diff --git a/2018/0xxx/CVE-2018-0495.json b/2018/0xxx/CVE-2018-0495.json index 6a6843e7869..e326fe5cae1 100644 --- a/2018/0xxx/CVE-2018-0495.json +++ b/2018/0xxx/CVE-2018-0495.json @@ -146,6 +146,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:1296", "url": "https://access.redhat.com/errata/RHSA-2019:1296" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2019:1543", + "url": "https://access.redhat.com/errata/RHSA-2019:1543" } ] } diff --git a/2018/0xxx/CVE-2018-0732.json b/2018/0xxx/CVE-2018-0732.json index d062e8fa040..75d19eff6cb 100644 --- a/2018/0xxx/CVE-2018-0732.json +++ b/2018/0xxx/CVE-2018-0732.json @@ -209,6 +209,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:1296", "url": "https://access.redhat.com/errata/RHSA-2019:1296" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2019:1543", + "url": "https://access.redhat.com/errata/RHSA-2019:1543" } ] } diff --git a/2018/1000xxx/CVE-2018-1000005.json b/2018/1000xxx/CVE-2018-1000005.json index 3d0173aa53a..1d221754a3a 100644 --- a/2018/1000xxx/CVE-2018-1000005.json +++ b/2018/1000xxx/CVE-2018-1000005.json @@ -78,6 +78,11 @@ "name": "https://github.com/curl/curl/pull/2231", "refsource": "CONFIRM", "url": "https://github.com/curl/curl/pull/2231" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2019:1543", + "url": "https://access.redhat.com/errata/RHSA-2019:1543" } ] } diff --git a/2018/1000xxx/CVE-2018-1000007.json b/2018/1000xxx/CVE-2018-1000007.json index e21db75b612..737d4b94373 100644 --- a/2018/1000xxx/CVE-2018-1000007.json +++ b/2018/1000xxx/CVE-2018-1000007.json @@ -98,6 +98,11 @@ "refsource": "REDHAT", "name": "RHBA-2019:0327", "url": "https://access.redhat.com/errata/RHBA-2019:0327" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2019:1543", + "url": "https://access.redhat.com/errata/RHSA-2019:1543" } ] } diff --git a/2018/1000xxx/CVE-2018-1000120.json b/2018/1000xxx/CVE-2018-1000120.json index 54424bfbf0d..b6026ebd060 100644 --- a/2018/1000xxx/CVE-2018-1000120.json +++ b/2018/1000xxx/CVE-2018-1000120.json @@ -118,6 +118,11 @@ "refsource": "REDHAT", "name": "RHBA-2019:0327", "url": "https://access.redhat.com/errata/RHBA-2019:0327" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2019:1543", + "url": "https://access.redhat.com/errata/RHSA-2019:1543" } ] } diff --git a/2018/1000xxx/CVE-2018-1000122.json b/2018/1000xxx/CVE-2018-1000122.json index 22ecb126674..2cea72d00f7 100644 --- a/2018/1000xxx/CVE-2018-1000122.json +++ b/2018/1000xxx/CVE-2018-1000122.json @@ -118,6 +118,11 @@ "refsource": "REDHAT", "name": "RHBA-2019:0327", "url": "https://access.redhat.com/errata/RHBA-2019:0327" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2019:1543", + "url": "https://access.redhat.com/errata/RHSA-2019:1543" } ] } diff --git a/2018/14xxx/CVE-2018-14404.json b/2018/14xxx/CVE-2018-14404.json index df22cbb0038..a7a6e66d734 100644 --- a/2018/14xxx/CVE-2018-14404.json +++ b/2018/14xxx/CVE-2018-14404.json @@ -81,6 +81,11 @@ "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1595985", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595985" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2019:1543", + "url": "https://access.redhat.com/errata/RHSA-2019:1543" } ] } diff --git a/2019/0xxx/CVE-2019-0211.json b/2019/0xxx/CVE-2019-0211.json index f713083ee76..6d0522f9b0f 100644 --- a/2019/0xxx/CVE-2019-0211.json +++ b/2019/0xxx/CVE-2019-0211.json @@ -203,6 +203,11 @@ "refsource": "MLIST", "name": "[httpd-cvs] 20190611 svn commit: r1861068 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml", "url": "https://lists.apache.org/thread.html/fd110f4ace2d8364c7d9190e1993cde92f79e4eb85576ed9285686ac@%3Ccvs.httpd.apache.org%3E" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2019:1543", + "url": "https://access.redhat.com/errata/RHSA-2019:1543" } ] }, diff --git a/2019/12xxx/CVE-2019-12133.json b/2019/12xxx/CVE-2019-12133.json index 0e9f9f67a7b..ffa84143f8b 100644 --- a/2019/12xxx/CVE-2019-12133.json +++ b/2019/12xxx/CVE-2019-12133.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-12133", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-12133", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\\SYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html", + "url": "https://www.manageengine.com/products/desktop-central/elevation-of-privilege-vulnerability.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-007.md", + "url": "https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-007.md" } ] } diff --git a/2019/12xxx/CVE-2019-12878.json b/2019/12xxx/CVE-2019-12878.json new file mode 100644 index 00000000000..744cd739ba4 --- /dev/null +++ b/2019/12xxx/CVE-2019-12878.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12878", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12879.json b/2019/12xxx/CVE-2019-12879.json new file mode 100644 index 00000000000..cc7d02c47cb --- /dev/null +++ b/2019/12xxx/CVE-2019-12879.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12879", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12880.json b/2019/12xxx/CVE-2019-12880.json new file mode 100644 index 00000000000..4d257283e8b --- /dev/null +++ b/2019/12xxx/CVE-2019-12880.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12880", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file