diff --git a/2011/3xxx/CVE-2011-3389.json b/2011/3xxx/CVE-2011-3389.json index 9b2d8a7ad8f..71d272eed00 100644 --- a/2011/3xxx/CVE-2011-3389.json +++ b/2011/3xxx/CVE-2011-3389.json @@ -511,6 +511,11 @@ "name": "http://www.ibm.com/developerworks/java/jdk/alerts/", "refsource": "CONFIRM", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf" } ] } diff --git a/2013/0xxx/CVE-2013-0169.json b/2013/0xxx/CVE-2013-0169.json index 20a1100481f..96e351f39d0 100644 --- a/2013/0xxx/CVE-2013-0169.json +++ b/2013/0xxx/CVE-2013-0169.json @@ -346,6 +346,11 @@ "name": "55350", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55350" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf" } ] } diff --git a/2016/6xxx/CVE-2016-6329.json b/2016/6xxx/CVE-2016-6329.json index a61b596ceaa..bead37a6b8f 100644 --- a/2016/6xxx/CVE-2016-6329.json +++ b/2016/6xxx/CVE-2016-6329.json @@ -96,6 +96,11 @@ "name": "92631", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92631" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf" } ] } diff --git a/2018/12xxx/CVE-2018-12126.json b/2018/12xxx/CVE-2018-12126.json index 495dd468058..c6d52728a41 100644 --- a/2018/12xxx/CVE-2018-12126.json +++ b/2018/12xxx/CVE-2018-12126.json @@ -88,6 +88,11 @@ "refsource": "CONFIRM", "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf" } ] }, diff --git a/2018/12xxx/CVE-2018-12127.json b/2018/12xxx/CVE-2018-12127.json index 45ecf4c9c84..f24140155a1 100644 --- a/2018/12xxx/CVE-2018-12127.json +++ b/2018/12xxx/CVE-2018-12127.json @@ -88,6 +88,11 @@ "refsource": "CONFIRM", "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf" } ] }, diff --git a/2018/12xxx/CVE-2018-12130.json b/2018/12xxx/CVE-2018-12130.json index 96a121fff22..362343c8f5b 100644 --- a/2018/12xxx/CVE-2018-12130.json +++ b/2018/12xxx/CVE-2018-12130.json @@ -88,6 +88,11 @@ "refsource": "CONFIRM", "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf" } ] }, diff --git a/2018/14xxx/CVE-2018-14833.json b/2018/14xxx/CVE-2018-14833.json index aa4a1e96be8..75d1851e8e9 100644 --- a/2018/14xxx/CVE-2018-14833.json +++ b/2018/14xxx/CVE-2018-14833.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-14833", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Intuit Lacerte 2017 has Incorrect Access Control." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://themikewylie.com/2019/05/21/intuit-lacerte-vulnerability-and-data-exposure-cve-2018-11338-cve-2018-14833/", + "url": "https://themikewylie.com/2019/05/21/intuit-lacerte-vulnerability-and-data-exposure-cve-2018-11338-cve-2018-14833/" + }, + { + "refsource": "MISC", + "name": "https://www.themikewylie.com/intuit-lacerte-vulnerability-and-data-exposure-cve-2018-11338-cve-2018-14833/", + "url": "https://www.themikewylie.com/intuit-lacerte-vulnerability-and-data-exposure-cve-2018-11338-cve-2018-14833/" } ] } diff --git a/2018/15xxx/CVE-2018-15738.json b/2018/15xxx/CVE-2018-15738.json index db6e63b218c..77e3ec55bc9 100644 --- a/2018/15xxx/CVE-2018-15738.json +++ b/2018/15xxx/CVE-2018-15738.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-15738", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in STOPzilla AntiMalware 6.5.2.59. The driver file szkg64.sys contains an Arbitrary Write vulnerability due to not validating the output buffer address value from IOCtl 0x8000205F." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.greyhathacker.net", + "refsource": "MISC", + "name": "https://www.greyhathacker.net" + }, + { + "refsource": "MISC", + "name": "https://www.greyhathacker.net/?p=1025", + "url": "https://www.greyhathacker.net/?p=1025" } ] } diff --git a/2019/11xxx/CVE-2019-11091.json b/2019/11xxx/CVE-2019-11091.json index 6e8a3cf3371..c459cbee156 100644 --- a/2019/11xxx/CVE-2019-11091.json +++ b/2019/11xxx/CVE-2019-11091.json @@ -88,6 +88,11 @@ "refsource": "CONFIRM", "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf" } ] }, diff --git a/2019/11xxx/CVE-2019-11889.json b/2019/11xxx/CVE-2019-11889.json index 284b6f26370..044c22c0a6d 100644 --- a/2019/11xxx/CVE-2019-11889.json +++ b/2019/11xxx/CVE-2019-11889.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-11889", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-11889", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sony BRAVIA Smart TV devices allow remote attackers to cause a denial of service (device hang) via a crafted web page over HbbTV." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.first.org/members/teams/sony_psirt", + "refsource": "MISC", + "name": "https://www.first.org/members/teams/sony_psirt" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153547/Sony-BRAVIA-Smart-TV-Denial-Of-Service.html", + "url": "http://packetstormsecurity.com/files/153547/Sony-BRAVIA-Smart-TV-Denial-Of-Service.html" + }, + { + "refsource": "MISC", + "name": "https://www.darkmatter.ae/xen1thlabs/sony-remote-denial-of-service-triggered-over-vulnerability-hbbtv-xl-19-014/", + "url": "https://www.darkmatter.ae/xen1thlabs/sony-remote-denial-of-service-triggered-over-vulnerability-hbbtv-xl-19-014/" } ] } diff --git a/2019/11xxx/CVE-2019-11890.json b/2019/11xxx/CVE-2019-11890.json index 970dcb201ff..78711e02fd4 100644 --- a/2019/11xxx/CVE-2019-11890.json +++ b/2019/11xxx/CVE-2019-11890.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-11890", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-11890", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sony Bravia Smart TV devices allow remote attackers to cause a denial of service (device hang or reboot) via a SYN flood attack over a wired or Wi-Fi LAN." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.first.org/members/teams/sony_psirt", + "refsource": "MISC", + "name": "https://www.first.org/members/teams/sony_psirt" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153547/Sony-BRAVIA-Smart-TV-Denial-Of-Service.html", + "url": "http://packetstormsecurity.com/files/153547/Sony-BRAVIA-Smart-TV-Denial-Of-Service.html" + }, + { + "refsource": "MISC", + "name": "https://www.darkmatter.ae/xen1thlabs/sony-remote-denial-of-service-over-wifi-lan-internet-vulnerability-xl-19-013/", + "url": "https://www.darkmatter.ae/xen1thlabs/sony-remote-denial-of-service-over-wifi-lan-internet-vulnerability-xl-19-013/" } ] }