{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T08:32:59.321","vulnerabilities":[{"cve":{"id":"CVE-2018-12154","sourceIdentifier":"secure@intel.com","published":"2018-10-15T18:29:10.997","lastModified":"2024-11-21T03:44:40.150","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of Service in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unprivileged user to potentially create an infinite loop and crash an application via local access."},{"lang":"es","value":"Denegación de servicio (DoS) en Unified Shader Compiler en Intel Graphics Drivers en versiones anteriores a la 10.18.x.5056 (también conocida como 15.33.x.5056), 10.18.x.5057 (también conocida como 15.36.x.5057) y 20.19.x.5058 (también conocida como 15.40.x.5058) podría permitir que un usuario sin privilegios cree un bucle infinito y provoque el cierre inesperado de una aplicación mediante acceso local."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-835"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intel:graphics_driver:15.33.43.4425:*:*:*:*:*:*:*","matchCriteriaId":"7847862C-9367-42E2-B178-D09345F416EB"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:graphics_driver:15.33.45.4653:*:*:*:*:*:*:*","matchCriteriaId":"2F600263-6180-4777-B4C7-E6CCC17B2C60"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:graphics_driver:15.33.46.4885:*:*:*:*:*:*:*","matchCriteriaId":"01081B49-332E-41B3-9869-B7DF5C0310D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:graphics_driver:15.36.26.4294:*:*:*:*:*:*:*","matchCriteriaId":"1A612C80-E552-4862-9414-4A35CBF16913"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:graphics_driver:15.36.28.4332:*:*:*:*:*:*:*","matchCriteriaId":"F74D3784-D9CF-4840-9D19-ABC7C5E4383D"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:graphics_driver:15.36.31.4414:*:*:*:*:*:*:*","matchCriteriaId":"92AF2FDB-2D26-4F6D-972E-414DECD1EF02"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:graphics_driver:15.36.33.4578:*:*:*:*:*:*:*","matchCriteriaId":"F9B2C1C4-8708-4E3C-A67F-CDBA429FBE4F"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:graphics_driver:15.36.34.4889:*:*:*:*:*:*:*","matchCriteriaId":"D86EC210-6789-4115-9B3E-9D1D30CDB38B"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:graphics_driver:15.40.34.4624:*:*:*:*:*:*:*","matchCriteriaId":"F7222C2E-A27E-41EF-A05B-D5EEB8574CC5"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:graphics_driver:15.40.36.4703:*:*:*:*:*:*:*","matchCriteriaId":"13843BEF-EB51-41ED-AC47-1A51E04DC0E9"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:graphics_driver:15.40.37.4835:*:*:*:*:*:*:*","matchCriteriaId":"61D9C958-53FF-4AE5-8BC9-6B262E1A286F"},{"vulnerable":true,"criteria":"cpe:2.3:o:intel:graphics_driver:15.40.38.4963:*:*:*:*:*:*:*","matchCriteriaId":"540034FE-5215-46E0-8F5F-2C816A67BFF0"}]}]}],"references":[{"url":"http://seclists.org/fulldisclosure/2019/Oct/55","source":"secure@intel.com"},{"url":"http://seclists.org/fulldisclosure/2019/Oct/56","source":"secure@intel.com"},{"url":"http://www.securityfocus.com/bid/105582","source":"secure@intel.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://support.apple.com/kb/HT210634","source":"secure@intel.com"},{"url":"https://support.apple.com/kb/HT210722","source":"secure@intel.com"},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html","source":"secure@intel.com","tags":["Vendor Advisory"]},{"url":"http://seclists.org/fulldisclosure/2019/Oct/55","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://seclists.org/fulldisclosure/2019/Oct/56","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/105582","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://support.apple.com/kb/HT210634","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://support.apple.com/kb/HT210722","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}