cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-21945,https://securityvulnerability.io/vulnerability/CVE-2024-21945,Privilege Escalation Risk in AMD Ryzen Master Monitoring SDK,"An improper configuration of default permissions found in the installation directory of the AMD Ryzen Master Monitoring SDK poses a vulnerability where unauthorized users could execute privileged actions. This vulnerability could enable an attacker to escalate privileges, potentially resulting in execution of arbitrary code, which may compromise the system's security. It is critical for users and administrators to review the permission settings and apply necessary updates to mitigate potential security risks.",Amd,Ryzen Master Monitoring Software Development Kit,7.3,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-11-12T18:15:00.000Z,0 CVE-2024-21946,https://securityvulnerability.io/vulnerability/CVE-2024-21946,Privilege Escalation Vulnerability in AMD Ryzen Master Utility,"A vulnerability exists in the AMD Ryzen Master Utility that arises from incorrect default permissions in the installation directory. This flaw could enable an attacker to exploit the permissions to achieve privilege escalation, potentially allowing them to execute arbitrary code in the context of the affected user. It is crucial for users to review their installations and apply any available security updates to mitigate the associated risks.",Amd,Ryzen Master Utility For Overclocking Control,7.3,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-11-12T18:15:00.000Z,0 CVE-2023-20560,https://securityvulnerability.io/vulnerability/CVE-2023-20560," "," Insufficient validation of the IOCTL (Input Output Control) input buffer in AMD Ryzen™ Master may allow a privileged attacker to provide a null value potentially resulting in a Windows crash leading to denial of service. ",Amd,Ryzen™ Master,4.4,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2023-08-15T22:15:00.000Z,0 CVE-2023-20564,https://securityvulnerability.io/vulnerability/CVE-2023-20564," "," Insufficient validation in the IOCTL (Input Output Control) input buffer in AMD Ryzen™ Master may permit a privileged attacker to perform memory reads/writes potentially leading to a loss of confidentiality or arbitrary kernel execution. ",Amd,Ryzen™ Master,6.7,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2023-08-15T22:15:00.000Z,0 CVE-2022-27677,https://securityvulnerability.io/vulnerability/CVE-2022-27677,," Failure to validate privileges during installation of AMD Ryzen™ Master may allow an attacker with low privileges to modify files potentially leading to privilege escalation and code execution by the lower privileged user. ",Amd,Ryzen™ Master,7.8,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2023-03-01T08:15:00.000Z,0 CVE-2020-12928,https://securityvulnerability.io/vulnerability/CVE-2020-12928,,A vulnerability in a dynamically loaded AMD driver in AMD Ryzen Master V15 may allow any authenticated user to escalate privileges to NT authority system.,Amd,Amd Ryzen Master,7.8,HIGH,0.0004400000034365803,false,false,false,true,true,false,false,2020-10-13T21:12:21.000Z,0