Search Results (Refine Search)
- Keyword (text search): cpe:2.3:o:amd:ryzen_5_5600g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-20579 |
Improper Access Control in the AMD SPI protection feature may allow a user with Ring0 (kernel mode) privileged access to bypass protections potentially resulting in loss of integrity and availability. Published: February 13, 2024; 3:15:52 PM -0500 |
V4.0:(not available) V3.1: 6.0 MEDIUM V2.0:(not available) |
CVE-2023-20597 |
Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access. Published: September 20, 2023; 2:15:12 PM -0400 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-20594 |
Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access. Published: September 20, 2023; 2:15:12 PM -0400 |
V4.0:(not available) V3.1: 4.4 MEDIUM V2.0:(not available) |
CVE-2023-20569 |
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure. Published: August 08, 2023; 2:15:11 PM -0400 |
V4.0:(not available) V3.1: 4.7 MEDIUM V2.0:(not available) |