Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

#37e5125f-f79b-445b-8fad-9564f167944b

Security Advisories

Reported CVEsVendorsProductsReports
3269Vulnerabilities found

CVE-2025-8671
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-7.5||HIGH
EPSS-0.08% / 23.58%
||
7 Day CHG~0.00%
Published-13 Aug, 2025 | 12:03
Updated-17 Aug, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2025-8671

A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them—using malformed frames or flow control errors—an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.

Action-Not Available
Vendor-FastlyWind RiverVarnish SoftwareSUSE
Product-SUSE Manager ServerVarnish CacheEnterprise Module for Dev ToolsSUSE Manager Retail Branch ServerEnterprise Module for Development ToolsopenSUSE LeapLinuxSUSE Manager Server LTSEnterprise Server for SAP ApplicationsH20SUSE Manager ProxyEnterprise High Performance Computing (HPC)Enterprise Module for Package HubEnterprise ServerVarnish EnterpriseEnterprise High Performance ComputingEnterprise Desktop
CWE ID-CWE-404
Improper Resource Shutdown or Release
CVE-2025-6078
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-5.4||MEDIUM
EPSS-0.03% / 6.01%
||
7 Day CHG~0.00%
Published-02 Aug, 2025 | 02:15
Updated-04 Aug, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2025-6078

Partner Software's Partner Software application and Partner Web application allows an authenticated user to add notes on the 'Notes' page when viewing a job but does not completely sanitize input, making it possible to add notes with HTML tags and JavaScript, enabling an attacker to add a note containing malicious JavaScript, leading to stored XSS (cross-site scripting).

Action-Not Available
Vendor-Partner Software
Product-Partner Web
CVE-2025-6077
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.05% / 16.84%
||
7 Day CHG~0.00%
Published-02 Aug, 2025 | 02:15
Updated-05 Aug, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2025-6077

Partner Software's Partner Software Product and corresponding Partner Web application use the same default username and password for the administrator account across all versions.

Action-Not Available
Vendor-Partner Software
Product-Partner Web
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2025-6076
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-8.8||HIGH
EPSS-0.05% / 13.97%
||
7 Day CHG~0.00%
Published-02 Aug, 2025 | 02:15
Updated-04 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2025-6076

Partner Software's Partner Software application and Partner Web application do not sanitize files uploaded on the "reports" tab, allowing an authenticated attacker to upload a malicious file and compromise the device. By default, the software runs as SYSTEM, heightening the severity of the vulnerability.

Action-Not Available
Vendor-Partner Software
Product-Partner Web
CVE-2025-6241
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 1.36%
||
7 Day CHG~0.00%
Published-27 Jul, 2025 | 00:46
Updated-30 Jul, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2025-6241

LsiAgent.exe, a component of SysTrack from Lakeside Software, attempts to load several DLL files which are not present in the default installation. If a user-writable directory is present in the SYSTEM PATH environment variable, the user can write a malicious DLL to that directory with arbitrary code. This malicious DLL is executed in the context of NT AUTHORITY\SYSTEM upon service start or restart, due to the Windows default dynamic-link library search order, resulting in local elevation of privileges.

Action-Not Available
Vendor-Lakeside Software
Product-SysTrack
CVE-2025-7026
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-8.2||HIGH
EPSS-0.01% / 2.09%
||
7 Day CHG~0.00%
Published-11 Jul, 2025 | 15:27
Updated-15 Jul, 2025 | 13:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SMM Arbitrary Write via Unchecked RBX Pointer in CommandRcx0

A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used as an unchecked pointer in the CommandRcx0 function. If the contents at RBX match certain expected values (e.g., '$DB$' or '2DB$'), the function performs arbitrary writes to System Management RAM (SMRAM), leading to potential privilege escalation to System Management Mode (SMM) and persistent firmware compromise.

Action-Not Available
Vendor-GIGABYTE
Product-UEFI-GenericComponentSmmEntry
CVE-2025-7028
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.97%
||
7 Day CHG~0.00%
Published-11 Jul, 2025 | 15:26
Updated-15 Jul, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SMM Arbitrary Memory Access via Flash Handler with Unchecked FuncBlock Pointer

A vulnerability in the Software SMI handler (SwSmiInputValue 0x20) allows a local attacker to supply a crafted pointer (FuncBlock) through RBX and RCX register values. This pointer is passed unchecked into multiple flash management functions (ReadFlash, WriteFlash, EraseFlash, and GetFlashInfo) that dereference both the structure and its nested members, such as BufAddr. This enables arbitrary read/write access to System Management RAM (SMRAM), allowing an attacker to corrupt firmware memory, exfiltrate SMRAM content via flash, or install persistent implants.

Action-Not Available
Vendor-GIGABYTE
Product-UEFI-SmiFlash
CVE-2025-7027
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-8.2||HIGH
EPSS-0.01% / 2.09%
||
7 Day CHG~0.00%
Published-11 Jul, 2025 | 15:24
Updated-15 Jul, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SMM Arbitrary Write via Dual-Controlled Pointers in CommandRcx1

A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control both the read and write addresses used by the CommandRcx1 function. The write target is derived from an unvalidated UEFI NVRAM variable (SetupXtuBufferAddress), while the write content is read from an attacker-controlled pointer based on the RBX register. This dual-pointer dereference enables arbitrary memory writes within System Management RAM (SMRAM), leading to potential SMM privilege escalation and firmware compromise.

Action-Not Available
Vendor-GIGABYTE
Product-UEFI-GenericComponentSmmEntry
CVE-2025-7029
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-8.2||HIGH
EPSS-0.01% / 2.09%
||
7 Day CHG~0.00%
Published-11 Jul, 2025 | 15:22
Updated-15 Jul, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SMM Arbitrary Write via Unchecked OcHeader Buffer in Platform Configuration Handler

A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used to derive pointers (OcHeader, OcData) passed into power and thermal configuration logic. These buffers are not validated before performing multiple structured memory writes based on OcSetup NVRAM values, enabling arbitrary SMRAM corruption and potential SMM privilege escalation.

Action-Not Available
Vendor-GIGABYTE
Product-UEFI-OverClockSmiHandler
CVE-2025-3052
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-8.2||HIGH
EPSS-0.02% / 2.87%
||
7 Day CHG~0.00%
Published-10 Jun, 2025 | 19:19
Updated-12 Jun, 2025 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
An arbitrary write vulnerability in Microsoft signed UEFI firmware from DT Research Inc.

An arbitrary write vulnerability in Microsoft signed UEFI firmware allows for code execution of untrusted software. This allows an attacker to control its value, leading to arbitrary memory writes, including modification of critical firmware settings stored in NVRAM. Exploiting this vulnerability could enable security bypasses, persistence mechanisms, or full system compromise.

Action-Not Available
Vendor-DT Research
Product-BiosFlashShellDtbios
CVE-2025-2884
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-6.6||MEDIUM
EPSS-0.02% / 2.31%
||
7 Day CHG~0.00%
Published-10 Jun, 2025 | 17:29
Updated-13 Jun, 2025 | 18:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementation

TCG TPM2.0 Reference implementation's CryptHmacSign helper function is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key's algorithm. See Errata Revision 1.83 and advisory TCGVRT0009 for TCG standard TPM2.0

Action-Not Available
Vendor-Trusted Computing Group
Product-TPM2.0
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-3927
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 19.40%
||
7 Day CHG~0.00%
Published-02 May, 2025 | 14:36
Updated-17 Jun, 2025 | 14:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2025-3927

Digigram's PYKO-OUT audio-over-IP (AoIP) web-server does not require a password by default, allowing any attacker with the target IP address to connect and compromise the device, potentially pivoting to connected network or hardware devices.

Action-Not Available
Vendor-digigramDigigram
Product-pyko-outPYKO-OUT
CWE ID-CWE-862
Missing Authorization
CVE-2025-0285
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.73%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 16:25
Updated-15 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2025-0285

Various Paragon Software products contain an arbitrary kernel memory mapping vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to perform privilege escalation exploits.

Action-Not Available
Vendor-Paragon Software
Product-Migrate OS to SSDPartition ManagerBackup and RecoveryParagon Drive CopyHard Disk ManagerDisk Wiper
CVE-2025-0286
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-8.4||HIGH
EPSS-0.04% / 11.82%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 16:25
Updated-15 Apr, 2025 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2025-0286

Various Paragon Software products contain an arbitrary kernel memory write vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to execute arbitrary code on the victim machine.

Action-Not Available
Vendor-Paragon Software
Product-Partition ManagerMigrate OS to SSDBackup and RecoveryDrive CopyHard Disk ManagerDisk Wiper
CVE-2025-0287
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-5.1||MEDIUM
EPSS-0.04% / 10.40%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 16:25
Updated-14 Apr, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2025-0287

Various Paragon Software products contain a null pointer dereference vulnerability within biontdrv.sys that is caused by a lack of a valid MasterLrp structure in the input buffer, allowing an attacker to execute arbitrary code in the kernel, facilitating privilege escalation.

Action-Not Available
Vendor-Paragon Software
Product-Drive CopyMigrate OS to SSDHard Disk ManagerPartition ManagerBackup and RecoveryDisk Wiper
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-0288
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.73%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 16:24
Updated-15 Apr, 2025 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2025-0288

Various Paragon Software products contain an arbitrary kernel memory vulnerability within biontdrv.sys, facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation.

Action-Not Available
Vendor-Paragon Software
Product-Migrate OS to SSDPartition ManagerBackup and RecoveryDisk WiperHard Disk ManagerDrive Copy
CVE-2025-0289
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.73%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 16:24
Updated-15 Apr, 2025 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2025-0289

Various Paragon Software products contain an insecure kernel resource access vulnerability facilitated by the driver not validating the MappedSystemVa pointer before passing it to HalReturnToFirmware, which can allows an attacker the ability to compromise the service.

Action-Not Available
Vendor-Paragon Software
Product-Migrate OS to SSDPartition ManagerBackup and RecoveryDisk WiperHard Disk ManagerDrive Copy
CVE-2024-12366
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.55% / 66.97%
||
7 Day CHG~0.00%
Published-11 Feb, 2025 | 12:42
Updated-11 Feb, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2024-12366

PandasAI uses an interactive prompt function that is vulnerable to prompt injection and run arbitrary Python code that can lead to Remote Code Execution (RCE) instead of the intended explanation of the natural language processing by the LLM.

Action-Not Available
Vendor-Sinaptik AI
Product-PandasAI
CVE-2025-1066
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.16% / 37.78%
||
7 Day CHG~0.00%
Published-05 Feb, 2025 | 23:39
Updated-20 Mar, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2025-1066

OpenPLC_V3 contains an arbitrary file upload vulnerability, which could be leveraged for malvertising or phishing campaigns.

Action-Not Available
Vendor-openPLC
Product-OpenPLC
CVE-2024-7596
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 17.32%
||
7 Day CHG~0.00%
Published-05 Feb, 2025 | 17:37
Updated-06 Feb, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Generic UDP Encapsulation (GUE) (IETF Draft) do not validate or verify the source of a network packet

Proposed Generic UDP Encapsulation (GUE) (IETF Draft) do not validate or verify the source of a network packet allowing an attacker to spoof and route arbitrary traffic via an exposed network interface that can lead to spoofing, access control bypass, and other unexpected network behaviors. This can be considered similar to CVE-2020-10136.

Action-Not Available
Vendor-The IETF Administration LLC (IETF LLC)
Product-generic_udp_encapsulationdraft-ietf-intarea-gue-09
CVE-2024-7595
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-5.3||MEDIUM
EPSS-1.67% / 81.34%
||
7 Day CHG~0.00%
Published-05 Feb, 2025 | 17:36
Updated-06 Feb, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GRE and GRE6 Protocols (RFC2784) do not validate or verify the source of a network packet

GRE and GRE6 Protocols (RFC2784) do not validate or verify the source of a network packet allowing an attacker to spoof and route arbitrary traffic via an exposed network interface that can lead to spoofing, access control bypass, and other unexpected network behaviors. This can be considered similar to CVE-2020-10136.

Action-Not Available
Vendor-The IETF Administration LLC (IETF LLC)
Product-generic_routing_encapsulation6generic_routing_encapsulationRFC2784 - Generic Routing Encapsulation (GRE)
CVE-2024-7344
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-8.2||HIGH
EPSS-0.10% / 28.02%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 13:29
Updated-12 Feb, 2025 | 14:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.

Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.

Action-Not Available
Vendor-greenwaresignalcomputersanfongcs-grpwasayradixhowyarSignalComputerRadixCES TaiwanSANFONGHowyar TechnologiesGreenware Technologies
Product-hdd_kingerecoveryrxgreenguardsmart_recoveryez-back_systemneo_impactsysreturnSANFONG EZ-Back SystemSmartRecoveryGreenGuardCES NeoImpactHDD KingSysReturn (32-bit and 64-bit)
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-2201
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-4.7||MEDIUM
EPSS-0.02% / 3.19%
||
7 Day CHG-0.00%
Published-19 Dec, 2024 | 20:28
Updated-09 Jan, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2024-2201

A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems.

Action-Not Available
Vendor-Xen Project
Product-Xen
CVE-2023-7005
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-7.5||HIGH
EPSS-0.14% / 34.22%
||
7 Day CHG~0.00%
Published-19 Dec, 2024 | 17:35
Updated-20 Dec, 2024 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2023-7005

A specially crafted message can be sent to the TTLock App that downgrades the encryption protocol used for communication, and can be utilized to compromise the lock, such as through revealing the unlockKey field.

Action-Not Available
Vendor-Sciener
Product-TTLock App
CVE-2024-10469
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-4.4||MEDIUM
EPSS-0.07% / 22.71%
||
7 Day CHG+0.01%
Published-28 Oct, 2024 | 15:38
Updated-25 Aug, 2025 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CERT/CC VINCE versions before 3.0.9 allows authenticated user to access User Management view.

VINCE versions before 3.0.9 is vulnerable to exposure of User information to authenticated users.

Action-Not Available
Vendor-certCERT/CC
Product-vinceVINCE
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2024-9953
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-4.9||MEDIUM
EPSS-0.29% / 51.64%
||
7 Day CHG~0.00%
Published-14 Oct, 2024 | 21:19
Updated-20 Mar, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential DoS Vulnerability in CERT VINCE Software Before Version 3.0.8

A potential denial-of-service (DoS) vulnerability exists in CERT VINCE software versions prior to 3.0.8. An authenticated administrative user can inject an arbitrary pickle object into a user’s profile, which may lead to a DoS condition when the profile is accessed. While the Django server restricts unpickling to prevent server crashes, this vulnerability could still disrupt operations.

Action-Not Available
Vendor-certCERT/CC
Product-vinceVINCE - Vulnerability Information and Coordination Environment
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2024-8105
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 4.36%
||
7 Day CHG~0.00%
Published-26 Aug, 2024 | 19:15
Updated-25 Aug, 2025 | 21:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insecure Platform Key (PK) used in UEFI system firmware signature

A vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised.

Action-Not Available
Vendor-AopenSupermicroFormelifeGigabyteIntel CorporationHP Inc.Lenovo Group LimitedDell Inc.Fujitsu LimitedAcer Inc.
Product-G493-ZB4 (rev. AAP1)GA-B150M-Gaming (rev. 1.0)GA-Z68XP-UD4 (rev. 1.0)GB-BXi5-4200 (rev. 1.0)MSH61DI (rev. 1.2)G593-ZD1 (rev. AAX1)MZ72-HB2 (rev. 3.0)G262-ZR0X299 DESIGNARE EX (rev. 1.0)R123-X00 (rev. AA01)hp-prodesk-400-g1-microtower-pcGA-H110M-AE283-Z91 (rev. AAV1)GA-Z170X-Ultra Gaming (rev. 1.0)G1.Sniper Z170 (rev. 1.0)R282-Z96 (rev. 100)Q1742FT181-G20 (rev. 1.0)G190-H44MZ73-LM0 (rev. 2.0)G481-H80 (rev. 100)GB-BXi5G3-760 (rev. 1.0)GB-GZ1DTi7-1070-NK (rev. 1.0)G241-G40 (rev. 100)MA10-ST0 (rev. 1.1)R281-3C1GB-BKi5HT2-7200 (rev. 1.0)GA-J1800N-HGA-H61M-S2PV (rev. 2.3)MZ73-LM1 (rev. 1.x)GA-H170-Gaming 3 DDR3 (rev. 1.0)GB-BNi7QG4-950 (rev. 1.0)alienware-x14-r1-laptopGB-BSCE-3955GA-Z170X-Gaming G1 (rev. 1.0)MZ72-HB2 (rev. 3.x)inspiron-15-3502-laptopxps-8960-desktopinspiron-20-3059-aioalienware-m17-r4-laptopGB-BNE3HG4-950 (rev. 1.0)MZBAYAG (rev. 1.0)W281-G40X299 AORUS Gaming 3 ProGB-BKi7HT-7500GB-EKi3A-7100GA-P67A-UD3-B3 (rev. 1.x)R283-Z93thinkcentre-m62zGB-BSi3A-6100 (rev. 1.0)R271-Z00 (rev. B00)R283-ZF0 (rev. AAL1)inspiron-15-3510-laptopG1.Sniper 3 (rev. 1.0)H262-PC0 (rev. 100)G1.Sniper M7 (rev. 1.0)MU92-TU0 (rev. 1.x)GA-H170-HD3 DDR3GB-TCV2A (rev. 1.0)GA-B75TNG150-B10 (rev. 111)alienware-m17-r3-laptopGA-Z68X-UD3P-B3MD72-HB3 (rev. 1.x)GA-Z170N-WIFIMZ72-HB0 (rev. 3.x/4.x)H261-T60 (rev. 100)R283-Z93 (rev. AAF1)G292-Z46PRIMERGY CX270 S2X299 AORUS MASTERvostro-24-5460-aioGA-C1007UN (rev. 1.0)alienware-m15-r2-laptopE283-S90 (rev. AAD1)GB-BNi5HG6-1060GA-B150M-DS3PMultipleG292-Z20 (rev. 100)GB-BRi5-10210(E)GA-H110M-S2H DDR3GA-H110M-DS2V (rev. 1.0)GB-BACE-3000-FT-BW (rev. 1.0)GA-Z68XP-D3 (rev. 1.0)GB-BRi5-8250GA-Z68MA-D2H-B3 (rev. 1.0)R181-Z90poweredge-c5230G482-Z53MW32-SP0 (rev. 1.0)R263-Z35 (rev. AAL1)alienware-area51m-r2-laptopthinkcentre-edge-92zGA-Z68MX-UD2H-B3P15F R5X299-WU8inspiron-24-3455-aioM9M3XAI (rev. 1.0)aspire c22-1600G291-Z20 (rev. A00)c24-1655GA-X99-UD7 WIFIGA-Z170-HD3PG593-ZD2 (rev. AAX1)MW22-SE0 (rev. 1.0)GA-H110M-S2PTGA-X99-SOC ChampionGA-H110M-S2 (rev. 1.x)GB-BSI3H-6100-ZA-IWUS (rev. 1.0)GB-BRi3-10110 (rev. 1.0)hp-rp5-retail-system-model-5810MB10-DS0 (rev. 1.3)GB-BXi5G-760 (rev. 1.0)X299 UD4 Pro (rev. 1.0)R133-C10 (rev. AAG1)MD61-SC2 (rev. 1.x)GB-BXi5-4570RG293-S46 (rev. AAM1)GB-BKi5A-7200 (rev. 1.0)GA-X99-SLIMD70-HB1 (rev. 1.2)S12-P04R (rev. 1.0)MC13-LE0 (rev. 1.x/3.x)G482-Z50 (rev. 100)GA-H170M-D3H DDR3GA-H87TN (rev. 1.0)MZBAYAD (rev. 1.0)GA-B85TNX299 AORUS GamingR283-S94H231-G20 (rev. 100/A00)MX34-BS0 (rev. 1.x)GB-BEi5-1240 (rev. 1.0)MW70-3S0 (rev. 1.0)GB-EKi3M-7100iTXL-Q170AMF51-ES0 (rev. 1.0)GA-Z68XP-UD3P (rev. 1.0)inspiron-3472-desktopG492-Z52aspire xc-1710R162-ZA0 (rev. 100)GA-P75-D3 (rev. 1.0)R283-Z97H262-NO1hp-elitedesk-705-g1-desktop-mini-pcGA-H170TNR121-X30 (rev. 100)G593-ZX1 (rev. AAX1)MP30-AR1 (rev. 1.1)aio-300-22isuGA-J1900N-D2Hinspiron-22-3263-desktop-aioGA-H170M-DS3HGA-H61M-SGA-E350N WIN8 (rev. 1.0)GB-BXi5-5200G492-Z50 (rev. A00)MD30-RS0 (rev. 1.0)H262-Z61GA-6LXGH (rev. 1.0)hp-z1-all-in-one-g2-workstationR282-G30GB-BER5-5600GA-Z170X-Gaming GTGB-XM12-3227 (rev. 1.0)GA-Z77X-UD4Haspire s32-1856GA-Z68X-UD3-B3GA-H110-D3A (rev. 1.0)G292-Z43GB-EACE-3450X299 AORUS Gaming 3GA-H81TNH262-Z6BH270-H70 (rev. 100)G1.Sniper B7GA-Z170X-Gaming 3 (rev. 1.0)GA-Z170X-UD3 (rev. 1.0)GA-6LXSG (rev. 1.0)GA-H110M-S2VR260-R3CGA-J1900M-D2P (rev. 1.1)GB-BSi3-6100 (rev. 1.0)GB-GZ1DTi5K (rev. 1.0)GB-BRi3-8130MZBAYAC (rev. 1.0)R143-EG0-AAC1MDH11HI (rev. 1.0)GA-X99-Gaming 5PGA-Z77M-D3H-MVP (rev. 1.0)GA-Z170-Gaming K3 (rev. 1.0)GB-BER3-5300G242-Z10MZ73-LM1 (rev. 1.0)R162-ZA0 (rev. A00)GB-BXi7-4500 (rev. 1.0)R163-SG0 (rev. AAC1)MD80-TM1 (rev. 1.0)lenovo-c365-all-in-oneGB-BSi7-6500GB-BSi5A-6200GB-BER5-5500 (rev. 1.0)MZ32-AR0 (rev. 3.x)GB-BPCE-3455CS252-ZC0G492-ZD0 (rev. 100)R181-2A0 (rev. 100)GB-BER3-5400alienware-aurora-r16-desktopPRIMERGY RX100 S7pGB-BACE-3150-FT-BW (rev. 1.0)R183-Z90 (rev. LAD1)MD72-HB0 (rev. 1.x/2.0)GA-H110MSTX-HD3 (rev. 1.0)GA-B150M-D3H (rev. 1.0)WRX80-SU8-IPMI (rev. 1.0)G293-Z40GB-BSi7A-6500 (rev. 1.0)GB-BMCE-5105GA-Z170-HD3 (rev. 1.0)H233-Z80GA-J1800M-D2PGA-Z77M-D3HGB-BSi7-1165G7GA-H110M-HD3 DDR3GB-BXBT-1900GA-6LXGL (rev. 1.0)hp-z1-all-in-one-workstationGB-BNi7G4-1050TiGA-H170-HD3GA-H77TNU21MGA-6LXSL (rev. 1.0)GA-Z68X-UD3H-B3G152-Z12 (rev. 200)R143-E30 (rev. AAB1)R162-Z10GA-H110M-D3H R2 (rev. 1.0)aspire s 27GA-X99M-Gaming 5 (rev. 1.0)GA-Z170M-D3H (rev. 1.0)GA-X99-Phoenix SLIR280-G2OGA-H170M-D3HR160-S34R161-R12G292-Z20 (rev. A00)R263-Z35 (rev. AAF1)ME03-PE0 (rev. 1.0)H223-V10GB-EAPD-4200GA-Z77-DS3H (rev. 1.0)R182-Z90 (rev. A00/B00/AT0)GA-Z77-HD4alienware-17-laptopalienware-13-laptopG242-Z12GA-Z170X-UD5H252-Z12 (rev. A02)H262-PC1 (rev. 100)Q2542NE152-ZE1 (rev. A00)GA-Q77M-D2H (rev. 1.0)MZ71-CE0 (rev. 3.x/4.x)GA-Z170-D3HGA-Z77X-D3HGA-X99-Gaming 5 (rev. 1.0)alienware-17-r3H242-Z10 (rev. A00)GB-BRR5-4500 (rev. 1.0)J4105N HGB-BRR3-4300 (rev. 1.0)GB-BSi7HT-6500E163-Z30GB-BEi3-1220 (rev. 1.0)GB-BMCE-4500CG482-Z51 (rev. 100)GB-BER7-7840C621-SD8MC13-LE0 (rev. 1.x)hp-compaq-elite-8380-convertible-minitower-pcGA-B150M-D3H DDR3GA-Z77-HD3G493-ZB0 (rev. AAP1)R180-F28 (rev. 152)alienware-17-r2GB-BSi5-6200 (rev. 1.0)GA-Z77X-UD3H (rev. 1.0)GB-BRi7-8550 (rev. 1.0)GA-H170-D3HP (rev. 1.0)E163-S30 (rev. AAB1)G291-Z20 (rev. 100)E283-Z90GA-Z170X-UD5 TH (rev. 1.0)GA-P67X-UD3R-B3 (rev. 1.0)inspiron-3662-desktopaio-510-22asrGB-BXBT-2807GA-N3160N-D2HGA-H110M-DS2V DDR3 (rev. 1.0)alienware-aurora-r11-desktopMZ33-AR0 (rev. 1.x)MDH11KI (rev. 1.0)X299 UD4 (rev. 1.0)GA-H110M-S2PH DDR3MD71-HB0 (rev. 1.x)W771-Z00 (rev. 100)R133-X11 (rev. AAG1)lenovo-c460-all-in-oneGA-J1900N-D3V (rev. 1.x)MD60-SC0 (rev. 1.1)GA-H110M-HGB-BRi7-10710 (rev. 1.0)GA-X99-Gaming 7 WIFI (rev. 1.0)GA-B150N-GSMR262-ZA2GA-B150M-HD3 DDR3GB-BER7-5700GA-H170-Designare (rev. 1.0)GA-H110M-DS2 DDR3 (rev. 1.0)GA-N3150M-D3PGB-BXi7-4770R (rev. 1.0)MX32-4L0 (rev. 1.0)MB12-CE0 (rev. 100)GB-BACE-3150GA-H110M-Gaming 3 (rev. 1.0)GB-BSRE-1505 (rev. 1.0)GA-H77-DS3H (rev. 1.0)MD60-SC1 (rev. 1.1)GB-BSi3-1115G4 (rev. 1.0)GB-BKi7A-7500H230-R4C (rev. 100)GA-IMB1900NMZBSWAI (rev. 1.0)GA-P75-D3PR163-Z32 (rev. AAG1)G211-H4GMW31-SP0 (rev. 1.0)G250-G51 (rev. 400)alienware-aurora-r15-amd-desktopT181-Z70 (rev. A00)MFH27AI (rev. 1.0)MW34-SP0 (rev. 1.0)inspiron-3250-small-desktopG493-SB0G292-280 (rev. 100)R282-Z90 (rev. A00)GA-X99-Ultra GamingGA-Z170X-Gaming 6G262-IR0 (rev. 100)alienware-aurora-r13-desktopR121-340GA-H110NGA-B150M-D2V DDR3 (rev. 1.0)GB-BKi3A-7100 (rev. 1.0)R181-T90 (rev. 100)MF51-ES1 (rev. 1.0)R181-Z90 (rev. 100)R270-D70MZ71-CE0 (rev. 1.x)GA-X150M-PRO ECC (rev. 1.0)GA-H77N-WIFIG262-ZO0MZ33-CP0 (rev. 1.x)GA-H110M-S2HGA-H110M-D3H (rev. 1.0)GA-N3160TN (rev. 1.0)lenovo-erazer-x700-desktopGA-X150-PLUS WS (rev. 1.0)G493-ZB1 (rev. AAP1)R263-Z30 (rev. AAC1)hp-proone-400-g1-19.5-inch-non-touch-all-in-one-pcGB-BACE-3160GA-B150M-D2VGA-X99-UD4X299 AORUS Gaming 9 (rev. 1.0)MD72-HB2 (rev. 1.x)inspiron-17-5755-laptopalienware-13alienware-x17-r2-laptopMD72-HB1 (rev. 1.x)G492-H80MZ72-HB0 (rev. 3.0/4.0)GA-H110TN-MGA-B75N (rev. 1.0)GA-H110M-S2V DDR3 (rev. 1.0)MU72-SU0 (rev. 1.x/2.x)G180-G00 (rev. 100)D120-C20 (rev. 230)X299 AORUS Gaming 7 Pro (rev. 1.0)H253-Z10MB51-PS0 (rev. 1.0)H282-ZC0 (rev. A00)GB-BPCE-3455GA-X99-UD3P (rev. 1.0)H263-V11GA-H77M-HD3GA-N3050M-D3P (rev. 1.0)PRIMERGY TX100 S3pGA-Z170-HD3 DDR3 (rev. 1.0)GA-C1007UN-D (rev. 1.0)Studio Sys UPDlenovo-10w-type-82st-82suthinkcentre-edge-62zGA-Z170X-UD3 Ultra (rev. 1.0)GA-6LASL (rev. 1.0)S453-Z30R271-Z00 (rev. A00)TO25-Z11MZJ19AI (rev. 1.0)H23N-R4OGA-H110-D3EL-30 (rev. 1.0)GA-B75M-D3V (rev. 1.0)GB-BKi5HT-7200 (rev. 1.0)GA-X170-EXTREME ECCGA-H77-D3Hhp-compaq-pro-6305-microtower-pcG293-Z23MDH11BM (rev. 1.0)inspiron-24-3464-aioR143-EG0 (rev. AAC1)GA-X99-UD3GB-BEi7-1260 (rev. 1.0)MZ73-LM0 (rev. 2.x)H281-PE0MSQ77DI (rev. 1.1)C621-WD12-IPMI (rev. 1.0)GB-BPCE-3350C (rev. 1.0)GA-N3050N-D3H (rev. 1.0)H310NGA-N3150N-D3V (rev. 1.0)GA-Z68X-UD3R-B3GB-SIOPS-J1900 (rev. 1.0)GA-H110M-S2PV DDR3alienware-13-r2MATMH81 (rev. 1.0)GB-BSCEA-3955inspiron-5680-gaming-desktoplenovo-h520e-desktopG492-ID0 (rev. 100)J4005N D2PGA-X99-SOC ForceGB-BPCE-3350 (rev. 1.0)lenovo-62-desktopX299 AORUS Ultra Gaming Pro (rev. 1.0)GB-BACE-3000hp-z820-workstationGA-F2A85XM-D3HR182-34AG152-Z12R282-Z97 (rev. A00)GB-BSi7A-6600 (rev. 1.0)GB-BMPD-6005R163-Z30 (rev. AAB1)GA-B150M-D3VGA-H310TN-R2 (rev. 1.0)GA-H110M-S2PVMW21-SE0 (rev. 1.0)GA-Q87TN (rev. 1.0)E251-U70 (rev. 100)GB-BKi7HT2-7500 (rev. 1.0)GA-Z77X-UP5 TH (rev. 1.0)MQHUDVI (rev. 1.0)vostro-3252-small-desktopR263-Z33 (rev. AAL1)TO23-H60R182-NC0GA-H110M-DS2 (rev. 1.0/1.1/1.2)E162-220GA-B150-HD3 DDR3GA-Z77N-WIFIMC62-G41 (rev. 1.0)GA-B150M-HD3G291-280GA-H110TN-EGA-Z77P-D3PRIMERGY TX120 S3pC621-SU8 (rev. 1.0)GA-X150-PRO ECCGA-Z170X-Gaming 5 (rev. 1.0)GA-H110M-HD2 (rev. 1.0)R243-E30-AAC1X299 AORUS Ultra Gaming (rev. 1.0)MZAPLAI (rev. 1.0)GA-X99-Designare EXMU70-SU0 (rev. 1.0)GA-N3150N-D2H (rev. 1.0)alienware-15-r4GA-P67X-UD3-B3R152-Z30GA-N3160M-D3PE152-ZE0GA-B75M-HD3 (rev. 1.0)H263-V60 (rev. AAW1)H263-S62H261-Z60 (rev. 100)hp-elitedesk-800-g1-tower-pcxps-8950-desktopGA-H110M-DS2 (rev. 1.3)GB-BXi3-5010 (rev. 1.0)G191-H44GA-J1800N-D2PH (rev. 1.1)alienware-x15-r1-laptopGA-P110-D3iKBLMUx-DER(Volta Charging)GA-X99M-Gaming 5 (rev. 1.1)GA-7PXSL1 (rev. 1.0)H273-Z80H231-H60 (rev. 100/A00)R183-Z93 (rev. AAV1)GB-BSi5HT-6200 (rev. 1.0)G492-ZD2 (rev. A00)iAPLx-DE(TAA30 TEST)hp-z220-convertible-minitower-workstationGA-6UASL1 (rev. 1.0)GB-BXBT-3825 (rev. 1.0)GA-H110M-D3H R2 TPM (rev. 1.0)GA-Z68A-D3-B3 (rev. 1.0)MZBAYAI (rev. 1.0)GA-J1900M-D3PGA-H110M-S2HP (rev. 1.0)GB-SIOPS-4550U (rev. 1.0)hp-prodesk-600-g1-desktop-mini-pcGB-BSi5-1135G7G292-Z42 (rev. 100)W131-X30GA-Z77X-UD3Hinspiron-15-5552-laptopMJ11-EC0 (rev. 1.2)altos r680 f4GA-Z77MX-D3HC621-WD12H261-Z60GB-BNi5HG4-950GB-BSi5H-6200-B2-IW (rev. 1.0)GA-H61M-S1MZ33-AR0 (rev. 1.0)R282-Z93 (rev. A00)GA-J1800M-D2P-IN (rev. 1.1)MSH87FI (rev. 1.0)GA-B150N Phoenix (rev. 1.0)thinkcentre-m72zG482-Z54GA-Z77MX-D3H TH (rev. 1.0)GA-X99-Gaming G1 WIFI (rev. 1.0)G262-IR0GA-Z170MX-Gaming 5R162-ZA1GA-9SISL (rev. 1.2)ME03-PE0 (rev. 1.x)GA-Z68M-D2HGA-H310MSTX-HD3ME03-CE0 (rev. 1.0)GA-B150-HD3 (rev. 1.0)R133-X13 (rev. AAB1)GB-BXPi3-4010 (rev. 1.0)GB-BER7-5800GA-H170-Gaming 3GB-BXCE-2955 (rev. 1.0)GA-H170M-HD3 DDR3GB-BXi7G3-760GA-P67-DS3-B3W331-Z00 (rev. 100)G293-Z42 (rev. IAP1)GA-6UASL3 (rev. 1.x/2.x)GA-Z68AP-D3GA-Z68XP-UD3-iSSD (rev. 1.0)G1.Sniper M3GB-BSi7H-6500-LA-IW (rev. 1.0)GA-Z68P-DS3 (rev. 2.0)MD72-HB2 (rev. 1.x/2.x)GB-BRR7-4700GA-6LASH (rev. 1.0)GA-Z170M-D3H DDR3 (rev. 1.0)GA-Z68XP-UD3H262-PC2GA-Z68X-UD4-B3 (rev. 1.0)GB-BNi7G4-950 (rev. 1.0)MDH11JI (rev. 1.0)R163-Z35 (rev. AAC1)GB-BSRE-1605 (rev. 1.0)GA-B75-D3V (rev. 1.0)MZ72-HB0 (rev. 1.x)G291-2G0 (rev. 100)GA-B75M-D3H (rev. 1.0)hp-z420-workstationGB-BXi3-4010 (rev. 1.0)GA-SBC4100 (rev. 1.0)PRIMERGY CX420 S1 ChassisGA-H110M-S2 DDR3G492-ZD0GA-H77M-D3H (rev. 1.0)GA-Z170N-Gaming 5 (rev. 1.0)GA-6LISL (rev. 1.1)R182-NA0G293-Z20inspiron-3656-desktopTO25-S11 (rev. AA01)TO15-Z40GA-Z170XP-SLIc24-962GA-Z170X-DesignareGA-Z68A-D3H-B3 (rev. 1.0)GA-IMB4100TNinspiron-17-3782-laptopC621 AORUS XTREME (rev. 1.0)S453-S70GA-IMB1900TN (rev. 1.0)GA-B150M-DS3H (rev. 1.0)EL-20-3060-32G (rev. 1.0)X299 UD4 EX (rev. 1.0)H23N-H60G591-HS0MVBAYAI (rev. 1.0)G190-G30MX34-BS0 (rev. 1.0)altos r680s f4G242-Z11vostro-20-3015-aioinspiron-3655-desktopTO25-Z12 (rev. AA01)GB-BRR7-4800GA-P67A-D3-B3GA-F2A55M-DS2 (rev. 1.0)MD70-HB2 (rev. 1.0)GA-N3050N-D2P (rev. 1.0)H261-NO0GA-6LXSV (rev. 1.2)R163-S30 (rev. AAB1)GA-H110TN (rev. 1.0)GB-BACE-3010 (rev. 1.0)alienware-alphaGA-X99-UD4P (rev. 1.0)AU47 M1R161-340 (rev. 100/200)GA-H170-D3H (rev. 1.0)hp-z228-microtower-workstationG293-S45MW51-HP0 (rev. 1.x)R130-134vostro-20-3052-aioGA-Z77-D3HGA-J1800N-D2P (rev. 1.0)R281-3C2H262-Z6AH270-F4G (rev. 100)GB-BNi7HG4-950R182-340 (rev. 100)inspiron-one-23-2330-aioMX33-BS0 (rev. 1.x)GA-B75M-D2V (rev. 1.0)GA-H170N-WIFIGA-Z77X-D3H (rev. 1.0)GA-N3160N-D3V (rev. 1.0)R272-Z30 (rev. 100)GB-BXCE-3205MD80-TM0 (rev. 1.0)vz2694gH263-V60G363-ZR0G292-Z45S251-3O0 (rev. 100)GA-Z77X-UP4 TH (rev. 1.0)ME33-AR0 (rev. 1.0)G221-Z30R270-R3C (rev. 143)B760M D2HX LITE SI (rev. 1.0)GA-X99-UD5 WIFIR123-C00GB-BSi5A-6300 (rev. 1.0)inspiron-24-5459-aioH261-H61 (rev. 100)MD71-HB1 (rev. 1.x)alienware-aurora-r14-desktopG250-G50 (rev. 400)R292-4S0GA-E6010N (rev. 1.0)GB-BXi7-5500alienware-aurora-r15-desktopMC12-LE0 (rev. 1.x)E133-C10 (rev. AAA1)inspiron-22-3265-desktop-aioGA-J1800M-D3P (rev. 1.x)GA-B150-HD3PH262-NO0GA-B150N Phoenix-WIFI (rev. 1.0)GA-B150M-DS3H DDR3GB-KMA1 (rev. 1.0)G210-H4G (rev. 100)GA-Z68XP-UD3R (rev. 1.0)inspiron-15-3521-laptopH252-3C0 (rev. 100)S451-3R0GA-H61M-S2P-R3 (rev. 3.0)GB-BNi7HG4-1050Ti (rev. 1.0)W42G-P08RGB-KMA3 (rev. 1.0)G292-Z40GA-B75M-S (rev. 1.0)R263-Z34 (rev. AAH1)MZBAYVA (rev. 1.2)GA-Z170X-Gaming 7GA-H110M-M.2GA-H61TN (rev. 1.1)GB-BNi7HG6-1060 (rev. 1.0)GB-BRi7-10510 (rev. 1.0)R163-S35 (rev. AAH1)MDH11TI (rev. 1.0)GA-Z170X-SOC FORCEE133-C10MU71-SU0 (rev. 1.x)GA-6UASV3 (rev. 1.0)GA-H110M-S2PHX299 AORUS Gaming 7 (rev. 1.0)GA-J1800N-D2H (rev. 1.x)H223-Z10 (rev. AAP1)R283-ZF0 (rev. IAL1)GA-H310TN-CMG482-Z54 (rev. 100)GA-X150M-PLUS WSMW50-SV0 (rev. 1.0)GA-H110M-WWinspiron-3646-small-desktopG482-Z50MU92-TU1 (rev. 1.x/2.x)R283-Z94GA-B150M-D3V DDR3GA-H77-D3H-MVP (rev. 1.0)R162-ZA2GA-X99P-SLIG292-280G182-C20MX32-BS0 (rev. 1.0)G292-Z40 (rev. 100)GA-H97TN (rev. 1.0)GA-H110M-H DDR3GA-B75M-D3VR183-S90 (rev. LAD1)MF51-ES2 (rev. 1.0)
CVE-2024-7208
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.13% / 33.01%
||
7 Day CHG~0.00%
Published-30 Jul, 2024 | 17:01
Updated-29 Oct, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2024-7208

A vulnerability in multi-tenant hosting allows an authenticated sender to spoof the identity of a shared, hosted domain, thus bypass security measures provided by DMARC (or SPF or DKIM) policies.

Action-Not Available
Vendor-HostGator
Product-HostGator
CVE-2024-7209
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.12% / 32.39%
||
7 Day CHG~0.00%
Published-30 Jul, 2024 | 17:01
Updated-13 Feb, 2025 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2024-7209

A vulnerability exists in the use of shared SPF records in multi-tenant hosting providers, allowing attackers to use network authorization to be abused to spoof the email identify of the sender.

Action-Not Available
Vendor-NetWinBird
Product-NetWinFastmail
CVE-2024-3596
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-9||CRITICAL
EPSS-19.04% / 95.09%
||
7 Day CHG-0.40%
Published-09 Jul, 2024 | 12:02
Updated-01 May, 2025 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
RADIUS Protocol under RFC2865 is vulnerable to forgery attacks.

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

Action-Not Available
Vendor-Broadcom Inc.FreeRADIUSSonicWall Inc.The IETF Administration LLC (IETF LLC)
Product-brocade_sannavsonicosfabric_operating_systemfreeradiusRFCrfc
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-328
Use of Weak Hash
CWE ID-CWE-354
Improper Validation of Integrity Check Value
CWE ID-CWE-924
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
CVE-2018-25103
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.25% / 48.33%
||
7 Day CHG+0.06%
Published-17 Jun, 2024 | 18:02
Updated-13 Feb, 2025 | 16:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use-after-free vulnerabilities in lighttpd <= 1.4.50

There exists use-after-free vulnerabilities in lighttpd <= 1.4.50 request parsing which might read from invalid pointers to memory used in the same request, not from other requests.

Action-Not Available
Vendor-lighttpdlighttpd
Product-lighttpdlighttpd
CVE-2024-3411
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-9.1||CRITICAL
EPSS-0.17% / 38.29%
||
7 Day CHG~0.00%
Published-30 Apr, 2024 | 18:39
Updated-05 Feb, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficient Randomness When Validating an IPMI Authenticated Session

Implementations of IPMI Authenticated sessions does not provide enough randomness to protect from session hijacking, allowing an attacker to use either predictable IPMI Session ID or weak BMC Random Number to bypass security controls using spoofed IPMI packets to manage BMC device.

Action-Not Available
Vendor-Intel CorporationDell Inc.
Product-iDRAC8IPMI*
CWE ID-CWE-331
Insufficient Entropy
CVE-2024-3660
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.30% / 52.73%
||
7 Day CHG+0.01%
Published-16 Apr, 2024 | 20:09
Updated-13 Feb, 2025 | 17:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary code injection vulnerability in Keras framework < 2.13

A arbitrary code injection vulnerability in TensorFlow's Keras framework (<2.13) allows attackers to execute arbitrary code with the same permissions as the application using a model that allow arbitrary code irrespective of the application.

Action-Not Available
Vendor-TensorFlow
Product-kerastensorflow
CVE-2024-3566
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-3.03% / 86.10%
||
7 Day CHG~0.00%
Published-10 Apr, 2024 | 15:22
Updated-17 Jun, 2025 | 20:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Command injection vulnerability in programing languages on Microsoft Windows operating system.

A command inject vulnerability allows an attacker to perform command injection on Windows applications that indirectly depend on the CreateProcess function when the specific conditions are satisfied.

Action-Not Available
Vendor-haskellrust-langyt-dlp_projectGo Programming LanguageHaskell Programming Languagethephpgrouphaskellrust-langyt-dlp_projectThe PHP GroupMicrosoft CorporationNode.js (OpenJS Foundation)Go
Product-node.jswindowsprocess_libraryyt-dlprustphpgoNode.jsHaskelGoLangrustnodejsyt-dlpthephpgroupprocess_library
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2024-2653
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-8.2||HIGH
EPSS-4.59% / 88.80%
||
7 Day CHG+1.16%
Published-03 Apr, 2024 | 17:18
Updated-13 Feb, 2025 | 17:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2024-2653

amphp/http will collect CONTINUATION frames in an unbounded buffer and will not check a limit until it has received the set END_HEADERS flag, resulting in an OOM crash.

Action-Not Available
Vendor-AMPHP
Product-amphp/httpamphp/http-clienthttp-clienthttp
CVE-2024-2758
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-6.3||MEDIUM
EPSS-0.36% / 57.27%
||
7 Day CHG+0.16%
Published-03 Apr, 2024 | 17:17
Updated-13 Feb, 2025 | 17:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2024-2758

Tempesta FW rate limits are not enabled by default. They are either set too large to capture empty CONTINUATION frames attacks or too small to handle normal HTTP requests appropriately.

Action-Not Available
Vendor-Tempesta
Product-Tempesta FW
CVE-2024-2169
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-7.5||HIGH
EPSS-1.17% / 77.83%
||
7 Day CHG~0.00%
Published-19 Mar, 2024 | 19:50
Updated-04 Sep, 2024 | 12:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Implementations of UDP application protocols are susceptible to network loops and denial of service

Implementations of UDP application protocol are vulnerable to network loops. An unauthenticated attacker can use maliciously-crafted packets against a vulnerable implementation that can lead to Denial of Service (DOS) and/or abuse of resources.

Action-Not Available
Vendor-dproxy-nexgendproxy-nexgen_projectMicrosoft CorporationMikroTik
Product-RouterOS-TFTPdproxy-nexgenWDSrouteros_tftpwdsdproxy-nexgen
CVE-2024-2193
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-5.7||MEDIUM
EPSS-1.80% / 81.99%
||
7 Day CHG~0.00%
Published-15 Mar, 2024 | 18:03
Updated-30 Apr, 2025 | 23:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Speculative Race Condition impacts modern CPU architectures that support speculative execution, also known as GhostRace.

A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths.

Action-Not Available
Vendor-Xen ProjectAdvanced Micro Devices, Inc.
Product-XenCPU
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2023-6960
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-7.5||HIGH
EPSS-0.07% / 22.48%
||
7 Day CHG~0.00%
Published-15 Mar, 2024 | 17:09
Updated-10 Apr, 2025 | 20:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2023-6960

TTLock App virtual keys and settings are only deleted client side, and if preserved, can access the lock after intended deletion.

Action-Not Available
Vendor-Scienersciener
Product-TTLock Appttlock_app
CVE-2023-7003
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-6.8||MEDIUM
EPSS-0.06% / 18.94%
||
7 Day CHG~0.00%
Published-15 Mar, 2024 | 17:09
Updated-24 Sep, 2024 | 14:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2023-7003

The AES key utilized in the pairing process between a lock using Sciener firmware and a wireless keypad is not unique, and can be reused to compromise other locks using the Sciener firmware.

Action-Not Available
Vendor-Scienersciener
Product-Kontrol Luxttlock_app
CWE ID-CWE-323
Reusing a Nonce, Key Pair in Encryption
CVE-2023-7007
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-8.2||HIGH
EPSS-0.09% / 27.16%
||
7 Day CHG~0.00%
Published-15 Mar, 2024 | 17:08
Updated-26 Mar, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2023-7007

Sciener server does not validate connection requests from the GatewayG2, allowing an impersonation attack that provides the attacker the unlockKey field.

Action-Not Available
Vendor-Sciener
Product-Gateway G2
CVE-2023-7006
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-9.1||CRITICAL
EPSS-0.07% / 21.64%
||
7 Day CHG~0.00%
Published-15 Mar, 2024 | 17:08
Updated-02 Aug, 2024 | 21:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2023-7006

The unlockKey character in a lock using Sciener firmware can be brute forced through repeated challenge requests, compromising the locks integrity.

Action-Not Available
Vendor-Scienersciener
Product-Kontrol Luxkontrol_lux_firmware
CVE-2023-7004
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 16.76%
||
7 Day CHG~0.00%
Published-15 Mar, 2024 | 17:08
Updated-26 Aug, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2023-7004

The TTLock App does not employ proper verification procedures to ensure that it is communicating with the expected device, allowing for connection to a device that spoofs the MAC address of a lock, which compromises the legitimate locks integrity.

Action-Not Available
Vendor-Scienersciener
Product-TTLock Appttlock_app
CWE ID-CWE-940
Improper Verification of Source of a Communication Channel
CVE-2023-7009
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-8.2||HIGH
EPSS-0.08% / 25.52%
||
7 Day CHG~0.00%
Published-15 Mar, 2024 | 17:07
Updated-26 Aug, 2024 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2023-7009

Some Sciener-based locks support plaintext message processing over Bluetooth Low Energy, allowing unencrypted malicious commands to be passed to the lock. These malicious commands, less then 16 bytes in length, will be processed by the lock as if they were encrypted communications. This can be further exploited by an attacker to compromise the lock's integrity.

Action-Not Available
Vendor-Scienersciener
Product-Kontrol Luxkontrol_lux_firmware
CVE-2023-7017
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.14% / 34.63%
||
7 Day CHG~0.00%
Published-15 Mar, 2024 | 17:07
Updated-28 Aug, 2024 | 17:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2023-7017

Sciener locks' firmware update mechanism do not authenticate or validate firmware updates if passed to the lock through the Bluetooth Low Energy service. A challenge request can be sent to the lock with a command to prepare for an update, rather than an unlock request, allowing an attacker to compromise the device.

Action-Not Available
Vendor-Scienersciener
Product-Kontrol Luxkontrol_lux_firmware
CVE-2023-4969
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-6.5||MEDIUM
EPSS-1.58% / 80.81%
||
7 Day CHG~0.00%
Published-16 Jan, 2024 | 17:01
Updated-20 Jun, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GPU kernel implementations susceptible to memory leak

A GPU kernel can read sensitive data from another GPU kernel (even from another user or app) through an optimized GPU memory region called _local memory_ on various architectures.

Action-Not Available
Vendor-Khronos Group Inc.Imagination Technologies LimitedAdvanced Micro Devices, Inc.
Product-ryzen_5_pro_3400geryzen_7_6800hs_firmwareinstinct_mi100radeon_rx_5500minstinct_mi250_firmwareryzen_5_pro_7545uradeon_rx_6800xtryzen_7_5700ge_firmwareryzen_9_4900hsryzen_5_7500f_firmwareradeon_pro_w7600_firmwareryzen_9_7940h_firmwareradeon_rx_5500m_firmwareryzen_9_4900h_firmwareryzen_7_5700geradeon_pro_w6400ryzen_7_7736u_firmwareopenclryzen_3_3200ge_firmwareradeon_rx_5300_firmwareryzen_5_pro_7640uryzen_5_7640hradeon_pro_w5700x_firmwareradeon_rx_5300m_firmwareryzen_7_7700ryzen_9_6900hxryzen_7_4980u_firmwareryzen_3_3250u_firmwareradeon_pro_v520_firmwareryzen_3_3200u_firmwareryzen_3_7320uryzen_5_4600geryzen_5_pro_3400ge_firmwareradeon_rx_6800xt_firmwareryzen_5_5600geryzen_9_pro_7945hs_firmwareryzen_5_7640h_firmwareryzen_9_6900hs_firmwareryzen_5_7600radeon_rx_6800_firmwareryzen_5_5600gtryzen_7_5700uryzen_5_6600u_firmwareradeon_pro_v520radeon_pro_w5500xryzen_7_pro_7840uryzen_5_pro_3400gryzen_5_7600x_firmwareryzen_5_7645hxryzen_9_pro_7945hsradeon_pro_w6500m_firmwareinstinct_mi250radeon_rx_5600_firmwareradeon_pro_w6300mryzen_5_5500gtryzen_3_4300u_firmwareryzen_3_pro_3200gryzen_7_7800x3d_firmwareryzen_5_7520u_firmwareryzen_5_7500fathlon_3000g_firmwareradeon_rx_7600ryzen_7_7700xryzen_9_7900xryzen_3_4300geradeon_rx_7900xtx_firmwareradeon_rx_7900xtxryzen_5_4600hradeon_pro_w7600instinct_mi300aryzen_3_3200uryzen_5_pro_7545u_firmwareradeon_rx_7900xt_firmwareryzen_3_3250uradeon_rx_5500_firmwareryzen_5_4680u_firmwareryzen_5_5500uryzen_9_7950x_firmwareryzen_7_pro_7840u_firmwareryzen_7_6800h_firmwareryzen_7_7745hxryzen_3_5300g_firmwareradeon_rx_5700radeon_rx_7600xt_firmwareryzen_5_7645hx_firmwareryzen_3_pro_3200g_firmwareryzen_3_pro_3200geryzen_5_5500u_firmwareinstinct_mi300xryzen_7_7735hs_firmwareryzen_5_4600hs_firmwareryzen_7_7700x_firmwareryzen_3_5300uradeon_rx_7700xt_firmwareinstinct_mi210_firmwareryzen_5_pro_7645ryzen_5_5600g_firmwareinstinct_mi300a_firmwareradeon_rx_5600ryzen_5_4600hsryzen_9_7950x3dryzen_7_7735hsryzen_7_4800u_firmwareradeon_pro_w5700xryzen_3_7440u_firmwareryzen_9_6980hx_firmwareradeon_pro_v620_firmwareryzen_5_pro_3350gryzen_7_6800u_firmwareryzen_5_pro_3350ge_firmwareryzen_5_pro_3350geryzen_7_4700uradeon_rx_5600m_firmwareryzen_5_4600u_firmwareryzen_5_4600g_firmwareradeon_rx_7900xtryzen_5_3400gryzen_7_4800hryzen_5_pro_7640hsryzen_9_7900x3d_firmwareryzen_9_6980hs_firmwareradeon_rx_6800radeon_rx_5700mryzen_9_7945hx_firmwareradeon_instinct_mi50ryzen_7_pro_7840hs_firmwareryzen_5_pro_3400g_firmwareathlon_3000gryzen_7_pro_7840hsryzen_3_3200geryzen_7_7700_firmwareryzen_5_pro_7645_firmwareryzen_5_7600_firmwareryzen_5_pro_7540uryzen_9_7845hx_firmwareradeon_rx_7700xtryzen_5_5600gt_firmwareradeon_pro_w6400_firmwareryzen_3_4300g_firmwareryzen_3_4300ge_firmwareryzen_3_3200g_firmwareryzen_5_6600uryzen_7_7800x3dradeon_rx_7600xtradeon_pro_v620ryzen_5_4600h_firmwareryzen_5_4680uryzen_9_7945hx3d_firmwareryzen_5_7600xryzen_3_7320u_firmwareryzen_5_7535hs_firmwareryzen_7_7735u_firmwareradeon_rx_5500ryzen_7_4800hsryzen_9_7900ryzen_7_7745hx_firmwareryzen_5_pro_7540u_firmwareryzen_3_5300ge_firmwareryzen_9_7950xryzen_7_6800hsddkryzen_9_7900x_firmwareradeon_rx_5700xt_firmwareryzen_9_7945hxryzen_7_7840hryzen_3_pro_3200ge_firmwareryzen_7_6800uryzen_7_4980uryzen_7_4800h_firmwareradeon_rx_5300ryzen_5_4500u_firmwareryzen_9_7950x3d_firmwareradeon_rx_5600mradeon_rx_7800xtradeon_rx_7800xt_firmwareradeon_rx_5300mryzen_7_5700u_firmwareryzen_3_3250cryzen_9_7945hx3dryzen_5_3400g_firmwareryzen_5_4600ge_firmwareryzen_5_5600gryzen_7_4700geradeon_rx_5700_firmwareryzen_7_7736uryzen_5_6600hs_firmwareryzen_9_7845hxryzen_7_7735uryzen_7_7840h_firmwareryzen_9_4900hs_firmwareryzen_3_7440uryzen_9_6900hx_firmwareryzen_3_7335u_firmwareryzen_5_4500uryzen_7_4700gryzen_5_pro_7640u_firmwareradeon_rx_6900xt_firmwareryzen_3_3200gryzen_5_6600hsinstinct_mi100_firmwareryzen_3_3250c_firmwareryzen_5_7520uryzen_7_pro_7745_firmwareryzen_3_5300geryzen_9_7940hradeon_pro_w7500_firmwareinstinct_mi300x_firmwareryzen_7_5700g_firmwareryzen_5_7535uryzen_9_pro_7945ryzen_5_pro_7640hs_firmwareryzen_7_5700gryzen_5_4600gryzen_7_6800hradeon_rx_5700m_firmwareradeon_rx_5300xt_firmwareryzen_5_7535hsradeon_instinct_mi25_firmwareryzen_7_4700g_firmwareradeon_rx_5600xtryzen_5_7535u_firmwareradeon_pro_w5500x_firmwareryzen_3_4300gryzen_5_5600ge_firmwareryzen_3_5300gradeon_rx_6950xt_firmwareryzen_5_6600h_firmwareryzen_7_4700u_firmwareradeon_rx_7600_firmwareradeon_rx_5500xt_firmwareradeon_rx_5700xtvulkaninstinct_mi210ryzen_7_pro_7745ryzen_7_4700ge_firmwareryzen_7_4800hs_firmwareradeon_rx_6900xtryzen_9_6980hsryzen_5_4600uradeon_pro_w6500mryzen_3_5300u_firmwareryzen_5_6600hradeon_instinct_mi25ryzen_3_4300uradeon_rx_5500xtradeon_instinct_mi50_firmwareryzen_3_7335uradeon_rx_5300xtryzen_5_pro_3350g_firmwareryzen_9_4900hryzen_5_5500gt_firmwareryzen_7_4800uradeon_pro_w7500ryzen_9_pro_7945_firmwareryzen_9_6980hxradeon_rx_5600xt_firmwareradeon_pro_w6300m_firmwareryzen_9_6900hsryzen_9_7900x3dradeon_rx_6950xtryzen_9_7900_firmwareOpenCLVulkan
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2020-10132
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-6.1||MEDIUM
EPSS-4.45% / 88.61%
||
7 Day CHG~0.00%
Published-06 Sep, 2023 | 18:47
Updated-26 Sep, 2024 | 16:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2020-10132

SearchBlox before Version 9.1 is vulnerable to cross-origin resource sharing misconfiguration.

Action-Not Available
Vendor-searchbloxSearchBlox
Product-searchbloxSearchBlox
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-10131
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-8.84% / 92.18%
||
7 Day CHG~0.00%
Published-06 Sep, 2023 | 18:47
Updated-26 Sep, 2024 | 17:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2020-10131

SearchBlox before Version 9.2.1 is vulnerable to CSV macro injection in "Featured Results" parameter.

Action-Not Available
Vendor-searchbloxSearchBlox
Product-searchbloxSearchBlox
CWE ID-CWE-1236
Improper Neutralization of Formula Elements in a CSV File
CVE-2020-10130
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-8.8||HIGH
EPSS-0.15% / 36.58%
||
7 Day CHG~0.00%
Published-06 Sep, 2023 | 18:47
Updated-26 Sep, 2024 | 17:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2020-10130

SearchBlox before Version 9.1 is vulnerable to business logic bypass where the user is able to create multiple super admin users in the system.

Action-Not Available
Vendor-searchbloxSearchBlox
Product-searchbloxSearchBlox
CWE ID-CWE-639
Authorization Bypass Through User-Controlled Key
CVE-2020-10129
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-8.8||HIGH
EPSS-0.17% / 39.12%
||
7 Day CHG~0.00%
Published-06 Sep, 2023 | 18:44
Updated-26 Sep, 2024 | 17:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2020-10129

SearchBlox before Version 9.2.1 is vulnerable to Privileged Escalation-Lower user is able to access Admin functionality.

Action-Not Available
Vendor-searchbloxSearchBlox
Product-searchbloxSearchBlox
CWE ID-CWE-269
Improper Privilege Management
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 65
  • 66
  • Next