cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2019-0174,https://securityvulnerability.io/vulnerability/CVE-2019-0174,Logic Condition Vulnerability in Intel Microprocessors,"A logic condition vulnerability exists in specific Intel microprocessors that could allow authenticated users to potentially gain partial access to physical address information through local access. This flaw could pose a risk to system integrity, enabling potentially unauthorized data exposure.",Intel,Central Processing Units (cpus),3.3,LOW,0.0007900000200606883,false,,false,false,false,,,false,false,,2019-06-13T15:36:25.000Z,0 CVE-2018-12130,https://securityvulnerability.io/vulnerability/CVE-2018-12130,Microarchitecture Vulnerability in Intel Processors Impacting Various Products,"Microarchitectural Fill Buffer Data Sampling (MFBDS) is a vulnerability present in certain Intel microprocessors. It exploits the speculative execution feature, potentially allowing an authenticated user with local access to leak sensitive data via side-channel attacks. Affected users should apply the latest patches and microcode updates to mitigate the risk associated with this threat. For more information on impacted products and available mitigations, refer to the advisory issued by Intel.",Intel,Central Processing Units (cpus),5.6,MEDIUM,0.0007699999841861427,false,,false,false,false,,,false,false,,2019-05-30T15:40:44.000Z,0 CVE-2018-12127,https://securityvulnerability.io/vulnerability/CVE-2018-12127,Microarchitectural Load Port Data Sampling Vulnerabilities in Intel Products,"Microarchitectural Load Port Data Sampling (MLPDS) vulnerabilities affect certain Intel microprocessors, where load ports utilizing speculative execution can potentially be exploited by authenticated users. This exploitation may enable attackers to bypass security measures and extract sensitive information via a side channel, provided they have local access. Affected users are encouraged to consult the Intel security advisory for guidance on remediation and to ensure their systems are running updated microcode.",Intel,Central Processing Units (cpus),5.6,MEDIUM,0.0007699999841861427,false,,false,false,false,,,false,false,,2019-05-30T15:38:38.000Z,0 CVE-2019-11091,https://securityvulnerability.io/vulnerability/CVE-2019-11091,Microarchitectural Data Sampling Vulnerability in Intel Processors,This vulnerability relates to the Microarchitectural Data Sampling Uncacheable Memory (MDSUM) on certain Intel microprocessors that implement speculative execution. It could allow an authenticated user with local access to potentially exploit this flaw to disclose sensitive information through side channels. System administrators should apply relevant patches and mitigations as detailed in vendor advisories to protect against this vulnerability.,Intel Corporation,Central Processing Units (cpus),5.6,MEDIUM,0.0009599999757483602,false,,false,false,false,,,false,false,,2019-05-30T15:28:28.000Z,0