From dc22f77a5027f44a4cbc0a83e650b5297cf63ebb Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 17 Oct 2021 02:21:14 +0000 Subject: [PATCH] Auto Generated CVE annotations [Sun Oct 17 02:21:14 UTC 2021] :robot: --- cves/2021/CVE-2021-40978.yaml | 5 +++++ cves/2021/CVE-2021-42013.yaml | 5 +++++ 2 files changed, 10 insertions(+) diff --git a/cves/2021/CVE-2021-40978.yaml b/cves/2021/CVE-2021-40978.yaml index 2273074039..81ec5d959e 100644 --- a/cves/2021/CVE-2021-40978.yaml +++ b/cves/2021/CVE-2021-40978.yaml @@ -9,6 +9,11 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-40978 tags: cve,cve2021,mkdocs,lfi description: "** DISPUTED ** The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information. NOTE: the vendor has disputed this as described in https://github.com/mkdocs/mkdocs/issues/2601.] and https://github.com/nisdn/CVE-2021-40978/issues/1." + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-40978 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2021/CVE-2021-42013.yaml b/cves/2021/CVE-2021-42013.yaml index 9537c2fa6b..e789a8f86e 100644 --- a/cves/2021/CVE-2021-42013.yaml +++ b/cves/2021/CVE-2021-42013.yaml @@ -10,6 +10,11 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-42013 - https://twitter.com/itsecurityco/status/1446136957117943815 tags: cve,cve2021,lfi,apache,rce,misconfig + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-42013 + cwe-id: CWE-22 requests: - raw: