Auto Generated CVE annotations [Fri Feb 17 03:41:43 UTC 2023] 🤖

patch-1
GitHub Action 2023-02-17 03:41:43 +00:00
parent 747756ea44
commit 03dc7e19e1
2 changed files with 6 additions and 2 deletions

View File

@ -19,7 +19,7 @@ info:
metadata:
shodan-query: title:"Login to Cacti"
verified: "true"
tags: cve2022,cve,auth-bypass,cacti
tags: cve2022,cve,auth-bypass,cacti,kev
requests:
- raw:

View File

@ -10,11 +10,15 @@ info:
- https://wpscan.com/vulnerability/c5a6830c-6420-42fc-b20c-8e20224d6f18
- https://wordpress.org/plugins/easy-digital-downloads/
- https://nvd.nist.gov/vuln/detail/CVE-2023-23489
- https://www.tenable.com/security/research/tra-2023-2
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-23489
cwe-id: CWE-89
metadata:
verified: "true"
tags: cve,cve2023,sqli,wordpress,wp,wp-plugin,easy-digital-downloads,unauth
tags: easy-digital-downloads,wpscan,wordpress,wp,wp-plugin,unauth,cve,cve2023,sqli
requests:
- raw: