From 2bc852f3d1532fea4421bbddf57e41103dde2bb0 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Tue, 11 Jul 2023 23:32:39 +0530 Subject: [PATCH] Update CVE-2023-2796.yaml --- http/cves/2023/CVE-2023-2796.yaml | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-) diff --git a/http/cves/2023/CVE-2023-2796.yaml b/http/cves/2023/CVE-2023-2796.yaml index c10c9f83ad..60a47749fa 100644 --- a/http/cves/2023/CVE-2023-2796.yaml +++ b/http/cves/2023/CVE-2023-2796.yaml @@ -1,7 +1,7 @@ id: CVE-2023-2796 info: - name: EventON <= 2.1 - Missing Authorization to Event Access + name: EventON <= 2.1 - Missing Authorization author: randomrobbie severity: medium description: | @@ -12,16 +12,17 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2023-2796 remediation: Fixed in version 2.1.2 classification: + cve-id: CVE-2023-2796 cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 - cve-id: CVE-2023-2796 + cwe-id: cwe-862 metadata: + max-request: 1 + verified: true + shodan-query: 'vuln:CVE-2023-2796' fofa-query: "wp-content/plugins/eventon/" google-query: inurl:"/wp-content/plugins/eventon/" - shodan-query: 'vuln:CVE-2023-2796' - verified: true - max-request: 1 - tags: wordpress,wp-plugin,wpscan,wp,eventon + tags: cve,cve2023,wordpress,wp-plugin,wp,eventon,bypass http: - method: GET