From 03dc7e19e1ad63321915ae8d3c7068a4c8257623 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 17 Feb 2023 03:41:43 +0000 Subject: [PATCH] Auto Generated CVE annotations [Fri Feb 17 03:41:43 UTC 2023] :robot: --- cves/2022/CVE-2022-46169.yaml | 2 +- cves/2023/CVE-2023-23489.yaml | 6 +++++- 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/cves/2022/CVE-2022-46169.yaml b/cves/2022/CVE-2022-46169.yaml index 9138c55c53..0e98b5bef4 100644 --- a/cves/2022/CVE-2022-46169.yaml +++ b/cves/2022/CVE-2022-46169.yaml @@ -19,7 +19,7 @@ info: metadata: shodan-query: title:"Login to Cacti" verified: "true" - tags: cve2022,cve,auth-bypass,cacti + tags: cve2022,cve,auth-bypass,cacti,kev requests: - raw: diff --git a/cves/2023/CVE-2023-23489.yaml b/cves/2023/CVE-2023-23489.yaml index 0c6b7e2787..a4385382ad 100644 --- a/cves/2023/CVE-2023-23489.yaml +++ b/cves/2023/CVE-2023-23489.yaml @@ -10,11 +10,15 @@ info: - https://wpscan.com/vulnerability/c5a6830c-6420-42fc-b20c-8e20224d6f18 - https://wordpress.org/plugins/easy-digital-downloads/ - https://nvd.nist.gov/vuln/detail/CVE-2023-23489 + - https://www.tenable.com/security/research/tra-2023-2 classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 cve-id: CVE-2023-23489 + cwe-id: CWE-89 metadata: verified: "true" - tags: cve,cve2023,sqli,wordpress,wp,wp-plugin,easy-digital-downloads,unauth + tags: easy-digital-downloads,wpscan,wordpress,wp,wp-plugin,unauth,cve,cve2023,sqli requests: - raw: