| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2019-13946 | Siemens RUGGEDCOM 资源管理错误漏洞 | Siemens | Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | High | 7.5 | 2020-02-11 15:36:10 | Deep Dive |
| CVE-2019-18913 | 多款HP产品授权问题漏洞 | HP Inc. | HP Intel-based Business PCs that support Microsoft Windows 10 Kernel DMA protection. | 中危 | - | 2020-01-31 03:04:11 | Deep Dive |
| CVE-2019-16539 | CloudBees Jenkins Support Core Plugin 安全漏洞 | Jenkins project | Jenkins Support Core Plugin | 中危 | - | 2019-11-21 14:11:20 | Deep Dive |
| CVE-2019-16540 | CloudBees Jenkins Support Core Plugin 路径遍历漏洞 | Jenkins project | Jenkins Support Core Plugin | 中危 | - | 2019-11-21 14:11:20 | Deep Dive |
| CVE-2019-16284 | 多款HP产品输入验证错误漏洞 | HP Inc. | Multiple - See https://support.hp.com/rs-en/document/c06456250 | 高危 | - | 2019-11-05 20:16:57 | Deep Dive |
| CVE-2019-11146 | Intel Driver & Support Assistant 授权问题漏洞 | - | Intel(R) Driver & Support Assistant Advisory | 高危 | - | 2019-08-19 16:13:08 | Deep Dive |
| CVE-2019-11145 | Intel Driver & Support Assistant 授权问题漏洞 | - | Intel(R) Driver & Support Assistant Advisory | 高危 | - | 2019-08-19 16:12:49 | Deep Dive |
| CVE-2019-6329 | HP Support Assistant 权限许可和访问控制问题漏洞 | HP | HP Support Assistant | 高危 | - | 2019-06-25 16:24:33 | Deep Dive |
| CVE-2019-6328 | HP Support Assistant 权限许可和访问控制问题漏洞 | HP | HP Support Assistant | 高危 | - | 2019-06-25 16:23:47 | Deep Dive |
| CVE-2019-11095 | Intel Driver & Support Assistant 访问控制错误漏洞 | - | Intel(R) Driver & Support Assistant | 中危 | - | 2019-05-17 15:41:37 | Deep Dive |
| CVE-2019-11114 | Intel Driver & Support Assistant 输入验证错误漏洞 | - | Intel(R) Driver & Support Assistant | 中危 | - | 2019-05-17 15:41:37 | Deep Dive |
| CVE-2019-9494 | The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side-channel attacks | Wi-Fi Alliance | hostapd with SAE support | 中危 | - | 2019-04-17 13:31:08 | Deep Dive |
| CVE-2019-9495 | The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns | Wi-Fi Alliance | hostapd with EAP-pwd support | 低危 | - | 2019-04-17 13:31:08 | Deep Dive |
| CVE-2019-9496 | An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps | Wi-Fi Alliance | hostapd with SAE support | 高危 | - | 2019-04-17 13:31:08 | Deep Dive |
| CVE-2019-9497 | The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit | Wi-Fi Alliance | hostapd with EAP-pwd support | 高危 | - | 2019-04-17 13:31:08 | Deep Dive |
| CVE-2019-9498 | The implementations of EAP-PWD in hostapd EAP Server do not validate the scalar and element values in EAP-pwd-Commit | Wi-Fi Alliance | hostapd with EAP-pwd support | 高危 | - | 2019-04-17 13:31:08 | Deep Dive |
| CVE-2019-9499 | The implementations of EAP-PWD in wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit | Wi-Fi Alliance | hostapd with EAP-pwd support | 高危 | - | 2019-04-17 13:31:08 | Deep Dive |
| CVE-2018-4397 | Apple Support for iOS Analytics 输入验证错误漏洞 | - | Apple Support app | 中危 | - | 2019-04-03 17:43:19 | Deep Dive |
| CVE-2018-5927 | HP Support Assistant 授权问题漏洞 | HP | HP Support Assistant | 高危 | - | 2019-03-27 15:39:54 | Deep Dive |
| CVE-2019-0088 | Intel System Support Utility for Windows 权限许可和访问控制问题漏洞 | Intel Corporation | Intel(R) System Support Utility for Windows | 高危 | - | 2019-01-10 20:00:00 | Deep Dive |