- Synchronized data.

This commit is contained in:
CVE Team 2019-02-13 18:04:00 -05:00
parent e588266409
commit 5439f7050f
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
15 changed files with 45 additions and 675 deletions

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "secure@intel.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2019-02-12T00:00:00",
"ID" : "CVE-2018-12159",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Intel(R) PROSet Wireless Driver Denial of Service Advisory",
"version" : {
"version_data" : [
{
"version_value" : "Versions v20.50 and before."
}
]
}
}
]
},
"vendor_name" : "Intel Corporation"
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Buffer overflow in the command-line interface for Intel(R) PROSet Wireless v20.50 and before may allow an authenticated user to potentially enable denial of service via local access."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Denial of Service"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00169.html"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "secure@intel.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2019-02-12T00:00:00",
"ID" : "CVE-2018-3700",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Intel(R) USB 3.0 eXtensible Host Controller Driver Advisory",
"version" : {
"version_data" : [
{
"version_value" : "Versions before 5.0.4.43v2."
}
]
}
}
]
},
"vendor_name" : "Intel Corporation"
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Code injection vulnerability in the installer for Intel(R) USB 3.0 eXtensible Host Controller Driver for Microsoft Windows 7 before version 5.0.4.43v2 may allow a user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Escalation of Privilege"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00200.html"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "secure@intel.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2019-02-12T00:00:00",
"ID" : "CVE-2019-0101",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Intel(R) Unite Privilege Escalation Advisory",
"version" : {
"version_data" : [
{
"version_value" : "Intel Unite(R) Solution software server component on versions 3.2 through 3.3."
}
]
}
}
]
},
"vendor_name" : "Intel Corporation"
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Authentication bypass in the Intel Unite(R) solution versions 3.2 through 3.3 may allow an unauthenticated user to potentially enable escalation of privilege to the Intel Unite(R) Solution administrative portal via network access."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Escalation of Privilege"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00214.html"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "secure@intel.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2019-02-12T00:00:00",
"ID" : "CVE-2019-0102",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Intel(R) Data Center Manager SDK Advisory",
"version" : {
"version_data" : [
{
"version_value" : "before version 5.0.2."
}
]
}
}
]
},
"vendor_name" : "Intel Corporation"
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Insufficient session authentication in web server for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Escalation of Privilege"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "secure@intel.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2019-02-12T00:00:00",
"ID" : "CVE-2019-0103",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Intel(R) Data Center Manager SDK Advisory",
"version" : {
"version_data" : [
{
"version_value" : "before version 5.0.2."
}
]
}
}
]
},
"vendor_name" : "Intel Corporation"
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Insufficient file protection in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Information Disclosure"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "secure@intel.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2019-02-12T00:00:00",
"ID" : "CVE-2019-0104",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Intel(R) Data Center Manager SDK Advisory",
"version" : {
"version_data" : [
{
"version_value" : "before version 5.0.2."
}
]
}
}
]
},
"vendor_name" : "Intel Corporation"
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Insufficient file protection in uninstall routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Escalation of Privilege"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "secure@intel.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2019-02-12T00:00:00",
"ID" : "CVE-2019-0105",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Intel(R) Data Center Manager SDK Advisory",
"version" : {
"version_data" : [
{
"version_value" : "before version 5.0.2."
}
]
}
}
]
},
"vendor_name" : "Intel Corporation"
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Insufficient file permissions checking in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Escalation of Privilege"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "secure@intel.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2019-02-12T00:00:00",
"ID" : "CVE-2019-0106",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Intel(R) Data Center Manager SDK Advisory",
"version" : {
"version_data" : [
{
"version_value" : "before version 5.0.2."
}
]
}
}
]
},
"vendor_name" : "Intel Corporation"
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Insufficient run protection in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow a privileged user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Escalation of Privilege"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "secure@intel.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2019-02-12T00:00:00",
"ID" : "CVE-2019-0107",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Intel(R) Data Center Manager SDK Advisory",
"version" : {
"version_data" : [
{
"version_value" : "before version 5.0.2."
}
]
}
}
]
},
"vendor_name" : "Intel Corporation"
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Insufficient user prompt in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow a privileged user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Escalation of Privilege"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "secure@intel.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2019-02-12T00:00:00",
"ID" : "CVE-2019-0108",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Intel(R) Data Center Manager SDK Advisory",
"version" : {
"version_data" : [
{
"version_value" : "before version 5.0.2."
}
]
}
}
]
},
"vendor_name" : "Intel Corporation"
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Improper file permissions for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable disclosure of information via local access."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Information Disclosure"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "secure@intel.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2019-02-12T00:00:00",
"ID" : "CVE-2019-0109",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Intel(R) Data Center Manager SDK Advisory",
"version" : {
"version_data" : [
{
"version_value" : "before version 5.0.2."
}
]
}
}
]
},
"vendor_name" : "Intel Corporation"
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Improper folder permissions in Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Escalation of Privilege"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "secure@intel.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2019-02-12T00:00:00",
"ID" : "CVE-2019-0110",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Intel(R) Data Center Manager SDK Advisory",
"version" : {
"version_data" : [
{
"version_value" : "before version 5.0.2."
}
]
}
}
]
},
"vendor_name" : "Intel Corporation"
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Insufficient key management for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Information Disclosure"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "secure@intel.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2019-02-12T00:00:00",
"ID" : "CVE-2019-0111",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Intel(R) Data Center Manager SDK Advisory",
"version" : {
"version_data" : [
{
"version_value" : "before version 5.0.2."
}
]
}
}
]
},
"vendor_name" : "Intel Corporation"
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Improper file permissions for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Information Disclosure"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "secure@intel.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2019-02-12T00:00:00",
"ID" : "CVE-2019-0112",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Intel(R) Data Center Manager SDK Advisory",
"version" : {
"version_data" : [
{
"version_value" : "before version 5.0.2."
}
]
}
}
]
},
"vendor_name" : "Intel Corporation"
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Improper flow control in crypto routines for Intel(R) Data Center Manager SDK before version 5.0.2 may allow a privileged user to potentially enable a denial of service via local access."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Denial of Service"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,32 +1,9 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "secure@intel.com",
"ASSIGNER" : "cve@mitre.org",
"DATE_PUBLIC" : "2019-02-12T00:00:00",
"ID" : "CVE-2019-0127",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Intel(R) OpenVINO(TM) 2018 for Linux Advisory",
"version" : {
"version_data" : [
{
"version_value" : "Versions before R4."
}
]
}
}
]
},
"vendor_name" : "Intel Corporation"
}
]
}
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -35,26 +12,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Logic error in the installer for Intel(R) OpenVINO(TM) 2018 R3 and before for Linux may allow a privileged user to potentially enable information disclosure via local access."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Information Disclosure"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00222.html"
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}