Lucene search

K

CVE-2023-20531

🗓️ 11 Jan 2023 08:14:15Reported by [email protected]Type 
nvd
 nvd
🔗 web.nvd.nist.gov👁 11 Views

Insufficient bound checks in SMU can allow attacker to update SRAM to invalid value resulting in denial of servic

Show more
Related
Detection
Refs
ReporterTitlePublishedViews
Family
Cvelist
CVE-2023-20531
10 Jan 202320:57
cvelist
Prion
Design/Logic Flaw
11 Jan 202308:15
prion
CVE
CVE-2023-20531
11 Jan 202308:15
cve
Amd
AMD Server Vulnerabilities – January 2023
10 Jan 202300:00
amd
Nvd
Node
amdepyc_7h12_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7f72_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7f52_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7f32_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7742_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7702p_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7702_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7662_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7642_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7552_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7542_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7532_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7502p_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7502_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7452_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7402_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7402p_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7352_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7302p_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7302_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7282_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7272_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7262_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7252_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7232p_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7002_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7003_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_72f3_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7313_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7313p_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7343_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7373x_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_73f3_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7413_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7443_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7443p_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7453_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_74f3_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7513_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7543_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7543p_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7573x_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_75f3_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7643_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7663_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7713_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7713p_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7743_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7763_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7773x_firmwareRange<milanpi_1.0.0.5
AND

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
11 Jan 2023 08:15Current
7.4High risk
Vulners AI Score7.4
CVSS37.5
EPSS0.001
11
.json
Report