Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2018-0495

Summary
Assigner-debian
Assigner Org ID-79363d38-fa19-49d1-9214-5f28da3f3ac5
Published At-13 Jun, 2018 | 23:00
Updated At-05 Aug, 2024 | 03:28
Rejected At-
Credits

Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:debian
Assigner Org ID:79363d38-fa19-49d1-9214-5f28da3f3ac5
Published At:13 Jun, 2018 | 23:00
Updated At:05 Aug, 2024 | 03:28
Rejected At:
▼CVE Numbering Authority (CNA)

Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

Affected Products
Vendor
n/a
Product
Libgcrypt before 1.7.10 and 1.8.x before 1.8.3
Versions
Affected
  • Libgcrypt before 1.7.10 and 1.8.x before 1.8.3
Problem Types
TypeCWE IDDescription
textN/Aside-channel attack
Type: text
CWE ID: N/A
Description: side-channel attack
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965
x_refsource_MISC
http://www.securitytracker.com/id/1041144
vdb-entry
x_refsource_SECTRACK
https://usn.ubuntu.com/3850-1/
vendor-advisory
x_refsource_UBUNTU
http://www.securitytracker.com/id/1041147
vdb-entry
x_refsource_SECTRACK
https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
x_refsource_MISC
https://usn.ubuntu.com/3689-1/
vendor-advisory
x_refsource_UBUNTU
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html
x_refsource_MISC
https://usn.ubuntu.com/3689-2/
vendor-advisory
x_refsource_UBUNTU
https://usn.ubuntu.com/3692-2/
vendor-advisory
x_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html
mailing-list
x_refsource_MLIST
https://www.debian.org/security/2018/dsa-4231
vendor-advisory
x_refsource_DEBIAN
https://access.redhat.com/errata/RHSA-2018:3505
vendor-advisory
x_refsource_REDHAT
https://usn.ubuntu.com/3850-2/
vendor-advisory
x_refsource_UBUNTU
https://usn.ubuntu.com/3692-1/
vendor-advisory
x_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2018:3221
vendor-advisory
x_refsource_REDHAT
https://dev.gnupg.org/T4011
x_refsource_MISC
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
x_refsource_MISC
https://access.redhat.com/errata/RHSA-2019:1297
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:1296
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:1543
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:2237
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965
Resource:
x_refsource_MISC
Hyperlink: http://www.securitytracker.com/id/1041144
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://usn.ubuntu.com/3850-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.securitytracker.com/id/1041147
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
Resource:
x_refsource_MISC
Hyperlink: https://usn.ubuntu.com/3689-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html
Resource:
x_refsource_MISC
Hyperlink: https://usn.ubuntu.com/3689-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://usn.ubuntu.com/3692-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://www.debian.org/security/2018/dsa-4231
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3505
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://usn.ubuntu.com/3850-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://usn.ubuntu.com/3692-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3221
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://dev.gnupg.org/T4011
Resource:
x_refsource_MISC
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Resource:
x_refsource_MISC
Hyperlink: https://access.redhat.com/errata/RHSA-2019:1297
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2019:1296
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2019:1543
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2019:2237
Resource:
vendor-advisory
x_refsource_REDHAT
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965
x_refsource_MISC
x_transferred
http://www.securitytracker.com/id/1041144
vdb-entry
x_refsource_SECTRACK
x_transferred
https://usn.ubuntu.com/3850-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.securitytracker.com/id/1041147
vdb-entry
x_refsource_SECTRACK
x_transferred
https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
x_refsource_MISC
x_transferred
https://usn.ubuntu.com/3689-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html
x_refsource_MISC
x_transferred
https://usn.ubuntu.com/3689-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://usn.ubuntu.com/3692-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html
mailing-list
x_refsource_MLIST
x_transferred
https://www.debian.org/security/2018/dsa-4231
vendor-advisory
x_refsource_DEBIAN
x_transferred
https://access.redhat.com/errata/RHSA-2018:3505
vendor-advisory
x_refsource_REDHAT
x_transferred
https://usn.ubuntu.com/3850-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://usn.ubuntu.com/3692-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://access.redhat.com/errata/RHSA-2018:3221
vendor-advisory
x_refsource_REDHAT
x_transferred
https://dev.gnupg.org/T4011
x_refsource_MISC
x_transferred
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
x_refsource_MISC
x_transferred
https://access.redhat.com/errata/RHSA-2019:1297
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2019:1296
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2019:1543
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2019:2237
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.securitytracker.com/id/1041144
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://usn.ubuntu.com/3850-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.securitytracker.com/id/1041147
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://usn.ubuntu.com/3689-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://usn.ubuntu.com/3689-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://usn.ubuntu.com/3692-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://www.debian.org/security/2018/dsa-4231
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3505
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://usn.ubuntu.com/3850-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://usn.ubuntu.com/3692-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3221
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://dev.gnupg.org/T4011
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2019:1297
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2019:1296
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2019:1543
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2019:2237
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@debian.org
Published At:13 Jun, 2018 | 23:29
Updated At:07 Nov, 2023 | 02:51

Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.04.7MEDIUM
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Primary2.01.9LOW
AV:L/AC:M/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.0
Base score: 4.7
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 1.9
Base severity: LOW
Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CPE Matches

gnupg
gnupg
>>libgcrypt>>Versions before 1.7.10(exclusive)
cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*
gnupg
gnupg
>>libgcrypt>>Versions from 1.8.0(inclusive) to 1.8.3(exclusive)
cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>12.04
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>14.04
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>16.04
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>17.10
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>18.04
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>18.10
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>8.0
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>9.0
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>ansible_tower>>3.3
cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_desktop>>7.0
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server>>7.0
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_workstation>>7.0
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>traffic_director>>11.1.1.9.0
cpe:2.3:a:oracle:traffic_director:11.1.1.9.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-203Primarynvd@nist.gov
CWE ID: CWE-203
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securitytracker.com/id/1041144security@debian.org
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1041147security@debian.org
Third Party Advisory
VDB Entry
https://access.redhat.com/errata/RHSA-2018:3221security@debian.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3505security@debian.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1296security@debian.org
N/A
https://access.redhat.com/errata/RHSA-2019:1297security@debian.org
N/A
https://access.redhat.com/errata/RHSA-2019:1543security@debian.org
N/A
https://access.redhat.com/errata/RHSA-2019:2237security@debian.org
N/A
https://dev.gnupg.org/T4011security@debian.org
Patch
Vendor Advisory
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965security@debian.org
N/A
https://lists.debian.org/debian-lts-announce/2018/06/msg00013.htmlsecurity@debian.org
Mailing List
Third Party Advisory
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.htmlsecurity@debian.org
Vendor Advisory
https://usn.ubuntu.com/3689-1/security@debian.org
Third Party Advisory
https://usn.ubuntu.com/3689-2/security@debian.org
Third Party Advisory
https://usn.ubuntu.com/3692-1/security@debian.org
Third Party Advisory
https://usn.ubuntu.com/3692-2/security@debian.org
Third Party Advisory
https://usn.ubuntu.com/3850-1/security@debian.org
Third Party Advisory
https://usn.ubuntu.com/3850-2/security@debian.org
Third Party Advisory
https://www.debian.org/security/2018/dsa-4231security@debian.org
Third Party Advisory
https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/security@debian.org
Exploit
Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlsecurity@debian.org
Patch
Third Party Advisory
Hyperlink: http://www.securitytracker.com/id/1041144
Source: security@debian.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1041147
Source: security@debian.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3221
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3505
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2019:1296
Source: security@debian.org
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2019:1297
Source: security@debian.org
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2019:1543
Source: security@debian.org
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2019:2237
Source: security@debian.org
Resource: N/A
Hyperlink: https://dev.gnupg.org/T4011
Source: security@debian.org
Resource:
Patch
Vendor Advisory
Hyperlink: https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965
Source: security@debian.org
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html
Source: security@debian.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html
Source: security@debian.org
Resource:
Vendor Advisory
Hyperlink: https://usn.ubuntu.com/3689-1/
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3689-2/
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3692-1/
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3692-2/
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3850-1/
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3850-2/
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4231
Source: security@debian.org
Resource:
Third Party Advisory
Hyperlink: https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
Source: security@debian.org
Resource:
Exploit
Third Party Advisory
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Source: security@debian.org
Resource:
Patch
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

208Records found

CVE-2018-10472
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.6||MEDIUM
EPSS-0.09% / 25.99%
||
7 Day CHG~0.00%
Published-27 Apr, 2018 | 15:00
Updated-05 Aug, 2024 | 07:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.

Action-Not Available
Vendor-n/aDebian GNU/LinuxXen Project
Product-xendebian_linuxn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-10846
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 5.27%
||
7 Day CHG~0.00%
Published-22 Aug, 2018 | 13:00
Updated-05 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.

Action-Not Available
Vendor-[UNKNOWN]Canonical Ltd.GNUFedora ProjectRed Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxenterprise_linux_workstationfedoragnutlsenterprise_linux_desktopgnutls
CWE ID-CWE-385
Covert Timing Channel
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2018-0498
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-4.7||MEDIUM
EPSS-0.19% / 41.42%
||
7 Day CHG~0.00%
Published-28 Jul, 2018 | 17:00
Updated-05 Aug, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ARM mbed TLS before 2.12.0, before 2.7.5, and before 2.1.14 allows local users to achieve partial plaintext recovery (for a CBC based ciphersuite) via a cache-based side-channel attack.

Action-Not Available
Vendor-n/aDebian GNU/LinuxArm Limited
Product-mbed_tlsdebian_linuxARM mbed TLS before 2.12.0, before 2.7.5, and before 2.1.14
CVE-2017-9079
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.13% / 33.26%
||
7 Day CHG~0.00%
Published-19 May, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dropbear before 2017.75 might allow local users to read certain files as root, if the file has the authorized_keys file format with a command= option. This occurs because ~/.ssh/authorized_keys is read with root privileges and symlinks are followed.

Action-Not Available
Vendor-dropbear_ssh_projectn/aDebian GNU/Linux
Product-debian_linuxdropbear_sshn/a
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2021-3753
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.01% / 1.13%
||
7 Day CHG-0.00%
Published-16 Feb, 2022 | 00:00
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.

Action-Not Available
Vendor-n/aNetApp, Inc.Linux Kernel Organization, IncRed Hat, Inc.
Product-bootstrap_osh500senterprise_linuxactive_iq_unified_managerh300s_firmwareh410c_firmwareh410sh300shci_compute_nodeelement_softwaresolidfirelinux_kernelhci_management_nodeh410s_firmwareh700s_firmwareh500s_firmwareh410ch700skernel
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2017-2624
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.11% / 29.95%
||
7 Day CHG~0.00%
Published-27 Jul, 2018 | 18:00
Updated-05 Aug, 2024 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack.

Action-Not Available
Vendor-Debian GNU/LinuxX.Org Foundation
Product-debian_linuxxorg-serverxorg-x11-server
CWE ID-CWE-385
Covert Timing Channel
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-2665
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.04% / 11.49%
||
7 Day CHG~0.00%
Published-06 Jul, 2018 | 13:00
Updated-05 Aug, 2024 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The skyring-setup command creates random password for mongodb skyring database but it writes password in plain text to /etc/skyring/skyring.conf file which is owned by root but read by local user. Any local user who has access to system running skyring service will be able to get password in plain text.

Action-Not Available
Vendor-[UNKNOWN]MongoDB, Inc.Red Hat, Inc.
Product-mongodbstorage_consolerhscon-core
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2021-29906
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-5.1||MEDIUM
EPSS-0.10% / 28.43%
||
7 Day CHG~0.00%
Published-08 Oct, 2021 | 17:20
Updated-16 Sep, 2024 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM App Connect Enterprise Certified Container 1.0, 1.1, 1.2, 1.3, 1.4 and 1.5 could disclose sensitive information to a local user when it is configured to use an IBM Cloud API key to connect to cloud-based connectors. IBM X-Force ID: 207630.

Action-Not Available
Vendor-Red Hat, Inc.IBM Corporation
Product-openshiftapp_connect_enterprise_certified_containerApp Connect Enterprise Certified Container
CVE-2011-3154
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-1.9||LOW
EPSS-0.05% / 15.41%
||
7 Day CHG~0.00%
Published-17 Apr, 2014 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DistUpgrade/DistUpgradeViewKDE.py in Update Manager before 1:0.87.31.1, 1:0.134.x before 1:0.134.11.1, 1:0.142.x before 1:0.142.23.1, 1:0.150.x before 1:0.150.5.1, and 1:0.152.x before 1:0.152.25.5 does not properly create temporary files, which allows local users to obtain the XAUTHORITY file content for a user via a symlink attack on the temporary file.

Action-Not Available
Vendor-n/aCanonical Ltd.
Product-update-managerubuntu_linuxn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2011-2492
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-1.9||LOW
EPSS-0.06% / 17.20%
||
7 Day CHG~0.00%
Published-28 Jul, 2011 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The bluetooth subsystem in the Linux kernel before 3.0-rc4 does not properly initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel memory via a crafted getsockopt system call, related to (1) the l2cap_sock_getsockopt_old function in net/bluetooth/l2cap_sock.c and (2) the rfcomm_sock_getsockopt_old function in net/bluetooth/rfcomm/sock.c.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncRed Hat, Inc.
Product-linux_kernelenterprise_linux_workstationenterprise_linux_serverenterprise_linux_desktopenterprise_linux_ausenterprise_linux_eusn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-2291
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-4.7||MEDIUM
EPSS-0.57% / 67.65%
||
7 Day CHG~0.00%
Published-22 Apr, 2021 | 21:54
Updated-26 Sep, 2024 | 14:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-vm_virtualboxVM VirtualBox
CVE-2021-2374
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-4.1||MEDIUM
EPSS-0.16% / 37.87%
||
7 Day CHG~0.00%
Published-20 Jul, 2021 | 22:43
Updated-26 Sep, 2024 | 13:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).

Action-Not Available
Vendor-NetApp, Inc.Oracle CorporationFedora Project
Product-fedoramysql_serveroncommand_insightMySQL Server
CVE-2021-23239
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.5||LOW
EPSS-0.04% / 11.11%
||
7 Day CHG~0.00%
Published-12 Jan, 2021 | 00:00
Updated-03 Aug, 2024 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.

Action-Not Available
Vendor-sudo_projectn/aNetApp, Inc.Debian GNU/LinuxFedora Project
Product-debian_linuxcloud_backuphci_management_nodefedorasolidfiresudon/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2021-2296
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-5.3||MEDIUM
EPSS-0.08% / 24.89%
||
7 Day CHG~0.00%
Published-22 Apr, 2021 | 21:54
Updated-26 Sep, 2024 | 14:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-vm_virtualboxVM VirtualBox
CVE-2017-10020
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-4.7||MEDIUM
EPSS-0.12% / 31.87%
||
7 Day CHG~0.00%
Published-08 Aug, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Updates Change Assistant). Supported versions that are affected are 8.54 and 8.55. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where PeopleSoft Enterprise PeopleTools executes to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-peoplesoft_enterprise_peopletoolsPeopleSoft Enterprise PT PeopleTools
CVE-2017-10251
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-4.7||MEDIUM
EPSS-0.12% / 31.87%
||
7 Day CHG~0.00%
Published-08 Aug, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Test Framework). Supported versions that are affected are 8.54 and 8.55. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where PeopleSoft Enterprise PeopleTools executes to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-peoplesoft_enterprise_peopletoolsPeopleSoft Enterprise PT PeopleTools
CVE-2016-9593
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.15% / 35.65%
||
7 Day CHG~0.00%
Published-16 Apr, 2018 | 14:00
Updated-06 Aug, 2024 | 02:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

foreman-debug before version 1.15.0 is vulnerable to a flaw in foreman-debug's logging. An attacker with access to the foreman log file would be able to view passwords, allowing them to access those systems.

Action-Not Available
Vendor-unspecifiedRed Hat, Inc.The Foreman
Product-satelliteforemanforeman-debug
CWE ID-CWE-522
Insufficiently Protected Credentials
CWE ID-CWE-255
Not Available
CVE-2024-21210
Matching Score-6
Assigner-Oracle
ShareView Details
Matching Score-6
Assigner-Oracle
CVSS Score-3.7||LOW
EPSS-0.11% / 29.80%
||
7 Day CHG~0.00%
Published-15 Oct, 2024 | 19:52
Updated-18 Jun, 2025 | 20:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4 and 23. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-jrejdkOracle Java SE
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-24512
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-3.3||LOW
EPSS-0.05% / 13.75%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:53
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.Debian GNU/Linux
Product-solidfire_biosdebian_linuxfas\/aff_bioshci_compute_node_biosmicrocodeIntel(R) Processors
CWE ID-CWE-203
Observable Discrepancy
CVE-2017-9735
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.54% / 66.51%
||
7 Day CHG~0.00%
Published-16 Jun, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.

Action-Not Available
Vendor-n/aEclipse Foundation AISBLDebian GNU/LinuxOracle Corporation
Product-jettyretail_xstore_point_of_servicedebian_linuxcommunications_cloud_native_core_policyhospitality_guest_accessenterprise_manager_base_platformrest_data_servicesn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-1968
Matching Score-6
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-6
Assigner-OpenSSL Software Foundation
CVSS Score-3.7||LOW
EPSS-0.58% / 67.94%
||
7 Day CHG~0.00%
Published-09 Sep, 2020 | 13:50
Updated-16 Sep, 2024 | 19:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Raccoon attack

The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).

Action-Not Available
Vendor-OpenSSLOracle CorporationDebian GNU/LinuxCanonical Ltd.Fujitsu Limited
Product-ubuntu_linuxethernet_switch_es2-72peoplesoft_enterprise_peopletoolsm12-1jd_edwards_world_securityethernet_switch_tor-72_firmwareopensslm10-4s_firmwareethernet_switch_tor-72ethernet_switch_es2-64m10-4m10-4_firmwarem10-4sm12-1_firmwarem12-2sdebian_linuxethernet_switch_es1-24ethernet_switch_es2-72_firmwarem10-1_firmwareethernet_switch_es2-64_firmwarem10-1m12-2s_firmwarem12-2_firmwarem12-2ethernet_switch_es1-24_firmwareOpenSSL
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-20569
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.65% / 69.92%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 17:02
Updated-23 Sep, 2024 | 03:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft CorporationFedora ProjectDebian GNU/Linux
Product-ryzen_9_5900xepyc_7543epyc_9354pryzen_5_7645hxryzen_9_pro_7640hs_firmwareepyc_7713pepyc_7443epyc_7513ryzen_9_5900x_firmwareryzen_9_6900hx_firmwareryzen_9_5980hxryzen_7_pro_7730uryzen_7_7745hx_firmwareryzen_5_5600hsryzen_3_5300geepyc_7453ryzen_7_5825uryzen_7_5825u_firmwareepyc_9334_firmwareepyc_9454p_firmwareepyc_9454epyc_7413_firmwareepyc_9534_firmwareepyc_9754_firmwareryzen_7_5800x3d_firmwareepyc_7643_firmwareryzen_9_7950xepyc_9274f_firmwareryzen_threadripper_pro_5945wxryzen_5_7540uepyc_7373x_firmwareepyc_75f3_firmwareepyc_7473x_firmwareryzen_7_7700xepyc_9634_firmwarewindows_11_22h2ryzen_7_7700x_firmwareryzen_7_5700gryzen_9_7845hx_firmwareryzen_9_6900hxepyc_7573x_firmwareryzen_9_7945hx_firmwareryzen_5_7640hryzen_5_5500ryzen_3_5400uepyc_7713ryzen_5_5600_firmwareryzen_9_pro_5945windows_10_1607ryzen_5_7640h_firmwareryzen_5_7540u_firmwareryzen_5_5600x_firmwareryzen_9_5980hs_firmwareryzen_7_5800x3dryzen_7_7735uryzen_7_6800h_firmwareryzen_9_pro_7945ryzen_5_5600ge_firmwareepyc_9634epyc_9554p_firmwareryzen_5_5600h_firmwareryzen_7_5700ryzen_7_7745hxryzen_7_5800ryzen_7_pro_7745_firmwareryzen_5_7535uryzen_9_5950xryzen_9_7900x3d_firmwareryzen_5_5500_firmwareryzen_7_7840h_firmwareryzen_9_7845hxepyc_7443_firmwareryzen_7_6800hsepyc_7343epyc_7543_firmwarewindows_11_21h2ryzen_7_7736uepyc_9274fryzen_threadripper_pro_5945wx_firmwareepyc_9734epyc_9454pepyc_9734_firmwareepyc_7313p_firmwareryzen_5_5600uepyc_9124fedoraryzen_5_5600x3d_firmwareryzen_5_5600geryzen_7_7840u_firmwareepyc_9374f_firmwareryzen_9_6980hs_firmwareryzen_9_5900hs_firmwareepyc_72f3_firmwareepyc_9174fryzen_threadripper_pro_5975wx_firmwareryzen_7_5700_firmwareepyc_7413ryzen_9_7945hx3dryzen_5_7535hsepyc_9654_firmwareepyc_9384xryzen_9_7940h_firmwareepyc_7313ryzen_7_5700x_firmwarewindows_10_1507epyc_7663_firmwareryzen_3_7440u_firmwareryzen_3_pro_7330u_firmwareryzen_5_pro_5645_firmwareepyc_74f3_firmwareepyc_9654pryzen_3_5425uepyc_7763epyc_9454_firmwareryzen_7_5800_firmwareepyc_9374fryzen_9_5980hx_firmwareryzen_3_5100_firmwareepyc_7713p_firmwareryzen_3_7440uryzen_5_7645hx_firmwareepyc_9334ryzen_7_5800uryzen_9_7950x3d_firmwareryzen_5_5600g_firmwareryzen_5_pro_7645ryzen_5_5600ryzen_7_5800hepyc_7543pryzen_7_pro_7730u_firmwarewindows_10_1809ryzen_9_7950x_firmwareepyc_7453_firmwareryzen_7_5700uryzen_7_pro_7840hs_firmwareryzen_7_5700ge_firmwareepyc_9554windows_server_2019ryzen_7_6800hryzen_9_7900x_firmwareryzen_5_6600h_firmwareepyc_9254_firmwareryzen_5_pro_5645ryzen_7_7800x3d_firmwareryzen_7_7840uryzen_5_pro_7640hs_firmwareryzen_7_7735hs_firmwareepyc_7573xepyc_9684x_firmwarewindows_10_21h2epyc_9534ryzen_3_pro_7330uryzen_7_5800hsryzen_threadripper_pro_5955wx_firmwareryzen_5_5600xryzen_9_5900_firmwareryzen_threadripper_pro_5995wxepyc_7373xwindows_10_22h2epyc_7513_firmwareryzen_5_6600hryzen_9_pro_7640hsepyc_9384x_firmwareryzen_9_6980hxryzen_5_5560uryzen_9_7940hepyc_75f3debian_linuxepyc_9184x_firmwareryzen_7_5700u_firmwareryzen_9_7900xepyc_7343_firmwareryzen_5_6600hsepyc_9754s_firmwareryzen_7_pro_5845ryzen_7_7840hryzen_9_5900hsryzen_5_7640uwindows_server_2022epyc_9174f_firmwareepyc_7313pwindows_server_2008epyc_9124_firmwareryzen_9_7945hx3d_firmwareryzen_9_5980hsryzen_3_5125c_firmwareryzen_5_7600ryzen_5_5500u_firmwareryzen_7_5800h_firmwareryzen_9_6900hsryzen_threadripper_pro_5965wx_firmwareepyc_7713_firmwareepyc_9254epyc_9474f_firmwareepyc_7443p_firmwareryzen_7_5800xepyc_7773xryzen_7_7700_firmwareryzen_3_5300gryzen_5_7600x_firmwareryzen_9_5900ryzen_7_6800u_firmwareryzen_5_pro_7530uryzen_5_5600hs_firmwareryzen_7_pro_7745ryzen_threadripper_pro_5955wxryzen_9_6900hs_firmwareryzen_5_5500uryzen_3_5400u_firmwareryzen_7_6800hs_firmwareryzen_7_7800x3dryzen_5_pro_7640hsryzen_5_5600hryzen_5_7535u_firmwareryzen_3_5300u_firmwareryzen_7_6800uryzen_9_7945hxepyc_7763_firmwareryzen_3_5300uryzen_5_5600gryzen_9_pro_7945_firmwareryzen_3_5425u_firmwareryzen_7_7735hsryzen_9_7900x3dryzen_threadripper_pro_5975wxryzen_9_5900hx_firmwareepyc_9354ryzen_9_5950x_firmwareryzen_9_7900_firmwareryzen_5_7600xryzen_7_5800x_firmwareepyc_7543p_firmwareryzen_3_5300ge_firmwareryzen_5_5625uryzen_5_6600uryzen_7_5700geepyc_9554_firmwareryzen_3_5125cryzen_9_6980hx_firmwareryzen_7_7735u_firmwareryzen_7_pro_5845_firmwareryzen_5_5600u_firmwareepyc_7663ryzen_5_5600x3depyc_7773x_firmwareryzen_5_pro_7645_firmwareryzen_5_6600u_firmwareryzen_3_7335uryzen_7_5700g_firmwareryzen_5_7535hs_firmwareryzen_5_7600_firmwareepyc_7473xepyc_9754ryzen_7_pro_7840hsryzen_5_7500f_firmwareryzen_9_pro_5945_firmwareepyc_9554pepyc_9654windows_server_2016epyc_9684xwindows_server_2012ryzen_3_5300g_firmwareryzen_5_7500fryzen_7_5800u_firmwareryzen_7_7736u_firmwareepyc_9474fryzen_5_6600hs_firmwareepyc_9754sryzen_5_7640u_firmwareryzen_5_5560u_firmwareepyc_73f3_firmwareepyc_9654p_firmwareryzen_threadripper_pro_5965wxryzen_9_5900hxepyc_72f3epyc_7643ryzen_9_7950x3depyc_9354_firmwareryzen_7_7700ryzen_3_5100epyc_9354p_firmwareepyc_9224_firmwareepyc_7313_firmwareepyc_7443pryzen_9_7900epyc_9184xryzen_5_pro_7530u_firmwareryzen_7_5800hs_firmwareepyc_9224ryzen_threadripper_pro_5995wx_firmwareryzen_5_5625u_firmwareryzen_3_7335u_firmwareepyc_74f3ryzen_7_5700xryzen_9_6980hsepyc_73f3Ryzen™ PRO 3000 Series Desktop Processors Ryzen™ Threadripper™ 5000 Series ProcessorsAthlon™ 3000 Series Mobile Processors with Radeon™ GraphicsRyzen™ Threadripper™ 2000 Series Processors Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics4th Gen AMD EPYC™ Processors2nd Gen AMD EPYC™ ProcessorsRyzen™ PRO 5000 Series Desktop ProcessorsRyzen™ 3000 Series Desktop ProcessorsRyzen™ PRO 3000 Series Processors with Radeon™ Vega GraphicsAthlon™ 3000 Series Processors with Radeon™ Graphics Ryzen™ PRO 5000 Series ProcessorsRyzen™ 3000 Series Desktop Processors with Radeon™ GraphicsRyzen™ PRO 6000 Series ProcessorsRyzen™ 5000 Series Desktop Processors with Radeon™ Graphics3rd Gen AMD EPYC™ ProcessorsRyzen™ 7000 Series Processors 1st Gen AMD EPYC™ ProcessorsRyzen™ PRO 4000 Series Desktop ProcessorsRyzen™ Threadripper™ 3000 Series ProcessorsAthlon™ PRO 3000 Series Processors with Radeon™ Vega GraphicsRyzen™ 5000 Series Processors with Radeon™ GraphicsRyzen™ 7040 Series Processors with Radeon™ GraphicsRyzen™ 6000 Series Processors with Radeon™ GraphicsRyzen™ 7000 Series Processors with Radeon™ GraphicsRyzen™ 5000 Series Desktop Processors
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-1998
Matching Score-6
Assigner-Google LLC
ShareView Details
Matching Score-6
Assigner-Google LLC
CVSS Score-5.6||MEDIUM
EPSS-0.04% / 10.90%
||
7 Day CHG~0.00%
Published-21 Apr, 2023 | 14:51
Updated-13 Feb, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Spectre v2 SMT mitigations problem in Linux kernel

The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line. This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.

Action-Not Available
Vendor-Debian GNU/LinuxLinux Kernel Organization, Inc
Product-linux_kerneldebian_linuxLinux Kernel
CWE ID-CWE-1303
Non-Transparent Sharing of Microarchitectural Resources
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-0361
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.4||HIGH
EPSS-2.61% / 85.07%
||
7 Day CHG-0.41%
Published-15 Feb, 2023 | 00:00
Updated-19 Mar, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

Action-Not Available
Vendor-n/aFedora ProjectDebian GNU/LinuxGNURed Hat, Inc.NetApp, Inc.
Product-enterprise_linuxfedoragnutlsconverged_systems_advisor_agentactive_iq_unified_managerontap_select_deploy_administration_utilitydebian_linuxgnutls
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-16150
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.09% / 26.90%
||
7 Day CHG-0.01%
Published-02 Sep, 2020 | 00:00
Updated-04 Aug, 2024 | 13:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Lucky 13 timing side channel in mbedtls_ssl_decrypt_buf in library/ssl_msg.c in Trusted Firmware Mbed TLS through 2.23.0 allows an attacker to recover secret key information. This affects CBC mode because of a computed time difference based on a padding length.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectArm Limited
Product-mbed_tlsdebian_linuxfedoran/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2017-1000385
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-83.28% / 99.22%
||
7 Day CHG~0.00%
Published-12 Dec, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Erlang otp TLS server answers with different TLS alerts to different error types in the RSA PKCS #1 1.5 padding. This allows an attacker to decrypt content or sign messages with the server's private key (this is a variation of the Bleichenbacher attack).

Action-Not Available
Vendor-erlangn/aDebian GNU/Linux
Product-erlang\/otpdebian_linuxn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-2467
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.06% / 17.54%
||
7 Day CHG-0.00%
Published-25 Apr, 2024 | 16:45
Updated-06 Aug, 2025 | 15:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Perl-crypt-openssl-rsa: side-channel attack in pkcs#1 v1.5 padding mode (marvin attack)

A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Enterprise Linux 9Red Hat Enterprise Linux 7Red Hat Enterprise Linux 8Red Hat Enterprise Linux 6openssl
CWE ID-CWE-203
Observable Discrepancy
CVE-2022-40982
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.42% / 61.03%
||
7 Day CHG+0.03%
Published-11 Aug, 2023 | 02:37
Updated-13 Feb, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aRed Hat, Inc.Xen ProjectNetApp, Inc.Intel CorporationDebian GNU/Linux
Product-xeon_d-2796texeon_w-1350_firmwarecore_i7-11850he_firmwarecore_i5-1035g7core_i3-8350k_firmwarecore_i3-9350k_firmwareceleron_5305ucore_i9-9990xe_firmwarepentium_gold_g6600_firmwarexeon_e-2314xeon_w-2125core_i9-10940xpentium_gold_g6400t_firmwarexeon_gold_5217_firmwarecore_i5-11600_firmwarexeon_d-2163it_firmwarecore_i7-1060g7_firmwarecore_i7-9700xeon_gold_6240_firmwarexeon_gold_6234core_i9-9900kfxeon_w-1250p_firmwarepentium_gold_g5400txeon_gold_6238rcore_i5-1035g4xeon_w-2255core_i5-10400hcore_i7-10700k_firmwarexeon_w-11555mlecore_i5-9600t_firmwarecore_i9-9940x_firmwarecore_i3-10100yxeon_gold_6248_firmwarecore_i5-10400tcore_i7-11370hcore_i5-10310ucore_i9-7920xcore_i7-7600ucore_i5-9400f_firmwarexeon_e-2224core_i7-10700t_firmwarexeon_gold_5218core_i3-7100ecore_i5-11600tcore_i9-7940x_firmwarecore_i5-8269u_firmwarexeon_e3-1505l_v6xeon_e-2278gexeon_platinum_8380hxeon_gold_5220r_firmwarexeon_d-2173it_firmwarexeon_w-2245pentium_6405u_firmwarexeon_d-1746tercore_i3-7120t_firmwarecore_i5-10400all_flash_fabric-attached_storage_8700pentium_gold_g6605_firmwareceleron_g5920core_i7-10710u_firmwarecore_i9-9940xcore_i5-11600xeon_gold_6240celeron_5305u_firmwareall_flash_fabric-attached_storage_9500pentium_gold_g6405t_firmwarecore_i5-8600core_i5-9400_firmwarexeon_d-2177nt_firmwareceleron_5205ucore_i7-8500y_firmwarecore_i7-7740x_firmwarecore_i7-1060g7xeon_gold_5220s_firmwarecore_i9-10900core_i5-11600k_firmwarexeon_e-2374g_firmwareceleron_g4900tcore_i3-10100txeon_w-1390t_firmwarexeon_gold_5220rxeon_d-2733nt_firmwarecore_i9-10900kxeon_e-2386gcore_i3-10325_firmwarexeon_d-2146ntxeon_gold_6230_firmwarecore_i5-8600kcore_i9-10900fcore_i7-8700k_firmwarecore_i5-11500t_firmwarexeon_w-2223_firmwarecore_i7-8750hcore_i3-10105t_firmwarecore_i9-9960x_firmwarexeon_e-2226ge_firmwarecore_i3-7100u_firmwarecore_i5-10400_firmwarecore_i3-1115gre_firmwarexeon_d-2166ntxeon_e3-1270_v6xeon_d-1732te_firmwarecore_i7-1180g7_firmwarecore_i3-1125g4xeon_gold_6328h_firmwarexeon_silver_4216xeon_gold_6230xeon_w-2195core_i7-7820eq_firmwarexeon_e-2276gxeon_w-1290p_firmwarecore_i3-1000g4xeon_gold_5317core_i5-7267u_firmwarexeon_d-2183itxeon_gold_6348h_firmwarecore_i3-7100core_i7-8809gxeon_gold_6246r_firmwarecore_i5-10400h_firmwarexeon_e3-1230_v6_firmwarecore_i5-10500_firmwarepentium_gold_g6505core_i5-7267uceleron_g5900t_firmwarexeon_gold_5320txeon_silver_4208core_i5-9400txeon_w-2123xeon_gold_5220score_i5-8300hxeon_platinum_9282core_i5-8600t_firmwarexeon_e3-1220_v6_firmwarecore_i3-10110ycore_i5-10600kfxeon_platinum_9242_firmwarexeon_e3-1535m_v6_firmwarexeon_gold_6240r_firmwarexeon_silver_4210xeon_platinum_8256_firmwarecore_i5-11600kfcore_i7-9800xcore_i7-11700kfpentium_gold_g5500tcore_i7-10870hxeon_w-11555mre_firmwarecore_i5-8600_firmwarexeon_silver_4215r_firmwarecore_i5-9600kf_firmwarexeon_silver_4310_firmwareceleron_g4920xeon_e-2274gcore_i5-11500tcore_i5-9500xeon_e-2278gelcore_i7-7740xxeon_silver_4310tcore_i5-1130g7_firmwarexeon_e3-1280_v6_firmwarexeon_gold_6230t_firmwaredebian_linuxcore_i5-8300h_firmwarexeon_silver_4208_firmwarexeon_platinum_8268xeon_e-2136_firmwareall_flash_fabric-attached_storage_c400core_i7-8565ucore_i9-9980xe_firmwarexeon_e-2274g_firmwarecore_i3-10300_firmwarecore_i7-7560ucore_i9-11900fcore_i5-8259ucore_i3-8100t_firmwareceleron_g5900txeon_w-1250_firmwarecore_i7-11600hpentium_gold_g5500xeon_w-3265m_firmwarexeon_w-11555mle_firmwarecore_i7-8850h_firmwarexeon_e-2336core_i7-9700kf_firmwarecore_i9-7900x_firmwarecore_i3-10105pentium_gold_g6405_firmwarexeon_gold_5218_firmwarecore_i5-7600tpentium_gold_g6500_firmwarecore_i9-10900k_firmwarexeon_w-1270_firmwarexeon_e-2224gxeon_w-2135xeon_silver_4316_firmwarecore_i7-1185g7_firmwarecore_i5-11320hxeon_e-2226gecore_i3-10300t_firmwarepentium_6405upentium_gold_g6500core_i3-7167u_firmwarecore_i7-8559u_firmwarexeon_gold_5220t_firmwarecore_i9-10920x_firmwarecore_i7-8086k_firmwarecore_i7-10610uxeon_gold_5220_firmwarecore_i5-1035g1_firmwarecore_i7-8665u_firmwareall_flash_fabric-attached_storage_c250core_i7-8500ycore_i9-9900txeon_gold_6208u_firmwarecore_i3-7310t_firmwarexeon_platinum_8360hxeon_w-1390pxeon_gold_6250_firmwarecore_i5-11300h_firmwarecore_i3-8300t_firmwarecore_i5-7400_firmwarecore_i3-8109u_firmwarexeon_gold_6254_firmwarecore_i7-9700k_firmwarecore_i9-10980xe_firmwarexeon_e-2288g_firmwarexeon_silver_4310core_i5-1145g7e_firmwarexeon_gold_6258r_firmwarecore_i3-10300txeon_silver_4314_firmwarecore_i3-7101ecore_i3-8100b_firmwarecore_i9-7900xcore_i9-8950hk_firmwarexeon_gold_6209uxeon_w-3223pentium_gold_g6600xeon_w-2235_firmwarecore_i5-8265uxeon_platinum_8376h_firmwarepentium_gold_g6605celeron_g5925pentium_gold_g5400t_firmwarexeon_e-2286g_firmwarexeon_d-2183it_firmwarecore_i3-8350kcore_i7-10700_firmwarecore_i5-7500txeon_e3-1505m_v6core_i3-9100core_i5-9600k_firmwarexeon_platinum_9282_firmwarexeon_e-2224g_firmwarepentium_gold_g5600xeon_gold_5220tcore_i5-1145gre_firmwarexeon_platinum_8276lcore_i7-7700kcore_i7-8705gxeon_platinum_9222xeon_gold_6230tcore_i7-7660ucore_i7-8706gxeon_w-3225xeon_w-1370core_i7-8700t_firmwarecore_i7-1185grecore_i7-11375hxeon_e3-1240_v6core_i7-8700core_i5-10400fcore_i5-8259u_firmwarexeon_w-2155_firmwarecore_i7-1068g7xeon_platinum_8380h_firmwarecore_i7-8705g_firmwarexeon_d-1746ter_firmwarecore_i3-7100tcore_i7-7700tcore_i7-10700txeon_w-3225_firmwarecore_i5-10210uxeon_w-2295core_i5-7260u_firmwarecore_i5-7600k_firmwarecore_i5-8257ucore_i7-8700kpentium_gold_g6405tcore_i5-1155g7_firmwarexeon_silver_4316xeon_e3-1270_v6_firmwarecore_i5-7442eqcore_i7-10510u_firmwarexeon_gold_5215xeon_d-2143itxeon_e-2226g_firmwarecore_i3-10100_firmwarexeon_gold_6244_firmwarexeon_e3-1285_v6core_i5-10505xeon_d-2161i_firmwarecore_i5-1030g7xeon_e3-1225_v6core_i5-7442eq_firmwarecore_i7-8569u_firmwarexeon_e-2144g_firmwarexeon_bronze_3206r_firmwarexeon_silver_4215rcore_i7-1185g7e_firmwarecore_i3-10110ucore_i5-10600kf_firmwarecore_i7-11800hxeon_gold_6330xeon_silver_4210txeon_gold_6212u_firmwarecore_i5-10310u_firmwarexeon_gold_6212uxeon_silver_4310t_firmwarecore_i9-7980xexeon_gold_6240l_firmwarexeon_d-2123it_firmwareceleron_g4900t_firmwarecore_i3-10105fcore_i3-8100hcore_i3-7310tcore_i9-11950hxeon_e-2386g_firmwarecore_i5-10300hxeon_gold_6238lxeon_platinum_8353hxeon_w-11865mlecore_i3-1005g1_firmwarecore_i5-7300uxeon_e3-1505l_v6_firmwarecore_i5-8500txeon_w-3265mcore_i5-7500xeon_gold_5320hxeon_platinum_8260y_firmwarepentium_gold_g6500tcore_i5-11500h_firmwarecore_i9-11900kcore_i5-8350u_firmwarexeon_d-2796te_firmwarexeon_gold_6338txeon_gold_6240y_firmwarecore_i9-10850kpentium_gold_g5600_firmwareceleron_g5905_firmwarexeon_e-2314_firmwarecore_i9-9900ks_firmwarepentium_gold_g6400tcore_i5-8400tcore_i3-9300_firmwarexeon_d-2145nt_firmwarexeon_w-1270pcore_i7-10700core_i7-11600h_firmwarecore_i9-10920xxeon_d-2712txeon_w-1290_firmwarecore_i7-10750h_firmwareceleron_g4920_firmwarecore_i3-10105tcore_i5-11400tcore_i5-11300hcore_i9-11900kfcore_i3-10325core_i3-7101te_firmwarecore_i7-10875hxeon_platinum_8356hpentium_gold_g5400_firmwarecore_i9-11900k_firmwarecore_i3-10100core_i5-8200y_firmwarecore_i7-8550u_firmwarecore_i5-1035g7_firmwarecore_i7-10700f_firmwaremicrocodecore_i5-7640x_firmwarexeon_gold_5318h_firmwarexeon_silver_4214y_firmwarecore_i5-9400core_i3-8100txeon_d-2733ntxeon_platinum_8260core_i3-7120txeon_bronze_3204_firmwarexeon_gold_5320h_firmwarexeon_d-2142it_firmwarecore_i5-7500t_firmwarecore_i7-8650uxeon_bronze_3204xeon_silver_4314core_i5-1145grexeon_gold_6246rxeon_w-11865mrexeon_gold_5217xeon_e-2234_firmwarecore_i3-7320t_firmwarecore_i5-11260h_firmwarexeon_gold_5222_firmwarexeon_w-3245core_i3-10110y_firmwarecore_i5-1035g4_firmwarecore_i5-8500bcore_i7-1185g7core_i7-1195g7core_i5-8269uxeon_e-2288gcore_i7-8709g_firmwarecore_i7-11700_firmwarexeon_gold_6240yxeon_w-1270p_firmwarecore_i5-11500he_firmwarexeon_w-2195_firmwarexeon_gold_6208ucore_i5-8279u_firmwarecore_i5-1145g7_firmwarecore_i5-9500f_firmwarecore_i5-10600t_firmwarexeon_gold_6252n_firmwarecore_i5-10210y_firmwarecore_i3-7350kxeon_w-2265_firmwarexeon_gold_6230r_firmwarecore_i5-8250ucore_i3-10305celeron_g5900_firmwareceleron_g5920_firmwarecore_i7-9700txeon_w-1370p_firmwarecore_i7-7820eqxeon_gold_6252nxeon_gold_6244xeon_w-1290t_firmwarexeon_gold_6330_firmwarecore_i7-8650u_firmwarexeon_w-3245_firmwarexeon_gold_6226_firmwarecore_i3-9350kfxeon_w-1370pcore_i9-9900k_firmwarecore_i7-7700k_firmwarexeon_w-2135_firmwarecore_i3-1115g4e_firmwarecore_i5-1130g7xeon_platinum_8354h_firmwarexeon_platinum_8256xeon_gold_6238l_firmwarecore_i9-9900xxeon_gold_5318hxeon_w-2125_firmwarecore_i5-8365u_firmwarecore_i5-10500hxeon_w-2175_firmwarexeon_e3-1275_v6core_i9-9990xecore_i3-9300txeon_gold_6262v_firmwarexeon_e-2278gxeon_platinum_8260ycore_i3-8100h_firmwarecore_i3-1115g4_firmwarexeon_w-1370_firmwarecore_i9-9980xecore_i7-10875h_firmwarexeon_d-2142itcore_i5-10500t_firmwarexeon_silver_4210t_firmwarecore_i5-8265u_firmwarexeon_e-2374gcore_i9-10900x_firmwarexeon_e3-1505m_v6_firmwarecore_i5-10600all_flash_fabric-attached_storage_8300xeon_platinum_8276core_i3-1115g4ecore_i3-9350kxeon_w-1350core_i5-8500_firmwarexeon_w-11155mle_firmwarecore_i9-11980hk_firmwarecore_i5-1145g7ecore_i7-7700t_firmwarexeon_gold_5320t_firmwarexeon_w-3275_firmwarecore_i5-11500hecore_i3-10320core_i5-8200yxeon_w-2275celeron_g4900_firmwarexeon_e-2144gxeon_e3-1245_v6_firmwarexeon_w-1350pcore_i9-10940x_firmwarexeon_gold_6230rcore_i7-8569uall_flash_fabric-attached_storage_500fxencore_i7-7700_firmwarecore_i5-10500txeon_d-1712tr_firmwarexeon_platinum_8353h_firmwarecore_i7-1185g7exeon_gold_5218rxeon_gold_5318yxeon_bronze_3206rxeon_gold_6226rcore_i3-8100bcore_i5-9600tcore_i3-7101e_firmwarecore_i3-7020u_firmwarecore_i3-9320core_i5-11400xeon_d-2775tecore_i7-1068g7_firmwarecore_i7-1065g7core_i9-10980hk_firmwarecore_i3-8130uxeon_platinum_8276l_firmwarexeon_w-10885m_firmwarecore_i3-9100_firmwarexeon_w-3245mcore_i7-11370h_firmwarexeon_e-2378gcore_i7-1160g7core_i3-10105f_firmwarexeon_e3-1501l_v6_firmwarexeon_e-2124g_firmwarecore_i7-9700kfcore_i5-8305g_firmwarecore_i5-7500_firmwarecore_i7-10870h_firmwarecore_i5-8400hcore_i3-1110g4_firmwarexeon_platinum_8360hl_firmwarecore_i3-1110g4xeon_gold_6326xeon_gold_5317_firmwarecore_i5-10200hxeon_e-2226gxeon_d-2775te_firmwarecore_i3-10100f_firmwarecore_i3-8145ucore_i7-11700xeon_gold_5318y_firmwarecore_i5-9600_firmwarecore_i3-7020uxeon_platinum_8268_firmwarexeon_e3-1501l_v6xeon_gold_6262vcore_i3-8109ucore_i9-11900tcore_i7-9700f_firmwarecore_i7-1195g7_firmwarecore_i3-7100e_firmwarecore_i3-7300xeon_e-2378core_i7-11850hcore_i9-11900xeon_e-2134_firmwarecore_i5-10600_firmwarexeon_platinum_8376hxeon_silver_4210_firmwarecore_i7-7600u_firmwarecore_i5-8400bcore_i3-9300t_firmwarecore_i7-10610u_firmwarexeon_gold_6248rcore_i5-9500_firmwarexeon_silver_4214r_firmwarexeon_platinum_8276_firmwarecore_i7-11850hexeon_w-1290tcore_i5-8400h_firmwarexeon_w-11155mre_firmwarepentium_gold_g6505tcore_i7-9700fcore_i9-10980hkcore_i9-9820x_firmwarexeon_e-2136pentium_gold_6405u_firmwarecore_i7-10510ucore_i7-9700kcore_i5-10400t_firmwarecore_i3-8100xeon_w-2265xeon_gold_5215_firmwarecore_i9-11900hxeon_w-10855mxeon_w-2245_firmwarexeon_w-1390p_firmwarexeon_w-10855m_firmwarecore_i3-11100hexeon_d-1712trcore_i3-7300_firmwarexeon_w-11555mrecore_i7-11700k_firmwarecore_i5-7287u_firmwarecore_i7-7700xeon_d-2752ter_firmwarepentium_gold_g6505t_firmwarecore_i3-7102exeon_platinum_8280l_firmwareceleron_5205u_firmwarexeon_e-2124_firmwarecore_i7-8700_firmwarexeon_e3-1240_v6_firmwarecore_i7-1160g7_firmwarexeon_e3-1501m_v6xeon_gold_6250lcore_i5-8365uxeon_gold_6210uxeon_d-2187ntcore_i5-9600kfxeon_d-1732tecore_i5-8500b_firmwareall_flash_fabric-attached_storage_a250core_i5-7600core_i9-7940xxeon_platinum_8380hlxeon_w-3265_firmwarecore_i9-9960xcore_i7-10700fcore_i5-1030g4_firmwarecore_i7-8557u_firmwarecore_i5-1145g7core_i7-10750hcore_i3-7120_firmwarexeon_platinum_8253xeon_w-3235_firmwarecore_i3-8300xeon_w-1390xeon_gold_6242r_firmwarexeon_e-2186gcore_i5-7400txeon_e-2174gcore_i5-7260ucore_i7-8700bxeon_w-2145_firmwarexeon_d-2145ntxeon_gold_6238xeon_w-1250pcore_i5-11400t_firmwarecore_i3-1115g4core_i7-11700f_firmwarecore_i7-7800xxeon_e3-1275_v6_firmwarexeon_e-2334_firmwarecore_i5-10210yxeon_e3-1225_v6_firmwarecore_i5-1140g7core_i3-8100f_firmwarecore_i9-9900kf_firmwarexeon_w-3275mcore_i5-9500fcore_i5-10210u_firmwarecore_i5-10600txeon_e-2356gcore_i3-7300t_firmwareall_flash_fabric-attached_storage_c800core_i9-9900kscore_i5-10500h_firmwarecore_i5-9600xeon_gold_5315ypentium_gold_g6500t_firmwarecore_i5-7300u_firmwarecore_i3-9100fxeon_platinum_8354hcore_i9-11900_firmwarexeon_e-2224_firmwarexeon_gold_6256_firmwarepentium_gold_6405ucore_i7-10700kceleron_g5925_firmwarecore_i3-9320_firmwarecore_i5-8400b_firmwarexeon_e3-1280_v6core_i7-9800x_firmwarecore_i3-8100_firmwarecore_i7-11700kxeon_silver_4214rxeon_d-1715ter_firmwarexeon_e-2124core_i5-7287ucore_i7-10710ucore_i7-10700kfxeon_d-2141ixeon_w-1350p_firmwarecore_i5-8500t_firmwarecore_i3-11100he_firmwarexeon_e-2276g_firmwarexeon_gold_6230n_firmwarexeon_gold_5222core_i7-8706g_firmwareall_flash_fabric-attached_storage_a800xeon_w-2133_firmwarecore_i9-11900t_firmwarexeon_platinum_8360hlxeon_e3-1535m_v6core_i5-7400t_firmwarexeon_platinum_9221core_i9-9900core_i7-10510y_firmwarecore_i7-11390h_firmwarexeon_w-11865mle_firmwarexeon_e-2146g_firmwareceleron_g5905txeon_e-2388gcore_i7-7800x_firmwarexeon_w-2225_firmwarexeon_platinum_8360h_firmwarexeon_d-2752terxeon_gold_6238t_firmwarecore_i3-7100_firmwarecore_i9-9820xcore_i3-1120g4_firmwarexeon_w-2155xeon_e-2278g_firmwarecore_i7-8550ucore_i3-9100txeon_w-2145core_i5-8310y_firmwarecore_i9-9900x_firmwarecore_i7-11375h_firmwarecore_i9-10900_firmwarexeon_platinum_9222_firmwarexeon_platinum_8253_firmwarecore_i5-10505_firmwarecore_i3-7167uxeon_e-2176g_firmwarecore_i7-7567uxeon_w-2295_firmwarecore_i3-8145u_firmwareenterprise_linuxxeon_silver_4214xeon_gold_5315y_firmwarecore_i5-11260hcore_i3-7340_firmwarexeon_d-2161ixeon_silver_4210rcore_i5-10300h_firmwarexeon_d-2141i_firmwarecore_i7-7660u_firmwarecore_i7-11850h_firmwarecore_i5-8210yxeon_gold_5218bcore_i7-8750h_firmwarecore_i9-11900f_firmwarecore_i5-10200h_firmwarecore_i3-7300txeon_silver_4216_firmwarecore_i7-11700t_firmwarecore_i3-9100f_firmwarexeon_e-2246g_firmwarecore_i7-1185gre_firmwarepentium_gold_g6400_firmwarexeon_e-2174g_firmwarexeon_d-2187nt_firmwarecore_i5-11500core_i5-1135g7core_i5-8500core_i5-7600_firmwarexeon_w-3275m_firmwarecore_i7-10700kf_firmwarexeon_w-3235xeon_gold_6222v_firmwarexeon_e-2336_firmwarexeon_platinum_8260_firmwarexeon_gold_6226r_firmwarexeon_w-2225pentium_gold_g6405core_i7-7560u_firmwarexeon_w-2133core_i3-10305txeon_gold_6328hlcore_i9-9900t_firmwarepentium_gold_g5500_firmwarexeon_w-2223xeon_silver_4210r_firmwarecore_i9-7920x_firmwarecore_i7-8665ucore_i3-8300tall_flash_fabric-attached_storage_a900all_flash_fabric-attached_storage_a400core_i7-11700fxeon_e-2236core_i7-10850hxeon_e-2236_firmwarexeon_gold_6338t_firmwarecore_i3-1125g4_firmwarexeon_e-2126g_firmwarexeon_gold_6238_firmwarecore_i7-11800h_firmwareceleron_g5905core_i9-7960x_firmwarecore_i5-8400core_i3-10300xeon_gold_6246core_i5-1140g7_firmwarecore_i7-8086kpentium_gold_g5500t_firmwarexeon_w-3245m_firmwarecore_i9-11900kf_firmwarecore_i5-8600k_firmwarexeon_e3-1285_v6_firmwarexeon_e-2134xeon_d-2163itxeon_w-1390txeon_w-1270core_i5-10310y_firmwarecore_i3-1000g1core_i7-10510yxeon_gold_5215lxeon_silver_4215_firmwarecore_i5-7360u_firmwarexeon_w-2275_firmwarecore_i5-8210y_firmwarecore_i9-7960xcore_i5-9600kcore_i7-7820xceleron_g5905t_firmwarecore_i3-10305t_firmwarecore_i9-10900f_firmwarecore_i5-1155g7core_i3-9100t_firmwarecore_i5-11320h_firmwarexeon_gold_6250l_firmwarexeon_d-1715terxeon_gold_6258rceleron_g5900xeon_gold_6240lxeon_gold_6250core_i5-8350uxeon_gold_6348hxeon_w-3223_firmwarexeon_d-2173itcore_i7-11700txeon_d-2123itxeon_e-2246gcore_i3-10100y_firmwarecore_i5-11400h_firmwarexeon_gold_5218n_firmwarexeon_w-2255_firmwarexeon_gold_6330h_firmwarecore_i7-8700b_firmwarexeon_gold_5218tcore_i9-8950hkxeon_gold_6242_firmwarexeon_e-2104g_firmwarexeon_w-2123_firmwarexeon_platinum_8356h_firmwarexeon_e3-1501m_v6_firmwarexeon_e-2334core_i3-7350k_firmwarexeon_d-2166nt_firmwarecore_i9-10885hxeon_d-2712t_firmwarexeon_gold_6328hl_firmwarecore_i3-9300xeon_gold_5218r_firmwarexeon_e-2244gcore_i9-9900kcore_i3-9350kf_firmwarexeon_e-2176gxeon_e-2324gcore_i7-8709gcore_i3-7120core_i9-9920xcore_m3-8100y_firmwarexeon_e-2104gcore_i7-8557uxeon_silver_4214_firmwarexeon_e-2278ge_firmwarecore_i5-9500tcore_i5-8260u_firmwarecore_i7-8700tcore_i3-10305_firmwarexeon_platinum_9242xeon_d-2143it_firmwarexeon_d-1735trcore_i5-7400xeon_platinum_8280lcore_i5-11400fcore_i5-11500_firmwarecore_i3-7102e_firmwarexeon_platinum_8280_firmwarecore_i3-7320core_i7-1180g7xeon_e-2378g_firmwarexeon_w-1390_firmwarexeon_e3-1230_v6core_i9-11950h_firmwarecore_i5-1035g1xeon_gold_6230nxeon_w-3265xeon_gold_5218ncore_i7-8565u_firmwarexeon_gold_6246_firmwarecore_i5-11400f_firmwarexeon_platinum_9221_firmwarexeon_e-2186g_firmwarexeon_gold_6248r_firmwarexeon_e-2124gcore_i5-7600t_firmwarexeon_gold_6326_firmwarecore_i7-1165g7core_i5-11600kcore_i9-7980xe_firmwarecore_i7-11390hcore_i9-11900h_firmwarecore_i5-1030g4xeon_gold_5220xeon_e-2234core_i5-10500xeon_gold_6254xeon_silver_4209t_firmwarexeon_e-2356g_firmwarecore_i5-9400fcore_i7-9700t_firmwarecore_i3-7320tcore_i5-7440eqxeon_gold_5215l_firmwarexeon_w-1250xeon_platinum_8376hl_firmwarecore_i7-7820x_firmwarecore_i5-8279ucore_i3-8130u_firmwarexeon_gold_6336ycore_i3-7100upentium_gold_g6505_firmwarecore_i3-7101tecore_i5-11400hxeon_w-3275xeon_d-1735tr_firmwarecore_i5-7600kxeon_platinum_8270_firmwarecore_i3-1000g4_firmwarexeon_e-2126gxeon_silver_4209txeon_gold_6234_firmwarexeon_gold_6210u_firmwarecore_i3-7100t_firmwarecore_i5-11400_firmwarecore_i5-7360ucore_i3-8100fcore_i3-7340xeon_gold_5218t_firmwarexeon_gold_6248core_i9-11980hkcore_i5-10600kxeon_platinum_8260l_firmwarexeon_e3-1220_v6xeon_e-2388g_firmwarexeon_platinum_8280core_m3-8100ycore_i7-1165g7_firmwarexeon_platinum_8380hl_firmwarecore_i9-10900kfxeon_w-11155mrecore_i5-8250u_firmwarecore_i7-7567u_firmwarecore_i3-7320_firmwarecore_i5-8400_firmwarexeon_gold_6336y_firmwarecore_i3-1120g4xeon_d-2146nt_firmwarecore_i5-7440eq_firmwarecore_i3-1000g1_firmwarecore_i5-10600k_firmwarecore_i5-10310yxeon_gold_6330hxeon_w-1290pcore_i5-8400t_firmwarexeon_gold_5218b_firmwarexeon_e-2286gxeon_gold_6222vxeon_w-11155mlexeon_platinum_8376hlxeon_gold_6242core_i5-8260ucore_i3-10100t_firmwarecore_i9-10900t_firmwarecore_i7-10810u_firmwarecore_i5-11600kf_firmwarexeon_e-2244g_firmwarecore_i7-10810ucore_i7-11700kf_firmwarecore_i5-10400f_firmwarexeon_platinum_8270core_i3-10105_firmwarexeon_gold_6242rxeon_e3-1245_v6xeon_silver_4215core_i3-1115grexeon_w-2235xeon_e-2378_firmwarecore_i7-8850hcore_i5-11500hcore_i3-10100fcore_i3-8300_firmwarecore_i9-9900_firmwarecore_i7-1065g7_firmwarecore_i5-1135g7_firmwarecore_i9-10900xxeon_gold_6238txeon_silver_4214ycore_i5-8257u_firmwarecore_i9-10980xecore_i9-10900kf_firmwarecore_i5-11600t_firmwarecore_i9-10850k_firmwarexeon_w-1290all_flash_fabric-attached_storage_2820core_i7-8809g_firmwarecore_i9-10885h_firmwarexeon_gold_6240rxeon_w-10885mceleron_g4900core_i5-1030g7_firmwarecore_i9-10900tpentium_gold_g5400core_i5-8310ycore_i5-7640xcore_i3-10110u_firmwarexeon_e-2324g_firmwarexeon_e-2278gel_firmwarexeon_gold_6226xeon_gold_6256xeon_gold_6238r_firmwarecore_i5-9500t_firmwarexeon_gold_6252core_i3-10320_firmwarecore_i3-1005g1xeon_w-11865mre_firmwarexeon_gold_6328hxeon_gold_6252_firmwarexeon_gold_6209u_firmwarecore_i9-9920x_firmwarecore_i5-8600tcore_i5-8305gxeon_platinum_8260lcore_i7-10850h_firmwarecore_i5-9400t_firmwarecore_i7-8559uxeon_e-2146gcore_i7-9700_firmwarexeon_d-2177ntpentium_gold_g6400xeon_w-2175Intel(R) Processors
CWE ID-CWE-1342
Information Exposure through Microarchitectural State after Transient Execution
CWE ID-CWE-203
Observable Discrepancy
CVE-2016-6489
Matching Score-6
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-6
Assigner-Debian GNU/Linux
CVSS Score-7.5||HIGH
EPSS-2.10% / 83.37%
||
7 Day CHG~0.00%
Published-14 Apr, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack.

Action-Not Available
Vendor-nettle_projectn/aRed Hat, Inc.Canonical Ltd.
Product-enterprise_linux_desktopnettleenterprise_linux_workstationenterprise_linux_serverenterprise_linux_hpc_nodeubuntu_linuxn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-21251
Matching Score-6
Assigner-Oracle
ShareView Details
Matching Score-6
Assigner-Oracle
CVSS Score-3.1||LOW
EPSS-0.09% / 26.73%
||
7 Day CHG~0.00%
Published-15 Oct, 2024 | 19:52
Updated-31 Oct, 2024 | 13:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.24, 21.3-21.15 and 23.4-23.5. Difficult to exploit vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java VM accessible data. CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-database_serverOracle Database Server
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-21208
Matching Score-6
Assigner-Oracle
ShareView Details
Matching Score-6
Assigner-Oracle
CVSS Score-3.7||LOW
EPSS-0.21% / 43.71%
||
7 Day CHG~0.00%
Published-15 Oct, 2024 | 19:52
Updated-18 Jun, 2025 | 20:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and 21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-Oracle Corporation
Product-graalvm_for_jdkgraalvmjrejdkOracle Java SE
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-21206
Matching Score-6
Assigner-Oracle
ShareView Details
Matching Score-6
Assigner-Oracle
CVSS Score-4.3||MEDIUM
EPSS-0.12% / 32.29%
||
7 Day CHG~0.00%
Published-15 Oct, 2024 | 19:52
Updated-23 Jun, 2025 | 15:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle Enterprise Command Center Framework product of Oracle E-Business Suite (component: Diagnostics). Supported versions that are affected are ECC:11-13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Command Center Framework. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Enterprise Command Center Framework accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-enterprise_command_center_frameworkOracle Enterprise Command Center Framework
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-21233
Matching Score-6
Assigner-Oracle
ShareView Details
Matching Score-6
Assigner-Oracle
CVSS Score-4.3||MEDIUM
EPSS-0.13% / 33.21%
||
7 Day CHG~0.00%
Published-15 Oct, 2024 | 19:52
Updated-31 Oct, 2024 | 13:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle Database Core component of Oracle Database Server. Supported versions that are affected are 19.3-19.24, 21.3-21.15 and 23.4-23.5. Easily exploitable vulnerability allows low privileged attacker having Create Session privilege with network access via Oracle Net to compromise Oracle Database Core. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database Core accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-database_serverOracle Database Server
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-12402
Matching Score-6
Assigner-Mozilla Corporation
ShareView Details
Matching Score-6
Assigner-Mozilla Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 5.31%
||
7 Day CHG~0.00%
Published-09 Jul, 2020 | 14:53
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.

Action-Not Available
Vendor-Debian GNU/LinuxopenSUSEFedora ProjectMozilla Corporation
Product-firefoxdebian_linuxfedoraleapFirefox
CWE ID-CWE-203
Observable Discrepancy
CVE-2016-0762
Matching Score-6
Assigner-Apache Software Foundation
ShareView Details
Matching Score-6
Assigner-Apache Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-0.92% / 75.01%
||
7 Day CHG~0.00%
Published-10 Aug, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.

Action-Not Available
Vendor-Debian GNU/LinuxCanonical Ltd.Red Hat, Inc.The Apache Software FoundationOracle CorporationNetApp, Inc.
Product-enterprise_linux_desktopcommunications_diameter_signaling_routertekelec_platform_distributionenterprise_linux_server_tusenterprise_linux_eusenterprise_linux_workstationtomcatoncommand_shiftdebian_linuxenterprise_linux_serversnap_creator_frameworkubuntu_linuxenterprise_linux_server_ausjboss_enterprise_web_serveroncommand_insightApache Tomcat
CWE ID-CWE-203
Observable Discrepancy
CVE-2015-8313
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-1.06% / 76.78%
||
7 Day CHG~0.00%
Published-20 Dec, 2019 | 13:10
Updated-06 Aug, 2024 | 08:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GnuTLS incorrectly validates the first byte of padding in CBC modes

Action-Not Available
Vendor-n/aDebian GNU/LinuxGNU
Product-debian_linuxgnutlsn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-5388
Matching Score-6
Assigner-Mozilla Corporation
ShareView Details
Matching Score-6
Assigner-Mozilla Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.17% / 39.12%
||
7 Day CHG-0.01%
Published-19 Mar, 2024 | 12:02
Updated-09 Jun, 2025 | 17:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9.

Action-Not Available
Vendor-Debian GNU/LinuxMozilla Corporation
Product-debian_linuxthunderbirdfirefoxFirefox ESRFirefoxThunderbird
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-0914
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.23% / 45.56%
||
7 Day CHG~0.00%
Published-31 Jan, 2024 | 04:53
Updated-24 Nov, 2024 | 12:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Opencryptoki: timing side-channel in handling of rsa pkcs#1 v1.5 padded ciphertexts (marvin)

A timing side-channel vulnerability has been discovered in the opencryptoki package while processing RSA PKCS#1 v1.5 padded ciphertexts. This flaw could potentially enable unauthorized RSA ciphertext decryption or signing, even without access to the corresponding private key.

Action-Not Available
Vendor-opencryptoki_projectRed Hat, Inc.
Product-enterprise_linuxopencryptokiRed Hat Enterprise Linux 8.6 Extended Update SupportRed Hat Enterprise Linux 9.2 Extended Update SupportRed Hat Enterprise Linux 7Red Hat Enterprise Linux 9Red Hat Enterprise Linux 6Red Hat Enterprise Linux 8Red Hat Enterprise Linux 8.8 Extended Update Support
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-38562
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.13% / 33.67%
||
7 Day CHG+0.01%
Published-18 Oct, 2021 | 08:52
Updated-04 Aug, 2024 | 01:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Best Practical Request Tracker (RT) 4.2 before 4.2.17, 4.4 before 4.4.5, and 5.0 before 5.0.2 allows sensitive information disclosure via a timing attack against lib/RT/REST2/Middleware/Auth.pm.

Action-Not Available
Vendor-n/aBest Practical Solutions, LLCFedora ProjectDebian GNU/Linux
Product-debian_linuxrequest_trackerfedoran/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-0553
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.91% / 74.87%
||
7 Day CHG-0.15%
Published-16 Jan, 2024 | 11:40
Updated-17 Jun, 2025 | 21:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Gnutls: incomplete fix for cve-2023-5981

A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.

Action-Not Available
Vendor-Red Hat, Inc.Fedora ProjectGNU
Product-fedoragnutlsenterprise_linuxRHODF-4.15-RHEL-9Red Hat Enterprise Linux 8Red Hat Enterprise Linux 8.6 Extended Update SupportRed Hat Enterprise Linux 6Red Hat Enterprise Linux 8.8 Extended Update SupportRed Hat Enterprise Linux 9.2 Extended Update SupportRed Hat Enterprise Linux 7Red Hat Enterprise Linux 9RHOL-5.8-RHEL-9
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-0564
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 4.07%
||
7 Day CHG~0.00%
Published-30 Jan, 2024 | 15:01
Updated-30 May, 2025 | 18:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kernel: max page sharing of kernel samepage merging (ksm) may cause memory deduplication

A flaw was found in the Linux kernel's memory deduplication mechanism. The max page sharing of Kernel Samepage Merging (KSM), added in Linux kernel version 4.4.0-96.119, can create a side channel. When the attacker and the victim share the same host and the default setting of KSM is "max page sharing=256", it is possible for the attacker to time the unmap to merge with the victim's page. The unmapping time depends on whether it merges with the victim's page and additional physical pages are created beyond the KSM's "max page share". Through these operations, the attacker can leak the victim's page.

Action-Not Available
Vendor-Red Hat, Inc.Linux Kernel Organization, Inc
Product-enterprise_linuxlinux_kernelRed Hat Enterprise Linux 9Red Hat Enterprise Linux 7Red Hat Enterprise Linux 6Red Hat Enterprise Linux 8
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-37968
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-4.3||MEDIUM
EPSS-0.52% / 65.78%
||
7 Day CHG~0.00%
Published-08 Oct, 2021 | 21:30
Updated-04 Aug, 2024 | 01:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

Action-Not Available
Vendor-Fedora ProjectGoogle LLCDebian GNU/Linux
Product-chromedebian_linuxfedoraChrome
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-38153
Matching Score-6
Assigner-Apache Software Foundation
ShareView Details
Matching Score-6
Assigner-Apache Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-0.94% / 75.31%
||
7 Day CHG+0.03%
Published-22 Sep, 2021 | 09:05
Updated-04 Aug, 2024 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Timing Attack Vulnerability for Apache Kafka Connect and Clients

Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, and 2.8.0.

Action-Not Available
Vendor-quarkusThe Apache Software FoundationOracle Corporation
Product-primavera_unifierquarkusfinancial_services_analytical_applications_infrastructurefinancial_services_behavior_detection_platformfinancial_services_enterprise_case_managementkafkacommunications_cloud_native_core_policycommunications_brm_-_elastic_charging_engineApache Kafka
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-6240
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 21.32%
||
7 Day CHG~0.00%
Published-04 Feb, 2024 | 14:11
Updated-31 Jul, 2025 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kernel: marvin vulnerability side-channel leakage in the rsa decryption operation

A Marvin vulnerability side-channel leakage was found in the RSA decryption operation in the Linux Kernel. This issue may allow a network attacker to decrypt ciphertexts or forge signatures, limiting the services that use that private key.

Action-Not Available
Vendor-Red Hat, Inc.Linux Kernel Organization, Inc
Product-enterprise_linuxlinux_kernelRed Hat Enterprise Linux 6Red Hat Enterprise Linux 7Red Hat Enterprise Linux 9.0 Extended Update SupportRed Hat Enterprise Linux 8Red Hat Enterprise Linux 9.2 Extended Update SupportRed Hat Enterprise Linux 9
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-3642
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.27% / 49.88%
||
7 Day CHG~0.00%
Published-05 Aug, 2021 | 20:48
Updated-03 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Wildfly Elytron in versions prior to 1.10.14.Final, prior to 1.15.5.Final and prior to 1.16.1.Final where ScramServer may be susceptible to Timing Attack if enabled. The highest threat of this vulnerability is confidentiality.

Action-Not Available
Vendor-quarkusn/aRed Hat, Inc.
Product-integration_camel_kopenshift_application_runtimesquarkusjboss_fuseprocess_automationjboss_enterprise_application_platform_expansion_packwildfly_elytrondescision_managerdata_gridjboss_enterprise_application_platformcodeready_studiobuild_of_quarkusintegration_camel_quarkuswildfly-elytron
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-5992
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.6||MEDIUM
EPSS-0.21% / 43.69%
||
7 Day CHG~0.00%
Published-31 Jan, 2024 | 14:05
Updated-24 Nov, 2024 | 12:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Opensc: side-channel leaks while stripping encryption pkcs#1 padding

A vulnerability was found in OpenSC where PKCS#1 encryption padding removal is not implemented as side-channel resistant. This issue may result in the potential leak of private data.

Action-Not Available
Vendor-opensc_projectRed Hat, Inc.
Product-enterprise_linux_for_arm_64_eusopenscenterprise_linux_for_ibm_z_systems_eusenterprise_linux_server_ausenterprise_linuxenterprise_linux_for_ibm_z_systemsenterprise_linux_eusenterprise_linux_for_power_little_endian_eusenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutionsenterprise_linux_for_power_little_endianenterprise_linux_for_arm_64Red Hat Enterprise Linux 9Red Hat Enterprise Linux 8Red Hat Enterprise Linux 7
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-5981
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.50% / 64.77%
||
7 Day CHG-0.08%
Published-28 Nov, 2023 | 11:49
Updated-23 Nov, 2024 | 00:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Gnutls: timing side-channel in the rsa-psk authentication

A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.

Action-Not Available
Vendor-Red Hat, Inc.GNUFedora Project
Product-gnutlsfedoralinuxRed Hat Enterprise Linux 8.6 Extended Update SupportRHOL-5.8-RHEL-9RHODF-4.15-RHEL-9Red Hat Enterprise Linux 7Red Hat Enterprise Linux 8.8 Extended Update SupportRed Hat Enterprise Linux 9Red Hat Enterprise Linux 6Red Hat Enterprise Linux 8Red Hat Enterprise Linux 9.2 Extended Update Support
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-35477
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 0.22%
||
7 Day CHG~0.00%
Published-02 Aug, 2021 | 03:57
Updated-04 Aug, 2024 | 00:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncFedora ProjectDebian GNU/Linux
Product-debian_linuxlinux_kernelfedoran/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-50781
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.30% / 53.22%
||
7 Day CHG~0.00%
Published-05 Feb, 2024 | 20:45
Updated-07 Feb, 2025 | 02:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
M2crypto: bleichenbacher timing attacks in the rsa decryption api - incomplete fix for cve-2020-25657

A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.

Action-Not Available
Vendor-m2crypto_projectRed Hat, Inc.
Product-m2cryptoupdate_infrastructureenterprise_linuxRed Hat Virtualization 4Red Hat Enterprise Linux 9Red Hat Enterprise Linux 6Red Hat Update Infrastructure 4 for Cloud ProvidersRed Hat Enterprise Linux 8Red Hat Enterprise Linux 7
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-34556
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 0.22%
||
7 Day CHG~0.00%
Published-02 Aug, 2021 | 04:02
Updated-04 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncFedora ProjectDebian GNU/Linux
Product-debian_linuxlinux_kernelfedoran/a
CWE ID-CWE-203
Observable Discrepancy
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found