cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2018-14714,https://securityvulnerability.io/vulnerability/CVE-2018-14714,,"System command injection in appGet.cgi on ASUS RT-AC3200 version 3.0.0.4.382.50010 allows attackers to execute system commands via the ""load_script"" URL parameter.",Asus,Rt-ac3200 Firmware,9.8,CRITICAL,0.49803000688552856,false,false,false,true,true,false,false,2019-05-13T12:24:24.000Z,0 CVE-2018-14713,https://securityvulnerability.io/vulnerability/CVE-2018-14713,,"Format string vulnerability in appGet.cgi on ASUS RT-AC3200 version 3.0.0.4.382.50010 allows attackers to read arbitrary sections of memory and CPU registers via the ""hook"" URL parameter.",Asus,Rt-ac3200 Firmware,8.1,HIGH,0.001230000052601099,false,false,false,false,,false,false,2019-05-13T12:22:09.000Z,0 CVE-2018-14712,https://securityvulnerability.io/vulnerability/CVE-2018-14712,,"Buffer overflow in appGet.cgi on ASUS RT-AC3200 version 3.0.0.4.382.50010 allows attackers to inject system commands via the ""hook"" URL parameter.",Asus,Rt-ac3200 Firmware,6.5,MEDIUM,0.000750000006519258,false,false,false,false,,false,false,2019-05-13T12:21:11.000Z,0 CVE-2018-14711,https://securityvulnerability.io/vulnerability/CVE-2018-14711,,Missing cross-site request forgery protection in appGet.cgi on ASUS RT-AC3200 version 3.0.0.4.382.50010 allows attackers to cause state-changing actions with specially crafted URLs.,Asus,Rt-ac3200 Firmware,6.5,MEDIUM,0.001449999981559813,false,false,false,false,,false,false,2019-05-13T12:20:19.000Z,0 CVE-2018-14710,https://securityvulnerability.io/vulnerability/CVE-2018-14710,,"Cross-site scripting in appGet.cgi on ASUS RT-AC3200 version 3.0.0.4.382.50010 allows attackers to execute JavaScript via the ""hook"" URL parameter.",Asus,Rt-ac3200 Firmware,6.1,MEDIUM,0.0015699999639764428,false,false,false,false,,false,false,2019-05-13T12:19:24.000Z,0