In digital computing, hardware security bugs are hardware bugs or flaws that create vulnerabilities affecting computer central processing units (CPUs)...
3 KB (295 words) - 20:51, 30 September 2022
A hardware bug is a bug in computer hardware. It is the hardware counterpart of software bug, a defect in software. A bug is different from a glitch which...
3 KB (322 words) - 06:43, 14 November 2024
execution Slipstream (computer science) Speculative multithreading Hardware security bug Transient execution CPU vulnerability Lampson, Butler (2006). "Lazy...
8 KB (978 words) - 11:44, 25 May 2025
software security assurance. Computer security Hacking: The Art of Exploitation IT risk Threat (computer) Vulnerability (computing) Hardware bug Secure...
3 KB (283 words) - 14:52, 26 May 2025
security vulnerability was called Meltdown because "the vulnerability basically melts security boundaries which are normally enforced by the hardware"...
87 KB (8,241 words) - 14:35, 26 December 2024
Exposures ID of CVE-2019-0162. Transient execution CPU vulnerability Hardware security bug Tung, Liam. "All Intel chips open to new Spoiler non-Spectre attack:...
3 KB (195 words) - 09:13, 15 August 2024
Execution Flaw". Tom's Hardware. Archived from the original on 2018-09-02. Retrieved 2018-06-14. Windeck, Christof (2018-06-14). "CPU-Bug Spectre-NG Nr. 3:...
83 KB (7,089 words) - 17:59, 16 June 2025
encryption dispute Hardware security Hardware security bug Hardware Trojan Intel Active Management Technology § Security Zombie Zero Open hardware Code signing...
16 KB (1,617 words) - 23:52, 25 May 2025
Guard Extensions (SGX) security subsystem is also affected by this bug. The Downfall vulnerability was discovered by the security researcher Daniel Moghimi...
8 KB (570 words) - 12:20, 10 May 2025
compromise its security. Despite a system administrator's best efforts to achieve complete correctness, virtually all hardware and software contain bugs where...
27 KB (3,333 words) - 03:19, 9 June 2025
Microarchitectural Data Sampling (redirect from Fallout (security vulnerability))
published a security advisory on its website detailing its plans to mitigate ZombieLoad. Transient execution CPU vulnerabilities Hardware security bug Greenberg...
14 KB (977 words) - 09:03, 13 June 2025
A software bug is a design defect (bug) in computer software. A computer program with many or serious bugs may be described as buggy. The effects of a...
40 KB (4,704 words) - 01:12, 20 June 2025
Shellshock, also known as Bashdoor, is a family of security bugs in the Unix Bash shell, the first of which was disclosed on 24 September 2014. Shellshock...
34 KB (3,343 words) - 05:06, 15 August 2024
is sometimes used to describe similar hardware design flaws such as the Cyrix coma bug. No permanent hardware damage results from executing the F00F...
12 KB (1,583 words) - 03:50, 19 June 2025
Transient execution CPU vulnerability (category Hardware bugs)
due to hardware mitigations for Spectre.[citation needed] On March 5, 2020, computer security experts reported another Intel chip security flaw, besides...
71 KB (5,148 words) - 17:50, 22 June 2025
Foreshadow (redirect from Foreshadow-NG (security vulnerability))
year [2018]." Transient execution CPU vulnerabilities Hardware security bug TLBleed, similar security vulnerability "Foreshadow - Breaking the Virtual Memory...
22 KB (1,943 words) - 13:13, 19 November 2024
to guess the signature in 216 tries or fewer. It is unfixable without hardware changes because it is caused by the inherent design of CPU caches and branch...
14 KB (1,392 words) - 09:07, 9 June 2025
Speculative Store Bypass (redirect from SSB (security vulnerability))
Speculative Store Bypass (SSB) (CVE-2018-3639) is the name given to a hardware security vulnerability and its exploitation that takes advantage of speculative...
13 KB (869 words) - 01:53, 18 November 2024
Lazy FP state restore (category Computer security stubs)
(CVE-2018-3665), also referred to as Lazy FP State Restore or LazyFP, is a security vulnerability affecting Intel Core CPUs. The vulnerability is caused by...
7 KB (832 words) - 01:53, 18 November 2024
SWAPGS, also known as Spectre variant 1, is a computer security vulnerability that utilizes the branch prediction used in modern microprocessors. Most...
6 KB (581 words) - 03:53, 6 February 2025
Computer security compromised by hardware failure is a branch of computer security applied to hardware. The objective of computer security includes protection...
41 KB (5,114 words) - 00:21, 21 January 2024
Computer hardware or software is said to be bug compatible if it exactly replicates an undesirable feature of a previous version. The phrase is found in...
17 KB (1,520 words) - 06:56, 13 April 2025
takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer hardware or software. Leyden, J...
18 KB (1,951 words) - 11:04, 25 May 2025
Check Point (redirect from Multi-domain security management)
combined hardware and software products for IT security, including network security, endpoint security, cloud security, mobile security, data security and...
16 KB (1,461 words) - 04:05, 25 May 2025
as in the Spectre exploit. Disk encryption hardware Hardware-based full disk encryption Hardware security module Intel® 64 and IA-32 Architectures Software...
15 KB (1,251 words) - 08:41, 27 May 2025
execution attack". Ars Technica. Retrieved 2022-07-12. ETH Zurich Computer Security Group. "Retbleed: Arbitrary Speculative Code Execution with Return Instructions"...
4 KB (305 words) - 09:13, 15 August 2024
Zerodium (category Computer security companies)
targets security flaws in computer hardware, software or firmware in order to maliciously plant malware, steal data, or damage the program. Bug bounty...
5 KB (403 words) - 10:29, 28 April 2025
Heartbleed (redirect from Heartbleed Bug)
a security bug in some outdated versions of the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security (TLS)...
118 KB (9,768 words) - 05:24, 10 May 2025
Coordinated vulnerability disclosure (category Computer security procedures)
2024-10-02. Kuhn, John (27 May 2016). "Bug Poaching: A New Extortion Tactic Targeting Enterprises". Security Intelligence. Archived from the original...
11 KB (903 words) - 12:25, 27 May 2025
Software (section Quality and security)
assurance and security are critical aspects of software development, as bugs and security vulnerabilities can lead to system failures and security breaches...
27 KB (3,073 words) - 15:08, 8 June 2025