MostInterestingBotInTheWorld
9ff9285916
Dashboard Content Enhancements ( #4338 )
...
Dashboard Content Enhancements
2022-05-09 12:12:52 -04:00
forgedhallpass
209538baa6
refactor: Description field uniformization
...
* info field reorder
* reference values refactored to list
* added new lines after the id and before the protocols
* removed extra new lines
* split really long descriptions to multiple lines (part 1)
* other minor fixes
2022-04-22 13:38:41 +03:00
MostInterestingBotInTheWorld
3e13f1cce6
Dashboard Template Enhancements ( #3752 )
...
* Enhancement: cves/2021/CVE-2021-1497.yaml by cs
* Enhancement: cves/2010/CVE-2010-1957.yaml by mp
* Enhancement: cves/2010/CVE-2010-1977.yaml by mp
* Enhancement: cves/2010/CVE-2010-1979.yaml by mp
* Enhancement: cves/2010/CVE-2010-1980.yaml by mp
* Enhancement: cves/2010/CVE-2010-1981.yaml by mp
* Enhancement: cves/2010/CVE-2010-1982.yaml by mp
* Enhancement: cves/2010/CVE-2010-1983.yaml by mp
* Enhancement: cves/2010/CVE-2010-2033.yaml by mp
* Enhancement: cves/2010/CVE-2010-2034.yaml by mp
* Enhancement: cves/2010/CVE-2010-2035.yaml by mp
* Enhancement: cves/2010/CVE-2010-2036.yaml by mp
* Enhancement: cves/2010/CVE-2010-2037.yaml by mp
* Enhancement: cves/2010/CVE-2010-2045.yaml by mp
* Enhancement: cves/2010/CVE-2010-2050.yaml by mp
* Enhancement: cves/2010/CVE-2010-2122.yaml by mp
* Enhancement: cves/2010/CVE-2010-1980.yaml by mp
* Enhancement: cves/2010/CVE-2010-1981.yaml by mp
* Enhancement: cves/2010/CVE-2010-1982.yaml by mp
* Enhancement: cves/2010/CVE-2010-2035.yaml by mp
* Enhancement: cves/2010/CVE-2010-2128.yaml by mp
* Enhancement: cves/2010/CVE-2010-2259.yaml by mp
* Enhancement: cves/2010/CVE-2010-2307.yaml by mp
* Enhancement: cves/2010/CVE-2010-2507.yaml by mp
* Enhancement: cves/2010/CVE-2010-2680.yaml by mp
* Enhancement: cves/2010/CVE-2010-2682.yaml by mp
* Enhancement: cves/2010/CVE-2010-2857.yaml by mp
* Enhancement: cves/2010/CVE-2010-2861.yaml by mp
* Enhancement: cves/2010/CVE-2010-2918.yaml by mp
* Enhancement: cves/2010/CVE-2010-2920.yaml by mp
* Enhancement: cves/2010/CVE-2010-3203.yaml by mp
* Enhancement: cves/2010/CVE-2010-3426.yaml by mp
* Enhancement: cves/2010/CVE-2010-4617.yaml by mp
* Enhancement: cves/2010/CVE-2010-4231.yaml by mp
* Enhancement: cves/2010/CVE-2010-4282.yaml by mp
* Enhancement: cves/2010/CVE-2010-4282.yaml by mp
* Enhancement: cves/2010/CVE-2010-4617.yaml by mp
* Enhancement: cves/2010/CVE-2010-4719.yaml by mp
* Enhancement: cves/2010/CVE-2010-4769.yaml by mp
* Enhancement: cves/2010/CVE-2010-4977.yaml by mp
* Enhancement: cves/2010/CVE-2010-5028.yaml by mp
* Enhancement: cves/2010/CVE-2010-5278.yaml by mp
* Enhancement: cves/2010/CVE-2010-5286.yaml by mp
* Enhancement: cves/2011/CVE-2011-0049.yaml by mp
* Enhancement: cves/2011/CVE-2011-1669.yaml by mp
* Enhancement: cves/2011/CVE-2011-2744.yaml by mp
* Enhancement: cves/2000/CVE-2000-0114.yaml by mp
* Enhancement: cves/2011/CVE-2011-3315.yaml by mp
* Enhancement: cves/2011/CVE-2011-4336.yaml by mp
* Enhancement: cves/2011/CVE-2011-4618.yaml by mp
* Enhancement: cves/2011/CVE-2011-4624.yaml by mp
* Enhancement: cves/2011/CVE-2011-4804.yaml by mp
* Enhancement: cves/2011/CVE-2011-0049.yaml by mp
* Enhancement: cves/2011/CVE-2011-2780.yaml by mp
* Enhancement: cves/2011/CVE-2011-2780.yaml by mp
* Enhancement: cves/2012/CVE-2012-1823.yaml by mp
* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
* Enhancement: cves/2012/CVE-2012-1226.yaml by mp
* Enhancement: cves/2012/CVE-2012-0996.yaml by mp
* Enhancement: cves/2021/CVE-2021-39226.yaml by cs
* Enhancement: cves/2021/CVE-2021-27358.yaml by cs
* Enhancement: cves/2021/CVE-2021-43798.yaml by cs
* Enhancement: cves/2021/CVE-2021-43798.yaml by cs
* Enhancement: cves/2021/CVE-2021-43798.yaml by cs
* Enhancement: cves/2012/CVE-2012-1835.yaml by mp
* Enhancement: cves/2012/CVE-2012-0901.yaml by mp
* Enhancement: cves/2011/CVE-2011-5265.yaml by mp
* Enhancement: cves/2011/CVE-2011-5181.yaml by mp
* Enhancement: cves/2011/CVE-2011-5179.yaml by mp
* Enhancement: cves/2011/CVE-2011-5107.yaml by mp
* Enhancement: cves/2011/CVE-2011-5106.yaml by mp
* Enhancement: cves/2011/CVE-2011-4926.yaml by mp
* Enhancement: cves/2012/CVE-2012-0991.yaml by mp
* Enhancement: cves/2012/CVE-2012-0981.yaml by mp
* Enhancement: cves/2012/CVE-2012-0896.yaml by mp
* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
Fix "too few spaces before comment" lint errors
* Enhancement: cves/2011/CVE-2011-5106.yaml by mp
* Enhancement: cves/2011/CVE-2011-4926.yaml by mp
* Enhancement: cves/2013/CVE-2013-2287.yaml by mp
* Enhancement: cves/2012/CVE-2012-5913.yaml by mp
* Enhancement: cves/2012/CVE-2012-4889.yaml by mp
* Enhancement: cves/2012/CVE-2012-4768.yaml by mp
* Enhancement: cves/2012/CVE-2012-4547.yaml by mp
* Enhancement: cves/2012/CVE-2012-4273.yaml by mp
* Enhancement: cves/2012/CVE-2012-4242.yaml by mp
* Enhancement: cves/2012/CVE-2012-2371.yaml by mp
* Enhancement: cves/2013/CVE-2013-2248.yaml by mp
* Enhancement: cves/2012/CVE-2012-4940.yaml by mp
* Enhancement: cves/2012/CVE-2012-4878.yaml by mp
* Enhancement: cves/2012/CVE-2012-4253.yaml by mp
* Enhancement: cves/2012/CVE-2012-4253.yaml by mp
Trailing space
* Enhancement: cves/2013/CVE-2013-2251.yaml by mp
* Enhancement: cves/2013/CVE-2013-1965.yaml by mp
* Enhancement: cves/2012/CVE-2012-3153.yaml by mp
* Enhancement: cves/2012/CVE-2012-5913.yaml by mp
* Enhancement: cves/2012/CVE-2012-4242.yaml by mp
* Merge conflict
* Fix references syntax
* Fix syntax. Again.
* Update CVE-2011-4926.yaml
* Enhancement: cves/2021/CVE-2021-28073.yaml by cs
* Enhancement: cves/2021/CVE-2021-39226.yaml by cs
* Enhancement: cves/2021/CVE-2021-20167.yaml by cs
* Enhancement: cves/2021/CVE-2021-40438.yaml by cs
* Enhancement: cves/2021/CVE-2021-40438.yaml by cs
Co-authored-by: sullo <sullo@cirt.net>
2022-02-23 13:30:19 +05:30
Prince Chaddha
9afd4bcfd8
Update CVE-2021-20167.yaml
2022-01-11 13:57:07 +05:30
GwanYeong Kim
d772fd884b
Create CVE-2021-20167.yaml
...
This vulnerability uses a combination of CVE-2021-20166 and CVE-2021-20167. Netgear RAX43 version 1.0.3.96 contains a command injection and authbypass vulnerability. The readycloud cgi application is vulnerable to command injection in the name parameter. and The URL parsing functionality in the cgi-bin endpoint of the router containers a buffer overrun issue that can redirection control flow of the applicaiton.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-11 15:00:56 +09:00