cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2019-13402,https://securityvulnerability.io/vulnerability/CVE-2019-13402,,/usr/sbin/default.sh and /usr/apache/htdocs/cgi-bin/admin/hardfactorydefault.cgi on Dynacolor FCM-MB40 v1.2.0.0 devices implement an incomplete factory-reset process. A backdoor can persist because neither system accounts nor the set of services is reset.,Fortinet,Fcm-mb40 Firmware,8.8,HIGH,0.0017900000093504786,false,false,false,false,,false,false,2019-07-08T00:02:20.000Z,0 CVE-2019-13401,https://securityvulnerability.io/vulnerability/CVE-2019-13401,,Dynacolor FCM-MB40 v1.2.0.0 devices have CSRF in all scripts under cgi-bin/.,Fortinet,Fcm-mb40 Firmware,8.8,HIGH,0.004430000204592943,false,false,false,false,,false,false,2019-07-08T00:02:12.000Z,0 CVE-2019-13400,https://securityvulnerability.io/vulnerability/CVE-2019-13400,,Dynacolor FCM-MB40 v1.2.0.0 use /etc/appWeb/appweb.pass to store administrative web-interface credentials in cleartext. These credentials can be retrieved via cgi-bin/getuserinfo.cgi?mode=info.,Fortinet,Fcm-mb40 Firmware,9.8,CRITICAL,0.01331000030040741,false,false,false,false,,false,false,2019-07-08T00:02:05.000Z,0 CVE-2019-13399,https://securityvulnerability.io/vulnerability/CVE-2019-13399,,Dynacolor FCM-MB40 v1.2.0.0 devices have a hard-coded SSL/TLS key that is used during an administrator's SSL conversation.,Fortinet,Fcm-mb40 Firmware,5.9,MEDIUM,0.006169999949634075,false,false,false,false,,false,false,2019-07-08T00:01:53.000Z,0 CVE-2019-13398,https://securityvulnerability.io/vulnerability/CVE-2019-13398,,"Dynacolor FCM-MB40 v1.2.0.0 devices allow remote attackers to execute arbitrary commands via a crafted parameter to a CGI script, as demonstrated by sed injection in cgi-bin/camctrl_save_profile.cgi (save parameter) and cgi-bin/ddns.cgi.",Fortinet,Fcm-mb40 Firmware,7.2,HIGH,0.0036899999249726534,false,false,false,false,,false,false,2019-07-08T00:01:43.000Z,0