diff --git a/http/cves/2022/CVE-2022-0597.yaml b/http/cves/2022/CVE-2022-0597.yaml index 4cd99cbbc3..12d0b39fed 100644 --- a/http/cves/2022/CVE-2022-0597.yaml +++ b/http/cves/2022/CVE-2022-0597.yaml @@ -10,16 +10,22 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2022-0597 - https://huntr.dev/bounties/68c22eab-cc69-4e9f-bcb6-2df3db626813/ - https://www.mend.io/vulnerability-database/CVE-2022-0597 + - https://github.com/microweber/microweber/commit/acfc6a581d1ea86096d1b0ecd8a0eec927c0e9b2 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 + cve-id: CVE-2022-0597 cwe-id: CWE-601 + epss-score: 0.00068 + epss-percentile: 0.28494 cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:* metadata: - max-request: 1 verified: true + max-request: 1 + vendor: microweber + product: microweber shodan-query: http.favicon.hash:780351152 - tags: cve,cve2023,microweber,redirect,oss, + tags: huntr,cve,cve2023,microweber,redirect,oss, http: - method: GET