5 results (0.012 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in the Ping tools web interface in Dlink Di-604 router allows remote attackers to inject arbitrary web script or HTML via the IP field. vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en las herramientas Ping del interfase web en el router Dlink Di-604, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro IP. • http://www.securityfocus.com/archive/1/511751/100/0/threaded http://www.securityfocus.com/bid/40691 https://exchange.xforce.ibmcloud.com/vulnerabilities/59364 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

The Ping tools web interface in Dlink Di-604 router allows remote authenticated users to cause a denial of service via a large "ip textfield" size. La interfaz web de las herramientas Ping en el enrutador Dlink Di-604 permite a usuarios remotos autenticados causar una denegación de servicio a través de un campo "ip textfield" demasiado grande. • http://www.securityfocus.com/archive/1/511751/100/0/threaded http://www.securityfocus.com/bid/40691 https://exchange.xforce.ibmcloud.com/vulnerabilities/59366 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Cross-site scripting (XSS) vulnerability in prim.htm on the D-Link DI-604 router allows remote attackers to inject arbitrary web script or HTML via the rf parameter. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en prim.htm del router D-Link DI-604 permite a atacantes remotos inyectar web script o HTML de su elección a través del parámetro rf. • http://secunia.com/advisories/29531 http://www.gnucitizen.org/projects/router-hacking-challenge http://www.securityfocus.com/archive/1/489009/100/0/threaded http://www.securityfocus.com/bid/28439 https://exchange.xforce.ibmcloud.com/vulnerabilities/41122 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 36%CPEs: 7EXPL: 1

Stack-based buffer overflow in the Universal Plug and Play (UPnP) service in D-Link DI-524, DI-604 Broadband Router, DI-624, D-Link DI-784, WBR-1310 Wireless G Router, WBR-2310 RangeBooster G Router, and EBR-2310 Ethernet Broadband Router allows remote attackers to execute arbitrary code via a long M-SEARCH request to UDP port 1900. Desbordamiento de búfer basado en pila en el servicio Universal Plug and Play (UPnP) de D-Link DI-524, DI-604 Broadband Router, DI-624, D-Link DI-784, WBR-1310 Wireless G Router, WBR-2310 RangeBooster G Router, and EBR-2310 Ethernet Broadband Router permite a atacantes remotos ejecutar código de su elección mediante una petición M-SEARCH larga al puerto UDP 1900. • https://www.exploit-db.com/exploits/28230 http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0363.html http://secunia.com/advisories/21081 http://securitytracker.com/id?1016511 http://www.eeye.com/html/research/advisories/AD20060714.html http://www.kb.cert.org/vuls/id/971705 http://www.osvdb.org/27333 http://www.securityfocus.com/archive/1/440298/100/0/threaded http://www.securityfocus.com/archive/1/440852/100/100/threaded http://www.securityfocus.com/bid/19 •

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 0

Integer signedness error in D-Link AirPlus DI-614+ running firmware 2.30 and earlier allows remote attackers to cause a denial of service (IP lease depletion) via a DHCP request with the LEASETIME option set to -1, which makes the DHCP lease valid for thirteen or more years. • http://marc.info/?l=bugtraq&m=108844250013785&w=2 http://secunia.com/advisories/12018 http://www.osvdb.org/7294 http://www.securityfocus.com/archive/1/367485 http://www.securityfocus.com/bid/10621 https://exchange.xforce.ibmcloud.com/vulnerabilities/16531 •