Vulnerabilities (CVE)

Filtered by vendor Ami Subscribe
Filtered by product Aptio V
Total 27 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-39539 1 Ami 1 Aptio V 2024-11-21 N/A 7.5 HIGH
AMI AptioV contains a vulnerability in BIOS where a User may cause an unrestricted upload of a PNG Logo file with dangerous type by Local access. A successful exploit of this vulnerability may lead to a loss of Confidentiality, Integrity, and/or Availability. 
CVE-2023-39538 1 Ami 1 Aptio V 2024-11-21 N/A 7.5 HIGH
AMI AptioV contains a vulnerability in BIOS where a User may cause an unrestricted upload of a BMP Logo file with dangerous type by Local access. A successful exploit of this vulnerability may lead to a loss of Confidentiality, Integrity, and/or Availability. 
CVE-2023-39537 1 Ami 1 Aptio V 2024-11-21 N/A 7.5 HIGH
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
CVE-2023-39536 1 Ami 1 Aptio V 2024-11-21 N/A 7.5 HIGH
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
CVE-2023-39535 1 Ami 1 Aptio V 2024-11-21 N/A 7.5 HIGH
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
CVE-2023-34470 1 Ami 1 Aptio V 2024-11-21 N/A 6.8 MEDIUM
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper access control via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
CVE-2023-34469 1 Ami 1 Aptio V 2024-11-21 N/A 4.9 MEDIUM
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper access control via the physical network. A successful exploit of this vulnerability may lead to a loss of confidentiality.