Improper input validation in SEV-SNP could allow hypervisor to read or overwrite guest memory leading to data leakage or corruptio
Reporter | Title | Published | Views | Family All 15 |
---|---|---|---|---|
![]() | CVE-2024-21978 | 17 Dec 202409:51 | – | redhatcve |
![]() | Exploit for Improper Input Validation in Amd Epyc 7203 Firmware | 7 Jan 202411:07 | – | githubexploit |
![]() | CVE-2024-21978 | 5 Aug 202416:05 | – | vulnrichment |
![]() | CVE-2024-21978 | 5 Aug 202416:15 | – | nvd |
![]() | CVE-2024-21978 | 5 Aug 202416:15 | – | cve |
![]() | [SECURITY] Fedora 42 Update: linux-firmware-20250311-1.fc42 | 16 Mar 202500:16 | – | fedora |
![]() | [SECURITY] Fedora 40 Update: linux-firmware-20250311-1.fc40 | 17 Mar 202502:04 | – | fedora |
![]() | [SECURITY] Fedora 41 Update: linux-firmware-20250311-1.fc41 | 15 Mar 202502:24 | – | fedora |
![]() | Fedora 40 : linux-firmware (2025-3110d5f423) | 19 Mar 202500:00 | – | nessus |
![]() | Fedora 42 : linux-firmware (2025-a5859c4a47) | 8 Jun 202500:00 | – | nessus |
[
{
"defaultStatus": "affected",
"product": "3rd Gen AMD EPYC™ Processors",
"vendor": "AMD",
"versions": [
{
"lessThan": "MilanPI 1.0.0.D",
"status": "affected",
"version": "various",
"versionType": "Platform Initialization"
}
]
},
{
"defaultStatus": "affected",
"product": "4th Gen AMD EPYC™ Processors",
"vendor": "AMD",
"versions": [
{
"lessThan": "GenoaPI 1.0.0.C",
"status": "affected",
"version": "various",
"versionType": "Platform Initialization"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD EPYC™ Embedded 7003",
"vendor": "AMD",
"versions": [
{
"lessThan": "EmbMilanPI-SP3 1.0.0.9",
"status": "affected",
"version": "various",
"versionType": "Platform Initialization"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD EPYC™ Embedded 9003",
"vendor": "AMD",
"versions": [
{
"lessThan": "EmbGenoaPI-SP5 1.0.0.7",
"status": "affected",
"version": "various",
"versionType": "Platform Initialization"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo