cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2018-16201,https://securityvulnerability.io/vulnerability/CVE-2018-16201,,"Toshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier uses hard-coded credentials, which may allow an attacker on the same network segment to login to the administrators settings screen and change the configuration or execute arbitrary OS commands.",Toshiba,Toshiba Home Gateway Hem-gw16a And Toshiba Home Gateway Hem-gw26a,8.8,HIGH,0.0007699999841861427,false,,false,false,false,,,false,false,,2019-01-09T22:00:00.000Z,0 CVE-2018-16197,https://securityvulnerability.io/vulnerability/CVE-2018-16197,,"Toshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier allows an attacker on the same network segment to bypass access restriction to access the information and files stored on the affected device.",Toshiba,Toshiba Home Gateway Hem-gw16a And Toshiba Home Gateway Hem-gw26a,6.5,MEDIUM,0.0008399999933317304,false,,false,false,false,,,false,false,,2019-01-09T22:00:00.000Z,0 CVE-2018-16198,https://securityvulnerability.io/vulnerability/CVE-2018-16198,,"Toshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier may allow an attacker on the same network segment to access a non-documented developer screen to perform operations on the affected device.",Toshiba,Toshiba Home Gateway Hem-gw16a And Toshiba Home Gateway Hem-gw26a,8.8,HIGH,0.0007699999841861427,false,,false,false,false,,,false,false,,2019-01-09T22:00:00.000Z,0 CVE-2018-16199,https://securityvulnerability.io/vulnerability/CVE-2018-16199,,"Cross-site scripting vulnerability in Toshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier allows an remote attacker to inject arbitrary web script or HTML via unspecified vectors.",Toshiba,Toshiba Home Gateway Hem-gw16a And Toshiba Home Gateway Hem-gw26a,6.1,MEDIUM,0.0009299999801442027,false,,false,false,false,,,false,false,,2019-01-09T22:00:00.000Z,0 CVE-2018-16200,https://securityvulnerability.io/vulnerability/CVE-2018-16200,,"Toshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier allows an attacker on the same network segment to execute arbitrary OS commands.",Toshiba,Toshiba Home Gateway Hem-gw16a And Toshiba Home Gateway Hem-gw26a,8.8,HIGH,0.0007800000021234155,false,,false,false,false,,,false,false,,2019-01-09T22:00:00.000Z,0 CVE-2017-2235,https://securityvulnerability.io/vulnerability/CVE-2017-2235,,Toshiba Home gateway HEM-GW16A firmware HEM-GW16A-FW-V1.2.0 and earlier. Toshiba Home gateway HEM-GW26A firmware HEM-GW26A-FW-V1.2.0 and earlier allows an attacker to bypass access restriction to change the administrator account password via unspecified vectors.,Toshiba,"Toshiba Home Gateway Hem-gw16a,Toshiba Home Gateway Hem-gw26a",9.8,CRITICAL,0.0021100000012665987,false,,false,false,false,,,false,false,,2017-07-07T13:00:00.000Z,0 CVE-2017-2237,https://securityvulnerability.io/vulnerability/CVE-2017-2237,,Toshiba Home gateway HEM-GW16A firmware HEM-GW16A-FW-V1.2.0 and earlier. Toshiba Home gateway HEM-GW26A firmware HEM-GW26A-FW-V1.2.0 and earlier allows an attacker to execute arbitrary OS commands via unspecified vectors.,Toshiba,"Toshiba Home Gateway Hem-gw16a,Toshiba Home Gateway Hem-gw26a",9.8,CRITICAL,0.0021100000012665987,false,,false,false,false,,,false,false,,2017-07-07T13:00:00.000Z,0 CVE-2017-2238,https://securityvulnerability.io/vulnerability/CVE-2017-2238,,Cross-site request forgery (CSRF) vulnerability in Toshiba Home gateway HEM-GW16A firmware HEM-GW16A-FW-V1.2.0 and earlier and Toshiba Home gateway HEM-GW26A firmware HEM-GW26A-FW-V1.2.0 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.,Toshiba,"Toshiba Home Gateway Hem-gw16a,Toshiba Home Gateway Hem-gw26a",8.8,HIGH,0.0013599999947473407,false,,false,false,false,,,false,false,,2017-07-07T13:00:00.000Z,0 CVE-2017-2234,https://securityvulnerability.io/vulnerability/CVE-2017-2234,,"Toshiba Home gateway HEM-GW16A firmware HEM-GW16A-FW-V1.2.0 and earlier, Toshiba Home gateway HEM-GW26A firmware HEM-GW26A-FW-V1.2.0 and earlier may allow remote attackers to access a non-documented developer screen to perform operations on device with administrative privileges.",Toshiba,"Toshiba Home Gateway Hem-gw16a,Toshiba Home Gateway Hem-gw26a",9.8,CRITICAL,0.0063599999994039536,false,,false,false,false,,,false,false,,2017-07-07T13:00:00.000Z,0 CVE-2017-2236,https://securityvulnerability.io/vulnerability/CVE-2017-2236,,"Toshiba Home gateway HEM-GW16A firmware HEM-GW16A-FW-V1.2.0 and earlier, Toshiba Home gateway HEM-GW26A firmware HEM-GW26A-FW-V1.2.0 and earlier uses hard-coded credentials, which may allow attackers to perform operations on device with administrative privileges.",Toshiba,"Toshiba Home Gateway Hem-gw16a,Toshiba Home Gateway Hem-gw26a",9.8,CRITICAL,0.0017600000137463212,false,,false,false,false,,,false,false,,2017-07-07T13:00:00.000Z,0