diff --git a/2019/12xxx/CVE-2019-12733.json b/2019/12xxx/CVE-2019-12733.json index c87be089679..2e53c8a839b 100644 --- a/2019/12xxx/CVE-2019-12733.json +++ b/2019/12xxx/CVE-2019-12733.json @@ -66,6 +66,16 @@ "refsource": "MISC", "name": "https://www.cybercom.com/contentassets/ac929be030744b8e92dc6e457fdb7dcc/sitevision-disclosure-rce.pdf", "url": "https://www.cybercom.com/contentassets/ac929be030744b8e92dc6e457fdb7dcc/sitevision-disclosure-rce.pdf" + }, + { + "refsource": "FULLDISC", + "name": "20191206 SiteVision Insufficient Module Access Control", + "url": "http://seclists.org/fulldisclosure/2019/Dec/13" + }, + { + "refsource": "FULLDISC", + "name": "20191206 SiteVision Remote Code Execution", + "url": "http://seclists.org/fulldisclosure/2019/Dec/12" } ] } diff --git a/2019/12xxx/CVE-2019-12734.json b/2019/12xxx/CVE-2019-12734.json index 0629e985a51..dbf1d0bd0de 100644 --- a/2019/12xxx/CVE-2019-12734.json +++ b/2019/12xxx/CVE-2019-12734.json @@ -66,6 +66,16 @@ "refsource": "MISC", "name": "https://www.cybercom.com/contentassets/ac929be030744b8e92dc6e457fdb7dcc/sitevision-disclosure-insufficient-access-control.pdf", "url": "https://www.cybercom.com/contentassets/ac929be030744b8e92dc6e457fdb7dcc/sitevision-disclosure-insufficient-access-control.pdf" + }, + { + "refsource": "FULLDISC", + "name": "20191206 SiteVision Insufficient Module Access Control", + "url": "http://seclists.org/fulldisclosure/2019/Dec/13" + }, + { + "refsource": "FULLDISC", + "name": "20191206 SiteVision Remote Code Execution", + "url": "http://seclists.org/fulldisclosure/2019/Dec/12" } ] } diff --git a/2019/12xxx/CVE-2019-12750.json b/2019/12xxx/CVE-2019-12750.json index 68671d290fe..ca1819baa7e 100644 --- a/2019/12xxx/CVE-2019-12750.json +++ b/2019/12xxx/CVE-2019-12750.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/155581/Symantec-Endpoint-Protection-Information-Disclosure-Privilege-Escalation.html", "url": "http://packetstormsecurity.com/files/155581/Symantec-Endpoint-Protection-Information-Disclosure-Privilege-Escalation.html" + }, + { + "refsource": "FULLDISC", + "name": "20191206 Symantec Endoint Security LPE CVE-2019-12750", + "url": "http://seclists.org/fulldisclosure/2019/Dec/11" } ] }, diff --git a/2019/16xxx/CVE-2019-16885.json b/2019/16xxx/CVE-2019-16885.json index 5b42b39de30..455a11f76b9 100644 --- a/2019/16xxx/CVE-2019-16885.json +++ b/2019/16xxx/CVE-2019-16885.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://www.ait.ac.at/ait-sa-20191129-01-unauthenticated-remote-code-execution-okaycms", "url": "https://www.ait.ac.at/ait-sa-20191129-01-unauthenticated-remote-code-execution-okaycms" + }, + { + "refsource": "FULLDISC", + "name": "20191206 [AIT-SA-20191129-01] CVE-2019-16885: Unauthenticated remote code execution in OkayCMS", + "url": "http://seclists.org/fulldisclosure/2019/Dec/15" } ] } diff --git a/2019/19xxx/CVE-2019-19519.json b/2019/19xxx/CVE-2019-19519.json index 172ed3b8071..6fd85427ed2 100644 --- a/2019/19xxx/CVE-2019-19519.json +++ b/2019/19xxx/CVE-2019-19519.json @@ -81,6 +81,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html", "url": "http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html" + }, + { + "refsource": "FULLDISC", + "name": "20191206 Authentication vulnerabilities in OpenBSD", + "url": "http://seclists.org/fulldisclosure/2019/Dec/14" } ] } diff --git a/2019/19xxx/CVE-2019-19520.json b/2019/19xxx/CVE-2019-19520.json index 3c05addee2a..36846feb396 100644 --- a/2019/19xxx/CVE-2019-19520.json +++ b/2019/19xxx/CVE-2019-19520.json @@ -81,6 +81,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html", "url": "http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html" + }, + { + "refsource": "FULLDISC", + "name": "20191206 Authentication vulnerabilities in OpenBSD", + "url": "http://seclists.org/fulldisclosure/2019/Dec/14" } ] } diff --git a/2019/19xxx/CVE-2019-19521.json b/2019/19xxx/CVE-2019-19521.json index bb3caf1899c..801d3a51ee6 100644 --- a/2019/19xxx/CVE-2019-19521.json +++ b/2019/19xxx/CVE-2019-19521.json @@ -81,6 +81,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html", "url": "http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html" + }, + { + "refsource": "FULLDISC", + "name": "20191206 Authentication vulnerabilities in OpenBSD", + "url": "http://seclists.org/fulldisclosure/2019/Dec/14" } ] } diff --git a/2019/19xxx/CVE-2019-19522.json b/2019/19xxx/CVE-2019-19522.json index 81be6a6eaf7..4edcf08515f 100644 --- a/2019/19xxx/CVE-2019-19522.json +++ b/2019/19xxx/CVE-2019-19522.json @@ -76,6 +76,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html", "url": "http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html" + }, + { + "refsource": "FULLDISC", + "name": "20191206 Authentication vulnerabilities in OpenBSD", + "url": "http://seclists.org/fulldisclosure/2019/Dec/14" } ] } diff --git a/2019/9xxx/CVE-2019-9466.json b/2019/9xxx/CVE-2019-9466.json index b2b392ba73b..70060c92e76 100644 --- a/2019/9xxx/CVE-2019-9466.json +++ b/2019/9xxx/CVE-2019-9466.json @@ -4,58 +4,14 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-9466", - "ASSIGNER": "security@android.com", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "n/a", - "product": { - "product_data": [ - { - "product_name": "Android", - "version": { - "version_data": [ - { - "version_value": "Android kernel" - } - ] - } - } - ] - } - } - ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Remote code execution" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "refsource": "MISC", - "name": "https://source.android.com/security/bulletin/pixel/2019-11-01", - "url": "https://source.android.com/security/bulletin/pixel/2019-11-01" - } - ] + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "In the Broadcom Wi-Fi driver, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-130375182" + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-9503. Reason: This candidate is a duplicate of CVE-2019-9503. Notes: All CVE users should reference CVE-2019-9503 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ] }