From 4c049000ff7ee461ae1a94eab492e4c6437b1944 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 1 Jul 2022 22:46:47 +0000 Subject: [PATCH] Auto Generated CVE annotations [Fri Jul 1 22:46:47 UTC 2022] :robot: --- cves/2021/CVE-2021-24997.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-24997.yaml b/cves/2021/CVE-2021-24997.yaml index 9ebbbf6722..96d9aedf4e 100644 --- a/cves/2021/CVE-2021-24997.yaml +++ b/cves/2021/CVE-2021-24997.yaml @@ -9,10 +9,12 @@ info: - https://www.exploit-db.com/exploits/50540 - https://patchstack.com/database/vulnerability/wp-guppy/wordpress-wp-guppy-plugin-1-2-sensitive-information-disclosure-vulnerability - https://nvd.nist.gov/vuln/detail/CVE-2021-24997 + - https://wpscan.com/vulnerability/747e6c7e-a167-4d82-b6e6-9e8613f0e900 classification: - cvss-score: 5.4 + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N + cvss-score: 6.5 cve-id: CVE-2021-24997 - cwe-id: CWE-200 + cwe-id: CWE-862 tags: wordpress,guppy,api,cve2021,cve,wp-plugin requests: