{ "schema_version": "1.4.0", "id": "GHSA-c3mf-3753-8v7f", "modified": "2022-05-24T17:08:51Z", "published": "2022-05-24T17:08:51Z", "aliases": [ "CVE-2020-8950" ], "details": "The AUEPLauncher service in Radeon AMD User Experience Program Launcher through 1.0.0.1 on Windows allows elevation of privilege by placing a crafted file in %PROGRAMDATA%\\AMD\\PPC\\upload and then creating a symbolic link in %PROGRAMDATA%\\AMD\\PPC\\temp that points to an arbitrary folder with an arbitrary file name.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8950" }, { "type": "WEB", "url": "https://heynowyouseeme.blogspot.com/2020/02/another-privilege-escalation-filewrite.html" }, { "type": "WEB", "url": "https://heynowyouseeme.blogspot.com/2020/02/privilege-escalation-filewrite-eop-in.html" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-02-12T20:15:00Z" } }