CVSS Base Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Detection Type: Remote Banner
Solution Type: Vendor Patch
Summary: The D-Link DNS-320 NAS-device is prone to a remote command injection vulnerability.
Technical Details: The flaw exists in the login module of the device when using a hidden feature
called SSL Login, for which its required parameter, port, can be poisoned.
Detection Method: Checks if a vulnerable version is present on the target host.
Affected Versions: D-Link DNS-320 versions through 2.05.B10.
Recommendations: Update to version 2.06B01 or later.
Web application abuses
Mageni can help you to find out if you have this or more vulnerabilities exposing you to hackers, ransomware and malware: Download Mageni's Free Edition
Debian Security Advisory DSA 4545-1 (mediawiki - security update)
Debian LTS Advisory ([SECURITY] [DLA 1966-1] aspell security update)
Debian LTS Advisory ([SECURITY] [DLA 1965-1] nfs-utils security update)
Apache HTTP Server Memory Access Vulnerability (Windows)
Apache HTTP Server Memory Access Vulnerability (Linux)
Apache HTTP Server Multiple Vulnerabilities (Windows)
Apache HTTP Server Multiple Vulnerabilities (Linux)
Apache HTTP Server Stack Overflow Vulnerability (Windows)
Apache HTTP Server Stack Overflow Vulnerability (Linux)
Mageni provides a free vulnerability scanning and management platform which helps you need to find, prioritize, remediate and manage your vulnerabilities.