| CVE-2024-28956 | |
| Insufficient Resource Pool | |
| Uncaught Exception | |
| CVE-2025-20623 | |
| Hardware Features Enable Physical Attacks from Software | |
| CVE-2024-45332 | |
| CVE-2024-43420 | |
| Incorrect Behavior Order | |
| CVE-2025-24495 | |
| Improper Access Control | |
| Improper Finite State Machines (FSMs) in Hardware Logic | |
| Improper Finite State Machines (FSMs) in Hardware Logic | |
| Insufficient Granularity of Access Control | |
| Improper Initialization | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Finite State Machines (FSMs) in Hardware Logic | |
| Resource Exhaustion | |
| Information Exposure | |
| Protection Mechanism Failure | |
| Incorrect Calculation | |
| Non-Transparent Sharing of Microarchitectural Resources | |
| Protection Mechanism Failure | |
| CVE-2023-28746 | |
| Unauthorized Error Injection Can Degrade Hardware Redundancy | <4:20220809-2.20230808.2.el8_8 |
| Expected Behavior Violation | <4:20190618-1.20191112.1.el8_1 |
| CVE-2022-38090 | |
| Incorrect Calculation | |
| Incorrect Default Permissions | |
| CVE-2022-21216 | |
| Out-of-bounds Read | |
| CVE-2021-0127 | |
| Improper Initialization | |
| Information Exposure | <4:20210216-1.20210525.1.el8_4 |
| Information Exposure | <4:20210216-1.20210608.1.el8_4 |
| Information Exposure | <4:20210216-1.20210608.1.el8_4 |
| Incomplete Cleanup | <4:20210216-1.20210608.1.el8_4 |
| Improper Cross-boundary Removal of Sensitive Data | <4:20210216-1.20210608.1.el8_4 |
| Information Exposure | <4:20210216-1.20210608.1.el8_4 |
| Information Exposure | <4:20210216-1.20210608.1.el8_4 |
| Information Exposure | <4:20210216-1.20210608.1.el8_4 |
| Information Exposure | <4:20210216-1.20210608.1.el8_4 |
| Insufficient Granularity of Access Control | <4:20190618-1.20191112.1.el8_1 |
| Improper Cross-boundary Removal of Sensitive Data | <4:20210216-1.20210608.1.el8_4 |