• In digital computing, hardware security bugs are hardware bugs or flaws that create vulnerabilities affecting computer central processing units (CPUs)...
    3 KB (295 words) - 20:51, 30 September 2022
  • A hardware bug is a bug in computer hardware. It is the hardware counterpart of software bug, a defect in software. A bug is different from a glitch which...
    3 KB (322 words) - 06:43, 14 November 2024
  • execution Slipstream (computer science) Speculative multithreading Hardware security bug Transient execution CPU vulnerability Lampson, Butler (2006). "Lazy...
    8 KB (978 words) - 11:44, 25 May 2025
  • software security assurance. Computer security Hacking: The Art of Exploitation IT risk Threat (computer) Vulnerability (computing) Hardware bug Secure...
    3 KB (283 words) - 14:52, 26 May 2025
  • Thumbnail for Meltdown (security vulnerability)
    security vulnerability was called Meltdown because "the vulnerability basically melts security boundaries which are normally enforced by the hardware"...
    87 KB (8,241 words) - 14:35, 26 December 2024
  • Exposures ID of CVE-2019-0162. Transient execution CPU vulnerability Hardware security bug Tung, Liam. "All Intel chips open to new Spoiler non-Spectre attack:...
    3 KB (195 words) - 09:13, 15 August 2024
  • Thumbnail for Spectre (security vulnerability)
    Execution Flaw". Tom's Hardware. Archived from the original on 2018-09-02. Retrieved 2018-06-14. Windeck, Christof (2018-06-14). "CPU-Bug Spectre-NG Nr. 3:...
    83 KB (7,089 words) - 17:59, 16 June 2025
  • encryption dispute Hardware security Hardware security bug Hardware Trojan Intel Active Management Technology § Security Zombie Zero Open hardware Code signing...
    16 KB (1,617 words) - 23:52, 25 May 2025
  • Guard Extensions (SGX) security subsystem is also affected by this bug. The Downfall vulnerability was discovered by the security researcher Daniel Moghimi...
    8 KB (570 words) - 12:20, 10 May 2025
  • compromise its security. Despite a system administrator's best efforts to achieve complete correctness, virtually all hardware and software contain bugs where...
    27 KB (3,333 words) - 03:19, 9 June 2025
  • Thumbnail for Microarchitectural Data Sampling
    published a security advisory on its website detailing its plans to mitigate ZombieLoad. Transient execution CPU vulnerabilities Hardware security bug Greenberg...
    14 KB (977 words) - 09:03, 13 June 2025
  • A software bug is a design defect (bug) in computer software. A computer program with many or serious bugs may be described as buggy. The effects of a...
    40 KB (4,704 words) - 01:12, 20 June 2025
  • Thumbnail for Shellshock (software bug)
    Shellshock, also known as Bashdoor, is a family of security bugs in the Unix Bash shell, the first of which was disclosed on 24 September 2014. Shellshock...
    34 KB (3,343 words) - 05:06, 15 August 2024
  • Thumbnail for Pentium F00F bug
    is sometimes used to describe similar hardware design flaws such as the Cyrix coma bug. No permanent hardware damage results from executing the F00F...
    12 KB (1,583 words) - 03:50, 19 June 2025
  • Transient execution CPU vulnerability (category Hardware bugs)
    due to hardware mitigations for Spectre.[citation needed] On March 5, 2020, computer security experts reported another Intel chip security flaw, besides...
    71 KB (5,148 words) - 17:50, 22 June 2025
  • Thumbnail for Foreshadow
    year [2018]." Transient execution CPU vulnerabilities Hardware security bug TLBleed, similar security vulnerability "Foreshadow - Breaking the Virtual Memory...
    22 KB (1,943 words) - 13:13, 19 November 2024
  • to guess the signature in 216 tries or fewer. It is unfixable without hardware changes because it is caused by the inherent design of CPU caches and branch...
    14 KB (1,392 words) - 09:07, 9 June 2025
  • Speculative Store Bypass (SSB) (CVE-2018-3639) is the name given to a hardware security vulnerability and its exploitation that takes advantage of speculative...
    13 KB (869 words) - 01:53, 18 November 2024
  • Lazy FP state restore (category Computer security stubs)
    (CVE-2018-3665), also referred to as Lazy FP State Restore or LazyFP, is a security vulnerability affecting Intel Core CPUs. The vulnerability is caused by...
    7 KB (832 words) - 01:53, 18 November 2024
  • SWAPGS, also known as Spectre variant 1, is a computer security vulnerability that utilizes the branch prediction used in modern microprocessors. Most...
    6 KB (581 words) - 03:53, 6 February 2025
  • Computer security compromised by hardware failure is a branch of computer security applied to hardware. The objective of computer security includes protection...
    41 KB (5,114 words) - 00:21, 21 January 2024
  • Computer hardware or software is said to be bug compatible if it exactly replicates an undesirable feature of a previous version. The phrase is found in...
    17 KB (1,520 words) - 06:56, 13 April 2025
  • takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer hardware or software. Leyden, J...
    18 KB (1,951 words) - 11:04, 25 May 2025
  • Thumbnail for Check Point
    combined hardware and software products for IT security, including network security, endpoint security, cloud security, mobile security, data security and...
    16 KB (1,461 words) - 04:05, 25 May 2025
  • Thumbnail for Hardware-based encryption
    as in the Spectre exploit. Disk encryption hardware Hardware-based full disk encryption Hardware security module Intel® 64 and IA-32 Architectures Software...
    15 KB (1,251 words) - 08:41, 27 May 2025
  • execution attack". Ars Technica. Retrieved 2022-07-12. ETH Zurich Computer Security Group. "Retbleed: Arbitrary Speculative Code Execution with Return Instructions"...
    4 KB (305 words) - 09:13, 15 August 2024
  • Zerodium (category Computer security companies)
    targets security flaws in computer hardware, software or firmware in order to maliciously plant malware, steal data, or damage the program. Bug bounty...
    5 KB (403 words) - 10:29, 28 April 2025
  • Thumbnail for Heartbleed
    Heartbleed (redirect from Heartbleed Bug)
    a security bug in some outdated versions of the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security (TLS)...
    118 KB (9,768 words) - 05:24, 10 May 2025
  • Coordinated vulnerability disclosure (category Computer security procedures)
    2024-10-02. Kuhn, John (27 May 2016). "Bug Poaching: A New Extortion Tactic Targeting Enterprises". Security Intelligence. Archived from the original...
    11 KB (903 words) - 12:25, 27 May 2025
  • Thumbnail for Software
    assurance and security are critical aspects of software development, as bugs and security vulnerabilities can lead to system failures and security breaches...
    27 KB (3,073 words) - 15:08, 8 June 2025