Remove trailing spaces

patch-1
sullo 2022-02-04 14:09:21 -05:00
parent 111f7d9a88
commit 8461d21658
2 changed files with 2 additions and 2 deletions

View File

@ -5,7 +5,7 @@ info:
author: madrobot author: madrobot
severity: critical severity: critical
description: This vulnerability is part of an attack chain that could allow remote code execution on Microsoft Exchange Server. The initial attack requires the ability to make an untrusted connection to Exchange server port 443. Other portions of the chain can be triggered if an attacker already has access or can convince an administrator to open a malicious file. Be aware his CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, and CVE-2021-27078. description: This vulnerability is part of an attack chain that could allow remote code execution on Microsoft Exchange Server. The initial attack requires the ability to make an untrusted connection to Exchange server port 443. Other portions of the chain can be triggered if an attacker already has access or can convince an administrator to open a malicious file. Be aware his CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, and CVE-2021-27078.
remediation: Apply the appropriate security update. remediation: Apply the appropriate security update.
tags: cve,cve2021,ssrf,rce,exchange,oast,microsoft tags: cve,cve2021,ssrf,rce,exchange,oast,microsoft
reference: reference:
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26855 - https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26855

View File

@ -6,7 +6,7 @@ info:
severity: critical severity: critical
description: PrestaShop SmartBlog by SmartDataSoft < 4.0.6 is vulnerable to a SQL injection in the blog archive functionality. description: PrestaShop SmartBlog by SmartDataSoft < 4.0.6 is vulnerable to a SQL injection in the blog archive functionality.
tags: cve,cve2021,prestashop,smartblog,sqli tags: cve,cve2021,prestashop,smartblog,sqli
remediation: Apply the fix. remediation: Apply the fix.
reference: reference:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37538 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37538
- https://blog.sorcery.ie/posts/smartblog_sqli/ - https://blog.sorcery.ie/posts/smartblog_sqli/