cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2019-7246,https://securityvulnerability.io/vulnerability/CVE-2019-7246,Arbitrary MSR Writes in AMD ATI Diagnostics Hardware Abstraction Utility,"A significant vulnerability exists in the AMD ATI Diagnostics Hardware Abstraction Sys/Overclocking Utility, where the atillk64.sys driver inadequately filters Model Specific Registers (MSRs). This flaw allows an attacker to leverage the wrmsr instruction for arbitrary writes, potentially enabling unauthorized Ring-0 code execution. Such exploitation may lead to a serious escalation of privileges, impacting the integrity and security of the affected system.",Amd,Atillk64,6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-05-18T15:56:48.000Z,0 CVE-2020-12138,https://securityvulnerability.io/vulnerability/CVE-2020-12138,Privilege Escalation in AMD ATI Driver for Windows,"The AMD ATI atillk64.sys driver version 5.11.9.0 contains a vulnerability that allows low-privileged users to access physical memory directly. By exploiting certain driver routines, these users can map physical memory into their process's virtual address space, enabling them to elevate their privileges to NT AUTHORITY\SYSTEM level. This is achieved through specific DeviceIoControl calls such as MmMapIoSpace, IoAllocateMdl, MmBuildMdlForNonPagedPool, or MmMapLockedPages, posing a significant security risk.",Amd,Atillk64,8.8,HIGH,0.00203999993391335,false,,false,false,false,,,false,false,,2020-04-27T14:31:47.000Z,0