From b750a84cb6d443c513ad7c0e7888688cef4d0a72 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Tue, 17 May 2022 15:13:05 -0400 Subject: [PATCH] Enhancement: cves/2021/CVE-2021-27132.yaml by mp --- cves/2021/CVE-2021-27132.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-27132.yaml b/cves/2021/CVE-2021-27132.yaml index fa6027d1ba..742b1c5782 100644 --- a/cves/2021/CVE-2021-27132.yaml +++ b/cves/2021/CVE-2021-27132.yaml @@ -1,7 +1,7 @@ id: CVE-2021-27132 info: - name: Sercomm VD625 - CRLF Injection + name: Sercomm VD625 Smart Modems - CRLF Injection author: geeknik severity: critical description: Sercomm AGCOMBO VD625 Smart Modems with firmware version AGSOT_2.1.0 are vulnerable to Carriage Return Line Feed (CRLF) injection via the Content-Disposition header. @@ -37,4 +37,5 @@ requests: part: header condition: and + # Enhanced by mp on 2022/05/17