cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2015-7247,https://securityvulnerability.io/vulnerability/CVE-2015-7247,,"D-Link DVG-N5402SP with firmware W1000CN-00, W1000CN-03, or W2000EN-00 discloses usernames, passwords, keys, values, and web account hashes (super and admin) in plaintext when running a configuration backup, which allows remote attackers to obtain sensitive information.",D-link,Dvg-n5402sp Firmware,9.8,CRITICAL,0.014120000414550304,false,false,false,false,,false,false,2017-04-24T18:00:00.000Z,0 CVE-2015-7246,https://securityvulnerability.io/vulnerability/CVE-2015-7246,,"D-Link DVG-N5402SP with firmware W1000CN-00, W1000CN-03, or W2000EN-00 has a default password of root for the root account and tw for the tw account, which makes it easier for remote attackers to obtain administrative access.",D-link,Dvg-n5402sp Firmware,9.8,CRITICAL,0.006440000142902136,false,false,false,false,,false,false,2017-04-24T18:00:00.000Z,0 CVE-2015-7245,https://securityvulnerability.io/vulnerability/CVE-2015-7245,,"Directory traversal vulnerability in D-Link DVG-N5402SP with firmware W1000CN-00, W1000CN-03, or W2000EN-00 allows remote attackers to read sensitive information via a .. (dot dot) in the errorpage parameter.",D-link,Dvg-n5402sp Firmware,7.5,HIGH,0.8843399882316589,false,false,false,false,,false,false,2017-04-24T18:00:00.000Z,0