From 3e372abb22b529d707fbf2233c079cef85a9ceb5 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Wed, 1 Feb 2023 13:26:43 -0500 Subject: [PATCH] Enhancement: cves/2021/CVE-2021-21816.yaml by md --- cves/2021/CVE-2021-21816.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-21816.yaml b/cves/2021/CVE-2021-21816.yaml index 9c44e64e9d..9c39f3546b 100644 --- a/cves/2021/CVE-2021-21816.yaml +++ b/cves/2021/CVE-2021-21816.yaml @@ -4,7 +4,7 @@ info: name: D-Link DIR-3040 1.13B03 - Information Disclosure author: gy741 severity: medium - description: D-Link DIR-3040 1.13B03 is susceptible to information disclosure vulnerability in the Syslog functionality. A specially crafted HTTP network request can lead to the disclosure of sensitive information. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations. + description: D-Link DIR-3040 1.13B03 is susceptible to information disclosure in the Syslog functionality. A specially crafted HTTP network request can lead to the disclosure of sensitive information. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations. reference: - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1281 - https://nvd.nist.gov/vuln/detail/CVE-2021-21816