Vulnerabilities > AMD
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-02-12 | CVE-2020-8950 | Link Following vulnerability in AMD User Experience Program 1.0.0.1 The AUEPLauncher service in Radeon AMD User Experience Program Launcher through 1.0.0.1 on Windows allows elevation of privilege by placing a crafted file in %PROGRAMDATA%\AMD\PPC\upload and then creating a symbolic link in %PROGRAMDATA%\AMD\PPC\temp that points to an arbitrary folder with an arbitrary file name. | 7.8 |
2020-01-25 | CVE-2019-5183 | Type Confusion vulnerability in AMD Atidxx64 26.20.13031.10003/26.20.13031.15006/26.20.13031.18002 An exploitable type confusion vulnerability exists in AMD ATIDXX64.DLL driver, versions 26.20.13031.10003, 26.20.13031.15006 and 26.20.13031.18002. | 9.0 |
2020-01-25 | CVE-2019-5147 | Out-of-bounds Read vulnerability in AMD Atidxx64 26.20.13003.1007 An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13003.1007. | 8.6 |
2020-01-25 | CVE-2019-5146 | Out-of-bounds Read vulnerability in AMD Atidxx64 26.20.13025.10004 An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13025.10004. | 8.6 |
2020-01-25 | CVE-2019-5124 | Out-of-bounds Read vulnerability in AMD Atidxx64 26.20.13001.50005 An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13001.50005. | 8.6 |
2019-12-05 | CVE-2019-5098 | Out-of-bounds Read vulnerability in multiple products An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13001.29010. | 8.6 |
2019-10-31 | CVE-2019-5049 | Out-of-bounds Write vulnerability in AMD products An exploitable memory corruption vulnerability exists in AMD ATIDXX64.DLL driver, versions 25.20.15031.5004 and 25.20.15031.9002. | 10.0 |
2019-06-25 | CVE-2019-9836 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation. | 5.3 |
2018-03-22 | CVE-2018-8936 | Unspecified vulnerability in AMD products The AMD EPYC Server, Ryzen, Ryzen Pro, and Ryzen Mobile processor chips allow Platform Security Processor (PSP) privilege escalation. | 9.0 |
2018-03-22 | CVE-2018-8935 | Unspecified vulnerability in AMD Ryzen Firmware and Ryzen PRO Firmware The Promontory chipset, as used in AMD Ryzen and Ryzen Pro platforms, has a backdoor in the ASIC, aka CHIMERA-HW. | 9.0 |