\n \n \n
\n
\n \n 2024\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n Native BHI Vulnerability.\n \n \n \n \n\n\n \n Wiebing, S.; de Faveri Tron, A.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n April 2024.\n
Affected vendors: Intel, Linux, Other SW Vendors\n\n
\n\n
\n\n
\n\n \n \n Web\n \n \n \n CVE-2024-2201\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@misc{wiebing_native_2024,\n\ttitle = {Native {BHI} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/native-bhi CVE-2024-2201=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201},\n\tauthor = {Wiebing, Sander and de Faveri Tron, Alvise and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = apr,\n\tyear = {2024},\n\tnote = {Affected vendors: Intel, Linux, Other SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n GhostRace Vulnerability.\n \n \n \n \n\n\n \n Ragab, H.; Mambretti, A.; Kurmus, A.; and Giuffrida, C.\n\n\n \n\n\n\n March 2024.\n
Affected vendors: All Major HW Vendors, Linux, Other SW Vendors\n\n
\n\n
\n\n
\n\n \n \n Web\n \n \n \n CVE-2024-2193\n \n \n \n CVE-2024-26602 (Linux)\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@misc{ragab_ghostrace_2024,\n\ttitle = {{GhostRace} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/ghostrace CVE-2024-2193=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2193 CVE-2024-26602_(Linux)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602},\n\tauthor = {Ragab, Hany and Mambretti, Andrea and Kurmus, Anil and Giuffrida, Cristiano},\n\tmonth = mar,\n\tyear = {2024},\n\tnote = {Affected vendors: All Major HW Vendors, Linux, Other SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2023\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n Uncontained Vulnerabilities.\n \n \n \n \n\n\n \n Koschel, J.; Borrello, P.; D'Elia, D. C.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n June 2023.\n
Affected Vendors: Linux\n\n
\n\n
\n\n
\n\n \n \n Web\n \n \n \n CVE-2023-1073\n \n \n \n CVE-2023-1074\n \n \n \n CVE-2023-1075\n \n \n \n CVE-2023-1076\n \n \n \n CVE-2023-1077\n \n \n \n CVE-2023-1078\n \n \n \n CVE-2023-1079\n \n \n \n CVE-2023-25012\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 202 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n \n \n\n\n\n
\n
@misc{koschel_uncontained_2023,\n\ttitle = {Uncontained {Vulnerabilities}},\n\turl = {Web=https://vusec.net/projects/uncontained CVE-2023-1073=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1073 CVE-2023-1074=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1074 CVE-2023-1075=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1075 CVE-2023-1076=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1076 CVE-2023-1077=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1077 CVE-2023-1078=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1078 CVE-2023-1079=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1079 CVE-2023-25012=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25012},\n\tauthor = {Koschel, Jakob and Borrello, Pietro and D'Elia, Daniele Cono and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = jun,\n\tyear = {2023},\n\tnote = {Affected Vendors: Linux},\n\tkeywords = {research\\_uncontained, type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n CHOP Vulnerability.\n \n \n \n \n\n\n \n Duta, V.; Freyer, F.; Pagani, F.; Muench, M.; and Giuffrida, C.\n\n\n \n\n\n\n January 2023.\n
Affected vendors: Intel\n\n
\n\n
\n\n
\n\n \n \n CVE-2022-40196 (Intel)\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@misc{duta_chop_2023,\n\ttitle = {{CHOP} {Vulnerability}},\n\turl = {CVE-2022-40196_(Intel)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40196},\n\tauthor = {Duta, Victor and Freyer, Fabian and Pagani, Fabio and Muench, Marius and Giuffrida, Cristiano},\n\tmonth = jan,\n\tyear = {2023},\n\tnote = {Affected vendors: Intel},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2022\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n BHI (or Spectre-BHB) Vulnerability.\n \n \n \n \n\n\n \n Barberis, E.; Frigo, P.; Muench, M.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n March 2022.\n
Affected vendors: Intel (Bounty Reward), Arm, Other SW Vendors\n\n
\n\n
\n\n
\n\n \n \n Web\n \n \n \n CVE-2022-0001 (Intel)\n \n \n \n CVE-2022-0002 (Intel)\n \n \n \n CVE-2022-23960 (Arm)\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@misc{barberis_bhi_2022,\n\ttitle = {{BHI} (or {Spectre}-{BHB}) {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/bhi-spectre-bhb CVE-2022-0001_(Intel)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001 CVE-2022-0002_(Intel)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002 CVE-2022-23960_(Arm)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960},\n\tauthor = {Barberis, Enrico and Frigo, Pietro and Muench, Marius and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = mar,\n\tyear = {2022},\n\tnote = {Affected vendors: Intel (Bounty Reward), Arm, Other SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2021\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n FPVI Vulnerability.\n \n \n \n \n\n\n \n Ragab, H.; Barberis, E.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n June 2021.\n
Affected vendors: Intel (Bounty Reward), AMD, Mozilla (Bounty Reward), Other SW Vendors\n\n
\n\n
\n\n
\n\n \n \n Web\n \n \n \n CVE-2021-0086 (Intel)\n \n \n \n CVE-2021-26314 (AMD)\n \n \n \n CVE-2021-29955 (Mozilla)\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@misc{ragab_fpvi_2021,\n\ttitle = {{FPVI} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/fpvi-scsb CVE-2021-0086_(Intel)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0086 CVE-2021-26314_(AMD)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26314 CVE-2021-29955_(Mozilla)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29955},\n\tauthor = {Ragab, Hany and Barberis, Enrico and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = jun,\n\tyear = {2021},\n\tnote = {Affected vendors: Intel (Bounty Reward), AMD, Mozilla (Bounty Reward), Other SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n SCSB Vulnerability.\n \n \n \n \n\n\n \n Ragab, H.; Barberis, E.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n June 2021.\n
Affected vendors: Intel (Bounty Reward), AMD, Xen, Other SW Vendors\n\n
\n\n
\n\n
\n\n \n \n Web\n \n \n \n CVE-2021-0089 (Intel)\n \n \n \n CVE-2021-26313 (AMD)\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@misc{ragab_scsb_2021,\n\ttitle = {{SCSB} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/fpvi-scsb CVE-2021-0089_(Intel)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089 CVE-2021-26313_(AMD)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313},\n\tauthor = {Ragab, Hany and Barberis, Enrico and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = jun,\n\tyear = {2021},\n\tnote = {Affected vendors: Intel (Bounty Reward), AMD, Xen, Other SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2020\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n SRBDS (CrossTalk) Vulnerability.\n \n \n \n \n\n\n \n Ragab, H.; Milburn, A.; Razavi, K.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n June 2020.\n
Affected Vendors: Intel (Bounty Reward), SW Vendors\n\n
\n\n
\n\n
\n\n \n \n Web\n \n \n \n CVE-2020-0543 (Intel)\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@misc{ragab_srbds_2020,\n\ttitle = {{SRBDS} ({CrossTalk}) {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/crosstalk CVE-2020-0543_(Intel)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543},\n\tauthor = {Ragab, Hany and Milburn, Alyssa and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = jun,\n\tyear = {2020},\n\tnote = {Affected Vendors: Intel (Bounty Reward), SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n TRRespass Vulnerability.\n \n \n \n \n\n\n \n Frigo, P.; Vannacci, E.; Hassan, H.; van der Veen, V.; Mutlu, O.; Giuffrida, C.; Bos, H.; and Razavi, K.\n\n\n \n\n\n\n March 2020.\n
Affected Vendors: Micron, Samsung, SK Hynix, SW Vendors\n\n
\n\n
\n\n
\n\n \n \n Web\n \n \n \n CVE-2020-10255\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@misc{frigo_trrespass_2020,\n\ttitle = {{TRRespass} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/trrespass CVE-2020-10255=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10255},\n\tauthor = {Frigo, Pietro and Vannacci, Emanuele and Hassan, Hasan and van der Veen, Victor and Mutlu, Onur and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = mar,\n\tyear = {2020},\n\tnote = {Affected Vendors: Micron, Samsung, \nSK Hynix, SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2019\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n NetCAT Vulnerability.\n \n \n \n \n\n\n \n Kurth, M.; Gras, B.; Andriesse, D.; Giuffrida, C.; Bos, H.; and Razavi, K.\n\n\n \n\n\n\n September 2019.\n
Affected Vendors: Intel (Bounty Reward), SW Vendors\n\n
\n\n
\n\n
\n\n \n \n Web\n \n \n \n CVE-2019-11184\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@misc{kurth_netcat_2019,\n\ttitle = {{NetCAT} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/netcat CVE-2019-11184=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11184},\n\tauthor = {Kurth, Michael and Gras, Ben and Andriesse, Dennis and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = sep,\n\tyear = {2019},\n\tnote = {Affected Vendors: Intel (Bounty Reward), SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n MDS (RIDL) Vulnerabilities.\n \n \n \n \n\n\n \n van Schaik, S.; Milburn, A.; Österlund, S.; Frigo, P.; Maisuradze, G.; Razavi, K.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n May 2019.\n
Affected Vendors: Intel (Bounty Reward, Highest to Date), SW Vendors\n\n
\n\n
\n\n
\n\n \n \n Web\n \n \n \n CVE-2018-12127 (MLPDS)\n \n \n \n CVE-2018-12130 (MFBDS)\n \n \n \n CVE-2019-11091 (MDSUM)\n \n \n \n CVE-2019-11135 (TAA)\n \n \n \n CVE-2020-0548 (VRS)\n \n \n \n CVE-2020-0549 (L1DES)\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@misc{van_schaik_mds_2019,\n\ttitle = {{MDS} ({RIDL}) {Vulnerabilities}},\n\turl = {Web=https://mdsattacks.com CVE-2018-12127_(MLPDS)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127 CVE-2018-12130_(MFBDS)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130 CVE-2019-11091_(MDSUM)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091 CVE-2019-11135_(TAA)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135 CVE-2020-0548_(VRS)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0548 CVE-2020-0549_(L1DES)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549},\n\tauthor = {van Schaik, Stephan and Milburn, Alyssa and Österlund, Sebastian and Frigo, Pietro and Maisuradze, Giorgi and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = may,\n\tyear = {2019},\n\tnote = {Affected Vendors: Intel (Bounty Reward, Highest to Date), SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2018\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n ECCploit Vulnerability.\n \n \n \n \n\n\n \n Cojocar, L.; Razavi, K.; Giuffrida, C.; and Bos, H.\n\n\n \n\n\n\n November 2018.\n
Affected Vendors: Intel, AMD, SW Vendors\n\n
\n\n
\n\n
\n\n \n \n Web\n \n \n \n CVE-2018-18904\n \n \n \n CVE-2018-18905\n \n \n \n CVE-2018-18906\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@misc{cojocar_eccploit_2018,\n\ttitle = {{ECCploit} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/netcat CVE-2018-18904=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18904 CVE-2018-18905=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18905 CVE-2018-18906=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18906},\n\tauthor = {Cojocar, Lucian and Razavi, Kaveh and Giuffrida, Cristiano and Bos, Herbert},\n\tmonth = nov,\n\tyear = {2018},\n\tnote = {Affected Vendors: Intel, AMD, SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n GLitch Vulnerability.\n \n \n \n \n\n\n \n Frigo, P.; Giuffrida, C.; Bos, H.; and Razavi, K.\n\n\n \n\n\n\n May 2018.\n
Affected Vendors: DRAM Vendors, SW Vendors\n\n
\n\n
\n\n
\n\n \n \n Web\n \n \n \n CVE-2018-10229\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@misc{frigo_glitch_2018,\n\ttitle = {{GLitch} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/glitch CVE-2018-10229=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10229},\n\tauthor = {Frigo, Pietro and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = may,\n\tyear = {2018},\n\tnote = {Affected Vendors: DRAM Vendors, SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2017\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n AnC Vulnerability.\n \n \n \n \n\n\n \n Gras, B.; Razavi, K.; Bosman, E.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n February 2017.\n
Affected Vendors: Intel, AMD, Arm, SW Vendors\n\n
\n\n
\n\n
\n\n \n \n Web\n \n \n \n CVE-2017-5925 (Intel)\n \n \n \n CVE-2017-5926 (AMD)\n \n \n \n CVE-2017-5927 (ARM)\n \n \n \n CVE-2017-5928 (Browsers)\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@misc{gras_anc_2017,\n\ttitle = {{AnC} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/anc CVE-2017-5925_(Intel)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5925 CVE-2017-5926_(AMD)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5926 CVE-2017-5927_(ARM)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5927 CVE-2017-5928_(Browsers)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5928},\n\tauthor = {Gras, Ben and Razavi, Kaveh and Bosman, Erik and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = feb,\n\tyear = {2017},\n\tnote = {Affected Vendors: Intel, AMD, Arm, SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2016\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n Drammer Vulnerability.\n \n \n \n \n\n\n \n van der Veen, V.; Fratantonio, Y.; Lindorfer, M.; Gruss, D.; Maurice, C.; Vigna, G.; Bos, H.; Razavi, K.; and Giuffrida, C.\n\n\n \n\n\n\n October 2016.\n
Affected Vendors: DRAM Vendors, Android (Security Reward)\n\n
\n\n
\n\n
\n\n \n \n Web\n \n \n \n CVE-2016-6728\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@misc{van_der_veen_drammer_2016,\n\ttitle = {Drammer {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/drammer CVE-2016-6728=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6728},\n\tauthor = {van der Veen, Victor and Fratantonio, Yanick and Lindorfer, Martina and Gruss, Daniel and Maurice, Clementine and Vigna, Giovanni and Bos, Herbert and Razavi, Kaveh and Giuffrida, Cristiano},\n\tmonth = oct,\n\tyear = {2016},\n\tnote = {Affected Vendors: DRAM Vendors, Android (Security Reward)},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Dedup Est Machina Vulnerability.\n \n \n \n \n\n\n \n Bosman, E.; Razavi, K.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n May 2016.\n
Affected Vendors: Microsoft\n\n
\n\n
\n\n
\n\n \n \n Web\n \n \n \n CVE-2016-3272\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@misc{bosman_dedup_2016,\n\ttitle = {Dedup {Est} {Machina} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/dedup-est-machina CVE-2016-3272=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3272},\n\tauthor = {Bosman, Erik and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = may,\n\tyear = {2016},\n\tnote = {Affected Vendors: Microsoft},\n\tkeywords = {type\\_cve},\n}\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n