Show filters
169 Total Results
Displaying 101-110 of 169
Sort by:
Attacker Value
Unknown

CVE-2020-35575

Disclosure Date: December 26, 2020 (last updated November 08, 2023)
A password-disclosure issue in the web interface on certain TP-Link devices allows a remote attacker to get full administrative access to the web panel. This affects WA901ND devices before 3.16.9(201211) beta, and Archer C5, Archer C7, MR3420, MR6400, WA701ND, WA801ND, WDR3500, WDR3600, WE843N, WR1043ND, WR1045ND, WR740N, WR741ND, WR749N, WR802N, WR840N, WR841HP, WR841N, WR842N, WR842ND, WR845N, WR940N, WR941HP, WR945N, WR949N, and WRD4300 devices.
Attacker Value
Unknown

CVE-2020-5797

Disclosure Date: November 21, 2020 (last updated February 22, 2025)
UNIX Symbolic Link (Symlink) Following in TP-Link Archer C9(US)_V1_180125 firmware allows an unauthenticated actor, with physical access and network access, to read sensitive files and write to a limited set of files after plugging a crafted USB drive into the router.
Attacker Value
Unknown

CVE-2020-26884

Disclosure Date: November 18, 2020 (last updated February 22, 2025)
RSA Archer 6.8 through 6.8.0.3 and 6.9 contains a URL injection vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability by tricking a victim application user into executing malicious JavaScript code in the context of the web application.
Attacker Value
Unknown

CVE-2020-5795

Disclosure Date: November 06, 2020 (last updated February 22, 2025)
UNIX Symbolic Link (Symlink) Following in TP-Link Archer A7(US)_V5_200721 allows an authenticated admin user, with physical access and network access, to execute arbitrary code after plugging a crafted USB drive into the router.
Attacker Value
Unknown

CVE-2020-9375

Disclosure Date: March 25, 2020 (last updated February 21, 2025)
TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.
Attacker Value
Unknown

CVE-2020-5331

Disclosure Date: February 28, 2020 (last updated February 21, 2025)
RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain an information exposure vulnerability. Users’ session information could potentially be stored in cache or log files. An authenticated malicious local user with access to the log files may obtain the exposed information to use it in further attacks.
Attacker Value
Unknown

CVE-2020-5334

Disclosure Date: February 28, 2020 (last updated February 21, 2025)
RSA Archer, versions prior to 6.7 P2 (6.7.0.2), contains a Document Object Model (DOM) based cross-site scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by tricking a victim application user to supply malicious HTML or JavaScript code to DOM environment in the browser. The malicious code is then executed by the web browser in the context of the vulnerable web application.
Attacker Value
Unknown

CVE-2020-5337

Disclosure Date: February 28, 2020 (last updated February 21, 2025)
RSA Archer, versions prior to 6.7 P1 (6.7.0.1), contain a URL redirection vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to redirect application users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links. The vulnerability could be used to conduct phishing attacks that cause users to unknowingly visit malicious sites.
Attacker Value
Unknown

CVE-2020-5336

Disclosure Date: February 28, 2020 (last updated February 21, 2025)
RSA Archer, versions prior to 6.7 P1 (6.7.0.1), contain a URL injection vulnerability. An unauthenticated attacker could potentially exploit this vulnerability by tricking a victim application user to execute malicious JavaScript code on the affected system.
Attacker Value
Unknown

CVE-2020-5332

Disclosure Date: February 28, 2020 (last updated February 21, 2025)
RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain a command injection vulnerability. AN authenticated malicious user with administrator privileges could potentially exploit this vulnerability to execute arbitrary commands on the system where the vulnerable application is deployed.