Enhancement: cves/2022/CVE-2022-0968.yaml by md
parent
02fe878a38
commit
db2041816e
|
@ -1,16 +1,17 @@
|
|||
id: CVE-2022-0968
|
||||
|
||||
info:
|
||||
name: Microweber < 1.2.12 - Integer Overflow (DOS)
|
||||
name: Microweber <1.2.12 - Integer Overflow
|
||||
author: amit-jd
|
||||
severity: medium
|
||||
description: |
|
||||
The microweber application allows large characters to insert in the input field "first & last name" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The first name & last name input should be limited to 50 characters or max 100 characters.
|
||||
Microweber before 1.2.12 is susceptible to integer overflow. The application allows large characters to insert in the input field 'first & last name,' which can allow an attacker to cause a denial of service via a crafted HTTP request.
|
||||
remediation: First name and last name input should be limited to 50 characters or maximum 100 characters.
|
||||
reference:
|
||||
- https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e/
|
||||
- https://github.com/advisories/GHSA-5fxv-xx5p-g2fv
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2022-0968
|
||||
- https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2022-0968
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
||||
cvss-score: 5.5
|
||||
|
@ -75,3 +76,5 @@ requests:
|
|||
group: 1
|
||||
regex:
|
||||
- '<input type="email" class="form-control" name="email" value="(.*)">'
|
||||
|
||||
# Enhanced by md on 2023/04/06
|
||||
|
|
Loading…
Reference in New Issue