Insufficient Resource Pool | |
Uncaught Exception | |
CVE-2025-20623 | |
Hardware Features Enable Physical Attacks from Software | |
CVE-2024-45332 | |
CVE-2024-43420 | |
Incorrect Behavior Order | |
CVE-2025-24495 | |
Improper Access Control | |
Improper Finite State Machines (FSMs) in Hardware Logic | |
Improper Finite State Machines (FSMs) in Hardware Logic | |
Insufficient Granularity of Access Control | |
Improper Initialization | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Finite State Machines (FSMs) in Hardware Logic | |
Resource Exhaustion | |
Information Exposure | |
Protection Mechanism Failure | |
Incorrect Calculation | |
Non-Transparent Sharing of Microarchitectural Resources | |
Protection Mechanism Failure | |
CVE-2023-28746 | |
Unauthorized Error Injection Can Degrade Hardware Redundancy | <4:20220809-2.20230808.2.el8_8 |
Expected Behavior Violation | <4:20190618-1.20191112.1.el8_1 |
CVE-2022-38090 | |
Incorrect Calculation | |
Incorrect Default Permissions | |
CVE-2022-21216 | |
Out-of-bounds Read | |
CVE-2021-0127 | |
Improper Initialization | |
Information Exposure | <4:20210216-1.20210525.1.el8_4 |
Information Exposure | <4:20210216-1.20210608.1.el8_4 |
Information Exposure | <4:20210216-1.20210608.1.el8_4 |
Incomplete Cleanup | <4:20210216-1.20210608.1.el8_4 |
Improper Cross-boundary Removal of Sensitive Data | <4:20210216-1.20210608.1.el8_4 |
Information Exposure | <4:20210216-1.20210608.1.el8_4 |
Information Exposure | <4:20210216-1.20210608.1.el8_4 |
Information Exposure | <4:20210216-1.20210608.1.el8_4 |
Information Exposure | <4:20210216-1.20210608.1.el8_4 |
Insufficient Granularity of Access Control | <4:20190618-1.20191112.1.el8_1 |
Improper Cross-boundary Removal of Sensitive Data | <4:20210216-1.20210608.1.el8_4 |