From 1348d134a2d70cf9c22353ab93d1662f71f6e7bb Mon Sep 17 00:00:00 2001 From: LSerki Date: Wed, 26 Jun 2024 04:56:56 +0000 Subject: [PATCH] Format markdown docs --- .../20240626003-WordPress-Plugin-Vulnerabilities.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/advisories/20240626003-WordPress-Plugin-Vulnerabilities.md b/docs/advisories/20240626003-WordPress-Plugin-Vulnerabilities.md index 856cf5f2..1d91b180 100644 --- a/docs/advisories/20240626003-WordPress-Plugin-Vulnerabilities.md +++ b/docs/advisories/20240626003-WordPress-Plugin-Vulnerabilities.md @@ -6,12 +6,12 @@ Several plugins for WordPress hosted on WordPress.org have been compromised and ## What is vulnerable? -| Products Affected. | CVE | CVSS | Severity | -| ------------------- | ----------------------------------------------------------------- | ---- | ------------ | -| **[List of Affected Products](https://www.cve.org/CVERecord?id=CVE-2024-6297)** | [CVE-2024-6297](https://www.cve.org/CVERecord?id=CVE-2024-6297) | 10 | **Critical** | +| Products Affected. | CVE | CVSS | Severity | +| ------------------------------------------------------------------------------- | --------------------------------------------------------------- | ---- | ------------ | +| **[List of Affected Products](https://www.cve.org/CVERecord?id=CVE-2024-6297)** | [CVE-2024-6297](https://www.cve.org/CVERecord?id=CVE-2024-6297) | 10 | **Critical** | ## Recommendation The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe (refer [Patch Management](../guidelines/patch-management.md)): -- https://www.wordfence.com/threat-intel/vulnerabilities/detail/several-wordpressorg-plugins-various-versions-injected-backdoor \ No newline at end of file +- https://www.wordfence.com/threat-intel/vulnerabilities/detail/several-wordpressorg-plugins-various-versions-injected-backdoor