Vulnerability knowledge base
2024
A new variant of the previously-disclosed BHI (also known as Spectre v2) vulnerabilities was discovered to affected certain Intel CPUs. The new publication shows that attacks are possible using vectors other than eBPF, leading to...
2023
It was discovered that some Intel processors were vulnerable to information exposure in certain vector (AVX) operations.
2022
Multiple issues were discovered in AMD and Intel CPUs that result in information disclosure under mitigations for the Spectre Variant 2 vulnerability.
It was discovered that readable files could be overwritten at the page cache level unintentionally or by a malicious actor. That includes files that the process did not have write access to, were immutable or were on read-only filesystems.
It was discovered that CPU internals can be abused by an unprivileged process to lead to information disclosure.
2021
A zero-day vulnerability was discovered in Apache Log4j 2, a Java logging framework, that allows for arbitrary code execution through the exploitation of requests to attacker-controlled LDAP and other JNDI endpoints.
Several vulnerabilities have been identified in GRUB2 that allow UEFI Secure Boot protections to be bypassed by a local attacker with administrative privileges (root) or physical access. These are different from the previously...
2020
Several vulnerabilities have been identified that affect the Linux kernel on Intel hosts through power side-channel attacks that allow information to be disclosed to non-privileged processes.
Several vulnerabilities have been identified in GRUB2 that allow UEFI Secure Boot protections to be bypassed by a local attacker with administrative privileges (root) or physical access.
A vulnerability was discovered affecting selected Intel CPUs that could allow a local attacker to expose the memory of processes running on the same CPU as the malicious code.
2019
Several vulnerabilities have been identified in Intel CPUs and graphics cards that allow a local attacker to expose memory across security boundaries (similar to MDS), cause Denial of Service attacks, or escalate privileges.
Several vulnerabilities were discovered in multiple implementations of the HTTP/2 transport protocol that allow a remote attacker to mount Denial of Service attacks.
A Kubernetes vulnerability has been identified where the API server mistakenly allows access to a cluster-scoped custom resource, when the requesting user has restricted access to namespaced resources.
Several vulnerabilities were discovered in the Linux kernel’s implementation of TCP that allow a remote attacker to cause a Denial of Service attack.
A vulnerability was discovered in Intel CPUs that allow a local attacker to access data belonging to another process or data that originated from a different security context. As a result, unintended memory exposure can occur...
A vulnerability was discovered in snapd that allow local privilege escalation attacks to be executed.
It was discovered that a vulnerability affecting the runC container runtime can allow an attacker to gain root privileges on the host from inside a privileged container.
2018
A vulnerability was discovered that allows a local attacker to extract memory associated to other processes from the L1 cache.
A side channel attack was discovered against applications previously assumed to be immune to the Spectre vulnerability that can be used to read the contents of memory across a network.
It was discovered that systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and...
A side channel attack was discovered that leaks certain register values between processes.
A variant of a cache speculation timing side channel attack was discovered, similar to the issues previously disclosed under the names Spectre and Meltdown.
A vulnerability was discovered in the Linux kernel that could be exploited by a local attacker to cause a denial of service (system crash). This issue only affected the amd64 architecture.
2017
Two issues were discovered affecting the Bluetooth subsystem: an information disclosure in the BlueZ daemon and a kernel stack-based buffer overflow that can cause denial of service through a system crash, both of which a...
2016
It was discovered that certain CGI environments had a vulnerability related to the processing of the Proxy header.
Two vulnerabilities were discovered in the OpenSSH client that could be exploited by a malicious SSH server to disclose private data (including private keys) or overwrite certain areas of the client’s memory.
2015
The Android stagefright vulnerability allows for a remote attacker to send a crafted MMS message to a victim’s phone to steal data, access hardware and install malware. Ubuntu Touch does not expose the affected functionality of...
Cryptanalysis has shown that the use of shared parameters and short key sizes makes Diffie-Hellman exchange subceptible to compromise.
It was discovered that a buffer overflow existed in the virtual floppy disk controller of QEMU. An attacker could use this issue to cause QEMU to crash or execute arbitrary code in the host’s QEMU process.
It was discovered that a buffer overflow existed in a GNU C Library function. An attacker could use this issue to execute arbitrary code or cause an application crash, resulting in a denial of service.