cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2013-3093,https://securityvulnerability.io/vulnerability/CVE-2013-3093,,ASUS RT-N56U devices allow CSRF.,Asus,Rt-n56u Firmware,8.8,HIGH,0.0021299999207258224,false,false,false,false,,false,false,2020-01-28T20:13:17.000Z,0 CVE-2017-5632,https://securityvulnerability.io/vulnerability/CVE-2017-5632,,"An issue was discovered on the ASUS RT-N56U Wireless Router with Firmware 3.0.0.4.374_979. When executing an ""nmap -O"" command that specifies an IP address of an affected device, one can crash the device's WAN connection, causing disconnection from the Internet, a Denial of Service (DoS). The attack is only possible from within the local area network.",Asus,Rt-n56u Firmware,6.5,MEDIUM,0.0005499999970197678,false,false,false,false,,false,false,2017-01-30T04:24:00.000Z,0 CVE-2014-2719,https://securityvulnerability.io/vulnerability/CVE-2014-2719,,"Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code.",Asus,"Rt-ac66u Firmware,Rt-ac68u Firmware,Rt-n10e Firmware,Rt-n14u Firmware,Rt-n16 Firmware,Rt-n56u Firmware,Rt-n65u Firmware,Rt-n66u Firmware,Rt-ac68u",,,0.0016899999463930726,false,false,false,false,,false,false,2014-04-22T13:06:00.000Z,0 CVE-2011-4497,https://securityvulnerability.io/vulnerability/CVE-2011-4497,,QIS_wizard.htm on the ASUS RT-N56U router with firmware before 1.0.1.4o allows remote attackers to obtain the administrator password via a flag=detect request.,Asus,"Rt-n56u Firmware,Rt-n56u",,,0.0016499999910593033,false,false,false,false,,false,false,2011-11-21T11:55:00.000Z,0