Auto Generated CVE annotations [Mon Dec 20 14:33:22 UTC 2021] 🤖

patch-1
GitHub Action 2021-12-20 14:33:22 +00:00
parent b12d40f626
commit 7fe5c23627
4 changed files with 21 additions and 1 deletions

View File

@ -3,12 +3,17 @@ id: CVE-2021-40856
info:
name: Auerswald COMfortel 1400/2600/3600 IP - Authentication Bypass
author: gy741
severity: medium
severity: high
description: Inserting the prefix "/about/../" allows bypassing the authentication check for the web-based configuration management interface. This enables attackers to gain access to the login credentials used for authentication at the PBX, among other data.
reference:
- https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-004/-auerswald-comfortel-1400-2600-3600-ip-authentication-bypass
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40856
tags: cve,cve2021,comfortel,auth-bypass
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.50
cve-id: CVE-2021-40856
cwe-id: CWE-287
requests:
- raw:

View File

@ -10,6 +10,11 @@ info:
- https://www.lunasec.io/docs/blog/log4j-zero-day/
- https://gist.github.com/bugbountynights/dde69038573db1c12705edb39f9a704a
tags: cve,cve2021,rce,oast,log4j
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.00
cve-id: CVE-2021-44228
cwe-id: CWE-502
requests:
- raw:

View File

@ -10,6 +10,11 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2021-44848
- https://www.tenable.com/cve/CVE-2021-44848
tags: cve,cve2021,exposure,thinfinity
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.30
cve-id: CVE-2021-44848
cwe-id: CWE-287
requests:
- raw:

View File

@ -13,6 +13,11 @@ info:
metadata:
google-dork: intitle:"HD-Network Real-time Monitoring System V2.0"
tags: cve,cve2021,hdnetwork,lfi,iot,camera
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.50
cve-id: CVE-2021-45043
cwe-id: CWE-22
requests:
- raw: