diff --git a/http/cves/2023/CVE-2023-46805.yaml b/http/cves/2023/CVE-2023-46805.yaml index 40f9d37bb8..e330867e40 100644 --- a/http/cves/2023/CVE-2023-46805.yaml +++ b/http/cves/2023/CVE-2023-46805.yaml @@ -7,6 +7,7 @@ info: description: An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks. reference: - https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US + - https://nvd.nist.gov/vuln/detail/CVE-2023-46805 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N cvss-score: 8.2 @@ -17,7 +18,7 @@ info: vendor: ivanti product: connect_secure shodan-query: html:"welcome.cgi?p=logo" - tags: cve,cve2023,kev,auth-bypass + tags: cve,cve2023,kev,auth-bypass,ivanti http: - method: GET