enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Speculative Store Bypass - Wikipedia

    en.wikipedia.org/wiki/Speculative_Store_Bypass

    Speculative execution exploit Variant 4, [8] is referred to as Speculative Store Bypass (SSB), [1] [9] and has been assigned CVE-2018-3639. [7] SSB is named Variant 4, but it is the fifth variant in the Spectre-Meltdown class of vulnerabilities.

  3. Transient execution CPU vulnerability - Wikipedia

    en.wikipedia.org/wiki/Transient_execution_CPU...

    In July 2023 a critical vulnerability in the Zen 2 AMD microarchitecture called Zenbleed was made public. [59] AMD released a microcode update to fix it. [60] In August 2023 a vulnerability in AMD's Zen 1, Zen 2, Zen 3, and Zen 4 microarchitectures called Inception [61] [62] was revealed and assigned CVE-2023-20569. According to AMD it is not ...

  4. Control-flow integrity - Wikipedia

    en.wikipedia.org/wiki/Control-flow_integrity

    [3] [4] [5] These protections can be classified into either coarse-grained or fine-grained based on the number of targets restricted. A coarse-grained forward-edge CFI implementation, could, for example, restrict the set of indirect call targets to any function that may be indirectly called in the program, while a fine-grained one would ...

  5. Speculative execution CPU vulnerabilities - Wikipedia

    en.wikipedia.org/wiki/Transient_execution_CPU...

    In June 2022, multiple MMIO Intel CPUs vulnerabilities related to execution in virtual environments were announced. [51] The following CVEs were designated: CVE-2022-21123, CVE-2022-21125, CVE-2022-21166. In July 2022, the Retbleed vulnerability was disclosed affecting Intel Core 6 to 8th generation CPUs and AMD Zen 1, 1+ and 2 generation CPUs ...

  6. Speculative execution - Wikipedia

    en.wikipedia.org/wiki/Speculative_execution

    Predictive execution is a form of speculative execution where some outcome is predicted and execution proceeds along the predicted path until the actual result is known. If the prediction is true, the predicted execution is allowed to commit; however, if there is a misprediction, execution has to be unrolled and re-executed.

  7. Billion laughs attack - Wikipedia

    en.wikipedia.org/wiki/Billion_laughs_attack

    The problem was first reported as early as 2002, [3] but began to be widely addressed in 2008. [ 4 ] Defenses against this kind of attack include capping the memory allocated in an individual parser if loss of the document is acceptable, or treating entities symbolically and expanding them lazily only when (and to the extent) their content is ...

  8. Lockstep protocol - Wikipedia

    en.wikipedia.org/wiki/Lockstep_protocol

    The lockstep protocol is a partial solution to the look-ahead cheating problem in peer-to-peer architecture multiplayer games, in which a cheating client delays their own actions to await the messages of other players. [1]

  9. Privilege escalation - Wikipedia

    en.wikipedia.org/wiki/Privilege_escalation

    A similar method of jailbreaking exists for S60 Platform smartphones, where utilities such as HelloOX allow the execution of unsigned code and full access to system files. [ 6 ] [ 7 ] or edited firmware (similar to the M33 hacked firmware used for the PlayStation Portable ) [ 8 ] to circumvent restrictions on unsigned code .