-
Notifications
You must be signed in to change notification settings - Fork 3
Expand file tree
/
Copy pathinvestigated.json
More file actions
40 lines (40 loc) · 1.17 KB
/
investigated.json
File metadata and controls
40 lines (40 loc) · 1.17 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
{
"investigated": {
"nvpcf.sys": {
"reason": "FP - MSR read not user-reachable, WDF device interface blocks unprivileged access",
"version": null
},
"AMDRyzenMasterDriver.sys": {
"reason": "Skipped - cannot obtain latest version for analysis",
"version": null
},
"AsusSAIO.sys": {
"reason": "1 vuln accepted by ASUS PSIRT, 3 rejected (Feb 2026)",
"version": null
},
"AsusWmiAcpi.sys": {
"reason": "1 vuln accepted by ASUS PSIRT, 3 rejected (Feb 2026)",
"version": null
},
"ssudbus2.sys": {
"reason": "4 vulns submitted to Samsung PSIRT (Feb 2026)",
"version": "2.21.0.0"
},
"mtkbtfilterx.sys": {
"reason": "Submitted to MediaTek PSIRT MSV-7296 (Feb 2026), under review",
"version": null
},
"mtkwl6ex.sys": {
"reason": "Submitted to MediaTek PSIRT MSV-6338 (Jan 2026), acknowledged",
"version": null
},
"amd_dpfc.sys": {
"reason": "Investigated - nothing exploitable found (Feb 2026)",
"version": null
},
"amdfendr.sys": {
"reason": "FP - AMD Fenced Runner, legitimate hardware management driver",
"version": null
}
}
}