diff --git a/2018/12xxx/CVE-2018-12174.json b/2018/12xxx/CVE-2018-12174.json index b28c6214697..8aba94fedb0 100644 --- a/2018/12xxx/CVE-2018-12174.json +++ b/2018/12xxx/CVE-2018-12174.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "ID" : "CVE-2018-12174", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Intel Parallel Studio XE 2018", + "version" : { + "version_data" : [ + { + "version_value" : "Update 3 and before" + } + ] + } + } + ] + }, + "vendor_name" : "Intel Corporation" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Heap overflow in Intel Trace Analyzer 2018 in Intel Parallel Studio XE 2018 Update 3 may allow an authenticated user to potentially escalate privileges via local access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Escalation of Privilege" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00180.html" } ] } diff --git a/2018/3xxx/CVE-2018-3621.json b/2018/3xxx/CVE-2018-3621.json index d627f826d42..24724b1957f 100644 --- a/2018/3xxx/CVE-2018-3621.json +++ b/2018/3xxx/CVE-2018-3621.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "ID" : "CVE-2018-3621", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Intel Driver & Support Assistant", + "version" : { + "version_data" : [ + { + "version_value" : "Versions before 3.6.0.4" + } + ] + } + } + ] + }, + "vendor_name" : "Intel Corporation" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Insufficient input validation in the Intel Driver & Support Assistant before 3.6.0.4 may allow an unauthenticated user to potentially enable information disclosure via adjacent access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Information Disclosure" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00187.html" } ] } diff --git a/2018/3xxx/CVE-2018-3635.json b/2018/3xxx/CVE-2018-3635.json index f6296583798..6962fcbd39d 100644 --- a/2018/3xxx/CVE-2018-3635.json +++ b/2018/3xxx/CVE-2018-3635.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "ID" : "CVE-2018-3635", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Intel Rapid Store Technology", + "version" : { + "version_data" : [ + { + "version_value" : "versions before 16.7" + } + ] + } + } + ] + }, + "vendor_name" : "Intel Corporation" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Insufficient input validation in installer in Intel Rapid Store Technology (RST) before version 16.7 may allow an unprivileged user to potentially elevate privileges or cause an installer denial of service via local access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Escalation of Privilege, Denial of Service" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00153.html" } ] } diff --git a/2018/3xxx/CVE-2018-3696.json b/2018/3xxx/CVE-2018-3696.json index bedf142f9c6..17ecea8abe7 100644 --- a/2018/3xxx/CVE-2018-3696.json +++ b/2018/3xxx/CVE-2018-3696.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "ID" : "CVE-2018-3696", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Intel RAID Web Console v3 for Windows", + "version" : { + "version_data" : [ + { + "version_value" : "Versions before 4.186" + } + ] + } + } + ] + }, + "vendor_name" : "Intel Corporation" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Authentication bypass in the Intel RAID Web Console 3 for Windows before 4.186 may allow an unprivileged user to potentially gain administrative privileges via local access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Information Disclosure" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00196.html" } ] } diff --git a/2018/3xxx/CVE-2018-3697.json b/2018/3xxx/CVE-2018-3697.json index ee68088fcf1..260751e699f 100644 --- a/2018/3xxx/CVE-2018-3697.json +++ b/2018/3xxx/CVE-2018-3697.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "ID" : "CVE-2018-3697", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Intel Media Server Studio", + "version" : { + "version_data" : [ + { + "version_value" : "Versions before 2019 Beta Release" + } + ] + } + } + ] + }, + "vendor_name" : "Intel Corporation" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Improper directory permissions in the installer for the Intel Media Server Studio may allow unprivileged users to potentially enable an escalation of privilege via local access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Escalation of Privilege" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00197.html" } ] } diff --git a/2018/3xxx/CVE-2018-3698.json b/2018/3xxx/CVE-2018-3698.json index 077edfa3476..566f51959bb 100644 --- a/2018/3xxx/CVE-2018-3698.json +++ b/2018/3xxx/CVE-2018-3698.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "ID" : "CVE-2018-3698", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Intel Ready Mode Technology", + "version" : { + "version_data" : [ + { + "version_value" : "all versions" + } + ] + } + } + ] + }, + "vendor_name" : "Intel Corporation" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Improper file permissions in the installer for the Intel Ready Mode Technology may allow an unprivileged user to potentially gain privileged access via local access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Escalation of Privilege" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00198.html" } ] } diff --git a/2018/3xxx/CVE-2018-3699.json b/2018/3xxx/CVE-2018-3699.json index 92a99a4f707..53d338fe769 100644 --- a/2018/3xxx/CVE-2018-3699.json +++ b/2018/3xxx/CVE-2018-3699.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "ID" : "CVE-2018-3699", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Intel RAID Web Console v3", + "version" : { + "version_data" : [ + { + "version_value" : "Versions before 4.186" + } + ] + } + } + ] + }, + "vendor_name" : "Intel Corporation" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Cross-site scripting in the Intel RAID Web Console v3 for Windows may allow an unauthenticated user to elevate privilege via remote access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Escalation of Privilege" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00199.html" } ] }