Auto Generated CVE annotations [Thu Aug 25 07:42:57 UTC 2022] 🤖
parent
aa3ab811dd
commit
ef9f76b66d
|
@ -11,6 +11,11 @@ info:
|
|||
- https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2021-24910.txt
|
||||
- https://wpscan.com/vulnerability/b5cbebf4-5749-41a0-8be3-3333853fca17
|
||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24910
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 6.1
|
||||
cve-id: CVE-2021-24910
|
||||
cwe-id: CWE-79
|
||||
metadata:
|
||||
verified: "true"
|
||||
tags: cve,cve2021,wordpress,wp-plugin,xss,wp
|
||||
|
|
|
@ -3,17 +3,20 @@ id: CVE-2021-42627
|
|||
info:
|
||||
name: D-Link DIR-615 - Unauthorized Access
|
||||
author: For3stCo1d
|
||||
severity: high
|
||||
severity: critical
|
||||
description: |
|
||||
The WAN configuration page "wan.htm" on D-Link DIR-615 devices with firmware 20.06 can be accessed directly without authentication which can lead to disclose the information about WAN settings and also leverage attacker to modify the data fields of page.
|
||||
reference:
|
||||
- https://github.com/sanjokkarki/D-Link-DIR-615/blob/main/CVE-2021-42627
|
||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42627
|
||||
- https://www.dlink.com/en/security-bulletin/
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||
cvss-score: 9.8
|
||||
cve-id: CVE-2021-42627
|
||||
metadata:
|
||||
verified: true
|
||||
shodan-query: http.title:"Roteador Wireless"
|
||||
verified: "true"
|
||||
tags: cve,cve2021,d-link,router,unauth,dir-615,roteador
|
||||
|
||||
requests:
|
||||
|
|
Loading…
Reference in New Issue