cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2015-8334,https://securityvulnerability.io/vulnerability/CVE-2015-8334,,SQL injection vulnerability in the Operation and Maintenance Unit (OMU) in Huawei VCN500 before V100R002C00SPC201 allows remote authenticated users to execute arbitrary SQL commands via a crafted HTTP request.,Huawei,Vcn500 Firmware,8.8,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2017-08-29T15:00:00.000Z,0 CVE-2015-8333,https://securityvulnerability.io/vulnerability/CVE-2015-8333,,The Operation and Maintenance Unit (OMU) in Huawei VCN500 with software before V100R002C00SPC200 allows remote authenticated users to change the IP address of the media server via crafted packets.,Huawei,Vcn500,7.1,HIGH,0.001129999989643693,false,,false,false,false,,,false,false,,2016-01-11T15:00:00.000Z,0 CVE-2015-8335,https://securityvulnerability.io/vulnerability/CVE-2015-8335,,"Huawei VCN500 with software before V100R002C00SPC201 logs passwords in cleartext, which allows remote authenticated users to obtain sensitive information by triggering log generation and then reading the log.",Huawei,Vcn500,6.5,MEDIUM,0.0011899999808520079,false,,false,false,false,,,false,false,,2016-01-11T15:00:00.000Z,0 CVE-2015-8331,https://securityvulnerability.io/vulnerability/CVE-2015-8331,,"The Operation and Maintenance Unit (OMU) in Huawei VCN500 with software before V100R002C00SPC200 does not properly invalidate the session ID when an ""abnormal exit"" occurs, which allows remote attackers to conduct replay attacks via the session ID.",Huawei,Vcn500,7.4,HIGH,0.00267999991774559,false,,false,false,false,,,false,false,,2016-01-11T15:00:00.000Z,0