Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
link vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2018-14080
An issue exists on D-Link DIR-809 A1 up to and including 1.09, A2 up to and including 1.11, and Guest Zone up to and including 1.09 devices. One can bypass authentication mechanisms to download the configuration file.
D-link Dir-809 A1 Firmware
D-link Dir-809 A2 Firmware
D-link Dir-809 Guestzone Firmware
5
CVSSv2
CVE-2018-14081
An issue exists on D-Link DIR-809 A1 up to and including 1.09, A2 up to and including 1.11, and Guest Zone up to and including 1.09 devices. Device passwords, such as the admin password and the WPA key, are stored in cleartext.
D-link Dir-809 A1 Firmware
D-link Dir-809 A2 Firmware
D-link Dir-809 Guestzone Firmware
7.8
CVSSv2
CVE-2020-9375
TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote malicious users to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.
Tp-link Archer C50 Build 170822
Tp-link Archer C50 Build 171227
Tp-link Archer C50 Build 200318
1 Github repository
10
CVSSv2
CVE-2013-2573
A Command Injection vulnerability exists in the ap parameter to the /cgi-bin/mft/wireless_mft.cgi file in TP-Link IP Cameras TL-SC 3130, TL-SC 3130G, 3171G. and 4171G 1.6.18P12s, which could let a malicious user execute arbitrary code.
Tp-link Tl-sc 3130g Firmware
Tp-link Tl-sc 3171g Firmware
Tp-link Tl-sc 4171g Firmware
1 EDB exploit
NA
CVE-2023-39745
TP-Link TL-WR940N V2, TP-Link TL-WR941ND V5 and TP-Link TL-WR841N V8 were discovered to contain a buffer overflow via the component /userRpm/AccessCtrlAccessRulesRpm. This vulnerability allows malicious users to cause a Denial of Service (DoS) via a crafted GET request.
Tp-link Tl-wr940n V2 Firmware -
Tp-link Tl-wr941nd V5 Firmware -
Tp-link Tl-wr841n V8 Firmware -
NA
CVE-2023-30383
TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 were discovered to contain a buffer overflow which may lead to a Denial of Service (DoS) when parsing crafted data.
Tp-link Archer C2 V1 Firmware 170228
Tp-link Archer C20 Firmware 150707
Tp-link Archer C50 Firmware 160801
5.8
CVSSv2
CVE-2020-15633
This vulnerability allows network-adjacent malicious users to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.20B10_BETA. Authentication is not required to exploit this vulnerability. The specific flaw exists within ...
D-link Dir-867 Firmware
D-link Dir-878 Firmware
D-link Dir-882 Firmware -
NA
CVE-2023-39747
TP-Link WR841N V8, TP-Link TL-WR940N V2, and TL-WR941ND V5 were discovered to contain a buffer overflow via the radiusSecret parameter at /userRpm/WlanSecurityRpm.
Tp-link Tl-wr940n V2 Firmware -
Tp-link Tl-wr941nd V5 Firmware -
Tp-link Tl-wr841n V8 Firmware -
NA
CVE-2022-4199
The Link Library WordPress plugin prior to 7.4.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite...
Link Library Project Link Library
4.3
CVSSv2
CVE-2021-25091
The Link Library WordPress plugin prior to 7.2.9 does not sanitise and escape the settingscopy parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting
Link Library Project Link Library
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »