{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T23:02:15.358","vulnerabilities":[{"cve":{"id":"CVE-2022-27233","sourceIdentifier":"secure@intel.com","published":"2022-11-11T16:15:13.347","lastModified":"2025-02-05T21:15:16.120","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"XML injection in the Quartus(R) Prime Programmer included in the Intel(R) Quartus Prime Pro and Standard edition software may allow an unauthenticated user to potentially enable information disclosure via network access."},{"lang":"es","value":"La inyección XML en el programador Quartus(R) Prime incluido en el software Intel(R) Quartus Prime Pro y Standard Edition puede permitir que un usuario no autenticado permita potencialmente la divulgación de información a través del acceso a la red."}],"metrics":{"cvssMetricV31":[{"source":"secure@intel.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-91"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-91"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:intel:quartus_prime:*:*:*:*:standard:*:*:*","versionEndIncluding":"21.1","matchCriteriaId":"4C4D8484-EFE5-4E4F-B9D1-67B154A4454A"},{"vulnerable":true,"criteria":"cpe:2.3:a:intel:quartus_prime:*:*:*:*:pro:*:*:*","versionEndExcluding":"22.1","matchCriteriaId":"8840E25D-6BE8-4057-8D89-0619BD9D2392"}]}]}],"references":[{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00659.html","source":"secure@intel.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00659.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}