From c60489097db12a84ebd8b30f88165552f85966ed Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 27 Sep 2021 18:01:53 +0530 Subject: [PATCH] Update CVE-2008-6222.yml --- cves/2008/CVE-2008-6222.yml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/cves/2008/CVE-2008-6222.yml b/cves/2008/CVE-2008-6222.yml index 5e11c820df..6cb7474f10 100644 --- a/cves/2008/CVE-2008-6222.yml +++ b/cves/2008/CVE-2008-6222.yml @@ -5,10 +5,10 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Pro Desk Support Center (com_pro_desk) component 1.0 and 1.2 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the include_file parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/6980 - https://www.cvedetails.com/cve/CVE-2008-6222 - tags: cve,cve2010,joomla,lfi + tags: cve,cve2008,joomla,lfi requests: - method: GET @@ -24,4 +24,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200