ID

VAR-201906-1235


CVE

CVE-2019-11128


TITLE

Intel Multiple vulnerabilities in the product

Trust: 0.8

sources: JVNDB: JVNDB-2019-004980

DESCRIPTION

Insufficient input validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. Attackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. The vulnerability stems from the failure of the network system or product to properly validate the input data

Trust: 1.35

sources: NVD: CVE-2019-11128 // BID: 108766 // VULHUB: VHN-142743 // VULMON: CVE-2019-11128

AFFECTED PRODUCTS

vendor:intelmodel:compute cardscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kitscope:eqversion: -

Trust: 1.0

vendor:intelmodel:compute stickscope:eqversion: -

Trust: 1.0

vendor:intelmodel:accelerated storage managerscope: - version: -

Trust: 0.8

vendor:intelmodel:chipset device softwarescope: - version: -

Trust: 0.8

vendor:intelmodel:compute cardscope: - version: -

Trust: 0.8

vendor:intelmodel:compute stickscope: - version: -

Trust: 0.8

vendor:intelmodel:core i3scope: - version: -

Trust: 0.8

vendor:intelmodel:core i5scope: - version: -

Trust: 0.8

vendor:intelmodel:core x-seriesscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc kitscope: - version: -

Trust: 0.8

vendor:intelmodel:omni-path fabric manager guiscope: - version: -

Trust: 0.8

vendor:intelmodel:pentiumscope:eqversion:processor 2000 series

Trust: 0.8

vendor:intelmodel:pentiumscope:eqversion:processor 3000 series

Trust: 0.8

vendor:intelmodel:pentiumscope:eqversion:processor g series

Trust: 0.8

vendor:intelmodel:proset/wireless software driverscope: - version: -

Trust: 0.8

vendor:intelmodel:raid web console v3scope:eqversion:for windows

Trust: 0.8

vendor:intelmodel:sgx dcap linux driverscope: - version: -

Trust: 0.8

vendor:intelmodel:sgx linux client driverscope: - version: -

Trust: 0.8

vendor:intelmodel:turbo boost max technologyscope: - version: -

Trust: 0.8

vendor:intelmodel:xeonscope:eqversion:processor e7 v3 family

Trust: 0.8

vendor:intelmodel:xeonscope:eqversion:processor e7 v5 family

Trust: 0.8

vendor:intelmodel:xeonscope:eqversion:processor e7 v7 family

Trust: 0.8

vendor:intelmodel:ite tech* consumer infrared driverscope:eqversion:for windows 10

Trust: 0.8

vendor:intelmodel:open cloud integrity technologyscope: - version: -

Trust: 0.8

vendor:intelmodel:openattestationscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc kitnuc6cayx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i7hvk biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i7hnk biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i7bex biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i5bex biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i3cyx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i3bex biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc7pjy biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i7dnx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i7bnx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i5dnx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i5bnx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i3dnx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i3bnx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc7cjy biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc6i7kyk biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc6i5syx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc6i3syx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc5ppyh biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc5pgyh biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i7ryx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i5ryx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i5myx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i3ryx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i3myx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc5cpyh biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit dn2820fykh biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit de3815tyb biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit d54250wyx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit d34010wyx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute stick stk2mv64cc biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute stick stk2m3w64cc biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute stick stk2m364cc biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute stick stck1a8lfc biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute stick stck1a32wfc biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute card cd1p64gk biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute card cd1m3128mk biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute card cd1iv128mk biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute card cd1c64gk biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kitnuc6cayx biosscope:neversion:0060

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i7hvk biosscope:neversion:0054

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i7hnk biosscope:neversion:0054

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i7bex biosscope:neversion:0071

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i5bex biosscope:neversion:0071

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i3cyx biosscope:neversion:0040

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i3bex biosscope:neversion:0071

Trust: 0.3

vendor:intelmodel:nuc kit nuc7pjy biosscope:neversion:0049

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i7dnx biosscope:neversion:0063

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i7bnx biosscope:neversion:0079

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i5dnx biosscope:neversion:0063

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i5bnx biosscope:neversion:0079

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i3dnx biosscope:neversion:0063

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i3bnx biosscope:neversion:0079

Trust: 0.3

vendor:intelmodel:nuc kit nuc7cjy biosscope:neversion:0049

Trust: 0.3

vendor:intelmodel:nuc kit nuc6i7kyk biosscope:neversion:0062

Trust: 0.3

vendor:intelmodel:nuc kit nuc6i5syx biosscope:neversion:0070

Trust: 0.3

vendor:intelmodel:nuc kit nuc6i3syx biosscope:neversion:0070

Trust: 0.3

vendor:intelmodel:nuc kit nuc5ppyh biosscope:neversion:0076

Trust: 0.3

vendor:intelmodel:nuc kit nuc5pgyh biosscope:neversion:0076

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i7ryx biosscope:neversion:0379

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i5ryx biosscope:neversion:0379

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i5myx biosscope:neversion:0051

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i3ryx biosscope:neversion:0379

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i3myx biosscope:neversion:0054

Trust: 0.3

vendor:intelmodel:nuc kit nuc5cpyh biosscope:neversion:0076

Trust: 0.3

vendor:intelmodel:nuc kit dn2820fykh biosscope:neversion:0067

Trust: 0.3

vendor:intelmodel:nuc kit de3815tyb biosscope:neversion:0065

Trust: 0.3

vendor:intelmodel:nuc kit de3815tyb biosscope:neversion:0020

Trust: 0.3

vendor:intelmodel:nuc kit d54250wyx biosscope:neversion:0051

Trust: 0.3

vendor:intelmodel:nuc kit d34010wyx biosscope:neversion:0051

Trust: 0.3

vendor:intelmodel:compute stick stk2mv64cc biosscope:neversion:0060

Trust: 0.3

vendor:intelmodel:compute stick stk2m3w64cc biosscope:neversion:0060

Trust: 0.3

vendor:intelmodel:compute stick stk2m364cc biosscope:neversion:0060

Trust: 0.3

vendor:intelmodel:compute stick stck1a8lfc biosscope:neversion:0039

Trust: 0.3

vendor:intelmodel:compute stick stck1a32wfc biosscope:neversion:0039

Trust: 0.3

vendor:intelmodel:compute card cd1p64gk biosscope:neversion:0050

Trust: 0.3

vendor:intelmodel:compute card cd1m3128mk biosscope:neversion:0056

Trust: 0.3

vendor:intelmodel:compute card cd1iv128mk biosscope:neversion:0036

Trust: 0.3

vendor:intelmodel:compute card cd1c64gk biosscope:neversion:0050

Trust: 0.3

sources: BID: 108766 // JVNDB: JVNDB-2019-004980 // NVD: CVE-2019-11128

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-11128
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-201906-553
value: MEDIUM

Trust: 0.6

VULHUB: VHN-142743
value: MEDIUM

Trust: 0.1

VULMON: CVE-2019-11128
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-11128
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-142743
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-11128
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-142743 // VULMON: CVE-2019-11128 // CNNVD: CNNVD-201906-553 // NVD: CVE-2019-11128

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

sources: VULHUB: VHN-142743 // NVD: CVE-2019-11128

THREAT TYPE

local

Trust: 0.9

sources: BID: 108766 // CNNVD: CNNVD-201906-553

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201906-553

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-004980

PATCH

title:[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html

Trust: 0.8

title:[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html

Trust: 0.8

title:[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html

Trust: 0.8

title:[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html

Trust: 0.8

title:[INTEL-SA-00264] Intel NUC Firmware Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html

Trust: 0.8

title:[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html

Trust: 0.8

title:[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html

Trust: 0.8

title:[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html

Trust: 0.8

title:[INTEL-SA-00235] Intel SGX for Linux Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html

Trust: 0.8

title:[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html

Trust: 0.8

title:[INTEL-SA-00247] Partial Physical Address Leakage Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html

Trust: 0.8

title:Intel NUC Kit Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93786

Trust: 0.6

title:Threatposturl:https://threatpost.com/intel-patches-nuc-firmware/145620/

Trust: 0.1

sources: VULMON: CVE-2019-11128 // JVNDB: JVNDB-2019-004980 // CNNVD: CNNVD-201906-553

EXTERNAL IDS

db:NVDid:CVE-2019-11128

Trust: 2.9

db:BIDid:108766

Trust: 2.1

db:JVNid:JVNVU95572531

Trust: 0.8

db:JVNDBid:JVNDB-2019-004980

Trust: 0.8

db:CNNVDid:CNNVD-201906-553

Trust: 0.7

db:AUSCERTid:ESB-2019.2099

Trust: 0.6

db:VULHUBid:VHN-142743

Trust: 0.1

db:VULMONid:CVE-2019-11128

Trust: 0.1

sources: VULHUB: VHN-142743 // VULMON: CVE-2019-11128 // BID: 108766 // JVNDB: JVNDB-2019-004980 // CNNVD: CNNVD-201906-553 // NVD: CVE-2019-11128

REFERENCES

url:http://www.securityfocus.com/bid/108766

Trust: 2.5

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html

Trust: 2.1

url:https://www.intel.com/content/www/us/en/security-center/advisory/in

Trust: 1.8

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html?wapkw=2019-11129

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-11128

Trust: 1.4

url:http://www.intel.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119

Trust: 0.8

url:http://jvn.jp/cert/jvnvu95572531

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0128

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0178

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11119

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0130

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0179

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11123

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0136

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0180

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11124

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0157

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0181

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11125

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0164

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0182

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11126

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0174

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0183

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11127

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0175

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11092

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-3702

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0177

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11117

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11129

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2019.2099/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/intel-patches-nuc-firmware/145620/

Trust: 0.1

sources: VULHUB: VHN-142743 // VULMON: CVE-2019-11128 // BID: 108766 // JVNDB: JVNDB-2019-004980 // CNNVD: CNNVD-201906-553 // NVD: CVE-2019-11128

CREDITS

and Malyutin Maksim.,Alexander Ermolov ,Ruslan Zakirov

Trust: 0.6

sources: CNNVD: CNNVD-201906-553

SOURCES

db:VULHUBid:VHN-142743
db:VULMONid:CVE-2019-11128
db:BIDid:108766
db:JVNDBid:JVNDB-2019-004980
db:CNNVDid:CNNVD-201906-553
db:NVDid:CVE-2019-11128

LAST UPDATE DATE

2024-11-23T20:14:03.913000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-142743date:2019-06-24T00:00:00
db:VULMONid:CVE-2019-11128date:2019-06-24T00:00:00
db:BIDid:108766date:2019-06-11T00:00:00
db:JVNDBid:JVNDB-2019-004980date:2019-06-13T00:00:00
db:CNNVDid:CNNVD-201906-553date:2019-06-19T00:00:00
db:NVDid:CVE-2019-11128date:2024-11-21T04:20:35.003

SOURCES RELEASE DATE

db:VULHUBid:VHN-142743date:2019-06-13T00:00:00
db:VULMONid:CVE-2019-11128date:2019-06-13T00:00:00
db:BIDid:108766date:2019-06-11T00:00:00
db:JVNDBid:JVNDB-2019-004980date:2019-06-13T00:00:00
db:CNNVDid:CNNVD-201906-553date:2019-06-13T00:00:00
db:NVDid:CVE-2019-11128date:2019-06-13T16:29:01.543