cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2014-7859,https://securityvulnerability.io/vulnerability/CVE-2014-7859,,"Stack-based buffer overflow in login_mgr.cgi in D-Link firmware DNR-320L and DNS-320LW before 1.04b08, DNR-322L before 2.10 build 03, DNR-326 before 2.10 build 03, and DNS-327L before 1.04b01 allows remote attackers to execute arbitrary code by crafting malformed ""Host"" and ""Referer"" header values.",D-link,Dns-322l Firmware,9.8,CRITICAL,0.16357000172138214,false,false,false,false,,false,false,2017-08-25T18:00:00.000Z,0 CVE-2014-7857,https://securityvulnerability.io/vulnerability/CVE-2014-7857,,"D-Link DNS-320L firmware before 1.04b12, DNS-327L before 1.03b04 Build0119, DNR-326 1.40b03, DNS-320B 1.02b01, DNS-345 1.03b06, DNS-325 1.05b03, and DNS-322L 2.00b07 allow remote attackers to bypass authentication and log in with administrator permissions by passing the cgi_set_wto command in the cmd parameter, and setting the spawned session's cookie to username=admin.",D-link,Dns-322l Firmware,9.8,CRITICAL,0.008310000412166119,false,false,false,false,,false,false,2017-08-25T18:00:00.000Z,0