From 92d6bae31808a3aeadf5bed9e3ca295ae3be2d11 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 17 Jan 2024 02:38:25 +0530 Subject: [PATCH] misc updates --- http/cves/2023/CVE-2023-46805.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/http/cves/2023/CVE-2023-46805.yaml b/http/cves/2023/CVE-2023-46805.yaml index 40f9d37bb8..e330867e40 100644 --- a/http/cves/2023/CVE-2023-46805.yaml +++ b/http/cves/2023/CVE-2023-46805.yaml @@ -7,6 +7,7 @@ info: description: An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks. reference: - https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US + - https://nvd.nist.gov/vuln/detail/CVE-2023-46805 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N cvss-score: 8.2 @@ -17,7 +18,7 @@ info: vendor: ivanti product: connect_secure shodan-query: html:"welcome.cgi?p=logo" - tags: cve,cve2023,kev,auth-bypass + tags: cve,cve2023,kev,auth-bypass,ivanti http: - method: GET