From 40a6f4fbe9a952335c15972d17166025c0385dbf Mon Sep 17 00:00:00 2001 From: Jongwon Baek Date: Tue, 29 Nov 2022 14:40:02 +0900 Subject: [PATCH] Update CVE-2019-13101.yaml --- cves/2019/CVE-2019-13101.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-13101.yaml b/cves/2019/CVE-2019-13101.yaml index f0d71f1629..222f69c32f 100644 --- a/cves/2019/CVE-2019-13101.yaml +++ b/cves/2019/CVE-2019-13101.yaml @@ -1,7 +1,7 @@ id: CVE-2019-13101 info: - name: D-Link DIR-600M Authentication Bypass + name: D-Link DIR-600M - Authentication Bypass author: Suman_Kar severity: critical description: D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices can be accessed directly without authentication and lead to disclosure of information about the WAN, which can then be leveraged by an attacker to modify the data fields of the page.