[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-0481":6},{"stargazers_count":4,"fetched_at":5},5,"2026-05-15T08:03:46.741Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":67,"aliases":68,"duplicate_of":9,"upstream":69,"downstream":70,"duplicates":71,"related":72,"reserved_at":9,"published_at":73,"modified_at":73,"state":74,"summary":75,"references_raw":82,"kevs":88,"epss":9,"epss_history":89,"metrics":90,"affected":97},"CVE-2026-0481","Unrestricted IP address binding in the AMD Device Metrics Exporter (ROCm ecosystem) could allow a remote attacker to perform unauthorized changes to the GPU configuration, potentially resulting in loss of availability",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":9,"capec":18},"CWE-1327","Binding to an Unrestricted IP Address","The product assigns the address 0.0.0.0 for a database server, a cloud service/instance, or any computing resource that communicates remotely.","weakness","Incomplete","Base",[19],{"id":20,"name":21,"techniques":22},"CAPEC-1","Accessing Functionality Not Properly Constrained by ACLs",[23],{"id":24,"name":25,"tactics":26,"countermeasures":42},"T1574.010","Services File Permissions Weakness",[27,30,33,36,39],{"id":28,"name":29},"TA0110","Persistence",{"id":31,"name":32},"TA0111","Privilege Escalation",{"id":34,"name":35},"TA0030","Defense Evasion",{"id":37,"name":38},"TA0005","Stealth",{"id":40,"name":41},"TA0104","Execution",[43,48,52,57,62],{"id":44,"name":45,"tactic":46},"D3-SWI","Software Inventory",{"name":47},"Model",{"id":49,"name":50,"tactic":51},"D3-AVE","Asset Vulnerability Enumeration",{"name":47},{"id":53,"name":54,"tactic":55},"D3-SBV","Service Binary Verification",{"name":56},"Detect",{"id":58,"name":59,"tactic":60},"D3-SU","Software Update",{"name":61},"Harden",{"id":63,"name":64,"tactic":65},"D3-RS","Restore Software",{"name":66},"Restore",[],[],[],[],[],[],"2026-05-15T03:04:56.312Z","Received",{"cisa_kev":76,"cisa_ransomware":76,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":77,"severity_score":78,"severity_version":79,"severity_source":80,"severity_vector":81,"severity_status":74},false,"critical",9.2,"v4.0","cve.org","CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H",[83],{"url":84,"sources":85,"tags":87},"https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6031.html",[80,86],"nvd",[],[],[],[91,94],{"source":80,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":9,"cvss_v4_0":92},{"baseScore":78,"baseSeverity":93,"vectorString":81,"impactScore":9,"exploitabilityScore":9},"CRITICAL",{"source":86,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":9,"cvss_v4_0":95},{"baseScore":78,"baseSeverity":93,"vectorString":96,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[]]