Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
link vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2023-30383
TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 were discovered to contain a buffer overflow which may lead to a Denial of Service (DoS) when parsing crafted data.
Tp-link Archer C2 V1 Firmware 170228
Tp-link Archer C20 Firmware 150707
Tp-link Archer C50 Firmware 160801
7.7
CVSSv3
CVE-2023-36357
An issue in the /userRpm/LocalManageControlRpm component of TP-Link TL-WR940N V2/V4/V6, TL-WR841N V8/V10, and TL-WR941ND V5 allows malicious users to cause a Denial of Service (DoS) via a crafted GET request.
Tp-link Tl-wr940n Firmware -
Tp-link Tl-wr841n Firmware -
Tp-link Tl-wr941nd Firmware -
7.5
CVSSv3
CVE-2023-36359
TP-Link TL-WR940N V4, TL-WR841N V8/V10, TL-WR940N V2/V3 and TL-WR941ND V5/V6 were discovered to contain a buffer overflow in the component /userRpm/QoSRuleListRpm. This vulnerability allows malicious users to cause a Denial of Service (DoS) via a crafted GET request.
Tp-link Tl-wr940n Firmware -
Tp-link Tl-wr841n Firmware -
Tp-link Tl-wr941nd Firmware -
8.8
CVSSv3
CVE-2023-36489
Multiple TP-LINK products allow a network-adjacent unauthenticated malicious user to execute arbitrary OS commands. Affected products/versions are as follows: TL-WR802N firmware versions prior to 'TL-WR802N(JP)_V4_221008', TL-WR841N firmware versions prior to 'TL-W...
Tp-link Tl-wr902ac Firmware
Tp-link Tl-wr802n Firmware
Tp-link Tl-wr841n Firmware
9.8
CVSSv3
CVE-2013-2573
A Command Injection vulnerability exists in the ap parameter to the /cgi-bin/mft/wireless_mft.cgi file in TP-Link IP Cameras TL-SC 3130, TL-SC 3130G, 3171G. and 4171G 1.6.18P12s, which could let a malicious user execute arbitrary code.
Tp-link Tl-sc 3130g Firmware
Tp-link Tl-sc 3171g Firmware
Tp-link Tl-sc 4171g Firmware
1 EDB exploit
8.1
CVSSv3
CVE-2023-33536
TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 exists to contain a buffer overflow via the component /userRpm/WlanMacFilterRpm.
Tp-link Tl-wr940n Firmware -
Tp-link Tl-wr841n Firmware -
Tp-link Tl-wr740n Firmware -
8.1
CVSSv3
CVE-2023-33537
TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 exists to contain a buffer overflow via the component /userRpm/FixMapCfgRpm.
Tp-link Tl-wr940n Firmware -
Tp-link Tl-wr841n Firmware -
Tp-link Tl-wr740n Firmware -
8.8
CVSSv3
CVE-2023-33538
TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 exists to contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm .
Tp-link Tl-wr940n Firmware -
Tp-link Tl-wr841n Firmware -
Tp-link Tl-wr740n Firmware -
6.1
CVSSv3
CVE-2021-25091
The Link Library WordPress plugin prior to 7.2.9 does not sanitise and escape the settingscopy parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting
Link Library Project Link Library
6.5
CVSSv3
CVE-2021-25092
The Link Library WordPress plugin prior to 7.2.8 does not have CSRF check when resetting library settings, allowing malicious users to make a logged in admin reset arbitrary settings via a CSRF attack
Link Library Project Link Library
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-36954
CVE-2024-36933
CVE-2024-24919
CVE-2024-36923
CVE-2024-2961
CVE-2024-36925
bypass
encryption
command injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »