From 4363fcded161a294dc70aa95fef638da35ab4fac Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 29 Mar 2021 19:37:59 +0000 Subject: [PATCH] Update CVE-2020-23517.yaml --- cves/2020/CVE-2020-23517.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-23517.yaml b/cves/2020/CVE-2020-23517.yaml index 90a7310fec..7430e804ef 100644 --- a/cves/2020/CVE-2020-23517.yaml +++ b/cves/2020/CVE-2020-23517.yaml @@ -4,7 +4,7 @@ info: name: Aryanic HighMail (High CMS) XSS author: geeknik severity: medium - description: (XSS) vulnerability in Aryanic HighMail (High CMS) versions 2020 and before allows remote attackers to inject arbitrary web script or HTML, via 'user' to Log> + description: XSS vulnerability in Aryanic HighMail (High CMS) versions 2020 and before allows remote attackers to inject arbitrary web script or HTML, via 'user' to LoginForm. reference: https://vulnerabilitypublishing.blogspot.com/2021/03/aryanic-highmail-high-cms-reflected.html tags: xss,cve,cve2020