diff --git a/2017/18xxx/CVE-2017-18359.json b/2017/18xxx/CVE-2017-18359.json index 5f84fb4116c..1a784a90142 100644 --- a/2017/18xxx/CVE-2017-18359.json +++ b/2017/18xxx/CVE-2017-18359.json @@ -52,6 +52,11 @@ }, "references" : { "reference_data" : [ + { + "name" : "[debian-lts-announce] 20190131 [SECURITY] [DLA 1653-1] postgis security update", + "refsource" : "MLIST", + "url" : "https://lists.debian.org/debian-lts-announce/2019/01/msg00030.html" + }, { "name" : "https://trac.osgeo.org/postgis/changeset/15444", "refsource" : "MISC", diff --git a/2017/6xxx/CVE-2017-6519.json b/2017/6xxx/CVE-2017-6519.json index fc234116d12..4e54c5fb92a 100644 --- a/2017/6xxx/CVE-2017-6519.json +++ b/2017/6xxx/CVE-2017-6519.json @@ -71,6 +71,11 @@ "name" : "https://github.com/lathiat/avahi/issues/203#issuecomment-449536790", "refsource" : "MISC", "url" : "https://github.com/lathiat/avahi/issues/203#issuecomment-449536790" + }, + { + "name" : "USN-3876-2", + "refsource" : "UBUNTU", + "url" : "https://usn.ubuntu.com/3876-2/" } ] } diff --git a/2018/15xxx/CVE-2018-15126.json b/2018/15xxx/CVE-2018-15126.json index ddabf9dd1aa..349a1af7d3c 100644 --- a/2018/15xxx/CVE-2018-15126.json +++ b/2018/15xxx/CVE-2018-15126.json @@ -52,10 +52,20 @@ }, "references" : { "reference_data" : [ + { + "name" : "[debian-lts-announce] 20190131 [SECURITY] [DLA 1652-1] libvncserver security update", + "refsource" : "MLIST", + "url" : "https://lists.debian.org/debian-lts-announce/2019/01/msg00029.html" + }, { "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-027-libvnc-heap-use-after-free/", "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-027-libvnc-heap-use-after-free/" + }, + { + "name" : "USN-3877-1", + "refsource" : "UBUNTU", + "url" : "https://usn.ubuntu.com/3877-1/" } ] } diff --git a/2018/15xxx/CVE-2018-15127.json b/2018/15xxx/CVE-2018-15127.json index 1307698aa94..64ff46226b8 100644 --- a/2018/15xxx/CVE-2018-15127.json +++ b/2018/15xxx/CVE-2018-15127.json @@ -66,6 +66,11 @@ "name" : "RHSA-2019:0059", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2019:0059" + }, + { + "name" : "USN-3877-1", + "refsource" : "UBUNTU", + "url" : "https://usn.ubuntu.com/3877-1/" } ] } diff --git a/2018/16xxx/CVE-2018-16540.json b/2018/16xxx/CVE-2018-16540.json index cee92e687d3..c095cdd7872 100644 --- a/2018/16xxx/CVE-2018-16540.json +++ b/2018/16xxx/CVE-2018-16540.json @@ -82,6 +82,11 @@ "refsource" : "GENTOO", "url" : "https://security.gentoo.org/glsa/201811-12" }, + { + "name" : "RHSA-2019:0229", + "refsource" : "REDHAT", + "url" : "https://access.redhat.com/errata/RHSA-2019:0229" + }, { "name" : "USN-3768-1", "refsource" : "UBUNTU", diff --git a/2018/16xxx/CVE-2018-16886.json b/2018/16xxx/CVE-2018-16886.json index 93424bf4713..3296ddc656d 100644 --- a/2018/16xxx/CVE-2018-16886.json +++ b/2018/16xxx/CVE-2018-16886.json @@ -77,6 +77,11 @@ "refsource" : "CONFIRM", "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16886" }, + { + "name" : "RHSA-2019:0237", + "refsource" : "REDHAT", + "url" : "https://access.redhat.com/errata/RHSA-2019:0237" + }, { "name" : "106540", "refsource" : "BID", diff --git a/2018/17xxx/CVE-2018-17926.json b/2018/17xxx/CVE-2018-17926.json index 9dc8ef3b251..b069416efc1 100644 --- a/2018/17xxx/CVE-2018-17926.json +++ b/2018/17xxx/CVE-2018-17926.json @@ -57,6 +57,11 @@ "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-07", "refsource" : "MISC", "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-07" + }, + { + "name" : "106243", + "refsource" : "BID", + "url" : "http://www.securityfocus.com/bid/106243" } ] } diff --git a/2018/17xxx/CVE-2018-17928.json b/2018/17xxx/CVE-2018-17928.json index 6c2948dc028..e40ee258168 100644 --- a/2018/17xxx/CVE-2018-17928.json +++ b/2018/17xxx/CVE-2018-17928.json @@ -57,6 +57,11 @@ "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-06", "refsource" : "MISC", "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-06" + }, + { + "name" : "106244", + "refsource" : "BID", + "url" : "http://www.securityfocus.com/bid/106244" } ] } diff --git a/2018/19xxx/CVE-2018-19475.json b/2018/19xxx/CVE-2018-19475.json index e26db885af0..0888b04a8ac 100644 --- a/2018/19xxx/CVE-2018-19475.json +++ b/2018/19xxx/CVE-2018-19475.json @@ -87,6 +87,11 @@ "refsource" : "DEBIAN", "url" : "https://www.debian.org/security/2018/dsa-4346" }, + { + "name" : "RHSA-2019:0229", + "refsource" : "REDHAT", + "url" : "https://access.redhat.com/errata/RHSA-2019:0229" + }, { "name" : "USN-3831-1", "refsource" : "UBUNTU", diff --git a/2018/19xxx/CVE-2018-19476.json b/2018/19xxx/CVE-2018-19476.json index 41874599468..cd0a30471a5 100644 --- a/2018/19xxx/CVE-2018-19476.json +++ b/2018/19xxx/CVE-2018-19476.json @@ -87,6 +87,11 @@ "refsource" : "DEBIAN", "url" : "https://www.debian.org/security/2018/dsa-4346" }, + { + "name" : "RHSA-2019:0229", + "refsource" : "REDHAT", + "url" : "https://access.redhat.com/errata/RHSA-2019:0229" + }, { "name" : "USN-3831-1", "refsource" : "UBUNTU", diff --git a/2018/19xxx/CVE-2018-19477.json b/2018/19xxx/CVE-2018-19477.json index 1a7d51eab61..6b7e87966db 100644 --- a/2018/19xxx/CVE-2018-19477.json +++ b/2018/19xxx/CVE-2018-19477.json @@ -87,6 +87,11 @@ "refsource" : "DEBIAN", "url" : "https://www.debian.org/security/2018/dsa-4346" }, + { + "name" : "RHSA-2019:0229", + "refsource" : "REDHAT", + "url" : "https://access.redhat.com/errata/RHSA-2019:0229" + }, { "name" : "USN-3831-1", "refsource" : "UBUNTU", diff --git a/2018/20xxx/CVE-2018-20019.json b/2018/20xxx/CVE-2018-20019.json index 8d12c66e659..b058fd84e4c 100644 --- a/2018/20xxx/CVE-2018-20019.json +++ b/2018/20xxx/CVE-2018-20019.json @@ -61,6 +61,11 @@ "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-029-libvnc-multiple-heap-out-of-bound-vulnerabilities/", "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-029-libvnc-multiple-heap-out-of-bound-vulnerabilities/" + }, + { + "name" : "USN-3877-1", + "refsource" : "UBUNTU", + "url" : "https://usn.ubuntu.com/3877-1/" } ] } diff --git a/2018/20xxx/CVE-2018-20020.json b/2018/20xxx/CVE-2018-20020.json index 5ebce5ce2e1..14611713f87 100644 --- a/2018/20xxx/CVE-2018-20020.json +++ b/2018/20xxx/CVE-2018-20020.json @@ -61,6 +61,11 @@ "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-030-libvnc-heap-out-of-bound-write/", "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-030-libvnc-heap-out-of-bound-write/" + }, + { + "name" : "USN-3877-1", + "refsource" : "UBUNTU", + "url" : "https://usn.ubuntu.com/3877-1/" } ] } diff --git a/2018/20xxx/CVE-2018-20021.json b/2018/20xxx/CVE-2018-20021.json index 031b3a4cafa..1083071ea76 100644 --- a/2018/20xxx/CVE-2018-20021.json +++ b/2018/20xxx/CVE-2018-20021.json @@ -61,6 +61,11 @@ "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-031-libvnc-infinite-loop/", "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-031-libvnc-infinite-loop/" + }, + { + "name" : "USN-3877-1", + "refsource" : "UBUNTU", + "url" : "https://usn.ubuntu.com/3877-1/" } ] } diff --git a/2018/20xxx/CVE-2018-20022.json b/2018/20xxx/CVE-2018-20022.json index 0234da07392..8ab7164393c 100644 --- a/2018/20xxx/CVE-2018-20022.json +++ b/2018/20xxx/CVE-2018-20022.json @@ -61,6 +61,11 @@ "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-032-libvnc-multiple-memory-leaks/", "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-032-libvnc-multiple-memory-leaks/" + }, + { + "name" : "USN-3877-1", + "refsource" : "UBUNTU", + "url" : "https://usn.ubuntu.com/3877-1/" } ] } diff --git a/2018/20xxx/CVE-2018-20023.json b/2018/20xxx/CVE-2018-20023.json index d99b0e7bca0..120ba42ba29 100644 --- a/2018/20xxx/CVE-2018-20023.json +++ b/2018/20xxx/CVE-2018-20023.json @@ -61,6 +61,11 @@ "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-033-libvnc-memory-leak/", "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-033-libvnc-memory-leak/" + }, + { + "name" : "USN-3877-1", + "refsource" : "UBUNTU", + "url" : "https://usn.ubuntu.com/3877-1/" } ] } diff --git a/2018/20xxx/CVE-2018-20024.json b/2018/20xxx/CVE-2018-20024.json index 55e8f1c1e94..e62d7045919 100644 --- a/2018/20xxx/CVE-2018-20024.json +++ b/2018/20xxx/CVE-2018-20024.json @@ -61,6 +61,11 @@ "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-034-libvnc-null-pointer-dereference/", "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-034-libvnc-null-pointer-dereference/" + }, + { + "name" : "USN-3877-1", + "refsource" : "UBUNTU", + "url" : "https://usn.ubuntu.com/3877-1/" } ] } diff --git a/2018/20xxx/CVE-2018-20748.json b/2018/20xxx/CVE-2018-20748.json index 048f2151977..1563a211097 100644 --- a/2018/20xxx/CVE-2018-20748.json +++ b/2018/20xxx/CVE-2018-20748.json @@ -52,6 +52,11 @@ }, "references" : { "reference_data" : [ + { + "name" : "[debian-lts-announce] 20190131 [SECURITY] [DLA 1652-1] libvncserver security update", + "refsource" : "MLIST", + "url" : "https://lists.debian.org/debian-lts-announce/2019/01/msg00029.html" + }, { "name" : "https://github.com/LibVNC/libvncserver/commit/a64c3b37af9a6c8f8009d7516874b8d266b42bae", "refsource" : "MISC", @@ -81,6 +86,11 @@ "name" : "https://www.openwall.com/lists/oss-security/2018/12/10/8", "refsource" : "MISC", "url" : "https://www.openwall.com/lists/oss-security/2018/12/10/8" + }, + { + "name" : "USN-3877-1", + "refsource" : "UBUNTU", + "url" : "https://usn.ubuntu.com/3877-1/" } ] } diff --git a/2018/20xxx/CVE-2018-20749.json b/2018/20xxx/CVE-2018-20749.json index f1c661d1ac8..c82aa8e995b 100644 --- a/2018/20xxx/CVE-2018-20749.json +++ b/2018/20xxx/CVE-2018-20749.json @@ -52,6 +52,11 @@ }, "references" : { "reference_data" : [ + { + "name" : "[debian-lts-announce] 20190131 [SECURITY] [DLA 1652-1] libvncserver security update", + "refsource" : "MLIST", + "url" : "https://lists.debian.org/debian-lts-announce/2019/01/msg00029.html" + }, { "name" : "https://github.com/LibVNC/libvncserver/commit/15bb719c03cc70f14c36a843dcb16ed69b405707", "refsource" : "MISC", @@ -66,6 +71,11 @@ "name" : "https://www.openwall.com/lists/oss-security/2018/12/10/8", "refsource" : "MISC", "url" : "https://www.openwall.com/lists/oss-security/2018/12/10/8" + }, + { + "name" : "USN-3877-1", + "refsource" : "UBUNTU", + "url" : "https://usn.ubuntu.com/3877-1/" } ] } diff --git a/2018/20xxx/CVE-2018-20750.json b/2018/20xxx/CVE-2018-20750.json index 40cc6f5cbcd..3109796c975 100644 --- a/2018/20xxx/CVE-2018-20750.json +++ b/2018/20xxx/CVE-2018-20750.json @@ -52,6 +52,11 @@ }, "references" : { "reference_data" : [ + { + "name" : "[debian-lts-announce] 20190131 [SECURITY] [DLA 1652-1] libvncserver security update", + "refsource" : "MLIST", + "url" : "https://lists.debian.org/debian-lts-announce/2019/01/msg00029.html" + }, { "name" : "https://github.com/LibVNC/libvncserver/commit/09e8fc02f59f16e2583b34fe1a270c238bd9ffec", "refsource" : "MISC", @@ -66,6 +71,11 @@ "name" : "https://www.openwall.com/lists/oss-security/2018/12/10/8", "refsource" : "MISC", "url" : "https://www.openwall.com/lists/oss-security/2018/12/10/8" + }, + { + "name" : "USN-3877-1", + "refsource" : "UBUNTU", + "url" : "https://usn.ubuntu.com/3877-1/" } ] } diff --git a/2018/6xxx/CVE-2018-6241.json b/2018/6xxx/CVE-2018-6241.json index 97b39442e74..97c418168a9 100644 --- a/2018/6xxx/CVE-2018-6241.json +++ b/2018/6xxx/CVE-2018-6241.json @@ -57,6 +57,11 @@ "name" : "https://source.android.com/security/bulletin/2019-01-01", "refsource" : "CONFIRM", "url" : "https://source.android.com/security/bulletin/2019-01-01" + }, + { + "name" : "106476", + "refsource" : "BID", + "url" : "http://www.securityfocus.com/bid/106476" } ] } diff --git a/2018/6xxx/CVE-2018-6307.json b/2018/6xxx/CVE-2018-6307.json index aea7dc663c1..c6ef78dbbff 100644 --- a/2018/6xxx/CVE-2018-6307.json +++ b/2018/6xxx/CVE-2018-6307.json @@ -61,6 +61,11 @@ "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-026-libvnc-heap-use-after-free/", "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-026-libvnc-heap-use-after-free/" + }, + { + "name" : "USN-3877-1", + "refsource" : "UBUNTU", + "url" : "https://usn.ubuntu.com/3877-1/" } ] } diff --git a/2019/2xxx/CVE-2019-2529.json b/2019/2xxx/CVE-2019-2529.json index 5693874bb9e..f1defbbce16 100644 --- a/2019/2xxx/CVE-2019-2529.json +++ b/2019/2xxx/CVE-2019-2529.json @@ -61,6 +61,11 @@ }, "references" : { "reference_data" : [ + { + "name" : "[debian-lts-announce] 20190201 [SECURITY] [DLA 1655-1] mariadb-10.0 security update", + "refsource" : "MLIST", + "url" : "https://lists.debian.org/debian-lts-announce/2019/02/msg00000.html" + }, { "name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "refsource" : "CONFIRM", diff --git a/2019/2xxx/CVE-2019-2537.json b/2019/2xxx/CVE-2019-2537.json index 6bed1564972..e5437698ca9 100644 --- a/2019/2xxx/CVE-2019-2537.json +++ b/2019/2xxx/CVE-2019-2537.json @@ -61,6 +61,11 @@ }, "references" : { "reference_data" : [ + { + "name" : "[debian-lts-announce] 20190201 [SECURITY] [DLA 1655-1] mariadb-10.0 security update", + "refsource" : "MLIST", + "url" : "https://lists.debian.org/debian-lts-announce/2019/02/msg00000.html" + }, { "name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "refsource" : "CONFIRM", diff --git a/2019/6xxx/CVE-2019-6110.json b/2019/6xxx/CVE-2019-6110.json index 8bd101bae03..48f007cdbae 100644 --- a/2019/6xxx/CVE-2019-6110.json +++ b/2019/6xxx/CVE-2019-6110.json @@ -52,6 +52,11 @@ }, "references" : { "reference_data" : [ + { + "name" : "46193", + "refsource" : "EXPLOIT-DB", + "url" : "https://www.exploit-db.com/exploits/46193/" + }, { "name" : "https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c", "refsource" : "MISC", diff --git a/2019/6xxx/CVE-2019-6111.json b/2019/6xxx/CVE-2019-6111.json index 994b6df32d7..656e9b0b262 100644 --- a/2019/6xxx/CVE-2019-6111.json +++ b/2019/6xxx/CVE-2019-6111.json @@ -52,6 +52,11 @@ }, "references" : { "reference_data" : [ + { + "name" : "46193", + "refsource" : "EXPLOIT-DB", + "url" : "https://www.exploit-db.com/exploits/46193/" + }, { "name" : "https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c", "refsource" : "MISC", @@ -61,6 +66,11 @@ "name" : "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt", "refsource" : "MISC", "url" : "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt" + }, + { + "name" : "106741", + "refsource" : "BID", + "url" : "http://www.securityfocus.com/bid/106741" } ] } diff --git a/2019/6xxx/CVE-2019-6133.json b/2019/6xxx/CVE-2019-6133.json index cca279bd880..b5fbb4ab5f5 100644 --- a/2019/6xxx/CVE-2019-6133.json +++ b/2019/6xxx/CVE-2019-6133.json @@ -77,6 +77,11 @@ "refsource" : "MISC", "url" : "https://gitlab.freedesktop.org/polkit/polkit/merge_requests/19" }, + { + "name" : "RHSA-2019:0230", + "refsource" : "REDHAT", + "url" : "https://access.redhat.com/errata/RHSA-2019:0230" + }, { "name" : "106537", "refsource" : "BID",