Lucene search
Basic search
Lucene search
Search by product
Subscribe
K
Start 30-day trial
Database
Vendors
Products
Years
CVSS
Scanner
Agent Scanning
API Scanning
Manual Audit
Perimeter Scanner
Scanning
Projects
Email
Webhook
Plugins
Resources
Documents
Blog
Glossary
FAQ
Pricing
Contacts
About Us
Partners
Branding Guideline
SIGN IN
OracleLinux
ELSA-2018-4196
History
Aug 14, 2018 - 12:00 a.m.
Vulners
/
Oraclelinux
/
Unbreakable Enterprise kernel security update
Unbreakable Enterprise kernel security update
2018-08-14
00:00:00
linux.oracle.com
80
0.017 Low
EPSS
Percentile
87.7%
JSON
[4.1.12-124.18.5]
inet: frag: enforce memory limits earlier (Eric Dumazet) [Orabug: 28450977]
x86/mm/pageattr.c: fix page prot mask (Mihai Carabas) [Orabug: 28492122]
x86/pgtable.h: fix PMD/PUD mask (Mihai Carabas) [Orabug: 28492122]
x86/asm: Add pud/pmd mask interfaces to handle large PAT bit (Toshi Kani) [Orabug: 28492122]
[4.1.12-124.18.4]
kvm/vmx: Dont mark vmx_exit() __exit (Boris Ostrovsky) [Orabug: 28491688]
x86/speculation: Dont mark cpu_no_l1tf __initconst (Boris Ostrovsky) [Orabug: 28491688]
x86/speculation: parse l1tf boot parameter early (Boris Ostrovsky) [Orabug: 28491688]
[4.1.12-124.18.3]
posix-timer: Properly check sigevent->sigev_notify (Thomas Gleixner) [Orabug: 28481412] {CVE-2017-18344}
[4.1.12-124.18.2]
x86/mm/kmmio: Make the tracer robust against L1TF (Andi Kleen) [Orabug: 28220674] {CVE-2018-3620}
x86/mm/pat: Make set_memory_np() L1TF safe (Andi Kleen) [Orabug: 28220674] {CVE-2018-3620}
x86/mm/pat: Ensure cpa->pfn only contains page frame numbers (Matt Fleming) [Orabug: 28220674] {CVE-2018-3620}
x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert (Andi Kleen) [Orabug: 28220674] {CVE-2018-3620}
x86/speculation/l1tf: Invert all not present mappings (Andi Kleen) [Orabug: 28220674] {CVE-2018-3620}
cpu/hotplug: Fix SMT supported evaluation (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3620}
KVM: VMX: Tell the nested hypervisor to skip L1D flush on vmentry (Paolo Bonzini) [Orabug: 28220674] {CVE-2018-3646}
x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (Paolo Bonzini) [Orabug: 28220674] {CVE-2018-3620}
KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES (KarimAllah Ahmed) [Orabug: 28220674] {CVE-2018-3646}
x86/speculation: Simplify sysfs report of VMX L1TF vulnerability (Paolo Bonzini) [Orabug: 28220674] {CVE-2018-3620}
Documentation/l1tf: Remove Yonah processors from not vulnerable list (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3620}
x86/KVM/VMX: Dont set l1tf_flush_l1d from vmx_handle_external_intr() (Nicolai Stange) [Orabug: 28220674] {CVE-2018-3646}
x86/irq: Let interrupt handlers set kvm_cpu_l1tf_flush_l1d (Nicolai Stange) [Orabug: 28220674] {CVE-2018-3646}
x86: Dont include linux/irq.h from asm/hardirq.h (Nicolai Stange) [Orabug: 28220625] {CVE-2018-3620}
x86/KVM/VMX: Introduce per-host-cpu analogue of l1tf_flush_l1d (Nicolai Stange) [Orabug: 28220625] {CVE-2018-3646}
x86/KVM/VMX: Move the l1tf_flush_l1d test to vmx_l1d_flush() (Nicolai Stange) [Orabug: 28220625] {CVE-2018-3646}
x86/KVM/VMX: Replace ‘vmx_l1d_flush_always’ with ‘vmx_l1d_flush_cond’ (Nicolai Stange) [Orabug: 28220625] {CVE-2018-3646}
x86/KVM/VMX: Dont set l1tf_flush_l1d to true from vmx_l1d_flush() (Nicolai Stange) [Orabug: 28220625] {CVE-2018-3646}
KVM: VMX: support MSR_IA32_ARCH_CAPABILITIES as a feature MSR (Paolo Bonzini) [Orabug: 28220625] {CVE-2018-3646}
KVM: X86: Introduce kvm_get_msr_feature() (Wanpeng Li) [Orabug: 28220674] {CVE-2018-3646}
KVM: x86: Add a framework for supporting MSR-based features (Tom Lendacky) [Orabug: 28220674] {CVE-2018-3646}
cpu/hotplug: detect SMT disabled by BIOS (Josh Poimboeuf) [Orabug: 28220674] {CVE-2018-3620}
Documentation/l1tf: Fix typos (Tony Luck) [Orabug: 28220674] {CVE-2018-3620}
x86/KVM/VMX: Initialize the vmx_l1d_flush_pages content (Nicolai Stange) [Orabug: 28220674] {CVE-2018-3646}
x86/speculation/l1tf: Unbreak !__HAVE_ARCH_PFN_MODIFY_ALLOWED architectures (Jiri Kosina) [Orabug: 28220674] {CVE-2018-3620}
Documentation: Add section about CPU vulnerabilities (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3620}
x86/bugs, kvm: Introduce boot-time control of L1TF mitigations (Jiri Kosina) [Orabug: 28220674] {CVE-2018-3646}
cpu/hotplug: Set CPU_SMT_NOT_SUPPORTED early (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3620}
cpu/hotplug: Expose SMT control init function (Jiri Kosina) [Orabug: 28220674] {CVE-2018-3620}
x86/kvm: Allow runtime control of L1D flush (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3646}
x86/kvm: Serialize L1D flush parameter setter (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3646}
x86/kvm: Add static key for flush always (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3646}
x86/kvm: Move l1tf setup function (Thomas Gleixner) [Orabug: 28220625] {CVE-2018-3646}
x86/l1tf: Handle EPT disabled state proper (Thomas Gleixner) [Orabug: 28220625] {CVE-2018-3620}
x86/kvm: Drop L1TF MSR list approach (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3646}
x86/litf: Introduce vmx status variable (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3620}
cpu/hotplug: Online siblings when SMT control is turned on (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3620}
x86/KVM/VMX: Use MSR save list for IA32_FLUSH_CMD if required (Konrad Rzeszutek Wilk) [Orabug: 28220674] {CVE-2018-3646}
x86/KVM/VMX: Extend add_atomic_switch_msr() to allow VMENTER only MSRs (Konrad Rzeszutek Wilk) [Orabug: 28220674] {CVE-2018-3646}
x86/KVM/VMX: Separate the VMX AUTOLOAD guest/host number accounting (Konrad Rzeszutek Wilk) [Orabug: 28220674] {CVE-2018-3646}
x86/KVM/VMX: Add find_msr() helper function (Konrad Rzeszutek Wilk) [Orabug: 28220674] {CVE-2018-3646}
x86/KVM/VMX: Split the VMX MSR LOAD structures to have an host/guest numbers (Konrad Rzeszutek Wilk) [Orabug: 28220674] {CVE-2018-3646}
x86/KVM/VMX: Add L1D flush logic (Paolo Bonzini) [Orabug: 28220674] {CVE-2018-3646}
x86/KVM/VMX: Add L1D MSR based flush (Paolo Bonzini) [Orabug: 28220674] {CVE-2018-3646}
x86/KVM/VMX: Add L1D flush algorithm (Paolo Bonzini) [Orabug: 28220674] {CVE-2018-3646}
x86/KVM/VMX: Add module argument for L1TF mitigation (Konrad Rzeszutek Wilk) [Orabug: 28220674] {CVE-2018-3646} {CVE-2018-3646}
locking/static_keys: Add static_key_{en,dis}able() helpers (Peter Zijlstra) [Orabug: 28220674] {CVE-2018-3620}
x86/KVM: Warn user if KVM is loaded SMT and L1TF CPU bug being present (Konrad Rzeszutek Wilk) [Orabug: 28220674] {CVE-2018-3646}
KVM: x86: Introducing kvm_x86_ops VM init/destroy hooks (Suravee Suthikulpanit) [Orabug: 28220674] {CVE-2018-3646}
cpu/hotplug: Boot HT siblings at least once (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3620}
Revert ‘x86/apic: Ignore secondary threads if nosmt=force’ (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3620}
x86/speculation/l1tf: Fix up pte->pfn conversion for PAE (Michal Hocko) [Orabug: 28220674] {CVE-2018-3620}
x86/speculation/l1tf: Protect PAE swap entries against L1TF (Vlastimil Babka) [Orabug: 28220674] {CVE-2018-3620}
x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (Borislav Petkov) [Orabug: 28220674] {CVE-2018-3620}
x86/cpufeatures: Add detection of L1D cache flush support. (Konrad Rzeszutek Wilk) [Orabug: 28220674] {CVE-2018-3620}
x86/speculation/l1tf: Extend 64bit swap file size limit (Vlastimil Babka) [Orabug: 28220674] {CVE-2018-3620}
x86/apic: Ignore secondary threads if nosmt=force (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3620}
x86/cpu/AMD: Evaluate smp_num_siblings early (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3620}
x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (Borislav Petkov) [Orabug: 28220674] {CVE-2018-3620}
x86/cpu/intel: Evaluate smp_num_siblings early (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3620}
x86/cpu/topology: Provide detect_extended_topology_early() (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3620}
x86/cpu/common: Provide detect_ht_early() (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3620}
x86/cpu/AMD: Remove the pointless detect_ht() call (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3620}
x86/cpu: Remove the pointless CPU printout (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3620}
cpu/hotplug: Provide knobs to control SMT (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3620}
x86/topology: Add topology_max_smt_threads() (Andi Kleen) [Orabug: 28220674] {CVE-2018-3620}
cpu/hotplug: Split do_cpu_down() (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3620}
x86/topology: Provide topology_smt_supported() (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3620}
x86/smp: Provide topology_is_primary_thread() (Thomas Gleixner) [Orabug: 28220674] {CVE-2018-3620}
x86/bugs: Move the l1tf function and define pr_fmt properly (Konrad Rzeszutek Wilk) [Orabug: 28220674] {CVE-2018-3620}
x86/speculation/l1tf: Limit swap file size to MAX_PA/2 (Andi Klein) [Orabug: 28220674] {CVE-2018-3620}
x86/speculation/l1tf: Disallow non privileged high MMIO PROT_NONE mappings (Andi Klein) [Orabug: 28220674] {CVE-2018-3620}
x86/speculation/l1tf: Add sysfs reporting for l1tf (Andi Klein) [Orabug: 28220674] {CVE-2018-3620}
x86/speculation/l1tf: Make sure the first page is always reserved (Andi Klein) [Orabug: 28220674] {CVE-2018-3620}
x86/speculation/l1tf: Protect PROT_NONE PTEs against speculation (Andi Klein) [Orabug: 28220674] {CVE-2018-3620}
x86/speculation/l1tf: Protect swap entries against L1TF (Linus Torvalds) [Orabug: 28220674] {CVE-2018-3620}
x86/speculation/l1tf: Change order of offset/type in swap entry (Linus Torvalds) [Orabug: 28220674] {CVE-2018-3620}
x86/speculation/l1tf: Increase 32bit PAE __PHYSICAL_PAGE_SHIFT (Andi Klein) [Orabug: 28220674] {CVE-2018-3620}
x86/mm: Limit mmap() of /dev/mem to valid physical addresses (Craig Bergstrom) [Orabug: 28220674] {CVE-2018-3620}
x86/mm: Prevent non-MAP_FIXED mapping across DEFAULT_MAP_WINDOW border (Kirill A. Shutemov) [Orabug: 28220674] {CVE-2018-3620}
Affected Package
OS
Version
Architecture
Package
Version
Filename
oracle linux
6
src
kernel-uek
< 4.1.12-124.18.5.el6uek
kernel-uek-4.1.12-124.18.5.el6uek.src.rpm
oracle linux
6
x86_64
kernel-uek
< 4.1.12-124.18.5.el6uek
kernel-uek-4.1.12-124.18.5.el6uek.x86_64.rpm
oracle linux
6
x86_64
kernel-uek-debug
< 4.1.12-124.18.5.el6uek
kernel-uek-debug-4.1.12-124.18.5.el6uek.x86_64.rpm
oracle linux
6
x86_64
kernel-uek-debug-devel
< 4.1.12-124.18.5.el6uek
kernel-uek-debug-devel-4.1.12-124.18.5.el6uek.x86_64.rpm
oracle linux
6
x86_64
kernel-uek-devel
< 4.1.12-124.18.5.el6uek
kernel-uek-devel-4.1.12-124.18.5.el6uek.x86_64.rpm
oracle linux
6
noarch
kernel-uek-doc
< 4.1.12-124.18.5.el6uek
kernel-uek-doc-4.1.12-124.18.5.el6uek.noarch.rpm
oracle linux
6
noarch
kernel-uek-firmware
< 4.1.12-124.18.5.el6uek
kernel-uek-firmware-4.1.12-124.18.5.el6uek.noarch.rpm
oracle linux
7
src
kernel-uek
< 4.1.12-124.18.5.el7uek
kernel-uek-4.1.12-124.18.5.el7uek.src.rpm
oracle linux
7
x86_64
kernel-uek
< 4.1.12-124.18.5.el7uek
kernel-uek-4.1.12-124.18.5.el7uek.x86_64.rpm
oracle linux
7
x86_64
kernel-uek-debug
< 4.1.12-124.18.5.el7uek
kernel-uek-debug-4.1.12-124.18.5.el7uek.x86_64.rpm
Rows per page:
10
1-10 of 14
1
Related
nessus 66
ubuntu 9
openvas 34
cloudfoundry 2
redhat 17
amazon 2
freebsd 1
fedora 2
redhatcve 4
osv 4
xen 1
debian 5
freebsd_advisory 1
ibm 8
oraclelinux 3
cert 1
msrc 2
f5 3
mageia 4
intel 1
thn 1
threatpost 1
lenovo 2
cisco 1
cvelist 2
exploitpack 1
virtuozzo 2
prion 1
debiancve 1
packetstorm 1
ubuntucve 2
nvd 2
veracode 2
cve 2
zdt 1
canvas 1
huawei 3
akamaiblog 1
mscve 1
attackerkb 1
nessus
nessus
66
Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4196)
2018-08-15 00:00:00
OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0247) (Foreshadow)
2018-08-16 00:00:00
Ubuntu 14.04 LTS : Linux kernel vulnerabilities (USN-3742-1)
2018-08-15 00:00:00
ubuntu
ubuntu
9
Linux kernel vulnerabilities
2018-08-14 00:00:00
Linux kernel (Trusty HWE) regressions
2018-08-21 00:00:00
Linux kernel (Trusty HWE) vulnerabilities
2018-08-14 00:00:00
openvas
openvas
34
Ubuntu: Security Advisory (USN-3742-2)
2022-08-26 00:00:00
Ubuntu: Security Advisory (USN-3742-3)
2022-08-26 00:00:00
Ubuntu: Security Advisory (USN-3740-2)
2018-08-15 00:00:00
cloudfoundry
cloudfoundry
USN-3740-2: Linux kernel (HWE) vulnerabilities | Cloud Foundry
2018-09-11 00:00:00
USN-3741-2: Linux kernel (Xenial HWE) vulnerabilities | Cloud Foundry
2018-08-17 00:00:00
redhat
redhat
17
(RHSA-2018:3459) Important: kernel security, bug fix, and enhancement update
2018-11-06 14:46:26
(RHSA-2018:2404) Important: rhev-hypervisor7 security update
2018-08-15 15:14:04
(RHSA-2018:2603) Important: kernel security update
2018-08-29 18:05:21
amazon
amazon
Critical: kernel
2018-08-10 22:53:00
Critical: kernel
2018-08-10 20:26:00
freebsd
freebsd
FreeBSD -- L1 Terminal Fault (L1TF) Kernel Information Disclosure
2018-08-14 00:00:00
fedora
fedora
[SECURITY] Fedora 28 Update: kernel-headers-4.17.14-3.fc28
2018-08-16 08:08:45
[SECURITY] Fedora 27 Update: kernel-headers-4.17.14-3.fc27
2018-08-16 07:24:56
redhatcve
redhatcve
4
CVE-2018-3646
2021-01-24 22:39:20
CVE-2017-18344
2018-08-01 17:49:05
CVE-2018-3620
2021-03-20 21:41:50
osv
osv
4
linux-4.9 - security update
2018-08-28 00:00:00
linux - security update
2018-08-20 00:00:00
CVE-2017-18344
2018-07-26 19:29:00
xen
xen
L1 Terminal Fault speculative side channel
2018-08-14 17:15:00
debian
debian
5
[SECURITY] [DSA 4274-1] xen security update
2018-08-16 20:47:43
[SECURITY] [DSA 4279-1] linux security update
2018-08-20 11:44:32
[SECURITY] [DLA 1481-1] linux-4.9 security update
2018-08-28 17:10:51
freebsd_advisory
freebsd_advisory
FreeBSD-SA-18:09.l1tf
2018-08-14 00:00:00
ibm
ibm
8
Security Bulletin: L1TF - L1 Terminal Fault Attack affect IBM Netezza Host Management
2019-10-18 03:36:34
Security Bulletin: IBM Security Guardium is affected by a Foreshadow Spectre Variant vulnerability
2019-02-07 19:55:01
Security Bulletin: Multiple Foreshadow Spectre Variant vulnerabilities affect IBM OS Image for Red Hat Linux Systems in IBM PureApplication System (CVE-2018-3615 CVE-2018-3620 CVE-2018-3646)
2019-01-25 12:10:01
oraclelinux
oraclelinux
Unbreakable Enterprise kernel security update
2018-09-13 00:00:00
Unbreakable Enterprise kernel security update
2018-08-14 00:00:00
Unbreakable Enterprise kernel security update
2018-09-06 00:00:00
cert
cert
Intel processors are vulnerable to a speculative execution side-channel attack called L1 Terminal Fault (L1TF)
2018-08-15 00:00:00
msrc
msrc
Analysis and mitigation of L1 Terminal Fault (L1TF)
2018-08-13 07:00:00
Analysis and mitigation of L1 Terminal Fault (L1TF)
2018-08-13 07:00:00
f5
f5
K70675920 : August 2018 Intel security vulnerability announcement
2018-08-15 00:00:00
K07020416 : Linux kernel vulnerability CVE-2017-18344
2020-12-08 00:00:00
K74374841 : Linux kernel vulnerability CVE-2018-5391
2018-08-20 00:00:00
mageia
mageia
4
Updated kernel-linus packages fix security vulnerabilities
2018-08-19 14:24:54
Updated kernel packages fix security vulnerabilities
2018-08-19 14:24:54
Updated microcode packages fix security vulnerabilities
2018-08-19 14:24:54
intel
intel
Q3 2018 Speculative Execution Side Channel Update
2021-05-11 00:00:00
thn
thn
Foreshadow Attacks — 3 New Intel CPU Side-Channel Flaws Discovered
2018-08-15 07:40:00
threatpost
threatpost
Intel CPUs Undermined By Fresh Speculative Execution Flaws
2018-08-14 19:24:34
lenovo
lenovo
L1 Terminal Fault Side Channel Vulnerabilities - Lenovo Support NL
2018-08-16 14:27:00
L1 Terminal Fault Side Channel Vulnerabilities - US
2018-08-16 14:27:00
cisco
cisco
CPU Side-Channel Information Disclosure Vulnerabilities: August 2018
2018-08-14 17:00:00
cvelist
cvelist
CVE-2017-18344
2018-07-26 19:00:00
CVE-2018-5391 The Linux kernel, versions 3.9+, IP implementation is vulnerable to denial of service conditions with low rates of specially modified packets
2018-09-06 21:00:00
exploitpack
exploitpack
Linux Kernel 4.14.7 (Ubuntu 16.04 CentOS 7) - (KASLR SMEP Bypass) Arbitrary File Read
2018-08-09 00:00:00
virtuozzo
virtuozzo
Important kernel security update: CVE-2017-18344; Virtuozzo ReadyKernel patch 56.0 for Virtuozzo 7.0.8
2018-08-09 00:00:00
Important kernel security update: CVE-2017-18344; Virtuozzo ReadyKernel patch 56.0 for all supported Virtuozzo 7.0 kernels
2018-08-06 00:00:00
prion
prion
Design/Logic Flaw
2018-07-26 19:29:00
debiancve
debiancve
CVE-2017-18344
2018-07-26 19:29:00
packetstorm
packetstorm
Linux Kernel 4.14.7 (Ubuntu 16.04 / CentOS 7) Arbitrary File Read
2018-08-09 00:00:00
ubuntucve
ubuntucve
CVE-2017-18344
2018-07-26 00:00:00
CVE-2018-5391
2018-08-14 00:00:00
nvd
nvd
CVE-2017-18344
2018-07-26 19:29:00
CVE-2018-5391
2018-09-06 21:29:00
veracode
veracode
Information Disclosure
2019-01-15 09:26:26
Denial Of Service (DoS)
2019-05-16 03:18:37
cve
cve
CVE-2017-18344
2018-07-26 19:29:00
CVE-2018-5391
2018-09-06 21:29:00
zdt
zdt
Linux Kernel 4.14.7 ( Ubuntu 16.04 / CentOS 7) Arbitrary File Read Exploit
2018-08-09 00:00:00
canvas
canvas
Immunity Canvas: SHOW_TIMER_LEAK
2018-07-26 19:29:00
huawei
huawei
Security Advisory - CPU Side Channel Vulnerability "L1TF"
2018-08-15 00:00:00
Security Advisory - FragmentSmack Vulnerability in Linux Kernel
2019-01-23 00:00:00
Security Advisory - FragmentSmack Vulnerability in Linux Kernel
2020-01-15 00:00:00
akamaiblog
akamaiblog
Linux Kernel IP Vulnerability 2
2018-08-15 18:00:00
mscve
mscve
Windows Denial of Service Vulnerability
2018-09-11 07:00:00
attackerkb
attackerkb
CVE-2018-5391
2018-09-06 00:00:00
0.017 Low
EPSS
Percentile
87.7%
JSON
Related for ELSA-2018-4196
nessus
66
ubuntu
9
openvas
34
cloudfoundry
2
redhat
17
amazon
2
freebsd
1
fedora
2
redhatcve
4
osv
4
xen
1
debian
5
freebsd_advisory
1
ibm
8
oraclelinux
3
cert
1
msrc
2
f5
3
mageia
4
intel
1
thn
1
threatpost
1
lenovo
2
cisco
1
cvelist
2
exploitpack
1
virtuozzo
2
prion
1
debiancve
1
packetstorm
1
ubuntucve
2
nvd
2
veracode
2
cve
2
zdt
1
canvas
1
huawei
3
akamaiblog
1
mscve
1
attackerkb
1