diff --git a/2019/12xxx/CVE-2019-12525.json b/2019/12xxx/CVE-2019-12525.json index 6740498a43e..a7e14bd3ad8 100644 --- a/2019/12xxx/CVE-2019-12525.json +++ b/2019/12xxx/CVE-2019-12525.json @@ -66,6 +66,11 @@ "refsource": "CONFIRM", "name": "http://www.squid-cache.org/Versions/v4/changesets/squid-4-7f73e9c5d17664b882ed32590e6af310c247f320.patch", "url": "http://www.squid-cache.org/Versions/v4/changesets/squid-4-7f73e9c5d17664b882ed32590e6af310c247f320.patch" + }, + { + "refsource": "UBUNTU", + "name": "USN-4065-1", + "url": "https://usn.ubuntu.com/4065-1/" } ] } diff --git a/2019/12xxx/CVE-2019-12527.json b/2019/12xxx/CVE-2019-12527.json index 0630d0414ac..7937d1aee44 100644 --- a/2019/12xxx/CVE-2019-12527.json +++ b/2019/12xxx/CVE-2019-12527.json @@ -71,6 +71,11 @@ "refsource": "BID", "name": "109143", "url": "http://www.securityfocus.com/bid/109143" + }, + { + "refsource": "UBUNTU", + "name": "USN-4065-1", + "url": "https://usn.ubuntu.com/4065-1/" } ] } diff --git a/2019/12xxx/CVE-2019-12529.json b/2019/12xxx/CVE-2019-12529.json index cb2ff34a19e..31c1b62ee38 100644 --- a/2019/12xxx/CVE-2019-12529.json +++ b/2019/12xxx/CVE-2019-12529.json @@ -66,6 +66,11 @@ "refsource": "CONFIRM", "name": "http://www.squid-cache.org/Versions/v4/changesets/squid-4-dd46b5417809647f561d8a5e0e74c3aacd235258.patch", "url": "http://www.squid-cache.org/Versions/v4/changesets/squid-4-dd46b5417809647f561d8a5e0e74c3aacd235258.patch" + }, + { + "refsource": "UBUNTU", + "name": "USN-4065-1", + "url": "https://usn.ubuntu.com/4065-1/" } ] } diff --git a/2019/13xxx/CVE-2019-13107.json b/2019/13xxx/CVE-2019-13107.json index 2b5fe30f295..97434ea7e5d 100644 --- a/2019/13xxx/CVE-2019-13107.json +++ b/2019/13xxx/CVE-2019-13107.json @@ -61,6 +61,11 @@ "url": "https://github.com/tbeu/matio/compare/f8cd397...fabac6c", "refsource": "MISC", "name": "https://github.com/tbeu/matio/compare/f8cd397...fabac6c" + }, + { + "refsource": "MISC", + "name": "https://github.com/tbeu/matio/pull/118", + "url": "https://github.com/tbeu/matio/pull/118" } ] } diff --git a/2019/1xxx/CVE-2019-1089.json b/2019/1xxx/CVE-2019-1089.json index c1bf1243103..147fcefb4e9 100644 --- a/2019/1xxx/CVE-2019-1089.json +++ b/2019/1xxx/CVE-2019-1089.json @@ -56,6 +56,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1089", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1089" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153683/Microsoft-Windows-RPCSS-Activation-Kernel-Security-Callback-Privilege-Escalation.html", + "url": "http://packetstormsecurity.com/files/153683/Microsoft-Windows-RPCSS-Activation-Kernel-Security-Callback-Privilege-Escalation.html" } ] }