From e52167be38ee6c46aac6ff55d67471fcd5818d91 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 30 Dec 2019 01:01:03 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/11xxx/CVE-2019-11045.json | 5 +++ 2019/11xxx/CVE-2019-11046.json | 5 +++ 2019/11xxx/CVE-2019-11047.json | 5 +++ 2019/11xxx/CVE-2019-11050.json | 5 +++ 2019/15xxx/CVE-2019-15945.json | 5 +++ 2019/15xxx/CVE-2019-15946.json | 5 +++ 2019/19xxx/CVE-2019-19479.json | 5 +++ 2019/19xxx/CVE-2019-19480.json | 5 +++ 2019/19xxx/CVE-2019-19481.json | 5 +++ 2019/20xxx/CVE-2019-20079.json | 72 ++++++++++++++++++++++++++++++++++ 2019/20xxx/CVE-2019-20080.json | 18 +++++++++ 2019/20xxx/CVE-2019-20081.json | 18 +++++++++ 2019/20xxx/CVE-2019-20082.json | 18 +++++++++ 2019/20xxx/CVE-2019-20083.json | 18 +++++++++ 2019/20xxx/CVE-2019-20084.json | 18 +++++++++ 2019/6xxx/CVE-2019-6502.json | 5 +++ 16 files changed, 212 insertions(+) create mode 100644 2019/20xxx/CVE-2019-20079.json create mode 100644 2019/20xxx/CVE-2019-20080.json create mode 100644 2019/20xxx/CVE-2019-20081.json create mode 100644 2019/20xxx/CVE-2019-20082.json create mode 100644 2019/20xxx/CVE-2019-20083.json create mode 100644 2019/20xxx/CVE-2019-20084.json diff --git a/2019/11xxx/CVE-2019-11045.json b/2019/11xxx/CVE-2019-11045.json index f16fea97a95..fd81db97fa5 100644 --- a/2019/11xxx/CVE-2019-11045.json +++ b/2019/11xxx/CVE-2019-11045.json @@ -95,6 +95,11 @@ "refsource": "MISC", "url": "https://bugs.php.net/bug.php?id=78863", "name": "https://bugs.php.net/bug.php?id=78863" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update", + "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00034.html" } ] }, diff --git a/2019/11xxx/CVE-2019-11046.json b/2019/11xxx/CVE-2019-11046.json index add28a79548..1198768b64b 100644 --- a/2019/11xxx/CVE-2019-11046.json +++ b/2019/11xxx/CVE-2019-11046.json @@ -95,6 +95,11 @@ "refsource": "MISC", "url": "https://bugs.php.net/bug.php?id=78878", "name": "https://bugs.php.net/bug.php?id=78878" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update", + "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00034.html" } ] }, diff --git a/2019/11xxx/CVE-2019-11047.json b/2019/11xxx/CVE-2019-11047.json index df452139686..e265fc5e637 100644 --- a/2019/11xxx/CVE-2019-11047.json +++ b/2019/11xxx/CVE-2019-11047.json @@ -95,6 +95,11 @@ "refsource": "MISC", "url": "https://bugs.php.net/bug.php?id=78910", "name": "https://bugs.php.net/bug.php?id=78910" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update", + "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00034.html" } ] }, diff --git a/2019/11xxx/CVE-2019-11050.json b/2019/11xxx/CVE-2019-11050.json index 5e56395c884..c34b53750cc 100644 --- a/2019/11xxx/CVE-2019-11050.json +++ b/2019/11xxx/CVE-2019-11050.json @@ -95,6 +95,11 @@ "refsource": "MISC", "url": "https://bugs.php.net/bug.php?id=78793", "name": "https://bugs.php.net/bug.php?id=78793" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update", + "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00034.html" } ] }, diff --git a/2019/15xxx/CVE-2019-15945.json b/2019/15xxx/CVE-2019-15945.json index 074e1595beb..d31675a0b37 100644 --- a/2019/15xxx/CVE-2019-15945.json +++ b/2019/15xxx/CVE-2019-15945.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update", "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00009.html" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20191229 OpenSC 0.20.0 released", + "url": "http://www.openwall.com/lists/oss-security/2019/12/29/1" } ] } diff --git a/2019/15xxx/CVE-2019-15946.json b/2019/15xxx/CVE-2019-15946.json index a0984e3de89..2dafe296357 100644 --- a/2019/15xxx/CVE-2019-15946.json +++ b/2019/15xxx/CVE-2019-15946.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update", "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00009.html" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20191229 OpenSC 0.20.0 released", + "url": "http://www.openwall.com/lists/oss-security/2019/12/29/1" } ] } diff --git a/2019/19xxx/CVE-2019-19479.json b/2019/19xxx/CVE-2019-19479.json index 0420c837519..3565baf0a99 100644 --- a/2019/19xxx/CVE-2019-19479.json +++ b/2019/19xxx/CVE-2019-19479.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20191226 [SECURITY] [DLA 2046-1] opensc security update", "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00031.html" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20191229 OpenSC 0.20.0 released", + "url": "http://www.openwall.com/lists/oss-security/2019/12/29/1" } ] } diff --git a/2019/19xxx/CVE-2019-19480.json b/2019/19xxx/CVE-2019-19480.json index 54c0ec87231..88e5bad2a8c 100644 --- a/2019/19xxx/CVE-2019-19480.json +++ b/2019/19xxx/CVE-2019-19480.json @@ -61,6 +61,11 @@ "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18478", "refsource": "MISC", "name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18478" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20191229 OpenSC 0.20.0 released", + "url": "http://www.openwall.com/lists/oss-security/2019/12/29/1" } ] } diff --git a/2019/19xxx/CVE-2019-19481.json b/2019/19xxx/CVE-2019-19481.json index 54f2412ab79..17903ff9d2f 100644 --- a/2019/19xxx/CVE-2019-19481.json +++ b/2019/19xxx/CVE-2019-19481.json @@ -61,6 +61,11 @@ "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18618", "refsource": "MISC", "name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18618" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20191229 OpenSC 0.20.0 released", + "url": "http://www.openwall.com/lists/oss-security/2019/12/29/1" } ] } diff --git a/2019/20xxx/CVE-2019-20079.json b/2019/20xxx/CVE-2019-20079.json new file mode 100644 index 00000000000..ed5b22fa5f9 --- /dev/null +++ b/2019/20xxx/CVE-2019-20079.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-20079", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The autocmd feature in window.c in Vim before 8.1.2136 accesses freed memory." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/vim/vim/commit/ec66c41d84e574baf8009dbc0bd088d2bc5b2421", + "refsource": "MISC", + "name": "https://github.com/vim/vim/commit/ec66c41d84e574baf8009dbc0bd088d2bc5b2421" + }, + { + "url": "https://packetstormsecurity.com/files/154898", + "refsource": "MISC", + "name": "https://packetstormsecurity.com/files/154898" + }, + { + "url": "https://github.com/vim/vim/compare/v8.1.2135...v8.1.2136", + "refsource": "MISC", + "name": "https://github.com/vim/vim/compare/v8.1.2135...v8.1.2136" + } + ] + } +} \ No newline at end of file diff --git a/2019/20xxx/CVE-2019-20080.json b/2019/20xxx/CVE-2019-20080.json new file mode 100644 index 00000000000..5895ef00e20 --- /dev/null +++ b/2019/20xxx/CVE-2019-20080.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-20080", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/20xxx/CVE-2019-20081.json b/2019/20xxx/CVE-2019-20081.json new file mode 100644 index 00000000000..2a2640ae6f6 --- /dev/null +++ b/2019/20xxx/CVE-2019-20081.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-20081", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/20xxx/CVE-2019-20082.json b/2019/20xxx/CVE-2019-20082.json new file mode 100644 index 00000000000..615ab4fe5ab --- /dev/null +++ b/2019/20xxx/CVE-2019-20082.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-20082", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/20xxx/CVE-2019-20083.json b/2019/20xxx/CVE-2019-20083.json new file mode 100644 index 00000000000..8d813021947 --- /dev/null +++ b/2019/20xxx/CVE-2019-20083.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-20083", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/20xxx/CVE-2019-20084.json b/2019/20xxx/CVE-2019-20084.json new file mode 100644 index 00000000000..d62f77f0704 --- /dev/null +++ b/2019/20xxx/CVE-2019-20084.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-20084", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/6xxx/CVE-2019-6502.json b/2019/6xxx/CVE-2019-6502.json index b2592e6797e..a54549b4f9b 100644 --- a/2019/6xxx/CVE-2019-6502.json +++ b/2019/6xxx/CVE-2019-6502.json @@ -56,6 +56,11 @@ "name": "https://github.com/OpenSC/OpenSC/issues/1586", "refsource": "MISC", "url": "https://github.com/OpenSC/OpenSC/issues/1586" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20191229 OpenSC 0.20.0 released", + "url": "http://www.openwall.com/lists/oss-security/2019/12/29/1" } ] }