[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 6629 Download | Alert*

Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit. CVE-2023-0464 David Benjamin reported a flaw related to the verification of X.509 certificate chains that include policy constraints, which may result in denial of service. CVE-2023-0465 David Benjamin reported that invalid certificate policies in leaf certificates are silently ignored. A malicious CA could t ...

Tavis Ormandy discovered that under specific microarchitectural circumstances, a vector register in 'Zen 2' CPUs may not be written to 0 correctly. This flaw allows an attacker to leak register contents across concurrent processes, hyper threads and virtualized guests. For details please refer to https://lock.cmpxchg8b.com/zenbleed.html https://github.com/google/security-research/security/advisori ...

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. CVE-2023-3390 A use-after-free flaw in the netfilter subsystem caused by incorrect error path handling may result in denial of service or privilege escalation. CVE-2023-3610 A use-after-free flaw in the netfilter subsystem caused by incorrect refcount ha ...

Tavis Ormandy discovered that under specific microarchitectural circumstances, a vector register in AMD 'Zen 2' CPUs may not be written to 0 correctly. This flaw allows an attacker to leak sensitive information across concurrent processes, hyper threads and virtualized guests. For details please refer to https://lock.cmpxchg8b.com/zenbleed.html and https://github.com/google/security-research/secur ...

Tavis Ormandy discovered that under specific microarchitectural circumstances, a vector register in 'Zen 2' CPUs may not be written to 0 correctly. This flaw allows an attacker to leak register contents across concurrent processes, hyper threads and virtualized guests. For details please refer to https://lock.cmpxchg8b.com/zenbleed.html https://github.com/google/security-research/security/advisori ...

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. CVE-2023-3390 A use-after-free flaw in the netfilter subsystem caused by incorrect error path handling may result in denial of service or privilege escalation. CVE-2023-3610 A use-after-free flaw in the netfilter subsystem caused by incorrect refcount ha ...

Tavis Ormandy discovered that under specific microarchitectural circumstances, a vector register in AMD 'Zen 2' CPUs may not be written to 0 correctly. This flaw allows an attacker to leak sensitive information across concurrent processes, hyper threads and virtualized guests. For details please refer to https://lock.cmpxchg8b.com/zenbleed.html and https://github.com/google/security-research/secur ...

CVE-2022-40982 Daniel Moghimi discovered Gather Data Sampling , a hardware vulnerability for Intel CPUs which allows unprivileged speculative access to data which was previously stored in vector registers. This mitigation requires updated CPU microcode provided in the intel-microcode package. For details please refer to https://downfall.page/ and https://www.intel.com/content/www/us/en/developer/a ...

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. CVE-2022-4269 William Zhao discovered that a flaw in the Traffic Control subsystem when using a specific networking configuration , may allow a local unprivileged user to cause a denial of service . CVE-2022-39189 Jann Horn discovered that TLB flush ope ...

CVE-2022-40982 Daniel Moghimi discovered Gather Data Sampling , a hardware vulnerability for Intel CPUs which allows unprivileged speculative access to data which was previously stored in vector registers. This mitigation requires updated CPU microcode provided in the intel-microcode package. For details please refer to https://downfall.page/ and https://www.intel.com/content/www/us/en/developer/a ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   662

© SecPod Technologies