From 6ae1c5e51456399b36be61af0a54394f89fbe0a4 Mon Sep 17 00:00:00 2001 From: numan Date: Sat, 5 Aug 2023 13:38:40 +0300 Subject: [PATCH] Update CVE-2023-39120.yaml fix typo --- http/cves/2023/CVE-2023-39120.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/http/cves/2023/CVE-2023-39120.yaml b/http/cves/2023/CVE-2023-39120.yaml index d24a678054..3dd4d78a1f 100644 --- a/http/cves/2023/CVE-2023-39120.yaml +++ b/http/cves/2023/CVE-2023-39120.yaml @@ -4,7 +4,7 @@ info: name: Nodogsplash - Directory Traversal author: Numan Türle severity: high - description: Nodogsplash product was affected by a directory traversal vulnerability that also impacted the OpenWrt product. This vulnerability was addressed in OpenWrt version 5.0.1. Exploiting this vulnerability, remote attackers could read arbitrary files from the target system. + description: Nodogsplash product was affected by a directory traversal vulnerability that also impacted the OpenWrt product. This vulnerability was addressed in Nodogsplash version 5.0.1. Exploiting this vulnerability, remote attackers could read arbitrary files from the target system. reference: - https://nvd.nist.gov/vuln/detail/CVE-2023-39120 - https://github.com/nodogsplash/nodogsplash/commit/a745a5d635925d2a6f0e0530bdc0eac645b672ed