cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2015-6287,https://securityvulnerability.io/vulnerability/CVE-2015-6287,,"Cisco Web Security Appliance (WSA) 8.0.6-078 and 8.0.6-115 allows remote attackers to cause a denial of service (service outage) via a flood of TCP traffic that leads to DNS resolution delays, aka Bug IDs CSCur32005 and CSCur07907.",Cisco,Web Security Virtual Appliance,,,0.003280000062659383,false,,false,false,false,,,false,false,,2015-09-14T01:00:00.000Z,0 CVE-2015-6290,https://securityvulnerability.io/vulnerability/CVE-2015-6290,,"Cisco Web Security Appliance (WSA) 8.0.7 allows remote HTTP servers to cause a denial of service (memory consumption from stale TCP connections) via crafted responses, aka Bug ID CSCuw10426.",Cisco,Web Security Virtual Appliance,,,0.0019600000232458115,false,,false,false,false,,,false,false,,2015-09-14T01:00:00.000Z,0 CVE-2015-4216,https://securityvulnerability.io/vulnerability/CVE-2015-4216,,"The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH root authorized key across different customers' installations, which makes it easier for remote attackers to bypass authentication by leveraging knowledge of a private key from another installation, aka Bug IDs CSCuu95988, CSCuu95994, and CSCuu96630.",Cisco,"Email Security Virtual Appliance,Content Security Management Virtual Appliance,Web Security Virtual Appliance",,,0.00203000009059906,false,,false,false,false,,,false,false,,2015-06-26T10:00:00.000Z,0 CVE-2015-4217,https://securityvulnerability.io/vulnerability/CVE-2015-4217,,"The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH host keys across different customers' installations, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of a private key from another installation, aka Bug IDs CSCus29681, CSCuu95676, and CSCuu96601.",Cisco,"Email Security Virtual Appliance,Content Security Management Virtual Appliance,Web Security Virtual Appliance",,,0.003019999945536256,false,,false,false,false,,,false,false,,2015-06-26T10:00:00.000Z,0 CVE-2014-2137,https://securityvulnerability.io/vulnerability/CVE-2014-2137,,"CRLF injection vulnerability in the web framework in Cisco Web Security Appliance (WSA) 7.7 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct redirection attacks via a crafted URL, aka Bug ID CSCuj61002.",Cisco,"Web Security Appliance,Web Security Virtual Appliance",,,0.001449999981559813,false,,false,false,false,,,false,false,,2014-04-02T01:00:00.000Z,0