CVE-2019-11135

LOW

Description

TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.

References

http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html

http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html

http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html

http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html

http://www.openwall.com/lists/oss-security/2019/12/10/3

http://www.openwall.com/lists/oss-security/2019/12/10/4

http://www.openwall.com/lists/oss-security/2019/12/11/1

https://access.redhat.com/errata/RHSA-2019:3936

https://access.redhat.com/errata/RHSA-2020:0026

https://access.redhat.com/errata/RHSA-2020:0028

https://access.redhat.com/errata/RHSA-2020:0204

https://access.redhat.com/errata/RHSA-2020:0279

https://access.redhat.com/errata/RHSA-2020:0366

https://access.redhat.com/errata/RHSA-2020:0555

https://access.redhat.com/errata/RHSA-2020:0666

https://access.redhat.com/errata/RHSA-2020:0730

https://kc.mcafee.com/corporate/index?page=content&id=SB10306

https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/

https://lists.fedoraproject.org/archives/list/[email protected]/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/

https://seclists.org/bugtraq/2019/Dec/28

https://seclists.org/bugtraq/2019/Nov/26

https://seclists.org/bugtraq/2020/Jan/21

https://security.gentoo.org/glsa/202003-56

https://support.f5.com/csp/article/K02912734?utm_source=f5support&utm_medium=RSS

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03968en_us

https://usn.ubuntu.com/4186-2/

https://www.debian.org/security/2020/dsa-4602

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html

https://www.oracle.com/security-alerts/cpujan2021.html

Details

Source: MITRE

Published: 2019-11-14

Updated: 2021-01-20

Risk Information

CVSS v2.0

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

CVSS v3.0

Base Score: 6.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Impact Score: 4

Exploitability Score: 2

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:slackware:slackware:14.2:*:*:*:*:*:*:*

Configuration 4

AND

OR

cpe:2.3:o:hp:apollo_4200_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:apollo_4200:gen10:*:*:*:*:*:*:*

Configuration 5

AND

OR

cpe:2.3:o:hp:apollo_2000_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:apollo_2000:-:*:*:*:*:*:*:*

Configuration 6

AND

OR

cpe:2.3:o:hp:proliant_bl460c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_bl460c:gen10:*:*:*:*:*:*:*

Configuration 7

AND

OR

cpe:2.3:o:hp:proliant_dl580_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_dl580:gen10:*:*:*:*:*:*:*

Configuration 8

AND

OR

cpe:2.3:o:hp:proliant_dl560_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_dl560:gen10:*:*:*:*:*:*:*

Configuration 9

AND

OR

cpe:2.3:o:hp:proliant_dl380_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_dl380:gen10:*:*:*:*:*:*:*

Configuration 10

AND

OR

cpe:2.3:o:hp:proliant_dl360_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_dl360:gen10:*:*:*:*:*:*:*

Configuration 11

AND

OR

cpe:2.3:o:hp:proliant_dl180_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_dl180:gen10:*:*:*:*:*:*:*

Configuration 12

AND

OR

cpe:2.3:o:hp:proliant_dl160_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_dl160:gen10:*:*:*:*:*:*:*

Configuration 13

AND

OR

cpe:2.3:o:hp:proliant_dl120_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_dl120:gen10:*:*:*:*:*:*:*

Configuration 14

AND

OR

cpe:2.3:o:hp:proliant_dl20_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_dl20:gen10:*:*:*:*:*:*:*

Configuration 15

AND

OR

cpe:2.3:o:hp:proliant_ml350_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_ml350:gen10:*:*:*:*:*:*:*

Configuration 16

AND

OR

cpe:2.3:o:hp:proliant_ml110_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_ml110:gen10:*:*:*:*:*:*:*

Configuration 17

AND

OR

cpe:2.3:o:hp:proliant_ml30_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_ml30:gen10:*:*:*:*:*:*:*

Configuration 18

AND

OR

cpe:2.3:o:hp:proliant_xl450_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_xl450:gen10:*:*:*:*:*:*:*

Configuration 19

AND

OR

cpe:2.3:o:hp:proliant_xl270d_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_xl270d:gen10:*:*:*:*:*:*:*

Configuration 20

AND

OR

cpe:2.3:o:hp:proliant_xl230k_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_xl230k:gen10:*:*:*:*:*:*:*

Configuration 21

AND

OR

cpe:2.3:o:hp:proliant_xl190r_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_xl190r:gen10:*:*:*:*:*:*:*

Configuration 22

AND

OR

cpe:2.3:o:hp:proliant_xl170r_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_xl170r:gen10:*:*:*:*:*:*:*

Configuration 23

AND

OR

cpe:2.3:o:hp:synergy_480_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:synergy_480:gen10:*:*:*:*:*:*:*

Configuration 24

AND

OR

cpe:2.3:o:hp:synergy_660_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:synergy_660:gen10:*:*:*:*:*:*:*

Configuration 25

AND

OR

cpe:2.3:o:hp:proliant_e910_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_e910:-:*:*:*:*:*:*:*

Configuration 26

AND

OR

cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*

Configuration 27

AND

OR

cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*

Configuration 28

AND

OR

cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*

Configuration 29

AND

OR

cpe:2.3:o:intel:core_i5-10110y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*

Configuration 30

AND

OR

cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*

Configuration 31

AND

OR

cpe:2.3:o:intel:core_i5-8310y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*

Configuration 32

AND

OR

cpe:2.3:o:intel:core_i5-8210y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*

Configuration 33

AND

OR

cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*

Configuration 34

AND

OR

cpe:2.3:o:intel:core_m3-8100y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*

Configuration 35

AND

OR

cpe:2.3:o:intel:xeon_8253_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8253:-:*:*:*:*:*:*:*

Configuration 36

AND

OR

cpe:2.3:o:intel:xeon_8256_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8256:-:*:*:*:*:*:*:*

Configuration 37

AND

OR

cpe:2.3:o:intel:xeon_8260_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8260:-:*:*:*:*:*:*:*

Configuration 38

AND

OR

cpe:2.3:o:intel:xeon_8260l_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8260l:-:*:*:*:*:*:*:*

Configuration 39

AND

OR

cpe:2.3:o:intel:xeon_8260m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8260m:-:*:*:*:*:*:*:*

Configuration 40

AND

OR

cpe:2.3:o:intel:xeon_8260y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8260y:-:*:*:*:*:*:*:*

Configuration 41

AND

OR

cpe:2.3:o:intel:xeon_8268_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8268:-:*:*:*:*:*:*:*

Configuration 42

AND

OR

cpe:2.3:o:intel:xeon_8270_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8270:-:*:*:*:*:*:*:*

Configuration 43

AND

OR

cpe:2.3:o:intel:xeon_8276_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8276:-:*:*:*:*:*:*:*

Configuration 44

AND

OR

cpe:2.3:o:intel:xeon_8276l_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8276l:-:*:*:*:*:*:*:*

Configuration 45

AND

OR

cpe:2.3:o:intel:xeon_8276m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8276m:-:*:*:*:*:*:*:*

Configuration 46

AND

OR

cpe:2.3:o:intel:xeon_8280_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8280:-:*:*:*:*:*:*:*

Configuration 47

AND

OR

cpe:2.3:o:intel:xeon_8280l_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8280l:-:*:*:*:*:*:*:*

Configuration 48

AND

OR

cpe:2.3:o:intel:xeon_8280m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8280m:-:*:*:*:*:*:*:*

Configuration 49

AND

OR

cpe:2.3:o:intel:xeon_9220_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_9220:-:*:*:*:*:*:*:*

Configuration 50

AND

OR

cpe:2.3:o:intel:xeon_9221_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_9221:-:*:*:*:*:*:*:*

Configuration 51

AND

OR

cpe:2.3:o:intel:xeon_9222_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_9222:-:*:*:*:*:*:*:*

Configuration 52

AND

OR

cpe:2.3:o:intel:xeon_9242_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_9242:-:*:*:*:*:*:*:*

Configuration 53

AND

OR

cpe:2.3:o:intel:xeon_9282_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_9282:-:*:*:*:*:*:*:*

Configuration 54

AND

OR

cpe:2.3:o:intel:xeon_5215_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5215:-:*:*:*:*:*:*:*

Configuration 55

AND

OR

cpe:2.3:o:intel:xeon_5215l_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5215l:-:*:*:*:*:*:*:*

Configuration 56

AND

OR

cpe:2.3:o:intel:xeon_5215m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5215m:-:*:*:*:*:*:*:*

Configuration 57

AND

OR

cpe:2.3:o:intel:xeon_5215r_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5215r:-:*:*:*:*:*:*:*

Configuration 58

AND

OR

cpe:2.3:o:intel:xeon_5217_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5217:-:*:*:*:*:*:*:*

Configuration 59

AND

OR

cpe:2.3:o:intel:xeon_5218_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5218:-:*:*:*:*:*:*:*

Configuration 60

AND

OR

cpe:2.3:o:intel:xeon_5218b_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5218b:-:*:*:*:*:*:*:*

Configuration 61

AND

OR

cpe:2.3:o:intel:xeon_5218n_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5218n:-:*:*:*:*:*:*:*

Configuration 62

AND

OR

cpe:2.3:o:intel:xeon_5218t_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5218t:-:*:*:*:*:*:*:*

Configuration 63

AND

OR

cpe:2.3:o:intel:xeon_5220_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5220:-:*:*:*:*:*:*:*

Configuration 64

AND

OR

cpe:2.3:o:intel:xeon_5220r_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5220r:-:*:*:*:*:*:*:*

Configuration 65

AND

OR

cpe:2.3:o:intel:xeon_5220s_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5220s:-:*:*:*:*:*:*:*

Configuration 66

AND

OR

cpe:2.3:o:intel:xeon_5220t_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5220t:-:*:*:*:*:*:*:*

Configuration 67

AND

OR

cpe:2.3:o:intel:xeon_5222_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5222:-:*:*:*:*:*:*:*

Configuration 68

AND

OR

cpe:2.3:o:intel:xeon_6222v_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6222v:-:*:*:*:*:*:*:*

Configuration 69

AND

OR

cpe:2.3:o:intel:xeon_6226_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6226:-:*:*:*:*:*:*:*

Configuration 70

AND

OR

cpe:2.3:o:intel:xeon_6230_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6230:-:*:*:*:*:*:*:*

Configuration 71

AND

OR

cpe:2.3:o:intel:xeon_6230n_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6230n:-:*:*:*:*:*:*:*

Configuration 72

AND

OR

cpe:2.3:o:intel:xeon_6230t_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6230t:-:*:*:*:*:*:*:*

Configuration 73

AND

OR

cpe:2.3:o:intel:xeon_6234_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6234:-:*:*:*:*:*:*:*

Configuration 74

AND

OR

cpe:2.3:o:intel:xeon_6238_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6238:-:*:*:*:*:*:*:*

Configuration 75

AND

OR

cpe:2.3:o:intel:xeon_6238l_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6238l:-:*:*:*:*:*:*:*

Configuration 76

AND

OR

cpe:2.3:o:intel:xeon_6238m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6238m:-:*:*:*:*:*:*:*

Configuration 77

AND

OR

cpe:2.3:o:intel:xeon_6238t_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6238t:-:*:*:*:*:*:*:*

Configuration 78

AND

OR

cpe:2.3:o:intel:xeon_6240_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6240:-:*:*:*:*:*:*:*

Configuration 79

AND

OR

cpe:2.3:o:intel:xeon_6240l_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6240l:-:*:*:*:*:*:*:*

Configuration 80

AND

OR

cpe:2.3:o:intel:xeon_6240m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6240m:-:*:*:*:*:*:*:*

Configuration 81

AND

OR

cpe:2.3:o:intel:xeon_6240y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6240y:-:*:*:*:*:*:*:*

Configuration 82

AND

OR

cpe:2.3:o:intel:xeon_6242_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6242:-:*:*:*:*:*:*:*

Configuration 83

AND

OR

cpe:2.3:o:intel:xeon_6244_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6244:-:*:*:*:*:*:*:*

Configuration 84

AND

OR

cpe:2.3:o:intel:xeon_6246_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6246:-:*:*:*:*:*:*:*

Configuration 85

AND

OR

cpe:2.3:o:intel:xeon_6248_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6248:-:*:*:*:*:*:*:*

Configuration 86

AND

OR

cpe:2.3:o:intel:xeon_6252_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6252:-:*:*:*:*:*:*:*

Configuration 87

AND

OR

cpe:2.3:o:intel:xeon_6252n_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6252n:-:*:*:*:*:*:*:*

Configuration 88

AND

OR

cpe:2.3:o:intel:xeon_6254_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6254:-:*:*:*:*:*:*:*

Configuration 89

AND

OR

cpe:2.3:o:intel:xeon_6262v_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6262v:-:*:*:*:*:*:*:*

Configuration 90

AND

OR

cpe:2.3:o:intel:xeon_4208_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4208:-:*:*:*:*:*:*:*

Configuration 91

AND

OR

cpe:2.3:o:intel:xeon_4208r_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4208r:-:*:*:*:*:*:*:*

Configuration 92

AND

OR

cpe:2.3:o:intel:xeon_4209t_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4209t:-:*:*:*:*:*:*:*

Configuration 93

AND

OR

cpe:2.3:o:intel:xeon_4210_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4210:-:*:*:*:*:*:*:*

Configuration 94

AND

OR

cpe:2.3:o:intel:xeon_4210r_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4210r:-:*:*:*:*:*:*:*

Configuration 95

AND

OR

cpe:2.3:o:intel:xeon_4214_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4214:-:*:*:*:*:*:*:*

Configuration 96

AND

OR

cpe:2.3:o:intel:xeon_4214c_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4214c:-:*:*:*:*:*:*:*

Configuration 97

AND

OR

cpe:2.3:o:intel:xeon_4214r_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4214r:-:*:*:*:*:*:*:*

Configuration 98

AND

OR

cpe:2.3:o:intel:xeon_4214y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4214y:-:*:*:*:*:*:*:*

Configuration 99

AND

OR

cpe:2.3:o:intel:xeon_4215_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4215:-:*:*:*:*:*:*:*

Configuration 100

AND

OR

cpe:2.3:o:intel:xeon_4216_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4216:-:*:*:*:*:*:*:*

Configuration 101

AND

OR

cpe:2.3:o:intel:xeon_4216r_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4216r:-:*:*:*:*:*:*:*

Configuration 102

AND

OR

cpe:2.3:o:intel:xeon_3204_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_3204:-:*:*:*:*:*:*:*

Configuration 103

AND

OR

cpe:2.3:o:intel:xeon_3206r_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_3206r:-:*:*:*:*:*:*:*

Configuration 104

AND

OR

cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*

Configuration 105

AND

OR

cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*

Configuration 106

AND

OR

cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*

Configuration 107

AND

OR

cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*

Configuration 108

AND

OR

cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*

Configuration 109

AND

OR

cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*

Configuration 110

AND

OR

cpe:2.3:o:intel:xeon_w-3235_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*

Configuration 111

AND

OR

cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*

Configuration 112

AND

OR

cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*

Configuration 113

AND

OR

cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*

Configuration 114

AND

OR

cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*

Configuration 115

AND

OR

cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*

Configuration 116

AND

OR

cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*

Configuration 117

AND

OR

cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*

Configuration 118

AND

OR

cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*

Configuration 119

AND

OR

cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*

Configuration 120

AND

OR

cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*

Configuration 121

AND

OR

cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*

Configuration 122

AND

OR

cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*

Configuration 123

AND

OR

cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*

Configuration 124

AND

OR

cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*

Configuration 125

AND

OR

cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*

Configuration 126

AND

OR

cpe:2.3:o:intel:core_i5-9300h_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*

Configuration 127

AND

OR

cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*

Configuration 128

AND

OR

cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*

Configuration 129

AND

OR

cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*

Configuration 130

AND

OR

cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*

Configuration 131

AND

OR

cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*

Configuration 132

AND

OR

cpe:2.3:o:intel:core_i5-9600kf_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*

Configuration 133

AND

OR

cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*

Configuration 134

AND

OR

cpe:2.3:o:intel:core_i5-9400f_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*

Configuration 135

AND

OR

cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*

Configuration 136

AND

OR

cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*

Configuration 137

AND

OR

cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*

Configuration 138

AND

OR

cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*

Configuration 139

AND

OR

cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*

Configuration 140

AND

OR

cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*

Configuration 141

AND

OR

cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*

Configuration 142

AND

OR

cpe:2.3:o:intel:pentium_6405u_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:pentium_6405u:-:*:*:*:*:*:*:*

Configuration 143

AND

OR

cpe:2.3:o:intel:celeron_5305u_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*

Configuration 144

AND

OR

cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*

Configuration 145

AND

OR

cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*

Configuration 146

AND

OR

cpe:2.3:o:intel:core_i5-8365u_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*

Configuration 147

AND

OR

cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*

Configuration 148

OR

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

Tenable Plugins

View all (140 total)

IDNameProductFamilySeverity
145983CentOS 8 : virt:rhel (CESA-2020:0279)NessusCentOS Local Security Checks
low
140038Oracle Linux 8 : virt:ol (ELSA-2020-0279)NessusOracle Linux Local Security Checks
low
140019OracleVM 3.4 : xen (OVMSA-2020-0039) (Bunker Buster) (Foreshadow) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (Meltdown) (POODLE) (Spectre)NessusOracleVM Local Security Checks
critical
138011EulerOS Virtualization 3.0.6.0 : kvm (EulerOS-SA-2020-1792)NessusHuawei Local Security Checks
high
138009EulerOS Virtualization 3.0.6.0 : qemu-kvm (EulerOS-SA-2020-1790)NessusHuawei Local Security Checks
high
137739OracleVM 3.3 / 3.4 : microcode_ctl (OVMSA-2020-0026) (Spectre)NessusOracleVM Local Security Checks
medium
136239EulerOS Virtualization for ARM 64 3.0.2.0 : kernel (EulerOS-SA-2020-1536)NessusHuawei Local Security Checks
critical
135559EulerOS 2.0 SP3 : qemu-kvm (EulerOS-SA-2020-1430)NessusHuawei Local Security Checks
critical
135525EulerOS 2.0 SP3 : kernel (EulerOS-SA-2020-1396)NessusHuawei Local Security Checks
critical
135129EulerOS Virtualization for ARM 64 3.0.6.0 : kernel (EulerOS-SA-2020-1342)NessusHuawei Local Security Checks
critical
134964GLSA-202003-56 : Xen: Multiple vulnerabilities (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)NessusGentoo Local Security Checks
high
134648Scientific Linux Security Update : kernel on SL7.x x86_64 (20200317)NessusScientific Linux Local Security Checks
high
134344RHEL 7 : Virtualization Manager (RHSA-2020:0730)NessusRed Hat Local Security Checks
medium
134312NewStart CGSL MAIN 4.05 : kernel Multiple Vulnerabilities (NS-SA-2020-0021)NessusNewStart CGSL Local Security Checks
high
134263RHEL 7 : qemu-kvm (RHSA-2020:0666)NessusRed Hat Local Security Checks
low
134174Xen Information Disclosure Vulnerability (XSA-305)NessusMisc.
low
133992EulerOS 2.0 SP8 : kernel (EulerOS-SA-2020-1158)NessusHuawei Local Security Checks
critical
133913EulerOS 2.0 SP5 : kernel (EulerOS-SA-2020-1112)NessusHuawei Local Security Checks
critical
133825RHEL 8 : Virtualization Manager (RHSA-2020:0555)NessusRed Hat Local Security Checks
low
133763SUSE SLES12 Security Update : xen (SUSE-SU-2020:0388-1)NessusSuSE Local Security Checks
high
133539SUSE SLES12 Security Update : xen (SUSE-SU-2020:0334-1)NessusSuSE Local Security Checks
high
133518Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20200205)NessusScientific Linux Local Security Checks
medium
133513Oracle Linux 7 : qemu-kvm (ELSA-2020-0366)NessusOracle Linux Local Security Checks
medium
133507CentOS 7 : qemu-kvm (CESA-2020:0366)NessusCentOS Local Security Checks
medium
133482RHEL 7 : qemu-kvm (RHSA-2020:0366)NessusRed Hat Local Security Checks
medium
133338RHEL 8 : virt:rhel (RHSA-2020:0279)NessusRed Hat Local Security Checks
low
133221RHEL 8 : kernel (RHSA-2020:0204)NessusRed Hat Local Security Checks
critical
133072NewStart CGSL CORE 5.05 / MAIN 5.05 : kernel Multiple Vulnerabilities (NS-SA-2020-0002)NessusNewStart CGSL Local Security Checks
high
132925SUSE SLES12 Security Update : kernel (SUSE-SU-2020:0093-1)NessusSuSE Local Security Checks
critical
132875Debian DSA-4602-1 : xen - security update (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)NessusDebian Local Security Checks
high
132687RHEL 7 : kpatch-patch (RHSA-2020:0028)NessusRed Hat Local Security Checks
low
132685RHEL 7 : kpatch-patch (RHSA-2020:0026)NessusRed Hat Local Security Checks
low
132536Photon OS 2.0: Linux PHSA-2019-2.0-0191NessusPhotonOS Local Security Checks
low
132520Photon OS 1.0: Linux PHSA-2019-1.0-0259NessusPhotonOS Local Security Checks
low
132516openSUSE Security Update : spectre-meltdown-checker (openSUSE-2019-2710)NessusSuSE Local Security Checks
low
132513Debian DLA-2051-1 : intel-microcode security updateNessusDebian Local Security Checks
low
132499NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0266)NessusNewStart CGSL Local Security Checks
high
132490NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0264)NessusNewStart CGSL Local Security Checks
high
132337SUSE SLED15 / SLES15 Security Update : spectre-meltdown-checker (SUSE-SU-2019:3348-1)NessusSuSE Local Security Checks
low
132334SUSE SLES12 Security Update : spectre-meltdown-checker (SUSE-SU-2019:3340-1)NessusSuSE Local Security Checks
low
132101Windows Speculative Execution Configuration CheckNessusWindows
medium
132073SUSE SLES12 Security Update : xen (SUSE-SU-2019:3297-1)NessusSuSE Local Security Checks
high
132071SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:3295-1)NessusSuSE Local Security Checks
high
131833SUSE SLES12 Security Update : kernel (SUSE-SU-2019:3200-1)NessusSuSE Local Security Checks
high
131694Ubuntu 16.04 LTS / 18.04 LTS / 19.04 / 19.10 : intel-microcode regression (USN-4182-3)NessusUbuntu Local Security Checks
low
131552SUSE SLES12 Security Update : ucode-intel (SUSE-SU-2019:3091-1)NessusSuSE Local Security Checks
low
131460Fedora 30 : xen (2019-cbb732f760)NessusFedora Local Security Checks
high
131297FreeBSD : FreeBSD -- Intel CPU Microcode Update (fbe10a8a-05a1-11ea-9dfa-f8b156ac3ff9) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (Spectre)NessusFreeBSD Local Security Checks
high
131272Oracle Linux 8 : kernel (ELSA-2019-3832)NessusOracle Linux Local Security Checks
low
131227Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2019-089)NessusVirtuozzo Local Security Checks
high
131208OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0056)NessusOracleVM Local Security Checks
high
131177RHEL 8 : kpatch-patch (RHSA-2019:3936)NessusRed Hat Local Security Checks
low
131174Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4850)NessusOracle Linux Local Security Checks
high
131156openSUSE Security Update : ucode-intel (openSUSE-2019-2528)NessusSuSE Local Security Checks
low
131155openSUSE Security Update : ucode-intel (openSUSE-2019-2527)NessusSuSE Local Security Checks
low
131143Fedora 31 : xen (2019-376ec5c107)NessusFedora Local Security Checks
high
131129VMware Workstation 15.0.x < 15.5.1 Multiple Vulnerabilities (VMSA-2019-0020, VMSA-2019-0021)NessusWindows
medium
131128VMware Fusion 11.0.x < 11.5.1 Multiple Vulnerabilities (VMSA-2019-0020, VMSA-2019-0021)NessusMacOS X Local Security Checks
medium
131123SUSE SLED12 / SLES12 Security Update : ucode-intel (SUSE-SU-2019:2988-1)NessusSuSE Local Security Checks
low
131122SUSE SLED15 / SLES15 Security Update : ucode-intel (SUSE-SU-2019:2987-1)NessusSuSE Local Security Checks
low
131121SUSE SLED15 / SLES15 Security Update : ucode-intel (SUSE-SU-2019:2986-1)NessusSuSE Local Security Checks
low
131120SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2984-1)NessusSuSE Local Security Checks
critical
131114Slackware 14.2 : Slackware 14.2 kernel (SSA:2019-320-01)NessusSlackware Local Security Checks
high
131110Oracle Linux 7 : kernel (ELSA-2019-3834)NessusOracle Linux Local Security Checks
low
131083Amazon Linux AMI : microcode_ctl / kernel (ALAS-2019-1318)NessusAmazon Linux Local Security Checks
low
131082Amazon Linux 2 : microcode_ctl / kernel (ALAS-2019-1364)NessusAmazon Linux Local Security Checks
low
131064openSUSE Security Update : qemu (openSUSE-2019-2510)NessusSuSE Local Security Checks
medium
131063openSUSE Security Update : ucode-intel (openSUSE-2019-2509)NessusSuSE Local Security Checks
low
131062openSUSE Security Update : xen (openSUSE-2019-2508)NessusSuSE Local Security Checks
high
131061openSUSE Security Update : the Linux Kernel (openSUSE-2019-2507)NessusSuSE Local Security Checks
high
131060openSUSE Security Update : xen (openSUSE-2019-2506)NessusSuSE Local Security Checks
high
131059openSUSE Security Update : qemu (openSUSE-2019-2505)NessusSuSE Local Security Checks
low
131058openSUSE Security Update : ucode-intel (openSUSE-2019-2504)NessusSuSE Local Security Checks
low
131057openSUSE Security Update : the Linux Kernel (openSUSE-2019-2503)NessusSuSE Local Security Checks
high
131032CentOS 7 : kernel (CESA-2019:3834)NessusCentOS Local Security Checks
low
131018VMSA-2019-0020 : Hypervisor-Specific Mitigations for Denial-of-Service and Speculative-Execution VulnerabilitiesNessusVMware ESX Local Security Checks
low
131014Ubuntu 16.04 LTS : Linux kernel vulnerability (USN-4186-3)NessusUbuntu Local Security Checks
high
131013Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel vulnerability and regression (USN-4185-3)NessusUbuntu Local Security Checks
high
131012Ubuntu 18.04 LTS / 19.04 : Linux kernel vulnerability and regression (USN-4184-2)NessusUbuntu Local Security Checks
high
131011Ubuntu 19.10 : Linux kernel vulnerability (USN-4183-2)NessusUbuntu Local Security Checks
high
131007Scientific Linux Security Update : kernel on SL7.x x86_64 (20191113)NessusScientific Linux Local Security Checks
low
131006Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20191113)NessusScientific Linux Local Security Checks
low
130999RHEL 7 : Virtualization Manager (RHSA-2019:3860)NessusRed Hat Local Security Checks
low
130998RHEL 6 : MRG (RHSA-2019:3844)NessusRed Hat Local Security Checks
low
130997Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2019-4839)NessusOracle Linux Local Security Checks
low
130996Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4838)NessusOracle Linux Local Security Checks
low
130995Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4837)NessusOracle Linux Local Security Checks
low
130994Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2019-4836)NessusOracle Linux Local Security Checks
low
130993Oracle Linux 6 : kernel (ELSA-2019-3836)NessusOracle Linux Local Security Checks
low
130989Fedora 29 : 2:microcode_ctl / kernel / kernel-headers / kernel-tools (2019-7a3fc17778)NessusFedora Local Security Checks
high
130983Debian DSA-4565-1 : intel-microcode - security updateNessusDebian Local Security Checks
low
130982Debian DSA-4564-1 : linux - security updateNessusDebian Local Security Checks
high
130979Debian DLA-1990-1 : linux-4.9 security updateNessusDebian Local Security Checks
high
130978CentOS 6 : kernel (CESA-2019:3836)NessusCentOS Local Security Checks
low
130966Ubuntu 16.04 LTS : Linux kernel vulnerabilities (USN-4186-1)NessusUbuntu Local Security Checks
high
130965Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel vulnerabilities (USN-4185-1)NessusUbuntu Local Security Checks
high
130964Ubuntu 18.04 LTS / 19.04 : Linux kernel vulnerabilities (USN-4184-1)NessusUbuntu Local Security Checks
high
130963Ubuntu 19.10 : Linux kernel vulnerabilities (USN-4183-1)NessusUbuntu Local Security Checks
high
130962Ubuntu 16.04 LTS / 18.04 LTS / 19.04 / 19.10 : Intel Microcode update (USN-4182-1)NessusUbuntu Local Security Checks
low
130960SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2019:2962-1)NessusSuSE Local Security Checks
high
130959SUSE SLED15 / SLES15 Security Update : xen (SUSE-SU-2019:2961-1)NessusSuSE Local Security Checks
high
130958SUSE SLED15 / SLES15 Security Update : xen (SUSE-SU-2019:2960-1)NessusSuSE Local Security Checks
high
130957SUSE SLED12 / SLES12 Security Update : ucode-intel (SUSE-SU-2019:2959-1)NessusSuSE Local Security Checks
low
130956SUSE SLED15 / SLES15 Security Update : ucode-intel (SUSE-SU-2019:2958-1)NessusSuSE Local Security Checks
low
130955SUSE SLED15 / SLES15 Security Update : ucode-intel (SUSE-SU-2019:2957-1)NessusSuSE Local Security Checks
low
130954SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2019:2956-1)NessusSuSE Local Security Checks
low
130953SUSE SLED15 / SLES15 Security Update : qemu (SUSE-SU-2019:2955-1)NessusSuSE Local Security Checks
medium
130952SUSE SLED15 / SLES15 Security Update : qemu (SUSE-SU-2019:2954-1)NessusSuSE Local Security Checks
low
130951SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2953-1)NessusSuSE Local Security Checks
high
130950SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2950-1) (SACK Panic)NessusSuSE Local Security Checks
critical
130949SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2949-1)NessusSuSE Local Security Checks
critical
130948SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:2948-1)NessusSuSE Local Security Checks
high
130947SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:2947-1)NessusSuSE Local Security Checks
high
130946SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:2946-1)NessusSuSE Local Security Checks
high
130935RHEL 6 : kernel (RHSA-2019:3843)NessusRed Hat Local Security Checks
low
130934RHEL 6 : kernel (RHSA-2019:3842)NessusRed Hat Local Security Checks
low
130933RHEL 7 : kernel (RHSA-2019:3841)NessusRed Hat Local Security Checks
high
130932RHEL 7 : kernel (RHSA-2019:3840)NessusRed Hat Local Security Checks
low
130931RHEL 7 : kernel (RHSA-2019:3839)NessusRed Hat Local Security Checks
low
130930RHEL 7 : kernel (RHSA-2019:3838)NessusRed Hat Local Security Checks
low
130929RHEL 7 : kernel (RHSA-2019:3837)NessusRed Hat Local Security Checks
low
130928RHEL 6 : kernel (RHSA-2019:3836)NessusRed Hat Local Security Checks
low
130927RHEL 7 : kernel-rt (RHSA-2019:3835)NessusRed Hat Local Security Checks
low
130926RHEL 7 : kernel (RHSA-2019:3834)NessusRed Hat Local Security Checks
low
130925RHEL 8 : kernel-rt (RHSA-2019:3833)NessusRed Hat Local Security Checks
low
130924RHEL 8 : kernel (RHSA-2019:3832)NessusRed Hat Local Security Checks
low
130923OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0052)NessusOracleVM Local Security Checks
low
130920Fedora 31 : 2:microcode_ctl / kernel / kernel-headers / kernel-tools (2019-68d7f68507)NessusFedora Local Security Checks
high
130919Fedora 30 : 2:microcode_ctl / kernel / kernel-headers / kernel-tools (2019-1689d3fe07)NessusFedora Local Security Checks
high
130918Debian DLA-1989-1 : linux security updateNessusDebian Local Security Checks
low
130910KB4525253: Windows Server 2012 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
130909KB4525250: Windows 8.1 and Windows Server 2012 R2 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
130908KB4525241: Windows 10 Version 1709 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
130907KB4525237: Windows 10 Version 1803 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
130906KB4525236: Windows 10 Version 1607 and Windows Server 2016 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
130905KB4525233: Windows 7 and Windows Server 2008 R2 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
130904KB4525239: Windows Server 2008 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
130903KB4525232: Windows 10 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
130902KB4524570: Windows 10 Version 1903 and Windows 10 Version 1909 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
130901KB4523205: Windows 10 Version 1809 and Windows Server 2019 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high