Количество 10
Количество 10

BDU:2024-01950
Уязвимость микропрограммного обеспечения процессоров Intel, AMD, ARM и IBM, связанная с возникновением в спекулятивном режиме состояний гонки, способных привести к обращению к уже освобождённым областям памяти, в случае неверного прогнозирования процессором ветвления в коде, позволяющая нарушителю получить доступ к защищенной памяти

CVE-2024-2193
A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths.

CVE-2024-2193
A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths.

CVE-2024-2193
A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths.
CVE-2024-2193
A Speculative Race Condition (SRC) vulnerability that impacts modern C ...
GHSA-3p53-237x-3cww
A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths.

SUSE-SU-2024:1105-1
Security update for xen

SUSE-SU-2024:1102-1
Security update for xen

ROS-20240821-02
Множественные уязвимости kernel-lt

SUSE-SU-2024:2535-1
Security update for xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2024-01950 Уязвимость микропрограммного обеспечения процессоров Intel, AMD, ARM и IBM, связанная с возникновением в спекулятивном режиме состояний гонки, способных привести к обращению к уже освобождённым областям памяти, в случае неверного прогнозирования процессором ветвления в коде, позволяющая нарушителю получить доступ к защищенной памяти | CVSS3: 8.8 | 1% Низкий | больше 1 года назад |
![]() | CVE-2024-2193 A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths. | CVSS3: 5.7 | 1% Низкий | больше 1 года назад |
![]() | CVE-2024-2193 A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths. | CVSS3: 5.5 | 1% Низкий | больше 1 года назад |
![]() | CVE-2024-2193 A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths. | CVSS3: 5.7 | 1% Низкий | больше 1 года назад |
CVE-2024-2193 A Speculative Race Condition (SRC) vulnerability that impacts modern C ... | CVSS3: 5.7 | 1% Низкий | больше 1 года назад | |
GHSA-3p53-237x-3cww A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths. | CVSS3: 5.7 | 1% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:1105-1 Security update for xen | около 1 года назад | ||
![]() | SUSE-SU-2024:1102-1 Security update for xen | около 1 года назад | ||
![]() | ROS-20240821-02 Множественные уязвимости kernel-lt | CVSS3: 9.8 | 10 месяцев назад | |
![]() | SUSE-SU-2024:2535-1 Security update for xen | 11 месяцев назад |
Уязвимостей на страницу