cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2006-1003,https://securityvulnerability.io/vulnerability/CVE-2006-1003,,"The backup configuration option in NETGEAR WGT624 Wireless Firewall Router stores sensitive information in cleartext, which allows remote attackers to obtain passwords and gain privileges.",Netgear,Wgt624,,,0.011490000411868095,false,,false,false,false,,,false,false,,2006-03-06T20:00:00.000Z,0 CVE-2006-1002,https://securityvulnerability.io/vulnerability/CVE-2006-1002,,"NETGEAR WGT624 Wireless DSL router has a default account of super_username ""Gearguy"" and super_passwd ""Geardog"", which allows remote attackers to modify the configuration. NOTE: followup posts have suggested that this might not occur with all WGT624 routers.",Netgear,Wgt624,,,0.035829998552799225,false,,false,false,false,,,false,false,,2006-03-06T20:00:00.000Z,0