cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2015-4216,https://securityvulnerability.io/vulnerability/CVE-2015-4216,,"The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH root authorized key across different customers' installations, which makes it easier for remote attackers to bypass authentication by leveraging knowledge of a private key from another installation, aka Bug IDs CSCuu95988, CSCuu95994, and CSCuu96630.",Cisco,"Email Security Virtual Appliance,Content Security Management Virtual Appliance,Web Security Virtual Appliance",,,0.00203000009059906,false,,false,false,false,,,false,false,,2015-06-26T10:00:00.000Z,0 CVE-2015-4217,https://securityvulnerability.io/vulnerability/CVE-2015-4217,,"The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH host keys across different customers' installations, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of a private key from another installation, aka Bug IDs CSCus29681, CSCuu95676, and CSCuu96601.",Cisco,"Email Security Virtual Appliance,Content Security Management Virtual Appliance,Web Security Virtual Appliance",,,0.003019999945536256,false,,false,false,false,,,false,false,,2015-06-26T10:00:00.000Z,0