Логотип exploitDog
bind:CVE-2024-10916
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-10916

Количество 3

Количество 3

nvd логотип

CVE-2024-10916

больше 1 года назад

A vulnerability classified as problematic has been found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. This affects an unknown part of the file /xml/info.xml of the component HTTP GET Request Handler. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-fj2w-q5f7-w82f

больше 1 года назад

A vulnerability classified as problematic has been found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. This affects an unknown part of the file /xml/info.xml of the component HTTP GET Request Handler. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2024-09496

больше 1 года назад

Уязвимость файла /xml/info.xml компонента HTTP GET Request Handler микропрограммного обеспечения маршрутизаторов D-Link DNS-320, DNS-320LW, DNS-325 и DNS-340L, позволяющая нарушителю раскрыть конфиденциальную информацию

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-10916

A vulnerability classified as problematic has been found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. This affects an unknown part of the file /xml/info.xml of the component HTTP GET Request Handler. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 5.3
2%
Низкий
больше 1 года назад
github логотип
GHSA-fj2w-q5f7-w82f

A vulnerability classified as problematic has been found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. This affects an unknown part of the file /xml/info.xml of the component HTTP GET Request Handler. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 5.3
2%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-09496

Уязвимость файла /xml/info.xml компонента HTTP GET Request Handler микропрограммного обеспечения маршрутизаторов D-Link DNS-320, DNS-320LW, DNS-325 и DNS-340L, позволяющая нарушителю раскрыть конфиденциальную информацию

CVSS3: 5.3
2%
Низкий
больше 1 года назад

Уязвимостей на страницу