Auto Generated CVE annotations [Thu Aug 25 07:42:57 UTC 2022] 🤖

patch-1
GitHub Action 2022-08-25 07:42:57 +00:00
parent aa3ab811dd
commit ef9f76b66d
2 changed files with 10 additions and 2 deletions

View File

@ -11,6 +11,11 @@ info:
- https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2021-24910.txt
- https://wpscan.com/vulnerability/b5cbebf4-5749-41a0-8be3-3333853fca17
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24910
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2021-24910
cwe-id: CWE-79
metadata:
verified: "true"
tags: cve,cve2021,wordpress,wp-plugin,xss,wp

View File

@ -3,17 +3,20 @@ id: CVE-2021-42627
info:
name: D-Link DIR-615 - Unauthorized Access
author: For3stCo1d
severity: high
severity: critical
description: |
The WAN configuration page "wan.htm" on D-Link DIR-615 devices with firmware 20.06 can be accessed directly without authentication which can lead to disclose the information about WAN settings and also leverage attacker to modify the data fields of page.
reference:
- https://github.com/sanjokkarki/D-Link-DIR-615/blob/main/CVE-2021-42627
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42627
- https://www.dlink.com/en/security-bulletin/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-42627
metadata:
verified: true
shodan-query: http.title:"Roteador Wireless"
verified: "true"
tags: cve,cve2021,d-link,router,unauth,dir-615,roteador
requests: