cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-23829,https://securityvulnerability.io/vulnerability/CVE-2022-23829,Potential weakness in AMD SPI protection features may allow malicious attackers to bypass kernel mode protections,"A potential weakness in the SPI protection features of AMD systems enables a malicious actor with Ring0 (kernel mode) access to circumvent the built-in protections of the System Management Mode (SMM) ROM. This may lead to unauthorized access to critical system functions, potentially compromising the integrity of the entire system. Organizations utilizing affected AMD products should assess their security measures and enhance their defenses against potential exploitation.",Amd,"Amd Ryzen™ Threadripper™ Pro Processors 5900 Wx-series,Amd Ryzen™ 6000 Series Mobile Processors And Workstations,Amd Ryzen™ 7000 Series Desktop Processors,Amd Ryzen™ 5000 Series Mobile Processors,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Desktop Processors,Amd Ryzen™ 4000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors,Amd Ryzen™ 3000 Series Mobile Processor / 2nd Gen Amd Ryzen™ Mobile Processor With Radeon™ Graphics,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ Threadripper™ Pro Processor,1st Gen Amd Epyc™ Processors,2nd Gen Amd Epyc™ Processors,3rd Gen Amd Epyc™ Processors,Amd Epyc™ Embedded 3000,Amd Epyc (tm) Embedded 7002,Amd Epyc™ Embedded 7003,Amd Ryzentm Embedded R1000,Amd Ryzentm Embedded R2000,Amd Ryzentm Embedded 5000,Amd Ryzentm Embedded V1000,Amd Ryzentm Embedded V2000,Amd Ryzentm Embedded V3000",8.2,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-06-18T19:01:24.315Z,0 CVE-2020-12930,https://securityvulnerability.io/vulnerability/CVE-2020-12930,Privilege Escalation Vulnerability in AMD Secure Processor Drivers,"The vulnerability arises from improper handling of parameters within the AMD Secure Processor (ASP) drivers. This security flaw could be exploited by a privileged attacker to escalate their permissions, leading to potential integrity compromise of the system. Addressing this issue is crucial for maintaining the security standards of systems utilizing AMD technology.",Amd,"Amd Radeon Rx 5000 Series & Pro W5000 Series,Amd Ryzen(tm) Embedded R1000,Amd Ryzen(tm) Embedded R2000,Amd Ryzen(tm) Embedded 5000,Amd Ryzen(tm) Embedded V1000,Amd Ryzen(tm) Embedded V2000",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-11-09T21:15:00.000Z,0 CVE-2020-12931,https://securityvulnerability.io/vulnerability/CVE-2020-12931,Privilege Escalation Vulnerability in AMD Secure Processor Kernel,"The AMD Secure Processor kernel contains an improper parameters handling vulnerability that could be exploited by a privileged attacker. This flaw may allow unauthorized escalation of privileges, potentially compromising system integrity and exposing sensitive information. It is crucial to apply patches and security updates to mitigate associated risks.",Amd,"Amd Radeon Rx 5000 Series & Pro W5000 Series,Amd Ryzen(tm) Embedded R1000,Amd Ryzen(tm) Embedded R2000,Amd Ryzen(tm) Embedded 5000,Amd Ryzen(tm) Embedded V1000",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-11-09T21:15:00.000Z,0