From 237c918af637fb6a53b110d54dea212d1d1e836a Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Tue, 3 Jan 2023 17:26:30 +0530 Subject: [PATCH] Update CVE-2022-0784.yaml --- cves/2022/CVE-2022-0784.yaml | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) diff --git a/cves/2022/CVE-2022-0784.yaml b/cves/2022/CVE-2022-0784.yaml index db0572bd03..6588a9b056 100644 --- a/cves/2022/CVE-2022-0784.yaml +++ b/cves/2022/CVE-2022-0784.yaml @@ -11,13 +11,10 @@ info: - https://wordpress.org/plugins/wp-experiments-free/ - https://nvd.nist.gov/vuln/detail/CVE-2022-0784 classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.8 cve-id: CVE-2022-0784 - cwe-id: CWE-89 metadata: verified: "true" - tags: cve,cve2022,sqli,wpscan,wordpress,wp-plugin,wp,wp-experiments-free,unauth + tags: cve,cve2022,wordpress,wp-plugin,wp,sqli,wp-experiments-free,unauth requests: - raw: @@ -36,4 +33,4 @@ requests: - 'status_code == 200' - 'contains(content_type, "text/html")' - 'contains(body, "{\"images\":")' - condition: and \ No newline at end of file + condition: and