cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-38270,https://securityvulnerability.io/vulnerability/CVE-2024-38270,Insufficient Entropy Vulnerability in Zyxel GS1900-10HP Firmware Could Allow LAN-Based Attackers to Gain Valid Session Token,An insufficient entropy vulnerability caused by the improper use of a randomness function with low entropy for web authentication tokens generation exists in the Zyxel GS1900-10HP firmware version V2.80(AAZI.0)C0. This vulnerability could allow a LAN-based attacker a slight chance to gain a valid session token if multiple authenticated sessions are alive.,Zyxel,Gs1900-10HP Firmware,6.5,MEDIUM,0.0005200000014156103,false,,false,false,false,,,false,false,,2024-09-10T02:15:00.000Z,0 CVE-2015-6260,https://securityvulnerability.io/vulnerability/CVE-2015-6260,,"Cisco NX-OS 7.1(1)N1(1) on Nexus 5500, 5600, and 6000 devices does not properly validate PDUs in SNMP packets, which allows remote attackers to cause a denial of service (SNMP application restart) via a crafted packet, aka Bug ID CSCut84645.",Zyxel,Gs1900-10HP Firmware,7.5,HIGH,0.00203999993391335,false,,false,false,false,,,false,false,,2016-03-03T22:00:00.000Z,0 CVE-2016-1317,https://securityvulnerability.io/vulnerability/CVE-2016-1317,,"Cisco Unified Communications Manager 11.5(0.98000.480) allows remote authenticated users to obtain sensitive database table-name and entity-name information via a direct request to an unspecified URL, aka Bug ID CSCuy11098.",Zyxel,Gs1900-10HP Firmware,4.3,MEDIUM,0.0008099999977275729,false,,false,false,false,,,false,false,,2016-02-09T02:00:00.000Z,0 CVE-2015-6398,https://securityvulnerability.io/vulnerability/CVE-2015-6398,,"Cisco Nexus 9000 Application Centric Infrastructure (ACI) Mode switches with software before 11.0(1c) allow remote attackers to cause a denial of service (device reload) via an IPv4 ICMP packet with the IP Record Route option, aka Bug ID CSCuq57512.",Zyxel,Gs1900-10HP Firmware,7.5,HIGH,0.00203999993391335,false,,false,false,false,,,false,false,,2016-02-07T11:00:00.000Z,0 CVE-2016-1307,https://securityvulnerability.io/vulnerability/CVE-2016-1307,,"The Openfire server in Cisco Finesse Desktop 10.5(1) and 11.0(1) and Unified Contact Center Express 10.6(1) has a hardcoded account, which makes it easier for remote attackers to obtain access via an XMPP session, aka Bug ID CSCuw79085.",Zyxel,"Gs1900-10HP Firmware,Keymouse Firmware",5.4,MEDIUM,0.001180000021122396,false,,false,false,false,,,false,false,,2016-02-07T11:00:00.000Z,0 CVE-2015-5987,https://securityvulnerability.io/vulnerability/CVE-2015-5987,,"Belkin F9K1102 2 devices with firmware 2.10.17 use an improper algorithm for selecting the ID value in the header of a DNS query, which makes it easier for remote attackers to spoof responses by predicting this value.",Zyxel,Gs1900-10HP Firmware,8.6,HIGH,0.0010499999625608325,false,,false,false,false,,,false,false,,2015-12-31T16:00:00.000Z,0 CVE-2015-5988,https://securityvulnerability.io/vulnerability/CVE-2015-5988,,"The web management interface on Belkin F9K1102 2 devices with firmware 2.10.17 has a blank password, which allows remote attackers to obtain administrative privileges by leveraging a LAN session.",Zyxel,Gs1900-10HP Firmware,9.8,CRITICAL,0.005179999861866236,false,,false,false,false,,,false,false,,2015-12-31T16:00:00.000Z,0 CVE-2015-5990,https://securityvulnerability.io/vulnerability/CVE-2015-5990,,Cross-site request forgery (CSRF) vulnerability on Belkin F9K1102 2 devices with firmware 2.10.17 allows remote attackers to hijack the authentication of arbitrary users.,Zyxel,Gs1900-10HP Firmware,8.8,HIGH,0.001879999996162951,false,,false,false,false,,,false,false,,2015-12-31T16:00:00.000Z,0 CVE-2015-5989,https://securityvulnerability.io/vulnerability/CVE-2015-5989,,"Belkin F9K1102 2 devices with firmware 2.10.17 rely on client-side JavaScript code for authorization, which allows remote attackers to obtain administrative privileges via certain changes to LockStatus and Login_Success values.",Zyxel,Gs1900-10HP Firmware,9.8,CRITICAL,0.005979999899864197,false,,false,false,false,,,false,false,,2015-12-31T16:00:00.000Z,0