cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2016-11021,https://securityvulnerability.io/vulnerability/CVE-2016-11021,Remote Code Execution Vulnerability in D-Link DCS-930L IP Cameras,"The vulnerability found in D-Link DCS-930L IP cameras allows a remote attacker to potentially execute arbitrary commands on the system. By manipulating the 'SystemCommand' parameter, the attacker can gain unauthorized access to device functionalities, posing significant risks to the network and connected devices. This vulnerability is present in versions of the DCS-930L prior to 2.12, necessitating prompt updates to mitigate exploitation risks.",D-Link,Dcs-930l Firmware,7.2,HIGH,0.951449990272522,true,2022-03-25T00:00:00.000Z,false,false,true,2022-03-25T00:00:00.000Z,true,false,false,,2020-03-09T00:55:19.000Z,0 CVE-2019-10999,https://securityvulnerability.io/vulnerability/CVE-2019-10999,Stack-based Buffer Overflow in D-Link DCS Series Wi-Fi Cameras,"The D-Link DCS series of Wi-Fi cameras are vulnerable to a stack-based buffer overflow in their internal web server, alphapd. This vulnerability allows a remotely authenticated attacker to execute arbitrary code by sending a maliciously crafted long string through the WEPEncryption parameter when accessing the wireless.htm page. Affected models include several DCS series cameras such as DCS-5009L, DCS-5010L, and more, with specific firmware versions listed. This issue poses significant security risks, as it could enable attackers to gain unauthorized access and control over the devices.",D-Link,Dcs-930l Firmware,8.8,HIGH,0.0007399999885819852,false,,false,false,true,2019-01-23T14:53:19.000Z,true,false,false,,2019-05-06T19:30:57.000Z,0