mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
77 lines
2.7 KiB
JSON
77 lines
2.7 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2019-11133",
|
|
"ASSIGNER": "secure@intel.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Intel Corporation",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Intel(R) Processor Diagnostic Tool Advisory",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "before 4.1.2.24"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Escalation of Privilege, Denial of Service, Information Disclosure"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00268.html",
|
|
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00268.html"
|
|
},
|
|
{
|
|
"refsource": "BID",
|
|
"name": "109096",
|
|
"url": "http://www.securityfocus.com/bid/109096"
|
|
},
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "https://support.f5.com/csp/article/K90305959",
|
|
"url": "https://support.f5.com/csp/article/K90305959"
|
|
},
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "https://support.f5.com/csp/article/K90305959?utm_source=f5support&utm_medium=RSS",
|
|
"url": "https://support.f5.com/csp/article/K90305959?utm_source=f5support&utm_medium=RSS"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Improper access control in the Intel(R) Processor Diagnostic Tool before version 4.1.2.24 may allow an authenticated user to potentially enable escalation of privilege, information disclosure or denial of service via local access."
|
|
}
|
|
]
|
|
}
|
|
} |