From 81bf8288b5a685bf3e42b4f1997d405b4cdcf462 Mon Sep 17 00:00:00 2001 From: Sullo Date: Thu, 27 Jan 2022 14:23:33 -0500 Subject: [PATCH] Syntax fixes --- cves/2008/CVE-2008-6172.yaml | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/cves/2008/CVE-2008-6172.yaml b/cves/2008/CVE-2008-6172.yaml index 045a013628..8c6e4cd240 100644 --- a/cves/2008/CVE-2008-6172.yaml +++ b/cves/2008/CVE-2008-6172.yaml @@ -5,17 +5,13 @@ info: author: daffainfo severity: high description: A directory traversal vulnerability in captcha/captcha_image.php in the RWCards (com_rwcards) 3.0.11 component for Joomla! when magic_quotes_gpc is disabled allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the img parameter. - remediation: Upgrade to the latest version. + remediation: Upgrade to the latest version. reference: - https://www.exploit-db.com/exploits/6817 - https://www.cvedetails.com/cve/CVE-2008-6172 tags: cve,cve2008,joomla,lfi - classification: - cvss-metrics: - cvss-score: cve-id: CVE-2008-6172 - cwe-id: requests: - method: GET