cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-10231,https://securityvulnerability.io/vulnerability/CVE-2020-10231,Remote NULL Pointer Dereference Vulnerability in TP-Link Cloud Cameras,"Various TP-Link Cloud Camera models, including NC200, NC210, NC220, NC230, NC250, NC260, and NC450, are susceptible to a remote NULL Pointer Dereference vulnerability. This issue arises from improper handling of input, allowing attackers to manipulate the device. If exploited, an attacker may gain control over affected devices, potentially leading to unauthorized access or control. Users of these TP-Link cameras should apply available security patches and follow best practices for device security to mitigate the risks associated with this vulnerability.",Tp-link,Nc450 Firmware,7.5,HIGH,0.0034000000450760126,false,,false,false,false,,,false,false,,2020-04-01T13:57:21.000Z,0 CVE-2020-11445,https://securityvulnerability.io/vulnerability/CVE-2020-11445,Authentication Bypass in TP-Link Cloud Cameras,"TP-Link cloud cameras were found to have a vulnerability that allows remote attackers to bypass authentication mechanisms. This exploit can occur when a device is connected to a Wi-Fi session with GPS functionality enabled. Through this means, unauthorized users could potentially gain access to sensitive information stored on the camera, posing significant security risks for users relying on these devices for surveillance and monitoring. It is imperative for users to update their devices and adhere to security best practices to mitigate such vulnerabilities.",Tp-link,Nc450 Firmware,5.3,MEDIUM,0.001129999989643693,false,,false,false,false,,,false,false,,2020-04-01T03:57:55.000Z,0