diff --git a/cves/2021/CVE-2021-40856.yaml b/cves/2021/CVE-2021-40856.yaml index ab8b50aadd..287fd5caff 100644 --- a/cves/2021/CVE-2021-40856.yaml +++ b/cves/2021/CVE-2021-40856.yaml @@ -3,12 +3,17 @@ id: CVE-2021-40856 info: name: Auerswald COMfortel 1400/2600/3600 IP - Authentication Bypass author: gy741 - severity: medium + severity: high description: Inserting the prefix "/about/../" allows bypassing the authentication check for the web-based configuration management interface. This enables attackers to gain access to the login credentials used for authentication at the PBX, among other data. reference: - https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-004/-auerswald-comfortel-1400-2600-3600-ip-authentication-bypass - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40856 tags: cve,cve2021,comfortel,auth-bypass + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-40856 + cwe-id: CWE-287 requests: - raw: diff --git a/cves/2021/CVE-2021-44228.yaml b/cves/2021/CVE-2021-44228.yaml index 4e415678d2..90a591ae92 100644 --- a/cves/2021/CVE-2021-44228.yaml +++ b/cves/2021/CVE-2021-44228.yaml @@ -10,6 +10,11 @@ info: - https://www.lunasec.io/docs/blog/log4j-zero-day/ - https://gist.github.com/bugbountynights/dde69038573db1c12705edb39f9a704a tags: cve,cve2021,rce,oast,log4j + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.00 + cve-id: CVE-2021-44228 + cwe-id: CWE-502 requests: - raw: diff --git a/cves/2021/CVE-2021-44848.yaml b/cves/2021/CVE-2021-44848.yaml index 18619d1986..178f13497e 100644 --- a/cves/2021/CVE-2021-44848.yaml +++ b/cves/2021/CVE-2021-44848.yaml @@ -10,6 +10,11 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-44848 - https://www.tenable.com/cve/CVE-2021-44848 tags: cve,cve2021,exposure,thinfinity + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2021-44848 + cwe-id: CWE-287 requests: - raw: diff --git a/cves/2021/CVE-2021-45043.yaml b/cves/2021/CVE-2021-45043.yaml index ab47cb6ae2..272833d0f6 100644 --- a/cves/2021/CVE-2021-45043.yaml +++ b/cves/2021/CVE-2021-45043.yaml @@ -13,6 +13,11 @@ info: metadata: google-dork: intitle:"HD-Network Real-time Monitoring System V2.0" tags: cve,cve2021,hdnetwork,lfi,iot,camera + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-45043 + cwe-id: CWE-22 requests: - raw: