cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2015-6019,https://securityvulnerability.io/vulnerability/CVE-2015-6019,,"The management portal on ZyXEL PMG5318-B20A devices with firmware 1.00AANC0b5 does not terminate sessions upon a logout action, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation.",Zyxel,Pmg5318-b20a Firmware,8.5,HIGH,0.0008699999889358878,false,,false,false,false,,,false,false,,2015-12-31T02:00:00.000Z,0 CVE-2015-6020,https://securityvulnerability.io/vulnerability/CVE-2015-6020,,ZyXEL PMG5318-B20A devices with firmware 1.00AANC0b5 allow remote authenticated users to obtain administrative privileges by leveraging access to the user account.,Zyxel,Pmg5318-b20a Firmware,8,HIGH,0.001979999942705035,false,,false,false,false,,,false,false,,2015-12-31T02:00:00.000Z,0 CVE-2015-6018,https://securityvulnerability.io/vulnerability/CVE-2015-6018,,The diagnostic-ping implementation on ZyXEL PMG5318-B20A devices with firmware before 1.00(AANC.2)C0 allows remote attackers to execute arbitrary commands via the PingIPAddr parameter.,Zyxel,Pmg5318-b20a Firmware,9.8,CRITICAL,0.021490000188350677,false,,false,false,false,,,false,false,,2015-12-31T02:00:00.000Z,0