From 70fd2d2499ba2830bc7acf8945548c97ef0f8800 Mon Sep 17 00:00:00 2001 From: sullo Date: Tue, 10 May 2022 17:37:18 -0400 Subject: [PATCH] Spacing issues --- cves/2007/CVE-2007-4556.yaml | 3 ++- cves/2014/CVE-2014-9618.yaml | 5 +++-- 2 files changed, 5 insertions(+), 3 deletions(-) diff --git a/cves/2007/CVE-2007-4556.yaml b/cves/2007/CVE-2007-4556.yaml index 196c912c5d..af70828829 100644 --- a/cves/2007/CVE-2007-4556.yaml +++ b/cves/2007/CVE-2007-4556.yaml @@ -4,7 +4,8 @@ info: name: OpenSymphony XWork/Apache Struts2 - Remote Code Execution author: pikpikcu severity: critical - description: "Apache Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via for"m input beginning with a "%{" sequence and ending with a "}" character." + description: | + Apache Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via for"m input beginning with a "%{" sequence and ending with a "}" character. reference: - https://www.guildhab.top/?p=2326 - https://nvd.nist.gov/vuln/detail/CVE-2007-4556 diff --git a/cves/2014/CVE-2014-9618.yaml b/cves/2014/CVE-2014-9618.yaml index bc774ef1ff..5dc89cf317 100644 --- a/cves/2014/CVE-2014-9618.yaml +++ b/cves/2014/CVE-2014-9618.yaml @@ -1,10 +1,11 @@ id: CVE-2014-9618 info: - name: Netsweeper - Authentication Bypass + name: Netsweeper - Authentication Bypass author: daffainfo severity: critical - description: The Client Filter Admin portal in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to bypass authentication and subsequently create arbitrary profiles via a showdeny action to the default URL. + description: | + The Client Filter Admin portal in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to bypass authentication and subsequently create arbitrary profiles via a showdeny action to the default URL. reference: - https://packetstormsecurity.com/files/download/133034/netsweeper-issues.tgz - https://nvd.nist.gov/vuln/detail/CVE-2014-9618