From 96e6a7a3d29f2581dd0778cd0d6ac55056b8fc08 Mon Sep 17 00:00:00 2001 From: Kazgangap Date: Fri, 19 Jul 2024 23:30:24 +0300 Subject: [PATCH] reference --- http/cves/2024/CVE-2024-6205.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/http/cves/2024/CVE-2024-6205.yaml b/http/cves/2024/CVE-2024-6205.yaml index d3566ca70b..b1c16d041a 100644 --- a/http/cves/2024/CVE-2024-6205.yaml +++ b/http/cves/2024/CVE-2024-6205.yaml @@ -11,8 +11,8 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2024-6205 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-6205 - https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/payplus-payment-gateway/payplus-payment-gateway-668-unauthenticated-sql-injection - - https://wpscan.com/vulnerability/7e2c5032-2917-418c-aee3-092bdb78a087/ - - https://github.com/20142995/nuclei-templates + - https://wpscan.com/vulnerability/7e2c5032-2917-418c-aee3-092bdb78a087 + - https://www.tenable.com/cve/CVE-2024-6205 classification: epss-score: 0.00043 epss-percentile: 0.09301