{"vulnerability": "CVE-2018-3639", "sightings": [{"uuid": "a6e37e5c-1a02-4042-83f4-3386dd328de0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-3639", "type": "exploited", "source": "https://www.exploit-db.com/exploits/44695", "content": "", "creation_timestamp": "2018-05-22T00:00:00.000000Z"}, {"uuid": "476d3860-2d7e-47ce-9d1f-bfa2166743de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-3639", "type": "seen", "source": "https://msrc.microsoft.com/blog/2018/05/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639/", "content": "", "creation_timestamp": "2018-05-21T05:00:00.000000Z"}, {"uuid": "dfe3adc9-12b4-49b0-923d-37d40506e984", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2018-3639", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/meltdown-ja-spectre-hyokkaykset-hyodyntavat-prosessorien-ongelmia", "content": "", "creation_timestamp": "2018-12-31T06:05:10.000000Z"}, {"uuid": "f7982efd-a7d0-4948-b925-fdf3e8beba08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-3639", "type": "seen", "source": "https://gist.github.com/alanc/c84be87ced541796db4da92fa41cbe68", "content": "", "creation_timestamp": "2025-02-25T18:31:50.000000Z"}, {"uuid": "bb648997-64c5-4a2b-94ed-bb83df88e449", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-3639", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ltb4rd55iz2p", "content": "", "creation_timestamp": "2025-07-06T01:31:10.868292Z"}, {"uuid": "6d0254ec-0ed2-4b35-a799-0f016d063814", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-3639", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ltb3keqiqe2s", "content": "", "creation_timestamp": "2025-07-06T01:09:23.845193Z"}, {"uuid": "24567a82-be0d-43d5-bf5d-396f95b87f4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-3639", "type": "seen", "source": "https://t.me/mikrotikninja/206", "content": "\u0418\u044e\u043d\u044c\u0441\u043a\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043e\u0442 Microsoft \u0437\u0430\u043a\u0440\u044b\u043b\u0438 \u0441\u0443\u043c\u043c\u0430\u0440\u043d\u043e 123 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Microsoft Windows, Microsoft Edge, Internet Explorer, Office, Office Web Apps, SharePoint Server, Project Server, Chakra Core \u0438 Adobe Flash.\n\n\u0412\u0441\u0435 \u0441\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f - https://portal.msrc.microsoft.com/en-us/security-guidance/summary\n\n\u0417\u0430\u043f\u0438\u0441\u044c \u0432\u0435\u0431\u0438\u043d\u0430\u0440\u0430 June Security Briefing Call. \u0412 \u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435 \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u044e\u0442\u0441\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0441\u043e \u0437\u0432\u0443\u043a\u043e\u043c \u0438 \u043f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0438\u0435\u0439. ;( \n\n\u0427\u0442\u043e \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e\u0433\u043e? \n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0447\u0435\u0442\u0432\u0435\u0440\u0442\u043e\u0433\u043e \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u0430 Meltdown-Spectre, \u0442\u0430\u043a \u0436\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e\u0439 \u043a\u0430\u043a Speculative Store Bypass (SSB). \u0412\u0441\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043e\u043f\u0438\u0441\u0430\u043d\u044b \u0432 CVE-2018-3639.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2018-8225 \u0432 Windows Domain Name System, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Windows \u0441 7 \u043f\u043e 10 \u0438 Windows Server. \n\n\u0418 \u043d\u0435 \u0437\u0430\u0431\u044b\u0432\u0430\u0435\u043c \u043f\u0440\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f Adobe Flash, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432\u044b\u0448\u043b\u0438 \u043d\u0430 \u043f\u0440\u043e\u0448\u043b\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0435: \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043d\u0430 \u0441\u0430\u0439\u0442\u0435 Adobe \u0438 \u043d\u0430 Microsoft.\n\n\u0425\u043e\u0442\u0435\u043b \u0431\u044b \u043d\u0430\u043f\u043e\u043c\u043d\u0438\u0442\u044c, \u0447\u0442\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f Windows 10 \u0432\u0441\u0435\u0445 \u0440\u0435\u0434\u0430\u043a\u0446\u0438\u0439 \u0432 \u0432\u0435\u0442\u043a\u0435 Current Branch \u0432\u044b\u0448\u043b\u0438 \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f 1703 \u0438 \u0432\u044b\u0448\u0435. \u0414\u043b\u044f Windows 10 1607 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0432\u044b\u0445\u043e\u0434\u044f\u0442 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 6 \u043c\u0435\u0441\u044f\u0446\u0435\u0432 \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f \u0440\u0435\u0434\u0430\u043a\u0446\u0438\u0439 Windows 10 Enterprise \u0438 Windows 10 Education.", "creation_timestamp": "2018-06-13T10:02:32.000000Z"}, {"uuid": "5ffbc995-9d57-41e7-87b6-4219c4340dc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-3639", "type": "seen", "source": "https://t.me/N0iSeBit/57", "content": "\u0412\u043e\u0442 \u0438 ARM \u043e\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c \u043a \u0432\u0430\u0440\u0438\u0430\u043d\u0438\u0442\u0443 4 (CVE-2018-3639). \u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438: https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability", "creation_timestamp": "2018-05-23T05:08:25.000000Z"}, {"uuid": "a35dd15c-05eb-4175-9b5d-a0fc68520874", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-3639", "type": "published-proof-of-concept", "source": "https://t.me/N0iSeBit/56", "content": "\u0425\u043e\u0440\u043e\u0448\u0438\u0439 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u043e\u0431\u0437\u043e\u0440 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \" Variant 4: Speculative Store Bypass \u2013 CVE-2018-3639\" \u0438 \u0441\u043f\u043e\u0441\u043e\u0431\u043e\u0432 \u043f\u0440\u043e\u0442\u0438\u0432\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u043e\u0442 Microsoft https://blogs.technet.microsoft.com/srd/2018/05/21/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639/", "creation_timestamp": "2018-05-22T07:29:29.000000Z"}, {"uuid": "b37d46f3-8a73-4eb5-b5ea-5086d58273f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-3639", "type": "seen", "source": "https://t.me/N0iSeBit/55", "content": "\u0415\u0449\u0435 \u043d\u0435\u043c\u043d\u043e\u0433\u043e \u043c\u0438\u043a\u0440\u043e\u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u043d\u044b\u0445 \u0431\u0430\u0433\u043e\u0432, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441\u043e \u0441\u043f\u0435\u043a\u0443\u043b\u044f\u0442\u0438\u0432\u043d\u044b\u043c\u0438 \u0432\u044b\u0447\u0438\u0441\u043b\u0435\u043d\u0438\u044f\u043c\u0438. \u0418\u0442\u0430\u043a, \u0432 \u0445\u0440\u043e\u043d\u043e\u043b\u043e\u0433\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u043f\u043e\u0440\u044f\u0434\u043a\u0435: \n    Variant 1: Bounds Check Bypass \u2013 CVE-2017-5753\n    Variant 2: Branch Target Injection \u2013 CVE-2017-5715\n    Variant 3: Rogue Data Cache Load \u2013 CVE-2017-5754\n    Variant 3a: Rogue System Register Read \u2013 CVE-2018-3640  \n    Variant 4: Speculative Store Bypass \u2013 CVE-2018-3639\n\u0421\u0435\u0433\u043e\u0434\u043d\u044f Google P0 \u043e\u0431\u043d\u0430\u0440\u043e\u0434\u043e\u0432\u0430\u043b \u043d\u043e\u0432\u044b\u0439 \u0442\u0438\u043f \u0430\u0442\u0430\u043a \u0432\u0430\u0440\u0438\u0430\u043d\u0442 4, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u0440\u043e\u0447\u0438\u0442\u0430\u0442\u044c \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u044f \u0441\u043e \u0441\u0442\u0435\u043a\u0430 \u0438\u0437 \u0434\u0440\u0443\u0433\u0438\u0445 \u043c\u0435\u0441\u0442, \u0430 \u043d\u0435 \u0442\u043e\u043b\u044c\u043a\u043e \u0442\u0435\u0445 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043e\u0436\u0438\u0434\u0430\u0435\u0442 CPU. \u0412 \u0438\u0442\u043e\u0433\u0435 \u0438\u043c\u043f\u0430\u043a\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0439: 1) \u0427\u0442\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 2) \u0441\u043f\u0435\u043a\u0443\u043b\u044f\u0442\u0438\u0432\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \"\u0441\u0442\u0430\u0440\u044b\u0445\" \u043a\u043e\u043c\u0430\u043d\u0434 \u0438\u0437 \u043a\u044d\u0448\u0430.  https://bugs.chromium.org/p/project-zero/issues/detail?id=1528", "creation_timestamp": "2018-05-22T07:26:30.000000Z"}, {"uuid": "80268916-8230-4cf6-bbcd-6c060b4c166a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-3639", "type": "seen", "source": "https://t.me/QubesOS/206", "content": "QSB #40: Information leaks due to processor speculative store bypass (XSA-263)\nhttps://www.qubes-os.org/news/2018/05/24/qsb-40/\n\nDear Qubes Community,\n\nWe have just published Qubes Security Bulletin (QSB) #40: Information\nleaks due to processor speculative store bypass (XSA-263). The text of\nthis QSB is reproduced below. This QSB and its accompanying signatures\nwill always be available in the Qubes Security Pack (qubes-secpack).\n\nView QSB #40 in the qubes-secpack:\n\nhttps://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-040-2018.txt\n\nLearn about the qubes-secpack, including how to obtain, verify, and\nread it:\n\nhttps://www.qubes-os.org/security/pack/\n\nView all past QSBs:\n\nhttps://www.qubes-os.org/security/bulletins/\n\nView XSA-263 in the XSA Tracker:\n\nhttps://www.qubes-os.org/security/xsa/#263\n\n\n\n             ---===[ Qubes Security Bulletin #40 ]===---\n\n                             2018-05-24\n\n\n  Information leaks due to processor speculative store bypass (XSA-263)\n\nSummary\n========\n\nOn 2018-05-21, the Xen Security Team published Xen Security Advisory\n263 (CVE-2018-3639 / XSA-263) [1] with the following description:\n\n| Contemporary high performance processors may use a technique commonly\n| known as Memory Disambiguation, whereby speculative execution may\n| proceed past unresolved stores.  This opens a speculative sidechannel\n| in which loads from an address which have had a recent store can\n| observe and operate on the older, stale, value.\n\nPlease note that this issue was neither predisclosed nor embargoed.\nConsequently, the Qubes Security Team has not had time to analyze it in\nadvance of issuing this bulletin.\n\nImpact\n=======\n\nAccording to XSA-263, the impact of this issue is as follows:\n\n| An attacker who can locate or create a suitable code gadget in a\n| different privilege context may be able to infer the content of\n| arbitrary memory accessible to that other privilege context.\n| \n| At the time of writing, there are no known vulnerable gadgets in the\n| compiled hypervisor code.  Xen has no interfaces which allow JIT code\n| to be provided.  Therefore we believe that the hypervisor itself is\n| not vulnerable.  Additionally, we do not think there is a viable\n| information leak by one Xen guest against another non-cooperating\n| guest.\n| \n| However, in most configurations, within-guest information leak is\n| possible.  Mitigation for this generally depends on guest changes\n| (for which you must consult your OS vendor) *and* on hypervisor\n| support, provided in this advisory.\n\nIn light of this, XSA-263 appears to be less severe than the related\nSpectre and Meltdown vulnerabilities we discussed in QSB #37 [2].\n\nPatching\n=========\n\nThe specific packages that resolve the problems discussed in this\nbulletin are as follows:\n\n  For Qubes 3.2:\n  - Xen packages, version 4.6.6-41\n\n  For Qubes 4.0:\n  - Xen packages, version 4.8.3-8\n\nThe packages are to be installed in dom0 via the Qubes VM Manager or via\nthe qubes-dom0-update command as follows:\n\n  For updates from the stable repository (not immediately available):\n  $ sudo qubes-dom0-update\n\n  For updates from the security-testing repository:\n  $ sudo qubes-dom0-update --enablerepo=qubes-dom0-security-testing\n\nA system restart will be required afterwards.\n\nThese packages will migrate from the security-testing repository to the\ncurrent (stable) repository over the next two weeks after being tested\nby the community.\n\nIf you use Anti Evil Maid, you will need to reseal your secret\npassphrase to new PCR values, as PCR18+19 will change due to the new\nXen binaries.\n\nIn addition, Intel Corporation has announced that microcode updates\nwill be available soon [3]:\n\n| Variant 3a is mitigated in the same processor microcode updates as\n| Variant 4, and Intel has released these updates in beta form to OEM\n| system manufacturers and system software vendors. They are being\n| readied for production release, and will be delivered to consumers\n| and IT Professionals in the coming weeks.", "creation_timestamp": "2018-05-25T02:15:16.000000Z"}, {"uuid": "cacb46c6-7b11-426d-ad85-92bc7b62e0ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-3639", "type": "seen", "source": "Telegram/cbaxTd52fBV52JH_AbRvmVYqdS5Lho2y0BCQUh1YEpXtdsI", "content": "", "creation_timestamp": "2021-06-08T03:18:29.000000Z"}, {"uuid": "4dbe3d6c-b65e-45d6-ab29-9ebc60a29067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-3639", "type": "seen", "source": "https://t.me/arpsyndicate/1803", "content": "#ExploitObserverAlert\n\nCVE-2018-3639\n\nDESCRIPTION: Exploit Observer has 193 entries related to CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.\n\nFIRST-EPSS: 0.001590000\nNVD-IS: 3.6\nNVD-ES: 1.8", "creation_timestamp": "2023-12-12T11:41:10.000000Z"}, {"uuid": "3f8d0007-79f8-47f5-923d-a2cda5b8e64d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-3639", "type": "exploited", "source": "https://t.me/SecLabNews/2412", "content": "\u0412 \u0440\u0430\u043c\u043a\u0430\u0445 \u043f\u043b\u0430\u043d\u043e\u0432\u043e\u0433\u043e \u00ab\u0432\u0442\u043e\u0440\u043d\u0438\u043a\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439\u00bb \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Microsoft \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043f\u0430\u043a\u0435\u0442 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u044e\u0449\u0438\u0445 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0443 \u0444\u0443\u043d\u043a\u0446\u0438\u0438, \u043f\u0440\u0438\u0437\u0432\u0430\u043d\u043d\u043e\u0439 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0442\u0438\u0442\u044c \u0430\u0442\u0430\u043a\u0438 \u0441 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0435\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Spectre Variant 4 (CVE-2018-3639), \u0442\u0430\u043a \u0436\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e\u0439 \u043a\u0430\u043a Speculative Store Bypass (SSB). \u041e \u0447\u0435\u0442\u0432\u0435\u0440\u0442\u043e\u043c \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u0435 \u043d\u0430\u0448\u0443\u043c\u0435\u0432\u0448\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 Meltdown-Spectre \u0441\u0442\u0430\u043b\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u0432 \u043c\u0430\u0435 \u043d\u044b\u043d\u0435\u0448\u043d\u0435\u0433\u043e \u0433\u043e\u0434\u0430. \u0410\u0442\u0430\u043a\u0430 Spectre Variant 4 \u043e\u0441\u043d\u043e\u0432\u0430\u043d\u0430 \u043d\u0430 \u0442\u0430\u043a \u043d\u0430\u0437\u044b\u0432\u0430\u0435\u043c\u043e\u043c \u0441\u043f\u0435\u043a\u0443\u043b\u044f\u0442\u0438\u0432\u043d\u043e\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0438 \u2013 \u0444\u0443\u043d\u043a\u0446\u0438\u0438, \u043f\u0440\u0438\u0441\u0443\u0449\u0435\u0439 \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u0441\u0435\u043c \u0441\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u043c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430\u043c. \u0411\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0435\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0438\u0442\u044c \u0430\u0442\u0430\u043a\u0443 \u043f\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u043c \u043a\u0430\u043d\u0430\u043b\u0430\u043c \u0438 \u043f\u043e\u0445\u0438\u0442\u0438\u0442\u044c \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435.    \nMicrosoft \u043f\u0440\u0438\u043d\u044f\u043b\u0430 \u043c\u0435\u0440\u044b \u043f\u0440\u043e\u0442\u0438\u0432 \u0430\u0442\u0430\u043a\u0438 Spectre Variant 4", "creation_timestamp": "2018-06-13T10:52:28.000000Z"}]}