diff --git a/2020/11xxx/CVE-2020-11978.json b/2020/11xxx/CVE-2020-11978.json index 770c8c01154..bc1c2318af3 100644 --- a/2020/11xxx/CVE-2020-11978.json +++ b/2020/11xxx/CVE-2020-11978.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html", "url": "http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-Execution.html" } ] }, diff --git a/2020/13xxx/CVE-2020-13927.json b/2020/13xxx/CVE-2020-13927.json index e3d904563b2..f92f95733ca 100644 --- a/2020/13xxx/CVE-2020-13927.json +++ b/2020/13xxx/CVE-2020-13927.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html", "url": "http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-Execution.html" } ] }, diff --git a/2023/26xxx/CVE-2023-26067.json b/2023/26xxx/CVE-2023-26067.json index 5d1b2c8280c..0615d9932ef 100644 --- a/2023/26xxx/CVE-2023-26067.json +++ b/2023/26xxx/CVE-2023-26067.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://publications.lexmark.com/publications/security-alerts/CVE-2023-26067.pdf", "url": "https://publications.lexmark.com/publications/security-alerts/CVE-2023-26067.pdf" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/174763/Lexmark-Device-Embedded-Web-Server-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/174763/Lexmark-Device-Embedded-Web-Server-Remote-Code-Execution.html" } ] } diff --git a/2023/26xxx/CVE-2023-26068.json b/2023/26xxx/CVE-2023-26068.json index b504bf7a537..3d12a321a9d 100644 --- a/2023/26xxx/CVE-2023-26068.json +++ b/2023/26xxx/CVE-2023-26068.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://publications.lexmark.com/publications/security-alerts/CVE-2023-26068.pdf", "url": "https://publications.lexmark.com/publications/security-alerts/CVE-2023-26068.pdf" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/174763/Lexmark-Device-Embedded-Web-Server-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/174763/Lexmark-Device-Embedded-Web-Server-Remote-Code-Execution.html" } ] } diff --git a/2023/4xxx/CVE-2023-4987.json b/2023/4xxx/CVE-2023-4987.json index d2e86e92849..f81e9e03fcc 100644 --- a/2023/4xxx/CVE-2023-4987.json +++ b/2023/4xxx/CVE-2023-4987.json @@ -67,6 +67,11 @@ "url": "https://vuldb.com/?ctiid.239798", "refsource": "MISC", "name": "https://vuldb.com/?ctiid.239798" + }, + { + "url": "http://packetstormsecurity.com/files/174760/Taskhub-2.8.7-SQL-Injection.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/174760/Taskhub-2.8.7-SQL-Injection.html" } ] }, diff --git a/2023/5xxx/CVE-2023-5069.json b/2023/5xxx/CVE-2023-5069.json new file mode 100644 index 00000000000..6eabc5f963d --- /dev/null +++ b/2023/5xxx/CVE-2023-5069.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-5069", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file