7 results (0.025 seconds)

CVSS: 5.5EPSS: 0%CPEs: 319EXPL: 0

Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access. La inicialización incorrecta de variables en el controlador DXE puede permitir que un usuario privilegiado filtre información sensible a través del acceso local. • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4007 • CWE-665: Improper Initialization •

CVSS: 4.4EPSS: 0%CPEs: 381EXPL: 0

Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access. La inicialización incorrecta de variables en el controlador DXE puede permitir que un usuario privilegiado filtre información sensible a través del acceso local. • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4007 • CWE-665: Improper Initialization •

CVSS: 8.8EPSS: 0%CPEs: 178EXPL: 0

Insufficient control flow management in AmdCpmOemSmm may allow a privileged attacker to tamper with the SMM handler potentially leading to an escalation of privileges. • https://www.amd.com/en/resources/product-security/bulletin/amd-sb-1027.html •

CVSS: 8.8EPSS: 0%CPEs: 178EXPL: 0

Insufficient control flow management in AmdCpmGpioInitSmm may allow a privileged attacker to tamper with the SMM handler potentially leading to escalation of privileges. • https://www.amd.com/en/resources/product-security/bulletin/amd-sb-1027.html •

CVSS: 7.8EPSS: 0%CPEs: 104EXPL: 0

A malformed SMI (System Management Interface) command may allow an attacker to establish a corrupted SMI Trigger Info data structure, potentially leading to out-of-bounds memory reads and writes when triggering an SMI resulting in a potential loss of resources. Un comando SMI (System Management Interface) malformado puede permitir a un atacante establecer una estructura de datos SMI Trigger Info corrupta, conllevando potencialmente a lecturas y escrituras de memoria fuera de límites cuando es desencadenado un SMI resultando en una potencial pérdida de recursos • https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 • CWE-125: Out-of-bounds Read CWE-787: Out-of-bounds Write •