cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2005-4220,https://securityvulnerability.io/vulnerability/CVE-2005-4220,,"Netgear RP114, and possibly other versions and devices, allows remote attackers to cause a denial of service via a SYN flood attack between one system on the internal interface and another on the external interface, which temporarily stops routing between the interfaces, as demonstrated using nmap.",Netgear,Rp114,,,0.014440000057220459,false,,false,false,false,,,false,false,,2005-12-14T11:00:00.000Z,0 CVE-2004-2032,https://securityvulnerability.io/vulnerability/CVE-2004-2032,,"Netgear RP114 allows remote attackers to bypass the keyword based URL filtering by requesting a long URL, as demonstrated using a large number of %20 (hex-encoded space) sequences.",Netgear,Rp114,,,0.017909999936819077,false,,false,false,false,,,false,false,,2004-05-24T04:00:00.000Z,0 CVE-2002-2020,https://securityvulnerability.io/vulnerability/CVE-2002-2020,,"Netgear RP114 Cable/DSL Web Safe Router Firmware 3.26 uses a default administrator password and accepts admin logins on the external interface, which allows remote attackers to gain privileges if the password is not changed.",Netgear,Rp114,,,0.010599999688565731,false,,false,false,false,,,false,false,,2002-12-31T05:00:00.000Z,0 CVE-2002-0127,https://securityvulnerability.io/vulnerability/CVE-2002-0127,,"Netgear RP114 Cable/DSL Web Safe Router Firmware 3.26, when configured to block traffic below port 1024, allows remote attackers to cause a denial of service (hang) via a port scan of the WAN port.",Netgear,Rp114,,,0.0025100000202655792,false,,false,false,false,,,false,false,,2002-03-25T05:00:00.000Z,0