From 0d1f876866ba2bb5a304523d69b129081dafa4ac Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Wed, 2 Feb 2022 12:15:24 -0500 Subject: [PATCH] Enhancement: cves/2021/CVE-2021-37538.yaml by mp --- cves/2021/CVE-2021-37538.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/cves/2021/CVE-2021-37538.yaml b/cves/2021/CVE-2021-37538.yaml index c7327b670e..3e47ea837a 100644 --- a/cves/2021/CVE-2021-37538.yaml +++ b/cves/2021/CVE-2021-37538.yaml @@ -6,6 +6,7 @@ info: severity: critical description: PrestaShop SmartBlog by SmartDataSoft < 4.0.6 is vulnerable to a SQL injection in the blog archive functionality. tags: cve,cve2021,prestashop,smartblog,sqli + remediation: Apply the fix. reference: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37538 - https://blog.sorcery.ie/posts/smartblog_sqli/ @@ -30,3 +31,5 @@ requests: words: - "c5fe25896e49ddfe996db7508cf00534" part: body + +# Enhanced by mp on 2022/02/02