{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T23:12:55.218","vulnerabilities":[{"cve":{"id":"CVE-2019-11165","sourceIdentifier":"secure@intel.com","published":"2019-12-16T20:15:14.663","lastModified":"2024-11-21T04:20:39.083","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper conditions check in the Linux kernel driver for the Intel(R) FPGA SDK for OpenCL(TM) Pro Edition before version 19.4 may allow an authenticated user to potentially enable denial of service via local access."},{"lang":"es","value":"Una comprobación de condiciones inapropiadas en el controlador del kernel de Linux para Intel(R) FPGA SDK para OpenCL(TM) Pro Edition versiones anteriores a 19.4, puede permitir a un usuario autenticado habilitar potencialmente una denegación de servicio por medio de un acceso local."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-754"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:intel:field_programmable_gate_array_software_development_kit_for_opencl:*:*:*:*:pro:*:*:*","versionEndExcluding":"19.4","matchCriteriaId":"DE9F3647-95ED-422C-BB0B-A0F2363D148A"}]}]}],"references":[{"url":"https://support.f5.com/csp/article/K07357521?utm_source=f5support&amp%3Butm_medium=RSS","source":"secure@intel.com"},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00284.html","source":"secure@intel.com","tags":["Patch","Vendor Advisory"]},{"url":"https://support.f5.com/csp/article/K07357521?utm_source=f5support&amp%3Butm_medium=RSS","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00284.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}