Lucene search

K

CVE-2018-12126

🗓️ 30 May 2019 16:00:29Reported by intelType 
cve
 cve
🔗 web.nvd.nist.gov👁 536 Views🌐 22 Media mentions

Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access

Show more
Related
Detection
Affected
Refs
Social
ReporterTitlePublishedViews
Family
Tenable Nessus
F5 Networks BIG-IP : Microarchitectural Store Buffer Data Sampling (MSBDS) (K52370164)
2 Nov 202300:00
nessus
Tenable Nessus
Oracle Linux 6 : qemu-kvm (ELSA-2019-1181) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)
15 May 201900:00
nessus
Tenable Nessus
Citrix XenServer Microarchitectural Data Sampling Speculative Side-Channel Vulnerabilities (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (CTX2251995)
30 May 201900:00
nessus
Tenable Nessus
RHEL 7 : libvirt (RHSA-2019:1186) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)
15 May 201900:00
nessus
Tenable Nessus
RHEL 6 : kernel (RHSA-2019:1169) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)
14 May 201900:00
nessus
Tenable Nessus
Fedora 28 : 2:qemu / libvirt (2019-6e146a714c) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)
21 May 201900:00
nessus
Tenable Nessus
OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0018) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)
15 May 201900:00
nessus
Tenable Nessus
RHEL 7 : qemu-kvm (RHSA-2019:1185) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)
14 May 201900:00
nessus
Tenable Nessus
Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2019-4637)
15 May 201900:00
nessus
Tenable Nessus
RHEL 6 : qemu-kvm (RHSA-2019:1181) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)
14 May 201900:00
nessus
Rows per page
[
  {
    "product": "Central ProcCVE-2018-12126essing Units (CPUs)",
    "vendor": "Intel Corporation",
    "versions": [
      {
        "status": "affected",
        "version": "A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf"
      }
    ]
  }
]

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo