cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2008-1259,https://securityvulnerability.io/vulnerability/CVE-2008-1259,,"The Zyxel P-2602HW-D1A router with 3.40(AJZ.1) firmware maintains authentication state by IP address, which allows remote attackers to bypass authentication by establishing a session from a source IP address of a user who previously authenticated within the previous 5 minutes.",Zyxel,P-2602hw-d1a,,,0.008070000447332859,false,,false,false,false,,,false,false,,2008-03-10T17:00:00.000Z,0 CVE-2008-1260,https://securityvulnerability.io/vulnerability/CVE-2008-1260,,Multiple cross-site request forgery (CSRF) vulnerabilities on the Zyxel P-2602HW-D1A router with 3.40(AJZ.1) firmware allow remote attackers to (1) make the admin web server available on the Internet (WAN) interface via the WWWAccessInterface parameter to Forms/RemMagWWW_1 or (2) change the IP whitelisting timeout via the StdioTimout parameter to Forms/rpSysAdmin_1.,Zyxel,P-2602hw-d1a,,,0.0020000000949949026,false,,false,false,false,,,false,false,,2008-03-10T17:00:00.000Z,0 CVE-2008-1261,https://securityvulnerability.io/vulnerability/CVE-2008-1261,,"The Zyxel P-2602HW-D1A router with 3.40(AJZ.1) firmware provides different responses to admin page requests depending on whether a user is logged in, which allows remote attackers to obtain current login status by requesting an arbitrary admin URI.",Zyxel,P-2602hw-d1a,,,0.005539999809116125,false,,false,false,false,,,false,false,,2008-03-10T17:00:00.000Z,0