cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2008-1253,https://securityvulnerability.io/vulnerability/CVE-2008-1253,,"Cross-site scripting (XSS) vulnerability in cgi-bin/webcm on the D-Link DSL-G604T router allows remote attackers to inject arbitrary web script or HTML via the var:category parameter, as demonstrated by a request for advanced/portforw.htm on the fwan page.",D-link,Dsl-g604t,,,0.00965999998152256,false,false,false,false,,false,false,2008-03-10T17:00:00.000Z,0 CVE-2006-2337,https://securityvulnerability.io/vulnerability/CVE-2006-2337,,Directory traversal vulnerability in webcm in the D-Link DSL-G604T Wireless ADSL Router Modem allows remote attackers to read arbitrary files via an absolute path in the getpage parameter.,D-link,Dsl-g604t,,,0.0232900008559227,false,false,false,false,,false,false,2006-05-12T00:00:00.000Z,0 CVE-2005-1680,https://securityvulnerability.io/vulnerability/CVE-2005-1680,,"D-Link DSL-502T, DSL-504T, DSL-562T, and DSL-G604T, when /cgi-bin/firmwarecfg is executed, allows remote attackers to bypass authentication (1) if their IP address already exists in /var/tmp/fw_ip or (2) if their request is the first, which causes /var/tmp/fw_ip to be created and contain their IP address.",D-link,"Dsl-504t,Dsl-562t,Dsl-g604t,Dsl-502t",,,0.005309999920427799,false,false,false,false,,false,false,2005-05-20T04:00:00.000Z,0