cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2009-1556,https://securityvulnerability.io/vulnerability/CVE-2009-1556,,"img/main.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote authenticated users to read arbitrary files in img/ via a filename in the next_file parameter, as demonstrated by reading .htpasswd to obtain the admin password, a different vulnerability than CVE-2004-2507.",Cisco,Wvc54gca,,,0.0020000000949949026,false,,false,false,false,,,false,false,,2009-05-06T16:00:00.000Z,0 CVE-2009-1555,https://securityvulnerability.io/vulnerability/CVE-2009-1555,,"The Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 sends configuration data in response to a Setup Wizard remote-management command, which allows remote attackers to obtain sensitive information such as passwords by reading the SetupWizard.exe process memory, a related issue to CVE-2008-4390.",Cisco,Wvc54gca,,,0.006579999811947346,false,,false,false,false,,,false,false,,2009-05-06T16:00:00.000Z,0 CVE-2009-1557,https://securityvulnerability.io/vulnerability/CVE-2009-1557,,"Multiple cross-site scripting (XSS) vulnerabilities on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allow remote attackers to inject arbitrary web script or HTML via the next_file parameter to (1) main.cgi, (2) img/main.cgi, or (3) adm/file.cgi; or (4) the this_file parameter to adm/file.cgi.",Cisco,Wvc54gca,,,0.20755000412464142,false,,false,false,false,,,false,false,,2009-05-06T16:00:00.000Z,0 CVE-2009-1558,https://securityvulnerability.io/vulnerability/CVE-2009-1558,,Directory traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter.,Cisco,Wvc54gca,,,0.13707999885082245,false,,false,false,false,,,false,false,,2009-05-06T16:00:00.000Z,0 CVE-2009-1559,https://securityvulnerability.io/vulnerability/CVE-2009-1559,,Absolute path traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R24 and possibly 1.00R22 allows remote attackers to read arbitrary files via an absolute pathname in the this_file parameter. NOTE: traversal via a .. (dot dot) is probably also possible.,Cisco,Wvc54gca,,,0.008750000037252903,false,,false,false,false,,,false,false,,2009-05-06T16:00:00.000Z,0