Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-8950

EPSS 3.00% · P87
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-8950

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The AUEPLauncher service in Radeon AMD User Experience Program Launcher through 1.0.0.1 on Windows allows elevation of privilege by placing a crafted file in %PROGRAMDATA%\AMD\PPC\upload and then creating a symbolic link in %PROGRAMDATA%\AMD\PPC\temp that points to an arbitrary folder with an arbitrary file name.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
AMD Radeon User Experience Program Launcher 后置链接漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
AMD Radeon User Experience Program Launcher是美国超微半导体(AMD)公司的一款启动器。 AMD Radeon User Experience Program Launcher 1.0.0.1及之前版本存在后置链接漏洞。攻击者可利用该漏洞提升权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-8950

#POC DescriptionSource LinkShenlong Link
1CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop) https://github.com/sailay1996/amd_eop_pocPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-8950

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-02-12 · 51 CVEs total

CVE-2019-19196多款Telink Semiconductor产品 缓冲区错误漏洞
CVE-2014-2560PhonerLite 信息泄露漏洞
CVE-2014-6262Zenoss Core RRDtool 格式化字符串错误漏洞
CVE-2014-2595Barracuda Networks Barracuda Web Application Firewall 代码问题漏洞
CVE-2014-4968Boat Browser WebView Class 代码注入漏洞
CVE-2014-0234Red Hat OpenShift Enterprise 安全漏洞
CVE-2019-19921runc 安全漏洞
CVE-2014-9390Mercurial输入验证错误漏洞
CVE-2013-7378Hubot Scripts email.coffee模块注入漏洞
CVE-2020-8595Istio 授权问题漏洞
CVE-2014-4607Oberhumer LZO 输入验证错误漏洞
CVE-2019-19194多款Telink Semiconductor产品 安全漏洞
CVE-2013-7381node-libnotify 注入漏洞
CVE-2015-5617Enorth Webpublisher CMS SQL注入漏洞
CVE-2020-8815IKTeam BearFTP 输入验证错误漏洞
CVE-2020-8839CHIYU BF-430 232/485 TCP/IP Converter 跨站脚本漏洞
CVE-2015-7890Samsung S6 Edge Exynos Seiren Audio 缓冲区错误漏洞
CVE-2013-1410Perforce P4web 跨站脚本漏洞
CVE-2013-4090Varnish HTTP cache 安全漏洞
CVE-2013-3685Sprite Software Spritebud和Backup 竞争条件问题漏洞

Showing top 20 of 51 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-8950

No comments yet


Leave a comment