diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index 8aeb8c6e8caa..a435871a86b5 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,125 +1,125 @@
cacti team reports:
+
A command injection vulnerability allows an
unauthenticated user to execute arbitrary code on a server
running Cacti, if a specific data source was selected for
any monitored device.
-
-
C. Michael Pilato reports:
security fix: escape revision view copy paths (#311) [CVE-2023-22464]
security fix: escape revision view changed paths (#311) [CVE-2023-22456]
Marc Lehmann reports:
The biggest issue is resolving CVE-2022-4170, which allows command execution inside urxvt from within the terminal (that means anything that can output text in the terminal can start commands in the context of the urxvt process, even remotely).
The Gitea team reports:
Remove ReverseProxy authentication from the API
Support Go Vulnerability Management
Forbid HTML string tooltips