Vulnerabilities > AMD > Low
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-11-15 | CVE-2020-12905 | Out-of-bounds Read vulnerability in AMD Radeon Software 20.7.1 Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure. | 2.1 |
2021-11-15 | CVE-2020-12901 | Use After Free vulnerability in AMD Radeon Software Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure. | 2.1 |
2021-11-15 | CVE-2020-12894 | Out-of-bounds Write vulnerability in AMD Radeon Software Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service. | 3.6 |
2021-11-15 | CVE-2020-12920 | Unspecified vulnerability in AMD Radeon Software 20.7.1 A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. | 2.1 |
2021-11-15 | CVE-2020-12904 | Out-of-bounds Read vulnerability in AMD Radeon Software 20.7.1 Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure. | 2.1 |
2021-11-15 | CVE-2020-12899 | Information Exposure vulnerability in AMD Radeon Software 20.7.1 Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service. | 3.6 |
2021-11-15 | CVE-2020-12897 | Information Exposure vulnerability in AMD Radeon Software 20.11.2/20.7.1 Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass. | 2.1 |
2021-10-13 | CVE-2021-26318 | Information Exposure Through Discrepancy vulnerability in AMD products A timing and power-based side channel attack leveraging the x86 PREFETCH instructions on some AMD CPUs could potentially result in leaked kernel address space information. | 1.9 |
2020-11-12 | CVE-2020-12912 | Information Exposure Through Discrepancy vulnerability in AMD Energy Driver for Linux A potential vulnerability in the AMD extension to Linux "hwmon" service may allow an attacker to use the Linux-based Running Average Power Limit (RAPL) interface to show various side channel attacks. | 2.1 |