cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2010-4302,https://securityvulnerability.io/vulnerability/CVE-2010-4302,,"/opt/rv/Versions/CurrentVersion/Mcu/Config/Mcu.val in Cisco Unified Videoconferencing (UVC) System 5110 and 5115, when the Linux operating system is used, uses a weak hashing algorithm for the (1) administrator and (2) operator passwords, which makes it easier for local users to obtain sensitive information by recovering the cleartext values, aka Bug ID CSCti54010.",Cisco,"Unified Videoconferencing System 5110 Firmware,Unified Videoconferencing System 5115 Firmware,Unified Videoconferencing System 5110,Unified Videoconferencing System 5115",,,0.0004199999966658652,false,,false,false,false,,,false,false,,2010-11-22T20:00:00.000Z,0 CVE-2010-4303,https://securityvulnerability.io/vulnerability/CVE-2010-4303,,"Cisco Unified Videoconferencing (UVC) System 5110 and 5115, when the Linux operating system is used, uses world-readable permissions for the /etc/shadow file, which allows local users to discover encrypted passwords by reading this file, aka Bug ID CSCti54043.",Cisco,"Unified Videoconferencing System 5110 Firmware,Unified Videoconferencing System 5115 Firmware,Unified Videoconferencing System 5110,Unified Videoconferencing System 5115",,,0.0004199999966658652,false,,false,false,false,,,false,false,,2010-11-22T20:00:00.000Z,0 CVE-2010-4304,https://securityvulnerability.io/vulnerability/CVE-2010-4304,,"The web interface in Cisco Unified Videoconferencing (UVC) System 3545, 5110, 5115, and 5230; Unified Videoconferencing 3527 Primary Rate Interface (PRI) Gateway; Unified Videoconferencing 3522 Basic Rate Interfaces (BRI) Gateway; and Unified Videoconferencing 3515 Multipoint Control Unit (MCU) uses predictable session IDs based on time values, which makes it easier for remote attackers to hijack sessions via a brute-force attack, aka Bug ID CSCti54048.",Cisco,"Unified Videoconferencing System 5110 Firmware,Unified Videoconferencing System 5115 Firmware,Unified Videoconferencing System 5110,Unified Videoconferencing System 5115",,,0.0020800000056624413,false,,false,false,false,,,false,false,,2010-11-22T20:00:00.000Z,0 CVE-2010-4305,https://securityvulnerability.io/vulnerability/CVE-2010-4305,,"Cisco Unified Videoconferencing (UVC) System 3545, 5110, 5115, and 5230; Unified Videoconferencing 3527 Primary Rate Interface (PRI) Gateway; Unified Videoconferencing 3522 Basic Rate Interfaces (BRI) Gateway; and Unified Videoconferencing 3515 Multipoint Control Unit (MCU) improperly use cookies for web-interface credentials, which allows remote attackers to obtain sensitive information by reading a (1) cleartext or (2) base64-encoded cleartext cookie, aka Bug ID CSCti54052.",Cisco,"Unified Videoconferencing System 5110 Firmware,Unified Videoconferencing System 5115 Firmware,Unified Videoconferencing System 5110,Unified Videoconferencing System 5115",,,0.0019099999917671084,false,,false,false,false,,,false,false,,2010-11-22T20:00:00.000Z,0 CVE-2010-3037,https://securityvulnerability.io/vulnerability/CVE-2010-3037,,"goform/websXMLAdminRequestCgi.cgi in Cisco Unified Videoconferencing (UVC) System 5110 and 5115, and possibly Unified Videoconferencing System 3545 and 5230, Unified Videoconferencing 3527 Primary Rate Interface (PRI) Gateway, Unified Videoconferencing 3522 Basic Rate Interfaces (BRI) Gateway, and Unified Videoconferencing 3515 Multipoint Control Unit (MCU), allows remote authenticated administrators to execute arbitrary commands via the username field, related to a ""shell command injection vulnerability,"" aka Bug ID CSCti54059.",Cisco,"Unified Videoconferencing System 5110 Firmware,Unified Videoconferencing System 5115 Firmware,Unified Videoconferencing System 5110,Unified Videoconferencing System 5115",,,0.002950000111013651,false,,false,false,false,,,false,false,,2010-11-22T19:00:00.000Z,0 CVE-2010-3038,https://securityvulnerability.io/vulnerability/CVE-2010-3038,,"Cisco Unified Videoconferencing (UVC) System 5110 and 5115, when the Linux operating system is used, has a default password for the (1) root, (2) cs, and (3) develop accounts, which makes it easier for remote attackers to obtain access via the (a) FTP or (b) SSH daemon, aka Bug ID CSCti54008.",Cisco,"Unified Videoconferencing System 5110 Firmware,Unified Videoconferencing System 5115 Firmware,Unified Videoconferencing System 5110,Unified Videoconferencing System 5115",,,0.011210000142455101,false,,false,false,false,,,false,false,,2010-11-22T19:00:00.000Z,0