mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
84 lines
2.8 KiB
JSON
84 lines
2.8 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "psirt@amd.com",
|
|
"DATE_PUBLIC": "2021-11-09T20:30:00.000Z",
|
|
"ID": "CVE-2020-12891",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Radeon Software",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "Radeon Driver",
|
|
"version_value": " 21.4.1"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Radeon Pro Software for Enterprise",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": " Enterprise Driver",
|
|
"version_value": "21.Q2 "
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "AMD"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable."
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.0.9"
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "TBD"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
|
|
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "AMD-SB-1000",
|
|
"discovery": "UNKNOWN"
|
|
}
|
|
} |