From 74a17976a821235a14551df8da51dcf747b58303 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 10 Aug 2021 22:23:57 +0530 Subject: [PATCH] Update CVE-2021-20090.yaml --- cves/2021/CVE-2021-20090.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-20090.yaml b/cves/2021/CVE-2021-20090.yaml index 19a576ad5c..9a8b58fe37 100644 --- a/cves/2021/CVE-2021-20090.yaml +++ b/cves/2021/CVE-2021-20090.yaml @@ -6,7 +6,7 @@ info: severity: critical description: | A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication. - reference: + reference: | - https://nvd.nist.gov/vuln/detail/CVE-2021-20090 - https://www.tenable.com/security/research/tra-2021-13 - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2