📦 Quartus Prime
by Intel
🔍 What is Quartus Prime?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in Intel Quartus Prime software allows authenticated local users to escalate privileges due to insufficient control flow management. It affects users running vulnerable versions of ...
This vulnerability in Intel Quartus Prime Pro Edition allows authenticated local users to escalate privileges due to improper file permissions. Attackers could gain elevated system access on affected ...
This vulnerability in Intel Quartus Prime Pro Edition allows authenticated local users to exploit improper XML external entity (XXE) restrictions, potentially enabling privilege escalation. It affects...
This vulnerability allows authenticated users with local access to Intel Quartus Prime Pro Edition to escalate privileges through improper access control in a third-party component. It affects users r...
This vulnerability allows authenticated users with local access to Intel Quartus Prime Pro Edition to potentially escalate privileges through improper input validation in a third-party component. It a...
This CVE describes an insecure temporary file vulnerability in Altera Quartus Prime installers on Windows. Attackers can exploit predictable temporary file names to potentially overwrite or manipulate...
This CVE describes a Search Order Hijacking vulnerability in Altera Quartus Prime's Nios II Command Shell modules on Windows. Attackers can place malicious DLLs in directories searched before legitima...
This CVE describes an insecure temporary file vulnerability in Altera Quartus Prime Pro Installer on Windows where predictable file names are used. Attackers can exploit this to overwrite or manipulat...
This CVE describes a Search Order Hijacking vulnerability in Altera Quartus Prime Pro Installer on Windows. Attackers can place malicious DLLs in directories searched before legitimate ones, potential...
This CVE describes a Search Order Hijacking vulnerability in Altera Quartus Prime installers on Windows. Attackers can place malicious DLLs in directories searched before legitimate ones, potentially ...
This vulnerability allows attackers to hijack the search path used by Altera Quartus Prime Pro's System Console modules on Windows, potentially loading malicious DLLs. It affects all Windows users run...
CVE-2025-13665 is a DLL planting vulnerability in the System Console Utility for Windows that allows attackers to execute arbitrary code by placing malicious DLLs in directories where the application ...
A privilege escalation vulnerability in Quartus Prime Pro Edition Design Software could allow local attackers to gain elevated privileges on affected systems. This affects users running vulnerable ver...
The Quartus Prime Pro Installer for Windows fails to verify directory permissions when installing to an existing directory, allowing attackers to potentially write malicious files to protected locatio...
A privilege escalation vulnerability in Quartus Prime Standard Edition Design Software could allow local attackers to execute arbitrary code with elevated privileges. This affects users running vulner...
This vulnerability in Intel High Level Synthesis Compiler allows authenticated local users to escalate privileges by manipulating the search path. It affects users running vulnerable versions of the c...
This vulnerability in Intel Quartus Prime Pro Edition Design Software allows authenticated local users to escalate privileges by exploiting an uncontrolled search path. It affects users running versio...
This vulnerability in Intel Quartus Prime Standard Edition Design software allows authenticated local users to escalate privileges by exploiting an uncontrolled search path. Attackers could execute ar...
This vulnerability in Intel Quartus Prime Lite Edition software allows authenticated local users to escalate privileges by exploiting an uncontrolled search path (DLL hijacking). It affects users runn...
This vulnerability in Intel Quartus Prime Lite Edition Design software allows authenticated users to potentially escalate privileges via local access. It affects users running versions before 23.1 who...