From 64fc998aaab1d4b494a392b052a6856eb0a4e986 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Tue, 16 Mar 2021 17:28:27 +0200 Subject: [PATCH] Fixed references --- cves/2020/CVE-2020-9376.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/cves/2020/CVE-2020-9376.yaml b/cves/2020/CVE-2020-9376.yaml index 36bad92b91..66b1211b6b 100644 --- a/cves/2020/CVE-2020-9376.yaml +++ b/cves/2020/CVE-2020-9376.yaml @@ -8,8 +8,10 @@ info: D-Link DIR-610 devices allow Information Disclosure via SERVICES=DEVICE.ACCOUNT%0AAUTHORIZED_GROUP=1 to getcfg.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. - References: - - https://nvd.nist.gov/vuln/detail/CVE-2020-9376 + reference: + - https://gist.github.com/GouveaHeitor/dcbb67b301cc45adc00f8a6a2a0a590f + - https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10182 + - https://www.dlink.com.br/produto/dir-610/ tags: cve,cve2020,dlink requests: - method: POST