Lucene search

K

CVE-2021-26338

🗓️ 16 Nov 2021 18:07:15Reported by [email protected]Type 
nvd
 nvd
🔗 web.nvd.nist.gov👁 10 Views

Improper access controls in System Management Unit (SMU) may allow an attacker to override performance control tables in DRAM leading to potential resource shortag

Show more
Related
Detection
Refs
ReporterTitlePublishedViews
Family
CVE
CVE-2021-26338
16 Nov 202118:15
cve
Prion
Improper access control
16 Nov 202118:15
prion
Cvelist
CVE-2021-26338
16 Nov 202117:53
cvelist
Amd
AMD Server Vulnerabilities – November 2021
8 Nov 202100:00
amd
Nvd
Node
amdepyc_7f72_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7f52_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7f32_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7h12_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7742_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7702_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7702p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7662_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7642_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7552_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7542_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7532_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7502_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7502p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7452_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7402_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7402p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7352_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7302_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7302p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7282_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7272_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7262_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7252_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7232p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7763_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7713p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7713_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7663_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7643_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_75f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7543p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7543_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7513_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7453_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_74f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7443p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7443_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7413_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_73f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7343_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7313p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7313_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_72f3_firmwareRange<milanpi-sp3_1.0.0.4
AND

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo