diff --git a/cves/2021/CVE-2021-40960.yaml b/cves/2021/CVE-2021-40960.yaml index 126dd45651..cca0c1c98f 100644 --- a/cves/2021/CVE-2021-40960.yaml +++ b/cves/2021/CVE-2021-40960.yaml @@ -3,12 +3,17 @@ id: CVE-2021-40960 info: name: Galera WebTemplate 1.0 – Directory Traversal author: daffainfo - severity: high + severity: critical description: Galera WebTemplate 1.0 is affected by a directory traversal vulnerability that could reveal information from /etc/passwd and /etc/shadow. reference: - http://www.omrylmz.com/galera-webtemplate-1-0-directory-traversal-vulnerability-cve-2021-40960/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40960 tags: cve,cve2021,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-40960 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2021/CVE-2021-41648.yaml b/cves/2021/CVE-2021-41648.yaml index 3c2322f4f0..cd7789ebef 100644 --- a/cves/2021/CVE-2021-41648.yaml +++ b/cves/2021/CVE-2021-41648.yaml @@ -7,6 +7,11 @@ info: description: An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /action.php prId parameter. Using a post request does not sanitize the user input. reference: https://github.com/MobiusBinary/CVE-2021-41648 tags: cve,cve2021,sqli + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-41648 + cwe-id: CWE-89 requests: - method: POST diff --git a/cves/2021/CVE-2021-41649.yaml b/cves/2021/CVE-2021-41649.yaml index 084555f45d..f9b72ad760 100644 --- a/cves/2021/CVE-2021-41649.yaml +++ b/cves/2021/CVE-2021-41649.yaml @@ -3,10 +3,15 @@ id: CVE-2021-41649 info: name: PuneethReddyHC online-shopping-system-advanced SQL Injection homeaction.php author: daffainfo - severity: high + severity: critical description: An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /homeaction.php cat_id parameter. Using a post request does not sanitize the user input. reference: https://github.com/MobiusBinary/CVE-2021-41649 tags: cve,cve2021,sqli + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-41649 + cwe-id: CWE-89 requests: - method: POST diff --git a/cves/2021/CVE-2021-41826.yaml b/cves/2021/CVE-2021-41826.yaml index 98cd0f66a4..63673f92a5 100644 --- a/cves/2021/CVE-2021-41826.yaml +++ b/cves/2021/CVE-2021-41826.yaml @@ -3,13 +3,18 @@ id: CVE-2021-41826 info: name: PlaceOS 1.2109.1 - Open Redirection author: geeknik - severity: low + severity: medium description: PlaceOS Authentication Service before 1.29.10.0 allows app/controllers/auth/sessions_controller.rb open redirect reference: - https://github.com/PlaceOS/auth/issues/36 - https://www.exploit-db.com/exploits/50359 - https://nvd.nist.gov/vuln/detail/CVE-2021-41826 tags: cve,cve2021,placeos,redirect + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-41826 + cwe-id: CWE-601 requests: - method: GET