Browse and filter security vulnerabilities across ecosystems
Browse and filter security vulnerabilities across ecosystems
In certain Arm CPUs, a CPP RCTX instruction executed on one Processing Element (PE) may inhibit TLB invalidation when a TLBI is issued to the PE, e...
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause a resource to be reused
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause a resource to be reused
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause a resource to be reused
Sensitive information uncleared in resource before release for reuse for some Intel(R) NPU Drivers for Windows before version 32
Untargeted information leak in Bolt protocol handshake
Lack of buffer clearing before reuse may result in incorrect system behavior.
wire-webapp has no database deletion on client logout
Sensitive information in resource not removed before reuse in some Intel(R) TDX Seamldr module software before version 1
CMSE secure state may leak from stack to floating-point registers
moodle: HTTP authorization header is preserved between "emulated redirects"
SixLabors.ImageSharp vulnerable to data leakage
The AppsAnywhere macOS client-privileged helper can be tricked into executing arbitrary commands with elevated permissions by a local user process
A known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, becomes actual again for the new hw AmpereOne
A flaw that boot CPU could be vulnerable for the speculative execution behavior kind of attacks in the Linux kernel X86 CPU Power management option...
Wasmtime vulnerable to data leakage between instances in the pooling allocator
In Eclipse Jetty version 9
Information Disclosure in GlobalProtect Agent
In all versions of Node