Auto Generated CVE annotations [Fri Oct 8 13:40:21 UTC 2021] 🤖
parent
1d75fef3b6
commit
87c57ed4ac
|
@ -3,12 +3,17 @@ id: CVE-2021-40960
|
|||
info:
|
||||
name: Galera WebTemplate 1.0 – Directory Traversal
|
||||
author: daffainfo
|
||||
severity: high
|
||||
severity: critical
|
||||
description: Galera WebTemplate 1.0 is affected by a directory traversal vulnerability that could reveal information from /etc/passwd and /etc/shadow.
|
||||
reference:
|
||||
- http://www.omrylmz.com/galera-webtemplate-1-0-directory-traversal-vulnerability-cve-2021-40960/
|
||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40960
|
||||
tags: cve,cve2021,lfi
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||
cvss-score: 9.80
|
||||
cve-id: CVE-2021-40960
|
||||
cwe-id: CWE-22
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -7,6 +7,11 @@ info:
|
|||
description: An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /action.php prId parameter. Using a post request does not sanitize the user input.
|
||||
reference: https://github.com/MobiusBinary/CVE-2021-41648
|
||||
tags: cve,cve2021,sqli
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||
cvss-score: 7.50
|
||||
cve-id: CVE-2021-41648
|
||||
cwe-id: CWE-89
|
||||
|
||||
requests:
|
||||
- method: POST
|
||||
|
|
|
@ -3,10 +3,15 @@ id: CVE-2021-41649
|
|||
info:
|
||||
name: PuneethReddyHC online-shopping-system-advanced SQL Injection homeaction.php
|
||||
author: daffainfo
|
||||
severity: high
|
||||
severity: critical
|
||||
description: An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /homeaction.php cat_id parameter. Using a post request does not sanitize the user input.
|
||||
reference: https://github.com/MobiusBinary/CVE-2021-41649
|
||||
tags: cve,cve2021,sqli
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||
cvss-score: 9.80
|
||||
cve-id: CVE-2021-41649
|
||||
cwe-id: CWE-89
|
||||
|
||||
requests:
|
||||
- method: POST
|
||||
|
|
|
@ -3,13 +3,18 @@ id: CVE-2021-41826
|
|||
info:
|
||||
name: PlaceOS 1.2109.1 - Open Redirection
|
||||
author: geeknik
|
||||
severity: low
|
||||
severity: medium
|
||||
description: PlaceOS Authentication Service before 1.29.10.0 allows app/controllers/auth/sessions_controller.rb open redirect
|
||||
reference:
|
||||
- https://github.com/PlaceOS/auth/issues/36
|
||||
- https://www.exploit-db.com/exploits/50359
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-41826
|
||||
tags: cve,cve2021,placeos,redirect
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 6.10
|
||||
cve-id: CVE-2021-41826
|
||||
cwe-id: CWE-601
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
Loading…
Reference in New Issue