to the reported security vulnerabilities with an official statement. AMD originally acknowledged vulnerability to one of the Spectre variants (GPZ variant...
83 KB (7,089 words) - 02:01, 13 May 2025
Meltdown also discovered Spectre. The security vulnerability was called Meltdown because "the vulnerability basically melts security boundaries which are...
87 KB (8,241 words) - 14:35, 26 December 2024
the Spectre security vulnerability, and expects to release the newly redesigned processors later in 2018. On May 3, 2018, eight additional Spectre-class...
71 KB (5,122 words) - 09:37, 14 May 2025
Speculative Store Bypass (redirect from SSB (security vulnerability))
hardware security vulnerability and its exploitation that takes advantage of speculative execution in a similar way to the Meltdown and Spectre security vulnerabilities...
13 KB (869 words) - 01:53, 18 November 2024
Foreshadow (redirect from Foreshadow-NG (security vulnerability))
is similar to the Spectre security vulnerabilities discovered earlier to affect Intel and AMD chips, and the Meltdown vulnerability that also affected...
22 KB (1,943 words) - 13:13, 19 November 2024
SWAPGS, also known as Spectre variant 1, is a computer security vulnerability that utilizes the branch prediction used in modern microprocessors. Most...
6 KB (581 words) - 03:53, 6 February 2025
Downfall, known as Gather Data Sampling (GDS) by Intel, is a computer security vulnerability found in 6th through 11th generations of consumer and 1st through...
8 KB (570 words) - 12:20, 10 May 2025
aforementioned Ryzen 9 3950X. Zen 2 includes hardware mitigations to the Spectre security vulnerability. Zen 2-based EPYC server CPUs use a design in which multiple...
22 KB (3,206 words) - 15:19, 20 April 2025
SPECTRE ("Special Executive for Counter-intelligence, Terrorism, Revenge and Extortion") is a fictional organisation featured in the James Bond novels...
58 KB (7,445 words) - 14:52, 28 April 2025
Speculative execution (redirect from Speculative execution vulnerability)
Sampling Spectre SPOILER Pacman Anticiparallelism Out-of-order execution Slipstream (computer science) Speculative multithreading Hardware security bug Transient...
8 KB (978 words) - 23:32, 1 December 2024
believe the vulnerability posed a serious threat to users because it requires specific conditions to be exploited. Pacman is similar to Spectre, abusing...
13 KB (1,390 words) - 18:49, 19 April 2025
US The Spectre (Antarctica), a rock spire in the Queen Maud Mountains HP Spectre, a Hewlett-Packard computer Spectre (security vulnerability), a computer...
6 KB (782 words) - 19:05, 30 April 2025
Intel Management Engine (redirect from Converged Security and Manageability Engine)
vPro Meltdown (security vulnerability) Microsoft Pluton Next-Generation Secure Computing Base Samsung Knox Spectre (security vulnerability) Trusted Computing...
46 KB (4,428 words) - 21:24, 30 April 2025
In computer security, coordinated vulnerability disclosure (CVD, sometimes known as responsible disclosure) is a vulnerability disclosure model in which...
12 KB (1,019 words) - 22:06, 5 February 2025
leading to a security vulnerability. Hardware security Security bug Computer security Threat (computer) Bruce Schneier (January 5, 2018). "Spectre and Meltdown...
3 KB (295 words) - 20:51, 30 September 2022
CVE-2019-0162. Transient execution CPU vulnerability Hardware security bug Tung, Liam. "All Intel chips open to new Spoiler non-Spectre attack: Don't expect a quick...
3 KB (195 words) - 09:13, 15 August 2024
Dynamically Allocated Way Guard, a mitigation approach to the Spectre security vulnerability Alternative spelling of dog All pages with titles containing...
1 KB (215 words) - 04:51, 26 February 2025
Denial-of-service attack Pentium FDIV bug Meltdown (security vulnerability) Spectre (security vulnerability) Collins, Robert R. (1998-05-01). "The Pentium...
12 KB (1,583 words) - 04:05, 25 March 2025
ARM architecture family (section Security extensions)
ARM processors Meltdown (security vulnerability) Reduced instruction set computer (RISC) RISC-V Spectre (security vulnerability) Unicore – a 32-register...
142 KB (13,704 words) - 17:41, 14 May 2025
School, in Bangalore, India Bounds Check Bypass Store, a Spectre-NG class security vulnerability This disambiguation page lists articles associated with...
262 bytes (64 words) - 20:08, 27 December 2019
instructions accurately which can be exploited in the Meltdown and Spectre security vulnerabilities. However, if this is not available other counters or timers...
11 KB (1,248 words) - 21:48, 13 November 2024
JavaScript (redirect from JavaScript security vulnerabilities)
2010-02-18 at the Wayback Machine SecurityFocus, Microsoft WebViewFolderIcon ActiveX Control Buffer Overflow Vulnerability Archived 2011-10-11 at the Wayback...
84 KB (7,915 words) - 05:24, 10 May 2025
Lazy FP state restore (redirect from Spectre-NG 3)
as Lazy FP State Restore or LazyFP, is a security vulnerability affecting Intel Core CPUs. The vulnerability is caused by a combination of flaws in the...
7 KB (832 words) - 01:53, 18 November 2024
Microarchitectural Data Sampling (redirect from Fallout (security vulnerability))
hyperthreading. Nevertheless, the ZombieLoad vulnerability can be used by hackers exploiting the vulnerability to steal information recently accessed by...
14 KB (977 words) - 09:13, 15 August 2024
Virtual machine escape (category Computer security exploits)
CVE-2007-1744 Directory traversal vulnerability in shared folders feature for VMware CVE-2008-0923 Directory traversal vulnerability in shared folders feature...
11 KB (1,141 words) - 19:43, 5 March 2025
Site isolation (category Internet security)
unbounded process use. In 2018, following the discovery of the Spectre and Meltdown vulnerabilities to the public, Google accelerated the work, culminating in...
23 KB (2,386 words) - 14:07, 30 April 2025
Kernel page-table isolation (category Transient execution CPU vulnerabilities)
macOS released similar updates. KPTI does not address the related Spectre vulnerability. The KPTI patches were based on KAISER (short for Kernel Address...
14 KB (1,275 words) - 09:13, 15 August 2024
Software Guard Extensions (section Spectre-like attack)
College London showed a proof of concept that the Spectre speculative execution security vulnerability can be adapted to attack the secure enclave. The...
22 KB (2,135 words) - 18:53, 16 May 2025
settings CPU-X, an alternative of CPU-Z for Linux and FreeBSD Spectre (security vulnerability) Speculative Store Bypass (SSB) /proc/cpuinfo, a text file...
230 KB (12,982 words) - 10:41, 2 May 2025
Retbleed (category Transient execution CPU vulnerabilities)
and AMD chips. First made public in 2022, it is a variant of the Spectre vulnerability which exploits retpoline, which was a mitigation for speculative...
4 KB (305 words) - 09:13, 15 August 2024