cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2019-13101,https://securityvulnerability.io/vulnerability/CVE-2019-13101,,"An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page.",D-Link,Dir-600m Firmware,9.8,CRITICAL,0.0638199970126152,false,false,false,true,true,false,false,2019-08-08T12:29:17.000Z,0 CVE-2019-7736,https://securityvulnerability.io/vulnerability/CVE-2019-7736,,D-Link DIR-600M C1 3.04 devices allow authentication bypass via a direct request to the wan.htm page. NOTE: this may overlap CVE-2019-13101.,D-Link,Dir-600m Firmware,9.8,CRITICAL,0.00431999983265996,false,false,false,false,,false,false,2019-02-11T17:00:00.000Z,0 CVE-2018-16605,https://securityvulnerability.io/vulnerability/CVE-2018-16605,,D-Link DIR-600M devices allow XSS via the Hostname and Username fields in the Dynamic DNS Configuration page.,D-Link,Dir-600m Firmware,5.4,MEDIUM,0.000859999970998615,false,false,false,false,,false,false,2018-09-12T16:00:00.000Z,0 CVE-2018-6936,https://securityvulnerability.io/vulnerability/CVE-2018-6936,,Cross Site Scripting (XSS) exists on the D-Link DIR-600M C1 3.01 via the SSID or the name of a user account.,D-link,Dir-600m C1 Firmware,5.4,MEDIUM,0.0010999999940395355,false,false,false,false,,false,false,2018-02-21T22:00:00.000Z,0 CVE-2017-10676,https://securityvulnerability.io/vulnerability/CVE-2017-10676,,"On D-Link DIR-600M devices before C1_v3.05ENB01_beta_20170306, XSS was found in the form2userconfig.cgi username parameter.",D-link,Dir-600m Firmware,6.1,MEDIUM,0.0024399999529123306,false,false,false,false,,false,false,2017-07-20T01:00:00.000Z,0 CVE-2017-9100,https://securityvulnerability.io/vulnerability/CVE-2017-9100,,login.cgi on D-Link DIR-600M devices with firmware 3.04 allows remote attackers to bypass authentication by entering more than 20 blank spaces in the password field during an admin login attempt.,D-Link,Dir-600m Firmware,8.8,HIGH,0.2778399884700775,false,false,false,false,,false,false,2017-05-21T03:41:00.000Z,0 CVE-2017-5874,https://securityvulnerability.io/vulnerability/CVE-2017-5874,,CSRF exists on D-Link DIR-600M Rev. Cx devices before v3.05ENB01_beta_20170306. This can be used to bypass authentication and insert XSS sequences or possibly have unspecified other impact.,D-link,Dir-600m Firmware,8.8,HIGH,0.0007099999929778278,false,false,false,false,,false,false,2017-03-22T05:31:00.000Z,0