cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-15057,https://securityvulnerability.io/vulnerability/CVE-2020-15057,Denial of Service Vulnerability in TP-Link USB Network Server Products,"TP-Link USB Network Server TL-PS310U devices prior to version 2.079.000.t0210 are susceptible to a denial-of-service attack. An attacker connected to the same network can exploit this vulnerability by sending excessively long input values to the device, resulting in service disruption. Protect your network infrastructure by ensuring you are using the latest firmware updates to mitigate potential risks.",Tp-link,Tl-ps310u Firmware,6.5,MEDIUM,0.0007300000288523734,false,,false,false,false,,,false,false,,2020-08-07T21:20:01.000Z,0 CVE-2020-15056,https://securityvulnerability.io/vulnerability/CVE-2020-15056,XSS Vulnerability in TP-Link USB Network Server Products,"The TP-Link USB Network Server TL-PS310U devices prior to version 2.079.000.t0210 are susceptible to Cross-Site Scripting (XSS) vulnerabilities. Attackers connected to the same network can exploit this weakness by setting a maliciously crafted server name, which can lead to persistent XSS attacks. This vulnerability allows unauthorized users to execute arbitrary scripts in the context of the user's browser, potentially compromising sensitive information and user session. It is crucial for administrators to apply the necessary updates to mitigate such risks.",Tp-link,Tl-ps310u Firmware,4.3,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-08-07T21:18:41.000Z,0 CVE-2020-15055,https://securityvulnerability.io/vulnerability/CVE-2020-15055,Authentication Bypass in TP-Link USB Network Server TL-PS310U,"The TP-Link USB Network Server TL-PS310U has a design flaw that allows an attacker on the same network to exploit the web administration interface. By sending a request that omits a password parameter, unauthorized access can be achieved, making it critical for users to ensure the device is updated to version 2.079.000.t0210 or later to mitigate this risk.",Tp-link,Tl-ps310u Firmware,8.8,HIGH,0.0007200000109151006,false,,false,false,false,,,false,false,,2020-08-07T21:16:57.000Z,0 CVE-2020-15054,https://securityvulnerability.io/vulnerability/CVE-2020-15054,Privilege Escalation Vulnerability in TP-Link USB Network Server,"The TP-Link USB Network Server TL-PS310U devices prior to version 2.079.000.t0210 are susceptible to a privilege escalation vulnerability. An attacker on the same network can exploit this weakness by intercepting unencrypted UDP traffic, which allows them to uncover the administrative password. This flaw underscores the importance of secure communication protocols to protect sensitive authentication information.",Tp-link,Tl-ps310u Firmware,8.8,HIGH,0.0007200000109151006,false,,false,false,false,,,false,false,,2020-08-07T21:14:13.000Z,0