z3775dxeon_e3-1246_v3xeon_e5-2643_v4core_i7-2635qmxeon_e5-2699a_v4core_i5-2430mceleron_g1840core_i3-4370xeon_e3-1265lxeon_e-2244gxeon_e7-8860_v3celeron_1037ucore_i9-9900kpentium_g640txeon_e-2176gpentium_g645xeon_gold_6142fxeon_e5-2637_v2core_i3-6320tcore_i5-3320mcore_i5-4670celeron_g1630core_i7-8709gcore_i3-7120xeon_gold_6130xeon_e5-2650l_v4core_i9-9920xcore_i7-5950hqcore_i7-4510uxeon_e5-2695_v2core_i5-6260ucore_i5-6500tcore_i7-8557ucore_i3-2348mceleron_g1610core_i7-8700txeon_platinum_9242xeon_e5-2630core_i3-4030ucore_i5-7400xeon_e7-4850_v3xeon_platinum_8280lcore_i7-3615qmxeon_e5-2697_v2core_i5-6600xeon_e5-2665core_i7-6700tcore_i7-2657mxeon_e3-1230_v6atom_z3736gxeon_e5-2430l_v2xeon_4850_v2xeon_gold_6230ncore_i7-2630qmxeon_w-3265xeon_gold_5218nxeon_e7-2850_v2xeon_gold_6138txeon_e5-2620_v4core_i5-4670spentium_g640xeon_e3-1276_v3xeon_gold_5120xeon_e-2124gcore_i5-2435mcore_i5-5575rxeon_e3-1231_v3core_i7-2620mxeon_gold_5220xeon_e-2234celeron_b800core_i3-2130xeon_d-1577xeon_d-1637xeon_gold_6254core_i7-2610uecore_i3-6320core_i5-9400fcore_i7-9850hxeon_gold_6154core_i3-7320tcore_i5-7440eqxeon_e3-1120lpentium_d1507xeon_e5-2640_v4core_i7-3770score_i7-2600sxeon_e7-8893_v4core_i5-4690sceleron_g3920core_i5-6400tcore_i3-7100uxeon_e5-2430lceleron_g1850core_i5-5287ucore_i3-7101texeon_w-3275core_i5-7600kcore_i3-2312mcore_m5-6y57core_5405uxeon_e-2126gxeon_silver_4209txeon_e5-4620_v3xeon_silver_4116core_i3-4130xeon_d-1633nxeon_e3-1275celeron_g1840tcore_i5-7360uxeon_e7-4820_v4core_i5-4300ycore_i7-4700mqcore_i5-6500core_i3-7340xeon_e5-4620core_i3-2310mxeon_gold_6248celeron_1017ucore_i5-2557mcore_9750hfxeon_e3-1220_v6core_i5-2320xeon_platinum_8280core_m3-8100ycore_i5-5675rxeon_e-2186mcore_i3-4030yxeon_e-2176mxeon_e3-1285_v4core_i3-2100core_i5-2500core_i7-6820hkpentium_g3420pentium_g3420txeon_gold_6152pentium_g4400core_i3-3120mecore_i7-3615qecore_i5-10310yxeon_gold_6222vcore_i3-6102exeon_platinum_8176xeon_gold_6242celeron_n2808celeron_b840core_i3-3210core_i5-6600txeon_e5-4610_v2core_i7-4810mqpentium_g630txeon_e3-1575m_v5xeon_e5-2650_v4xeon_platinum_8270xeon_d-1533npentium_g620xeon_e3-1245_v6xeon_silver_4215core_i3-4010uxeon_w-2235core_i7-8850hcore_i5-7210uxeon_gold_5118core_i7-4650uxeon_e5-2695_v4core_i7-3555lecore_i7-4760hqatom_c2530atom_c2508core_i7-6820eqatom_z3740xeon_gold_6134mcore_i7-3610qmcore_i9-10900xcore_i7-4770txeon_d1553ncore_i5-8650xeon_gold_6238txeon_silver_4214yxeon_e5-2603_v4xeon_e5-2643_v2xeon_e7-8860_v4atom_c2350core_i7-3970xxeon_platinum_8176fcore_i7-8750hfceleron_1000mcore_i3-4360txeon_e5-2680atom_c2308core_i3-2377mceleron_g4900pentium_4405ycore_i3-3217ucore_i3-5010upentium_gold_g5400core_i5-2500sxeon_8893_v2core_i3-6100core_i5-4460score_i5-8310ycore_i5-7640xpentium_g3450tpentium_g620tcore_i7-2600kxeon_gold_6226core_i5-8650kxeon_gold_6252core_i5-3470txeon_e5-4640_v3core_i5-4590tcore_i7-5750hqcore_i5-6267ucore_i5-4288uceleron_3965yceleron_g3900tepentium_g3240tcore_i5-3210mceleron_3855uatom_z3735ecore_i5-8600tcore_i5-8305gxeon_platinum_8260lcore_i9-9980hkcore_i7-8559upentium_g2100t_v2core_i7-2655lexeon_e-2146gxeon_d-2177ntpentium_2020m_v2xeon_e3-1270xeon_w-2175Intel(R) Processors Load Value Injection
CVE-2010-4073
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-1.9||LOW
EPSS-0.26% / 49.57%
||
7 Day CHG~0.00%
Published-29 Nov, 2010 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.

Action-Not Available
Vendor-n/aSUSELinux Kernel Organization, IncDebian GNU/LinuxopenSUSE
Product-linux_kernelopensusedebian_linuxlinux_enterprise_software_development_kitlinux_enterprise_serverlinux_enterprise_real_time_extensionlinux_enterprise_desktopn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-0093
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5||MEDIUM
EPSS-0.18% / 39.33%
||
7 Day CHG~0.00%
Published-14 May, 2020 | 20:10
Updated-04 Aug, 2024 | 05:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In exif_data_save_data_entry of exif-data.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-148705132

Action-Not Available
Vendor-libexif_projectn/aCanonical Ltd.openSUSEGoogle LLCDebian GNU/Linux
Product-ubuntu_linuxdebian_linuxandroidlibexifleapAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-0550
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.6||MEDIUM
EPSS-0.06% / 18.70%
||
7 Day CHG~0.00%
Published-12 Mar, 2020 | 21:02
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper data forwarding in some data cache for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. The list of affected products is provided in intel-sa-00330: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html

Action-Not Available
Vendor-Intel Corporation
Product-celeron_2957uxeon_e5-2667xeon_e7-8893_v3core_i3-2102core_i7-2637mceleron_847exeon_e7-8894_v4celeron_g550xeon_e5-2660_v3pentium_g870xeon_e5-2450_v2core_i7-4790tcore_m-5y3core_i7-5775rxeon_e5-2448lxeon_e5-1680_v3xeon_e5-2670_v2core_i7-4765txeon_d-1527core_i3-4025uxeon_e5-2697_v4core_i5-2450mcore_i7-4785txeon_2890_v2core_i3-4120uxeon_e5-2690_v2xeon_e5-2648l_v2xeon_e5-4610_v3xeon_e7-8870_v3core_i3-3250xeon_e7-8880_v4pentium_g632core_i5-4440core_i3-2100txeon_e7-8891_v4core_i5-3470score_i3-2115ccore_i7-3960xxeon_e5-1620_v2xeon_e3-1226_v3xeon_e5-2699r_v4xeon_e3-1265l_v2core_i3-2330epentium_a1018_v2xeon_d-1518core_i5-4258ucore_i7-4770rxeon_e5-2687wxeon_e5-2683_v4core_i5-4260uxeon_e5-2608l_v4core_i5-4670kxeon_e5-2640_v3core_i3-2120xeon_e7-8880l_v3core_i7-3770celeron_g1830core_i7-4770pentium_g3258xeon_d-1567core_i3-2370mpentium_g840xeon_e5-2630l_v3core_i7-2617mceleron_b720xeon_e5-2603core_i5-4690txeon_d-1587core_i5-5675ccore_i3-4360xeon_e5-2648lxeon_e5-2699_v3xeon_e5-4650core_i7-4600uceleron_1020ecore_i7-4980hqpentium_g645tcore_i7-4710hqcore_i5-5250uxeon_e3-1285xeon_e5-1650xeon_e5-4640_v2celeron_1020mpentium_d1517xeon_e5-4657l_v2core_i7-5850hqcore_i3-4170core_i7-6900kcore_m-5y10cxeon_e7-8870_v4core_i3-4160tcore_i5-3340mxeon_e3-1265l_v4xeon_e3-1225core_i5-3317upentium_3755ucore_i7-2670qmxeon_e5-2667_v4pentium_g3460txeon_e5-4650lcore_i7-2960xmxeon_e5-2450lcore_i3-2330mcore_i3-3220pentium_g3440xeon_d-1539xeon_e5-2628l_v2core_i5-4570rcore_m-5y10core_i5-2500txeon_e7-4809_v3core_i7-4712hqxeon_e5-2609_v2celeron_2955uxeon_e5-2630lcore_i5-2450pcore_i5-3550xeon_e5-4603core_i5-4278uxeon_e5-1428lceleron_927ueceleron_g465core_i7-2675qmcore_i3-3227ucore_i5-3437uxeon_e5-2640core_i5-4460xeon_e5-2680_v2core_i5-2510ecore_i7-3920xmpentium_g2120_v2pentium_g3220pentium_g2020t_v2core_i5-2390tcore_i3-5006upentium_3560mpentium_3561yxeon_e5-2630l_v4xeon_e5-2440pentium_b950core_i7-5650uxeon_e5-2628l_v4xeon_e5-2658_v2core_i3-5005ucore_i3-5020upentium_g3440txeon_e5-2630_v4xeon_d-1622xeon_e5-2687w_v2core_i7-2629mxeon_e5-2650lxeon_e3-1105cxeon_e5-4667_v3celeron_887core_i5-5257ucore_m-5y70xeon_e3-1280_v2xeon_e5-2643_v3xeon_e3-1220_v2xeon_d-1581core_i7-3612qexeon_e5-2630_v3core_i5-2540mcore_i5-4440score_3930kpentium_g3430core_i5-5300ucore_i3-2328mcore_i5-4402ecxeon_e5-2623_v4celeron_2970mpentium_g3460celeron_807uecore_i3-4020ycore_i7-3820xeon_e5-2683_v3core_i3-4160xeon_e5-2658pentium_3558ucore_i3-3229yxeon_e5-2670_v3_core_i7-5600uxeon_e3-1280_v3xeon_e3-1285_v3xeon_4880_v2core_i5-3450xeon_e5-2428l_v2xeon_e7-8867_v4pentium_3805ucore_i7-4960xxeon_e3-1260lxeon_e3-1281_v3pentium_977core_i7-2820qmcore_i7-3632qmxeon_e3-1240l_v3xeon_e5-2620core_i7-3517uceleron_g1820xeon_e7-8880_v3core_i5-3570xeon_e3-1270_v2xeon_d-1540xeon_e3-1290xeon_e3-1225_v3core_i5-5200uxeon_e5-1650_v2xeon_e5-2698_v4xeon_d-1528pentium_1405_v2core_i7-5820kcore_i3-3240tcore_i5-2537mxeon_e5-2697_v3xeon_e5-4603_v2xeon_e5-2660_v4xeon_d-1541xeon_e3-1275_v3core_i7-3940xmpentium_957xeon_e7-4830_v4core_i7-4950hqcore_i7-3740qmceleron_1047uecore_i7-4700hqxeon_e5-1660_v2core_i7-4930kxeon_e3-1125ccore_i7-4770hqxeon_e5-4617core_i7-2715qecore_i7-4910mqceleron_1019yxeon_e3-1245core_i3-2367mceleron_b815xeon_e5-4607_v2xeon_e3-1271_v3pentium_g630celeron_827epentium_b940xeon_d-1548xeon_e5-4607core_i7-4820kcore_i7-6950kxeon_d-1529xeon_d-1649nxeon_e3-1265l_v3core_i3-2340uecore_i7-2760qmcore_i3-2375mcore_i7-4860hqcore_i7-3770kpentium_g860celeron_3765uxeon_e5-2403_v2core_i5-4300ucore_i3-3130mcore_i7-2600pentium_2127u_v2pentium_3665ucore_i3-3217uecore_i7-4850hqpentium_g3260celeron_797core_i3-3240core_i7-3840qmceleron_b830pentium_d1519xeon_e5-2640_v2pentium_3215ucore_i3-4150pentium_g2030_v2core_i5-3360mxeon_4870_v2core_i7-4702mqxeon_e5-2618l_v4core_i3-4100ucore_i5-4220ypentium_g3240xeon_e3-1258l_v4core_i5-2500kceleron_g540core_i5-2400core_i7-3687uxeon_d-1623ncore_i7-4558uceleron_b820core_i7-2920xmceleron_g460core_i7-4550uceleron_857core_i7-4770score_i3-4340celeron_b810core_i3-4005ucore_i3-2350mcore_m-5y71xeon_e3-1240celeron_847core_i7-3612qmxeon_e5-2403pentium_g2140_v2celeron_g540tcore_i3-2332mcore_i7-2860qmceleron_g1620xeon_e5-2620_v2core_i7-5557upentium_1405core_i7-4960hqxeon_e3-1286_v3core_i5-4308upentium_g2020_v2core_i7-4710mqxeon_e3-1230_v3xeon_e5-2450core_i3-2365mxeon_e5-2620_v3core_i7-3520mpentium_b915cceleron_2980uxeon_e3-1280core_i5-4210ucore_i7-6850pentium_987xeon_2870_v2xeon_e5-2609_v3xeon_e3-1221_v3xeon_e5-1660pentium_g860txeon_e5-2418lxeon_e3-1230l_v3xeon_e5-2650_v3xeon_e5-2648l_v4core_i7-5775cxeon_e7-8855_v4core_i7-3770txeon_8880_v2xeon_d-1513ncore_i7-2640mxeon_d-1537xeon_e5-2630l_v2core_i7-3635qmxeon_d-1559core_i7-4790sxeon_e5-2667_v2xeon_e5-2618l_v2core_i5-4570sxeon_d-1519pentium_g850core_i3-4350tceleron_g1610tpentium_3765ucore_i7-5700eqcore_i3-4012ycore_i3-2310exeon_e5-2448l_v2core_i7-5930kxeon_e3-1235core_i7-4702ecxeon_e5-2430xeon_e5-4669_v3celeron_787core_i7-2677mxeon_e3-1220_v3xeon_d-1557xeon_e5-4627_v3celeron_g530txeon_e7-4850_v4core_i5-3337uxeon_e3-1120core_i5-2515exeon_e5-4610xeon_e5-4627_v2core_i5-3470core_i7-3689yxeon_e5-2679_v4pentium_g3450xeon_e5-4620_v2xeon_e5-4640xeon_e3-1220l_v2core_i3-4330core_i3-4170tcore_i7-3537ucore_i7-4500ucore_i5-2520mpentium_g3260tceleron_2981uxeon_e5-2637core_i5-3330pentium_g622pentium_g3250tcore_i5-3380mcore_i7-3517uecore_i7-3720qmcore_i5-2410mxeon_e5-4660_v3xeon_e5-1428l_v2core_i5-4350upentium_2030m_v2xeon_e5-2603_v2celeron_807xeon_4860_v2xeon_e5-2407_v2xeon_e3-1268l_v3xeon_e5-2603_v3celeron_b710core_m-5y10acore_i7-5850eqcore_i5-2380pcore_i7-4578uxeon_e5-2667_v3pentium_2129y_v2core_i5-3550score_i3-4130txeon_2880_v2xeon_e5-2650_v2xeon_e5-4655_v3core_i3-2120txeon_e7-4820_v3core_i3-3220txeon_e5-2699_v4core_i7-4771core_i5-4590score_i7-3667uceleron_725cxeon_e3-1278l_v4pentium_d1509core_i3-3120mcore_i5-4250uxeon_e3-1220l_v3core_i3-4100mcore_i7-2649mxeon_8880l_v2xeon_e5-2690_v3core_i7-4722hqxeon_e5-2658_v4core_i5-4430sxeon_8891_v2xeon_e5-2440_v2xeon_e5-1630_v3core_i7-4790xeon_e3-1290_v2pentium_3205uxeon_e3-1286l_v3xeon_e5-2680_v3xeon_e5-2420xeon_e3-1125c_v2core_i5-3340xeon_e7-4830_v3core_i7-3540mxeon_e3-1245_v3core_i7-3610qexeon_e5-2698_v3xeon_e3-1230_v2pentium_3556uceleron_1005mxeon_e5-2670xeon_d-1571core_i5-4210hcore_i5-3330score_i5-2300xeon_e5-1620_v3xeon_e5-2637_v3pentium_g3220tcore_i7-4800mqcore_i3-4010ycore_i7-4750hqpentium_2117u_v2xeon_e3-1240_v2xeon_d-1627core_i5-4670rxeon_4809_v2core_i3-4110mcore_i5-4670tcore_i5-3610mecore_i7-2700kcore_i5-4690core_i3-4370tcore_i7-4700eqpentium_3825upentium_b925cxeon_e3-1241_v3xeon_e5-2637_v4xeon_e5-2687w_v3xeon_d-1602xeon_e5-2470core_i5-3427uxeon_e5-2650xeon_e5-2428lxeon_e5-2680_v4celeron_877core_i5-3570spentium_g2030t_v2celeron_g1820txeon_e7-8890_v4core_i7-4702hqxeon_e5-2697a_v4pentium_b960core_i7-3820qmxeon_e5-2690_v4core_i5-5350xeon_e5-2609_v4xeon_e5-2660_v2core_i3-5015ucore_i5-2467mcore_i5-4590pentium_b980pentium_d1508core_i3-4158ucore_m-5y51core_i3-2125celeron_g550tceleron_g555core_i7-4720hqcore_i7-5500ucore_i5-2310core_i5-4570xeon_e5-2407xeon_e3-1246_v3pentium_b970core_i7-2635qmxeon_e5-2643_v4xeon_e5-2699a_v4core_i5-2430mceleron_g1840core_i3-3245core_i3-4370xeon_e3-1265lxeon_8857_v2xeon_e3-1235_v2core_i7-4610yxeon_e7-8860_v3celeron_1037upentium_g640tcore_i5-4460txeon_d-1533xeon_e3-1275l_v3pentium_g645xeon_e5-2637_v2core_i3-4350celeron_g1630core_i5-3320mcore_i5-4670core_i5-4210yxeon_e5-4650_v3core_i7-4712mqxeon_e5-2650l_v4xeon_8870_v2core_i7-4510ucore_i7-5950hqxeon_e5-2695_v2core_i3-2348mcore_i7-5550uxeon_e3-1245_v2xeon_e5-2470_v2celeron_g1610xeon_e5-2630core_i3-4150tcore_i7-4770kxeon_e5-2420_v2core_i3-4030uxeon_e7-4850_v3core_i7-3615qmcore_i5-4200uxeon_8850_v2xeon_e5-2430_v2xeon_e5-2697_v2xeon_e5-2643xeon_e5-2665xeon_v4_e7-4809_v4core_i7-2657mpentium_997xeon_4820_v2core_i3-3115ccore_i3-4330txeon_e5-2430l_v2xeon_4850_v2core_i3-3110mcore_i7-2630qmxeon_e7-2850_v2xeon_e5-2620_v4core_i5-4670spentium_g640xeon_e3-1276_v3xeon_d-1523ncore_i5-2435mcore_i5-5575rxeon_e3-1270_v3core_i3-2357mxeon_e3-1231_v3core_i5-3230mceleron_b810ecore_i7-2620mxeon_d-1653ncore_i5-3475sxeon_e5-4650_v2celeron_b800core_i3-2130core_i7-4900mqxeon_d-1577xeon_d-1637core_i7-2610uepentium_3560yxeon_e5-2660core_i7-2710qeceleron_1007uxeon_e3-1120lceleron_867pentium_d1507xeon_e5-2640_v4core_i7-3770score_i7-2600sxeon_e7-8893_v4core_i5-4690spentium_g2130_v2xeon_e5-2430lceleron_g1850xeon_e5-1650_v3core_i5-5287uxeon_e5-2630_v2xeon_8890_v2core_i5-3570txeon_e3-1105c_v2xeon_e7-8891_v3xeon_e5-2690core_i3-2312mpentium_g2010_v2core_i5-3340sxeon_e5-4620_v3core_i3-4130xeon_d-1633nxeon_e3-1275core_i5-3570kceleron_g1840tcore_i5-4300yxeon_e7-4820_v4xeon_e3-1240_v3core_i7-4700mqxeon_e5-2695_v3xeon_e5-4620core_i3-2310mceleron_1017uxeon_4830_v2core_i5-2557mcore_i3-5157ucore_i5-2320core_i5-3339ycore_i5-5675rxeon_e3-1225_v2core_i3-4030yxeon_e5-1660_v3xeon_d-1520xeon_e3-1285_v4core_i3-2100celeron_g530core_i3-3250tcore_i5-2500pentium_g3420pentium_g3420txeon_4890_v2xeon_e5-2623_v3core_i3-3120mecore_i5-4570tcore_i7-3615qecore_i7-3630qmcore_i3-2105core_i5-2550kceleron_b840core_i3-3210core_i5-4430core_i7-4810mqcore_i5-3439ypentium_g630txeon_d-1531xeon_e5-4610_v2xeon_e5-2650_v4xeon_d-1533nxeon_e7-8867_v3core_i5-2400spentium_g620xeon_e5-2450l_v2core_i3-4010ucore_i7-4650ucore_i7-3555lecore_i7-4760hqxeon_e5-2695_v4core_i5-5350ucore_i7-4700eccore_i7-6800kxeon_e5-4624l_v2core_i7-3610qmcore_i7-2720qmcore_i7-4770txeon_d1553nxeon_e5-2603_v4core_i7-5700hqxeon_e5-2643_v2xeon_e5-4628l_v4pentium_967xeon_e5-2418l_v2xeon_e7-8860_v4xeon_e3-1285l_v3xeon_e5-2650l_v2core_i5-4202ycore_i7-3970xcore_i5-4302yxeon_e3-1230celeron_1000mcore_i3-4360txeon_e5-2680pentium_g2120t_v2core_i3-2377mcore_i3-3225xeon_e7-8890_v3core_i3-3217ucore_i3-5010uxeon_e3-1275_v2core_i5-2500sxeon_8893_v2core_i5-4460sceleron_g470pentium_g3450txeon_d-1543ncore_i5-2405spentium_g620tceleron_g1620tcore_i7-2600kxeon_d-1521core_i7-5960xcore_i5-3470tcore_i7-5750hqcore_i5-4590txeon_e5-4640_v3core_i5-3350pcore_i5-4288upentium_g3470core_i5-3450spentium_g3240tcore_i5-3210mxeon_e5-1620core_i5-4200yxeon_e5-2609celeron_g440core_i7-4870hqpentium_g2100t_v2core_i7-2655lepentium_g3250pentium_2020m_v2xeon_e3-1270xeon_e5-2650l_v3Snoop Assisted L1D Sampling Advisory
CVE-2019-2745
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.1||MEDIUM
EPSS-0.07% / 21.22%
||
7 Day CHG~0.00%
Published-23 Jul, 2019 | 22:31
Updated-01 Oct, 2024 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxopenSUSEMcAfee, LLCHP Inc.Oracle Corporation
Product-ubuntu_linuxdebian_linuxepolicy_orchestratorxp7_command_viewjrejdkleapJava
CVE-2019-3901
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.6||MEDIUM
EPSS-0.07% / 20.95%
||
7 Day CHG~0.00%
Published-22 Apr, 2019 | 15:22
Updated-04 Aug, 2024 | 19:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs. As no relevant locks (in particular the cred_guard_mutex) are held during the ptrace_may_access() call, it is possible for the specified target task to perform an execve() syscall with setuid execution before perf_event_alloc() actually attaches to it, allowing an attacker to bypass the ptrace_may_access() check and the perf_event_exit_task(current) call that is performed in install_exec_creds() during privileged execve() calls. This issue affects kernel versions before 4.8.

Action-Not Available
Vendor-Linux Kernel Organization, IncDebian GNU/LinuxNetApp, Inc.The Linux Foundation
Product-virtual_storage_console_for_vmware_vspheredebian_linuxlinux_kernelcn1610hci_management_nodevasa_provider_for_clustered_data_ontapcn1610_firmwareactive_iq_unified_manager_for_vmware_vspheresnapprotectsolidfirestorage_replication_adapter_for_clustered_data_ontap_for_vmware_vspherekernel
CWE ID-CWE-667
Improper Locking
CVE-2019-2525
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.6||MEDIUM
EPSS-11.02% / 93.46%
||
7 Day CHG~0.00%
Published-16 Jan, 2019 | 19:00
Updated-02 Oct, 2024 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 5.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-vm_virtualboxVM VirtualBox
CVE-2010-3877
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-1.9||LOW
EPSS-0.11% / 29.10%
||
7 Day CHG~0.00%
Published-03 Jan, 2011 | 19:26
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The get_name function in net/tipc/socket.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/Linux
Product-linux_kerneldebian_linuxn/a
CWE ID-CWE-909
Missing Initialization of Resource
CVE-2010-3876
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-1.9||LOW
EPSS-0.06% / 17.99%
||
7 Day CHG~0.00%
Published-03 Jan, 2011 | 19:26
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures.

Action-Not Available
Vendor-n/aSUSELinux Kernel Organization, IncDebian GNU/LinuxopenSUSE
Product-linux_kernelopensusedebian_linuxlinux_enterprise_software_development_kitlinux_enterprise_serverlinux_enterprise_real_time_extensionlinux_enterprise_desktopn/a
CWE ID-CWE-909
Missing Initialization of Resource
CVE-2010-2371
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-1.9||LOW
EPSS-0.07% / 20.97%
||
7 Day CHG~0.00%
Published-13 Jul, 2010 | 22:07
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 6.1.1 allows local users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2010-2372.

Action-Not Available
Vendor-n/aOracle Corporation
Product-supply_chain_products_suiten/a
CVE-2010-2803
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-1.9||LOW
EPSS-0.08% / 23.99%
||
7 Day CHG~0.00%
Published-08 Sep, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The drm_ioctl function in drivers/gpu/drm/drm_drv.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows local users to obtain potentially sensitive information from kernel memory by requesting a large memory-allocation amount.

Action-Not Available
Vendor-n/aSUSELinux Kernel Organization, IncDebian GNU/LinuxopenSUSE
Product-linux_kernellinux_enterprise_real_timedebian_linuxopensuselinux_enterprise_serverlinux_enterprise_desktoplinux_enterprise_high_availability_extensionn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-29901
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.6||MEDIUM
EPSS-0.07% / 22.10%
||
7 Day CHG~0.00%
Published-12 Jul, 2022 | 00:00
Updated-03 Aug, 2024 | 06:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary Memory Disclosure through CPU Side-Channel Attacks (Retbleed)

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.

Action-Not Available
Vendor-Debian GNU/LinuxIntel CorporationVMware (Broadcom Inc.)Xen ProjectFedora Project
Product-core_i7-6920hqcore_i3-6167u_firmwarecore_i7-8705gcore_i7-8665ucore_i3-6100ucore_i3-8300tcore_i7-8510y_firmwarecore_i7-6700_firmwarecore_i7-6600ucore_i3-6100u_firmwarecore_i7-8706gcore_i3-8120_firmwarecore_i3-6300core_i5-8600_firmwarecore_i7-6510u_firmwarecore_i7-8565u_firmwarecore_i7-6822eq_firmwarecore_i3-6100e_firmwarecore_i3-8350k_firmwarecore_i7-8700t_firmwarecore_i5-8305g_firmwarecore_i3-6167ucore_i5-8500bcore_i5-6310ucore_i5-8269ucore_i5-8259u_firmwarecore_i5-8400hcore_i3-6300tcore_i7-8700core_i3-6120core_i5-8400core_i7-8705g_firmwarecore_i5-8400b_firmwarecore_i5-6300hq_firmwarecore_i7-6700t_firmwarecore_i3-8100_firmwarecore_i7-8709g_firmwarecore_i7-6500ucore_i7-6600u_firmwarecore_i7-6500u_firmwarecore_i7-6770hqcore_i3-6320core_i7-6700kcore_i7-8700kcore_i3-8000core_i3-8120core_i7-6650u_firmwarecore_i7-8560u_firmwarecore_i7-6820eq_firmwarecore_i5-8500t_firmwaredebian_linuxcore_i7-8670core_i7-8560ucore_i3-8145ucore_i5-8300h_firmwarecore_i5-8600k_firmwarecore_i7-6822eqcore_i3-8130u_firmwarecore_i3-8000tcore_i7-6700tecore_i5-6400tcore_i7-6567u_firmwarecore_i5-6300ucore_i3-8109ucore_i7-8565ucore_m5-6y57core_i3-6100t_firmwarecore_i5-8250ucore_i7-8569u_firmwarecore_i7-8706g_firmwarecore_i5-6442eq_firmwarecore_i7-6920hq_firmwarecore_i5-8269u_firmwarecore_i5-6600k_firmwarecore_i5-8550ucore_i3-6110u_firmwarecore_i3-6100hcore_i5-6287u_firmwarecore_i5-6200u_firmwarecore_i3-8100t_firmwarecore_i5-8259ucore_i5-8210y_firmwarecore_m5-6y54core_i5-6442eqcore_i5-6600kcore_i5-8420tcore_i5-6500core_i7-8650u_firmwarecore_i3-6300_firmwarecore_i5-8400bcore_i7-8850h_firmwarecore_m7-6y75_firmwarecore_i5-6200ucore_i7-8670t_firmwarecore_i7-6700hq_firmwarecore_i7-6700hqcore_m3-8100ycore_i5-6500te_firmwarecore_i3-8100hcore_i5-8650_firmwarecore_i5-8250u_firmwarecore_i7-6870hqcore_i5-8400_firmwarecore_i5-6350hqcore_i5-8550core_i7-6970hq_firmwarecore_i7-8670_firmwarecore_i5-8400h_firmwarecore_i7-6970hqcore_i7-6660u_firmwarecore_i7-6820hkcore_i5-8350ucore_i3-6100te_firmwarecore_i3-6320t_firmwarecore_i3-6120tcore_i5-6440hq_firmwarecore_m3-6y30_firmwarecore_i5-6350hq_firmwarecore_i5-8600core_i7-8550ucore_i5-8400t_firmwarecore_i5-8500tcore_i7-8500y_firmwarecore_i3-6102ecore_i3-6120_firmwarecore_i5-6400t_firmwarecore_i5-8365u_firmwarecore_i5-6310u_firmwarecore_i7-6700te_firmwarecore_i3-8100core_i5-6400core_i5-8310y_firmwarecore_i5-6600tcore_i3-8020core_i7-6650ucore_i7-6510ucore_i5-6360u_firmwarecore_i3-8100h_firmwarecore_i5-6400_firmwarecore_m7-6y75core_i5-6600t_firmwarecore_i5-8350u_firmwarecore_m3-6y30core_i5-6210ucore_i7-8700b_firmwarefedoracore_i7-8559u_firmwarecore_i7-8850hcore_i9-8950hkcore_i5-8265u_firmwarecore_i7-8665u_firmwarecore_i7-6560u_firmwarecore_i7-6820hq_firmwarecore_i3-6100tcore_i7-6820eqcore_i3-6320_firmwarecore_i3-8300_firmwarecore_i7-8500ycore_i5-8600kcore_i3-8145u_firmwarecore_i7-8700k_firmwarecore_i5-8400tcore_i5-8650core_i7-8700_firmwarecore_i7-8750hcore_i3-6100_firmwarecore_i5-6500tecore_i5-8365ucore_i5-8420core_i7-8670tcore_i7-6700tcore_i5-6260u_firmwarecore_i5-8210ycore_i7-6660ucore_i5-8500b_firmwarecore_i7-8750h_firmwarecore_i5-8500_firmwarecore_i3-6100h_firmwarecore_i3-6100ecore_i3-8300t_firmwarecore_i3-8109u_firmwarecore_i5-6210u_firmwarecore_i5-6300u_firmwarecore_i3-6120t_firmwarecore_i7-8809g_firmwarecore_i7-8557u_firmwarecore_m5-6y57_firmwarecore_i7-8750hfcore_i5-6500_firmwarecore_i5-8550_firmwarecore_i5-8420t_firmwarecore_i5-6500t_firmwarecore_i3-8300core_i7-6567ucore_i5-8200ycore_i7-8750hf_firmwarecore_i3-6100core_i5-8310ycore_i7-8809gcore_i9-8950hk_firmwarecore_i5-8500core_i7-6870hq_firmwarecore_i3-8000_firmwarecore_m5-6y54_firmwarecore_i5-6360ucore_i3-6320tcore_i7-8700bcore_i7-8709gcore_i5-8420_firmwarecore_i3-6300t_firmwarecore_i7-8550u_firmwarecore_i3-8000t_firmwarecore_i5-6287ucore_i5-8200y_firmwarecore_i5-8550u_firmwarecore_i5-8650kcore_i7-8510ycore_i7-8569ucore_i5-6267u_firmwarexencore_i7-6770hq_firmwarecore_i5-8265ucore_i3-6110ucore_i3-8100tcore_i5-6267ucore_i5-6300hqcore_m3-8100y_firmwarecore_i3-8020_firmwarecore_i5-6260ucore_i5-6440hqcore_i5-6500tcore_i7-6700k_firmwarecore_i5-8650k_firmwarecore_i7-8557ucore_i7-6560ucore_i7-6700core_i7-6820hk_firmwarecore_i7-8700tcore_i3-8350kcore_i5-6440eqcore_i5-8300hcore_i7-6820hqcore_i5-6440eq_firmwarecore_i5-8600t_firmwarecore_i5-8305gcore_i5-8600tcore_i7-8559ucore_i7-8650ucore_i3-6100tecore_i5-6600_firmwarecore_i3-8130ucore_i5-6600esxicore_i3-6102e_firmwareIntel Microprocessors
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2016-0371
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 19.20%
||
7 Day CHG~0.00%
Published-01 Feb, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Tivoli Storage Manager (TSM) password may be displayed in plain text via application trace output while application tracing is enabled.

Action-Not Available
Vendor-Linux Kernel Organization, IncOracle CorporationHP Inc.Apple Inc.IBM CorporationMicrosoft Corporation
Product-tivoli_storage_manageraixsolarismac_os_xlinux_kernelhp-uxwindowsTivoli Storage Manager
CVE-2022-25368
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.27% / 50.74%
||
7 Day CHG~0.00%
Published-09 Mar, 2022 | 18:17
Updated-03 Aug, 2024 | 04:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Spectre BHB is a variant of Spectre-v2 in which malicious code uses the shared branch history (stored in the CPU BHB) to influence mispredicted branches in the victim's hardware context. Speculation caused by these mispredicted branches can then potentially be used to cause cache allocation, which can then be used to infer information that should be protected.

Action-Not Available
Vendor-amperecomputingn/aArm Limited
Product-cortex-a76aecortex-x2_firmwarecortex-a75cortex-a65ae_firmwarecortex-a78ae_firmwareampere_altra_firmwarecortex-a78c_firmwarecortex-a77_firmwarecortex-a57neoverse_n2_firmwareneoverse_n2cortex-a15cortex-a65aeneoverse-e1cortex-a710cortex-x2cortex-a78neoverse_n1_firmwarecortex-a78ccortex-a15_firmwarecortex-a72_firmwareampere_altra_maxcortex-a77cortex-a57_firmwarecortex-x1cortex-a65_firmwareampere_altra_max_firmwarecortex-a78_firmwareampere_altracortex-a65neoverse-e1_firmwarecortex-a78aeneoverse-v1cortex-a76ae_firmwareneoverse_n1cortex-a710_firmwarecortex-x1_firmwarecortex-a75_firmwarecortex-a76_firmwarecortex-a73_firmwarecortex-a76cortex-a72cortex-a73neoverse-v1_firmwaren/a
CVE-2015-1420
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-1.9||LOW
EPSS-0.03% / 7.63%
||
7 Day CHG~0.00%
Published-16 Mar, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function.

Action-Not Available
Vendor-n/aDebian GNU/LinuxLinux Kernel Organization, Inc
Product-debian_linuxlinux_kerneln/a
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2018-3693
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.6||MEDIUM
EPSS-1.31% / 79.79%
||
7 Day CHG~0.00%
Published-10 Jul, 2018 | 21:00
Updated-05 Aug, 2024 | 04:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.

Action-Not Available
Vendor-Oracle CorporationArm LimitedNetApp, Inc.Red Hat, Inc.Fujitsu LimitedIntel Corporation
Product-enterprise_linux_server_eusxeon_e3_12201enterprise_linux_server_ausxeon_e3_1225_v3xeon_e5_2450lxeon_e5_1620_v3xeon_e5_1428lxeon_e5_1620_v4xeon_e3_1240l_v5xeon_e3_1270xeon_e3_1220_v6xeon_e3_1230l_v3xeon_e3_1230_v2xeon_e3_1225_v5xeon_e5_1630_v3xeon_bronze_3106xeon_e5_1680_v3xeon_e5_2643_v2m12-2senterprise_linux_workstationxeon_e3_1235xeon_e3_1281_v3xeon_e3_1220l_v3xeon_e3_1275xeon_e5_2450_v2xeon_e5_2408l_v3xeon_e5_1428l_v3xeon_phixeon_e3_1240_v2xeon_e5_2648lxeon_e3_1276_v3xeon_silverxeon_e5_2609_v4atom_zxeon_e3_1265l_v2xeon_e3_1278l_v4xeon_e5_1620_v2xeon_e3_1240xeon_e5_2630_v2xeon_e3_1246_v3xeon_e5_2637core_i7xeon_e-1105cxeon_e5_2448lxeon_e5_2630lxeon_e5_2643xeon_e3_1275l_v3core_m3xeon_e3_1105c_v2xeon_e5_2637_v2xeon_e3xeon_e3_1245_v5xeon_e5_2430_v2xeon_e5_2640_v4xeon_e5_2648l_v2xeon_e5_2608l_v3enterprise_linux_serverxeon_e3_1501l_v6m12-1xeon_e3_1230_v3xeon_e3_1226_v3xeon_e5_1650_v3xeon_e5_2430lxeon_e5_2428l_v3xeon_e3_1240_v5xeon_e5_2430l_v2xeon_e5_2637_v3xeon_e7xeon_e3_1280_v5xeon_e3_1245_v6xeon_e5_2420_v2solidfire_element_os_management_nodexeon_e5_2648l_v3core_i3celeron_nxeon_e5_2428lxeon_e3_1505m_v5xeon_e5_1660_v4xeon_e5_2620_v4xeon_e5_2428l_v2core_i5xeon_e3_1235l_v5xeon_e5_1660_v3celeron_jxeon_e5_2407_v2xeon_e5_2650_v2xeon_e3_1245_v3xeon_e3_1505l_v5xeon_e3_1230xeon_e3_1225xeon_e3_1245m12-2xeon_e5_2630_v4pentium_jatom_x3core_m7xeon_e3_1241_v3xeon_e3_1275_v2xeon_e3_1275_v6xeon_e3_1285l_v3xeon_e5_1620xeon_e5_2620_v3xeon_e5_2630l_v3cortex-axeon_e5_2640_v2xeon_platinumxeon_e5_1680_v4xeon_e5_2628l_v3xeon_e5_2609_v2xeon_e5_2430xeon_e5_2643_v3xeon_e5_1428l_v2xeon_e3_1240l_v3xeon_e3_1285l_v4xeon_bronze_3104xeon_e3_1125cxeon_e3_1230_v6xeon_e5_1630_v4communications_eagle_application_processorxeon_e5_2407xeon_e5_2643_v4xeon_e3_1220_v3xeon_e3_1280_v6xeon_e5_2620communications_lsmsxeon_e3_1285_v6enterprise_linux_server_tusxeon_e5_2618l_v4xeon_e3_1275_v3xeon_e3_1505l_v6xeon_e5_2418lxeon_e3_1275_v5xeon_e3_1286_v3xeon_e3_1220xeon_e3_1268l_v5xeon_e3_1240_v6xeon_e3_1290xeon_e5_2620_v2xeon_e3_1270_v5xeon_e5_2448l_v2xeon_e5_1650_v4core_m5xeon_e5_2450l_v2xeon_e5_2630l_v4xeon_e5_2403_v2xeon_e5_2609_v3cortex-rxeon_e3_1220_v5xeon_e3_1268l_v3xeon_e5_2603xeon_e3_1285_v3xeon_e5_2630_v3xeon_e5_2450xeon_e5_2623_v3xeon_e5_2650l_v3xeon_e3_1501m_v6m12-2s_firmwarecore_mxeon_e5_2650l_v2enterprise_linux_desktopxeon_e3_1231_v3xeon_e3_1265l_v4xeon_e3_1280_v2xeon_e5_1650xeon_e5_2470xeon_e5_2438l_v3enterprise_linuxxeon_goldxeon_e5_2603_v3xeon_e3_1286l_v3atom_catom_em12-1_firmwarexeon_e5_2603_v2pentium_nxeon_e3_1290_v2xeon_e5_1660xeon_e5_2618l_v3xeon_e5_2603_v4xeon_e5_2618l_v2xeon_e3_1220_v2xeon_e3_1270_v6xeon_e3_1280_v3xeon_e3_1225_v2xeonxeon_e3_1271_v3xeon_e3_12201_v2xeon_e5_2623_v4xeon_e3_1270_v2xeon_e5xeon_e3_1280xeon_e5_2640_v3xeon_e5_2628l_v4xeon_e3_1230_v5xeon_e3_1270_v3xeon_e5_2440xeon_e5_2440_v2xeon_e5_2608l_v4xeon_e5_2650enterprise_linux_eusxeon_e3_1265l_v3xeon_e5_1650_v2xeon_e3_1258l_v4xeon_e5_2650_v4xeon_e5_2609xeon_e5_2418l_v3xeon_e3_1260l_v5xeon_e5_2650lxeon_e5_2628l_v2xeon_e5_2418l_v2xeon_e3_1225_v6xeon_e5_2470_v2xeon_e5_2640xeon_e3_1245_v2xeon_e5_2637_v4struxureware_data_center_expertxeon_e3_1285_v4xeon_e5_2630l_v2xeon_e5_2650_v3xeon_e3_1240_v3xeon_e5_2648l_v4xeon_e5_1660_v2xeon_e5_2403xeon_e3_1260lxeon_e5_2630m12-2_firmwarexeon_e5_2420xeon_e3_1125c_v2Most Modern Operating Systems
CVE-2018-2922
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-2.5||LOW
EPSS-0.08% / 24.57%
||
7 Day CHG~0.00%
Published-17 Oct, 2018 | 01:00
Updated-02 Oct, 2024 | 19:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). The supported version that is affected is 11.3. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Solaris accessible data. CVSS 3.0 Base Score 2.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-solarisSolaris Operating System
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found