Page 14 of 846 results (0.007 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWanL2TP function. D-Link DIR-619L B1 2.02 es vulnerable al desbordamiento del búfer a través de la función formSetWanL2TP. • https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md https://www.dlink.com/en/security-bulletin • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via websGetVar function. D-Link DIR-619L B1 2.02 es vulnerable al desbordamiento del búfer a través de la función websGetVar. • https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md https://www.dlink.com/en/security-bulletin • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWAN_Wizard56 function. D-Link DIR-619L B1 2.02 es vulnerable al desbordamiento del búfer a través de la función formSetWAN_Wizard56. • https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md https://www.dlink.com/en/security-bulletin • CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

A vulnerability has been found in D-Link DAR-8000 up to 20151231 and classified as critical. This vulnerability affects unknown code of the file /sysmanage/changelogo.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/llixixi/cve/blob/main/D-LINK-DAR-8000-10_upload_%20changelogo.md https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10354 https://vuldb.com/?ctiid.240250 https://vuldb.com/?id.240250 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 1

A vulnerability, which was classified as critical, was found in D-Link DAR-8000 up to 20151231. This affects an unknown part of the file /Tool/querysql.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/llixixi/cve/blob/main/D-LINK-DAR-8000-10_sql_%20querysql.md https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10354 https://vuldb.com/?ctiid.240249 https://vuldb.com/?id.240249 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •