From 618caa238789d54fc6cacafa3d83f17cabf09564 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Wed, 1 Feb 2023 12:19:03 -0500 Subject: [PATCH] Enhancement: cves/2021/CVE-2021-21816.yaml by md --- cves/2021/CVE-2021-21816.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-21816.yaml b/cves/2021/CVE-2021-21816.yaml index 2edea85ba4..9c44e64e9d 100644 --- a/cves/2021/CVE-2021-21816.yaml +++ b/cves/2021/CVE-2021-21816.yaml @@ -1,13 +1,13 @@ id: CVE-2021-21816 info: - name: D-Link DIR-3040 - Syslog Information Disclosure + name: D-Link DIR-3040 1.13B03 - Information Disclosure author: gy741 severity: medium - description: An information disclosure vulnerability exists in the Syslog functionality of D-Link DIR-3040 1.13B03. A specially crafted network request can lead to the disclosure of sensitive information. An attacker - can send an HTTP request to trigger this vulnerability. + description: D-Link DIR-3040 1.13B03 is susceptible to information disclosure vulnerability in the Syslog functionality. A specially crafted HTTP network request can lead to the disclosure of sensitive information. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations. reference: - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1281 + - https://nvd.nist.gov/vuln/detail/CVE-2021-21816 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N cvss-score: 4.3 @@ -33,3 +33,5 @@ requests: - type: status status: - 200 + +# Enhanced by md on 2023/02/01