diff --git a/2022/47xxx/CVE-2022-47636.json b/2022/47xxx/CVE-2022-47636.json index e4cac382c2f..ae3c331331c 100644 --- a/2022/47xxx/CVE-2022-47636.json +++ b/2022/47xxx/CVE-2022-47636.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://www.exploit-db.com/exploits/51678", "url": "https://www.exploit-db.com/exploits/51678" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/174127/OutSystems-Service-Studio-11.53.30-DLL-Hijacking.html", + "url": "http://packetstormsecurity.com/files/174127/OutSystems-Service-Studio-11.53.30-DLL-Hijacking.html" } ] } diff --git a/2023/1xxx/CVE-2023-1389.json b/2023/1xxx/CVE-2023-1389.json index ec037f4267b..bbd24b30264 100644 --- a/2023/1xxx/CVE-2023-1389.json +++ b/2023/1xxx/CVE-2023-1389.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://www.tenable.com/security/research/tra-2023-11", "url": "https://www.tenable.com/security/research/tra-2023-11" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/174131/TP-Link-Archer-AX21-Command-Injection.html", + "url": "http://packetstormsecurity.com/files/174131/TP-Link-Archer-AX21-Command-Injection.html" } ] }, diff --git a/2023/26xxx/CVE-2023-26604.json b/2023/26xxx/CVE-2023-26604.json index 732e509bc1f..6123446eb1d 100644 --- a/2023/26xxx/CVE-2023-26604.json +++ b/2023/26xxx/CVE-2023-26604.json @@ -76,6 +76,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230505-0009/", "url": "https://security.netapp.com/advisory/ntap-20230505-0009/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/174130/systemd-246-Local-Root-Privilege-Escalation.html", + "url": "http://packetstormsecurity.com/files/174130/systemd-246-Local-Root-Privilege-Escalation.html" } ] } diff --git a/2023/27xxx/CVE-2023-27163.json b/2023/27xxx/CVE-2023-27163.json index 9d196947ded..6a631ba6f4d 100644 --- a/2023/27xxx/CVE-2023-27163.json +++ b/2023/27xxx/CVE-2023-27163.json @@ -71,6 +71,16 @@ "refsource": "MISC", "name": "https://gist.github.com/b33t1e/3079c10c88cad379fb166c389ce3b7b3", "url": "https://gist.github.com/b33t1e/3079c10c88cad379fb166c389ce3b7b3" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/174129/Maltrail-0.53-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/174129/Maltrail-0.53-Remote-Code-Execution.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/174128/Request-Baskets-1.2.1-Server-Side-Request-Forgery.html", + "url": "http://packetstormsecurity.com/files/174128/Request-Baskets-1.2.1-Server-Side-Request-Forgery.html" } ] } diff --git a/2023/39xxx/CVE-2023-39553.json b/2023/39xxx/CVE-2023-39553.json index 779efba494f..4f6ef988951 100644 --- a/2023/39xxx/CVE-2023-39553.json +++ b/2023/39xxx/CVE-2023-39553.json @@ -64,6 +64,11 @@ "url": "https://lists.apache.org/thread/ozpl0opmob49rkcz8svo8wkxyw1395sf", "refsource": "MISC", "name": "https://lists.apache.org/thread/ozpl0opmob49rkcz8svo8wkxyw1395sf" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/08/11/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/08/11/1" } ] },