7.5
CVE-2022-27233
- EPSS 0.51%
- Veröffentlicht 11.11.2022 16:15:13
- Zuletzt bearbeitet 05.02.2025 21:15:16
- Quelle secure@intel.com
- Teams Watchlist Login
- Unerledigt Login
XML injection in the Quartus(R) Prime Programmer included in the Intel(R) Quartus Prime Pro and Standard edition software may allow an unauthenticated user to potentially enable information disclosure via network access.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Intel ≫ Quartus Prime SwEditionstandard Version <= 21.1
Intel ≫ Quartus Prime SwEditionpro Version < 22.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.51% | 0.652 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
secure@intel.com | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
|
CWE-91 XML Injection (aka Blind XPath Injection)
The product does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.