diff --git a/cves/2022/CVE-2022-0968.yaml b/cves/2022/CVE-2022-0968.yaml index 1a78886a1d..43552faa00 100644 --- a/cves/2022/CVE-2022-0968.yaml +++ b/cves/2022/CVE-2022-0968.yaml @@ -3,16 +3,18 @@ id: CVE-2022-0968 info: name: Microweber < 1.2.12 - Integer Overflow (DOS) author: amit-jd - severity: high + severity: medium description: | The microweber application allows large characters to insert in the input field "first & last name" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The first name & last name input should be limited to 50 characters or max 100 characters. reference: - https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e/ - https://github.com/advisories/GHSA-5fxv-xx5p-g2fv - https://nvd.nist.gov/vuln/detail/CVE-2022-0968 + - https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e classification: - cvss-metrics: CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H - cvss-score: 7.2 + cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H + cvss-score: 5.5 + cve-id: CVE-2022-0968 cwe-id: CWE-190 tags: cve,cve2022,overflow,microweber,cms