Page 194 of 10815 results (0.037 seconds)

CVSS: 6.5EPSS: 0%CPEs: -EXPL: 0

Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. ... This issue may allow a malicious actor to achieve a local information disclosure, impacting the data confidentiality of the targeted system. • http://www.openwall.com/lists/oss-security/2024/03/12/13 https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org • CWE-1342: Information Exposure through Microarchitectural State after Transient Execution •

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

Insertion of sensitive information into log file for some Intel(R) Local Manageability Service software before version 2316.5.1.2 may allow an authenticated user to potentially enable information disclosure via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00923.html • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 5.5EPSS: 0%CPEs: -EXPL: 0

Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. ... A vulnerability was found in some Intel processors that may allow a malicious actor to achieve a local information disclosure, impacting the data confidentiality of the targeted host. • https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html https://security.netapp.com/advisory/ntap-20240405-0008 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00982.html https://access.redhat.com/security/cve/CVE-2023-38575 https://bugzilla.redhat.com/show_bug.cgi?id=2270701 • CWE-1303: Non-Transparent Sharing of Microarchitectural Resources •

CVSS: 5.3EPSS: 0%CPEs: -EXPL: 0

Incorrect calculation in microcode keying mechanism for some Intel(R) Xeon(R) D Processors with Intel(R) SGX may allow a privileged user to potentially enable information disclosure via local access. ... This issue may allow a local attacker to achieve sensitive information disclosure, impacting the data confidentiality of the targeted system. • https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html https://security.netapp.com/advisory/ntap-20240405-0009 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html https://access.redhat.com/security/cve/CVE-2023-43490 https://bugzilla.redhat.com/show_bug.cgi?id=2270704 • CWE-682: Incorrect Calculation •

CVSS: 8.6EPSS: 0%CPEs: 2EXPL: 0

The vulnerability could allow disclosure of restricted information in unauthenticated RPC. • https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0796609 • CWE-287: Improper Authentication •