diff --git a/2018/10xxx/CVE-2018-10237.json b/2018/10xxx/CVE-2018-10237.json index 9ebdc4cbe86..b9af6f578cc 100644 --- a/2018/10xxx/CVE-2018-10237.json +++ b/2018/10xxx/CVE-2018-10237.json @@ -131,6 +131,11 @@ "refsource": "MLIST", "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[activemq-issues] 20190516 [jira] [Created] (AMQ-7208) Security Issue related to Guava 18.0", + "url": "https://lists.apache.org/thread.html/3ddd79c801edd99c0978e83dbe2168ebd36fd42acfa5dac38fb03dd6@%3Cissues.activemq.apache.org%3E" } ] } diff --git a/2019/1xxx/CVE-2019-1727.json b/2019/1xxx/CVE-2019-1727.json index 85a79ee117a..022b7cb8cbe 100644 --- a/2019/1xxx/CVE-2019-1727.json +++ b/2019/1xxx/CVE-2019-1727.json @@ -84,6 +84,11 @@ "name": "20190515 Cisco NX-OS Software Python Parser Privilege Escalation Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-pyth-escal" + }, + { + "refsource": "BID", + "name": "108341", + "url": "http://www.securityfocus.com/bid/108341" } ] }, diff --git a/2019/1xxx/CVE-2019-1821.json b/2019/1xxx/CVE-2019-1821.json index a37f6400880..7d2f19056a6 100644 --- a/2019/1xxx/CVE-2019-1821.json +++ b/2019/1xxx/CVE-2019-1821.json @@ -71,6 +71,11 @@ "name": "20190515 Cisco Prime Infrastructure and Evolved Programmable Network Manager Remote Code Execution Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-rce" + }, + { + "refsource": "BID", + "name": "108339", + "url": "http://www.securityfocus.com/bid/108339" } ] }, diff --git a/2019/1xxx/CVE-2019-1822.json b/2019/1xxx/CVE-2019-1822.json index 40999f93b88..906a90cfdaa 100644 --- a/2019/1xxx/CVE-2019-1822.json +++ b/2019/1xxx/CVE-2019-1822.json @@ -71,6 +71,11 @@ "name": "20190515 Cisco Prime Infrastructure and Evolved Programmable Network Manager Remote Code Execution Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-rce" + }, + { + "refsource": "BID", + "name": "108339", + "url": "http://www.securityfocus.com/bid/108339" } ] }, diff --git a/2019/1xxx/CVE-2019-1823.json b/2019/1xxx/CVE-2019-1823.json index f020f34b0df..80ff36fe60f 100644 --- a/2019/1xxx/CVE-2019-1823.json +++ b/2019/1xxx/CVE-2019-1823.json @@ -71,6 +71,11 @@ "name": "20190515 Cisco Prime Infrastructure and Evolved Programmable Network Manager Remote Code Execution Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-rce" + }, + { + "refsource": "BID", + "name": "108339", + "url": "http://www.securityfocus.com/bid/108339" } ] }, diff --git a/2019/1xxx/CVE-2019-1824.json b/2019/1xxx/CVE-2019-1824.json index 8a5d28de321..10ee751cf9a 100644 --- a/2019/1xxx/CVE-2019-1824.json +++ b/2019/1xxx/CVE-2019-1824.json @@ -71,6 +71,11 @@ "name": "20190515 Cisco Prime Infrastructure and Evolved Programmable Network Manager SQL Injection Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-sqlinject" + }, + { + "refsource": "BID", + "name": "108337", + "url": "http://www.securityfocus.com/bid/108337" } ] }, diff --git a/2019/1xxx/CVE-2019-1825.json b/2019/1xxx/CVE-2019-1825.json index 2e0f5751853..ce3860782c5 100644 --- a/2019/1xxx/CVE-2019-1825.json +++ b/2019/1xxx/CVE-2019-1825.json @@ -71,6 +71,11 @@ "name": "20190515 Cisco Prime Infrastructure and Evolved Programmable Network Manager SQL Injection Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-sqlinject" + }, + { + "refsource": "BID", + "name": "108337", + "url": "http://www.securityfocus.com/bid/108337" } ] }, diff --git a/2019/1xxx/CVE-2019-1832.json b/2019/1xxx/CVE-2019-1832.json index 8f4a0e6a298..7ed89cc0a00 100644 --- a/2019/1xxx/CVE-2019-1832.json +++ b/2019/1xxx/CVE-2019-1832.json @@ -72,6 +72,11 @@ "name": "20190515 Cisco Firepower Threat Defense Software Detection Engine Policy Bypass Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftdde-poly-bypass" + }, + { + "refsource": "BID", + "name": "108340", + "url": "http://www.securityfocus.com/bid/108340" } ] }, diff --git a/2019/1xxx/CVE-2019-1833.json b/2019/1xxx/CVE-2019-1833.json index 713930d7bcf..8488a062205 100644 --- a/2019/1xxx/CVE-2019-1833.json +++ b/2019/1xxx/CVE-2019-1833.json @@ -72,6 +72,11 @@ "name": "20190515 Cisco Firepower Threat Defense Software SSL/TLS Policy Bypass Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftd-ssltls-bypass" + }, + { + "refsource": "BID", + "name": "108338", + "url": "http://www.securityfocus.com/bid/108338" } ] },