cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2016-11021,https://securityvulnerability.io/vulnerability/CVE-2016-11021,,setSystemCommand on D-Link DCS-930L devices before 2.12 allows a remote attacker to execute code via an OS command in the SystemCommand parameter.,D-Link,Dcs-930l Firmware,7.2,HIGH,0.9509900212287903,true,false,false,true,,false,false,2020-03-09T00:55:19.000Z,0 CVE-2019-10999,https://securityvulnerability.io/vulnerability/CVE-2019-10999,,"The D-Link DCS series of Wi-Fi cameras contains a stack-based buffer overflow in alphapd, the camera's web server. The overflow allows a remotely authenticated attacker to execute arbitrary code by providing a long string in the WEPEncryption parameter when requesting wireless.htm. Vulnerable devices include DCS-5009L (1.08.11 and below), DCS-5010L (1.14.09 and below), DCS-5020L (1.15.12 and below), DCS-5025L (1.03.07 and below), DCS-5030L (1.04.10 and below), DCS-930L (2.16.01 and below), DCS-931L (1.14.11 and below), DCS-932L (2.17.01 and below), DCS-933L (1.14.11 and below), and DCS-934L (1.05.04 and below).",D-Link,Dcs-930l Firmware,8.8,HIGH,0.0007399999885819852,false,false,false,true,true,false,false,2019-05-06T19:30:57.000Z,0