{"vulnerability": "CVE-2023-3134", "sightings": [{"uuid": "a6325eb8-9793-4b35-8607-0d759446262d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31343", "type": "seen", "source": "https://t.me/cvedetector/17779", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-31343 - AMD Ryzen SMM Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-31343 \nPublished : Feb. 11, 2025, 11:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Improper input validation in the SMM handler may allow a privileged attacker to overwrite SMRAM, potentially leading to arbitrary code execution. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T01:47:31.000000Z"}, {"uuid": "dc3b93ae-4bad-466b-86f1-56ba7600880e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31342", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhx4mjdonx22", "content": "", "creation_timestamp": "2025-02-12T02:24:50.010671Z"}, {"uuid": "a408c73c-a93d-4e6e-aad8-04f33926e812", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31345", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhxddazw632v", "content": "", "creation_timestamp": "2025-02-12T04:24:50.573315Z"}, {"uuid": "eca216f9-7bae-4e06-954c-ad96bc33d647", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-31347", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "8bbad65c-263e-41f1-8900-0f615a562025", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31343", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113987656887022195", "content": "", "creation_timestamp": "2025-02-11T22:40:12.909367Z"}, {"uuid": "28f6b509-c674-4cb2-a346-e04361e6ed2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31342", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhws2dkbmq2a", "content": "", "creation_timestamp": "2025-02-11T23:15:37.066768Z"}, {"uuid": "a232c651-69a0-4572-b8c1-8bd4d7ce4c7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31343", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhws2fxn4t2c", "content": "", "creation_timestamp": "2025-02-11T23:15:39.354780Z"}, {"uuid": "389ec0e3-ffdb-4879-86ca-25b40b9887cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31345", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113987938331211664", "content": "", "creation_timestamp": "2025-02-11T23:51:47.380757Z"}, {"uuid": "3b5fc1f5-5e6d-4a72-8adc-bbf4f903237d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31345", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwvhgzpwx2x", "content": "", "creation_timestamp": "2025-02-12T00:16:37.732992Z"}, {"uuid": "48bd54c1-5725-4e38-86ce-3bc55a38f9d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-31346", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "deff46a8-c9d8-464c-b40d-a6693ebcbd76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31345", "type": "seen", "source": "https://t.me/cvedetector/17800", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-31345 - AMD Ryzen SMM Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-31345 \nPublished : Feb. 12, 2025, 12:15 a.m. | 2\u00a0hours, 16\u00a0minutes ago \nDescription : Improper input validation in the SMM handler may allow a privileged attacker to overwrite SMRAM, potentially leading to arbitrary code execution. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T04:19:23.000000Z"}, {"uuid": "e6c42def-b617-4bfd-930f-17c6b2406e90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31343", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3973", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-31343\n\ud83d\udd25 CVSS Score: 7.9 (CVSS_V3)\n\ud83d\udd39 Description: Improper input validation in the SMM handler may allow a privileged attacker to overwrite SMRAM, potentially leading to arbitrary code execution.\n\ud83d\udccf Published: 2025-02-12T00:32:16Z\n\ud83d\udccf Modified: 2025-02-12T00:32:16Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2023-31343\n2. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3009.html\n3. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4008.html\n4. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5004.html", "creation_timestamp": "2025-02-12T01:11:15.000000Z"}, {"uuid": "b7d09d17-024c-4014-86f2-0d3c45b02831", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31342", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3977", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-31342\n\ud83d\udd25 CVSS Score: 7.9 (CVSS_V3)\n\ud83d\udd39 Description: Improper input validation in the SMM handler may allow a privileged attacker to overwrite SMRAM, potentially leading to arbitrary code execution.\n\ud83d\udccf Published: 2025-02-12T00:32:16Z\n\ud83d\udccf Modified: 2025-02-12T00:32:16Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2023-31342\n2. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3009.html\n3. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4008.html\n4. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5004.html", "creation_timestamp": "2025-02-12T01:14:07.000000Z"}, {"uuid": "5bdcd4e8-6ad2-4403-af85-988cdb78a8d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31342", "type": "seen", "source": "https://t.me/cvedetector/17778", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-31342 - AMD Ryzen SMM Handler Arbitrary Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-31342 \nPublished : Feb. 11, 2025, 11:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Improper input validation in the SMM handler may allow a privileged attacker to overwrite SMRAM, potentially leading to arbitrary code execution. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T01:47:30.000000Z"}, {"uuid": "64f07007-f2e5-431c-836f-8b5923f9a8be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31348", "type": "seen", "source": "https://t.me/cvedetector/3046", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-31348 - AMD \u03bcProf DLL Hijacking Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-31348 \nPublished : Aug. 13, 2024, 5:15 p.m. | 43\u00a0minutes ago \nDescription : A DLL hijacking vulnerability in AMD \u03bcProf could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T20:28:06.000000Z"}, {"uuid": "23b203f9-f2e3-45a1-a711-ee7af05b7a4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31345", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3956", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-31345\n\ud83d\udd25 CVSS Score: 7.9 (CVSS_V3)\n\ud83d\udd39 Description: Improper input validation in the SMM handler may allow a privileged attacker to overwrite SMRAM, potentially leading to arbitrary code execution.\n\ud83d\udccf Published: 2025-02-12T00:32:17Z\n\ud83d\udccf Modified: 2025-02-12T00:32:17Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2023-31345\n2. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3009.html\n3. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4008.html\n4. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5004.html", "creation_timestamp": "2025-02-12T01:09:49.000000Z"}, {"uuid": "94ce749a-2020-4eb4-aef1-2401dd90755e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31345", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13172", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-31345\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Improper input validation in the SMM handler may allow a privileged attacker to overwrite SMRAM, potentially leading to arbitrary code execution.\n\ud83d\udccf Published: 2025-02-11T23:49:05.388Z\n\ud83d\udccf Modified: 2025-04-24T03:55:31.019Z\n\ud83d\udd17 References:\n1. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5004.html\n2. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4008.html\n3. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3009.html", "creation_timestamp": "2025-04-24T04:05:45.000000Z"}, {"uuid": "e288ab94-2ce6-48c1-8adf-2130f3eaba56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31342", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13171", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-31342\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Improper input validation in the SMM handler may allow a privileged attacker to overwrite SMRAM, potentially leading to arbitrary code execution.\n\ud83d\udccf Published: 2025-02-11T22:24:02.153Z\n\ud83d\udccf Modified: 2025-04-24T03:55:32.361Z\n\ud83d\udd17 References:\n1. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5004.html\n2. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4008.html\n3. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3009.html", "creation_timestamp": "2025-04-24T04:05:44.000000Z"}, {"uuid": "ea831a9c-f43a-4ffb-b245-1f773ed1a1ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31341", "type": "seen", "source": "https://t.me/cvedetector/3045", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-31341 - AMD \u03bcProf Out-of-Bounds Write Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2023-31341 \nPublished : Aug. 13, 2024, 5:15 p.m. | 43\u00a0minutes ago \nDescription : Insufficient  \nvalidation of the Input Output Control (IOCTL) input buffer in AMD \u03bcProf may  \nallow an authenticated attacker to cause an out-of-bounds write, potentially  \ncausing a Windows\u00ae OS crash, resulting in denial of service. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T20:28:05.000000Z"}, {"uuid": "427e1806-df39-4966-836d-2ce3f07f18a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31347", "type": "seen", "source": "https://t.me/ctinow/184231", "content": "https://ift.tt/KIhUYu3\nCVE-2023-31347", "creation_timestamp": "2024-02-13T21:31:50.000000Z"}, {"uuid": "c345dd3d-bb15-46c0-b8aa-18574b5a87da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31345", "type": "seen", "source": "Telegram/0BysBoRkrQQr3J-6cU0_y7FJjjqHgp1kJ2WOORO9Tdt4kCkj", "content": "", "creation_timestamp": "2025-02-14T10:04:01.000000Z"}, {"uuid": "13b45db5-341b-4b4e-83f8-ee61d6085795", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31343", "type": "seen", "source": "Telegram/3-P0lh1FOEvnGwRsiiNr1N5GDRNQUQfPt3uTd7fp-jupU6dt", "content": "", "creation_timestamp": "2025-02-14T10:04:01.000000Z"}, {"uuid": "27652a97-0976-4c82-8220-f03f8e34a796", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31349", "type": "seen", "source": "https://t.me/cvedetector/3042", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-31349 - AMD \u03bcProf Privilege Escalation Arbitary Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-31349 \nPublished : Aug. 13, 2024, 5:15 p.m. | 43\u00a0minutes ago \nDescription : Incorrect default permissions in the AMD \u03bcProf installation directory could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T20:27:59.000000Z"}, {"uuid": "3a89b847-399f-4dfe-bebb-292926b3136e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31342", "type": "seen", "source": "Telegram/AgOyAvWTIy4qpYCfmqtmwYA-IzRTZvK6lVkmZbLkkix79pmv", "content": "", "creation_timestamp": "2025-02-14T10:04:01.000000Z"}, {"uuid": "a67cf3e7-4a07-4f7b-b950-4a152abdf4a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31346", "type": "seen", "source": "https://t.me/ctinow/184230", "content": "https://ift.tt/B6WhLXq\nCVE-2023-31346", "creation_timestamp": "2024-02-13T21:31:49.000000Z"}, {"uuid": "30c126ee-0bb7-41b4-9262-a74701f09317", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3134", "type": "seen", "source": "https://t.me/cibsecurity/67446", "content": "\u203c CVE-2023-3134 \u203c\n\nThe Forminator WordPress plugin before 1.24.4 does not properly escape values that are being reflected inside form fields that use pre-populated query parameters, which could lead to reflected XSS attacks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-31T14:37:43.000000Z"}]}