Product Notes
List of available documentation.
Effective Date | Title | Description | Size |
---|---|---|---|
2024/05/03 17:35:23 GMT+2 |
![]() |
On the 2nd of February, 2024, information regarding a recently identified vulnerability, known as CVE-2023-40547, was made public. This vulnerability affects th... | 283.7 KB |
2024/05/03 17:24:20 GMT+2 |
![]() |
IPMI (Intelligent Platform Management Interface) is a set of standardized specifications for hardware-based platform management systems that makes it possible t... | 263.4 KB |
2024/05/03 17:23:06 GMT+2 |
![]() |
Eviden is aware of the backdoor discovered in some recent versions of the compression tools XZ. After verification, Eviden products are not affected by this vul... | 181.3 KB |
2024/05/03 16:01:00 GMT+2 |
![]() |
SchedMD informed about responsible disclosure of a set of security vulnerabilities within Slurm. The maintenance releases - 23.11.1, 23.02.7, and 22.05.10 inclu... | 208.8 KB |
2024/05/03 14:32:05 GMT+2 |
![]() |
The BMCs of Bullion S and BullSequana S servers, if left in their original configuration, allow usage of vulnerable SSL or TLS protocols. Usual vulnerability sc... | 253.8 KB |
2024/03/22 14:03:08 GMT+1 |
![]() |
A vulnerability has been discovered internally on the Eviden CardOS API Windows installer. It allows Local Privilege Escalation from regular user to SYSTEM. Thi... | 166.7 KB |
2024/03/14 21:02:10 GMT+1 |
![]() |
Eviden is liaising closely with its suppliers and investigating the exact nature of these vulnerabilities to provide validated remediation. Intel reported Techn... | 190.6 KB |
2024/03/14 20:43:57 GMT+1 |
![]() |
A flaw in Intel processors may allow a privileged user to potentially enable escalation of privilege via local access. This vulnerability affects some servers o... | 323.4 KB |
2024/03/05 11:16:35 GMT+1 |
![]() |
The encryption of BitLocker was compromised by Stacksmashing, a Youtuber who released a video explaining the method he used to intercept BitLocker data, extract... | 153.7 KB |
2024/03/05 10:32:25 GMT+1 |
![]() |
OpenPMIx PMIx before 4.2.6 and 5.0.x before 5.0.1 could permit a malicious user to obtain ownership of an arbitrary file on the filesystem when parts of the PMI... | 280.9 KB |