Comment on Researchers discover new security vulnerability in Intel processors

<- View Parent
prettybunnys@sh.itjust.works ⁨3⁩ ⁨weeks⁩ ago

CVEs follow a naming convention, the exploit name is usually given by the researcher/hacker/whoever finds and documents it

source
Sort:hotnewtop