cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2016-5709,https://securityvulnerability.io/vulnerability/CVE-2016-5709,,"SolarWinds Virtualization Manager 6.3.1 and earlier uses weak encryption to store passwords in /etc/shadow, which allows local users with superuser privileges to obtain user passwords via a brute force attack.",Solarwinds,Virtualization Manager,4.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2016-06-24T17:00:00.000Z,0 CVE-2016-3642,https://securityvulnerability.io/vulnerability/CVE-2016-3642,,"The RMI service in SolarWinds Virtualization Manager 6.3.1 and earlier allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.",Solarwinds,Virtualization Manager,9.8,CRITICAL,0.018780000507831573,false,,false,false,false,,,false,false,,2016-06-17T15:00:00.000Z,0 CVE-2016-3643,https://securityvulnerability.io/vulnerability/CVE-2016-3643,,"SolarWinds Virtualization Manager 6.3.1 and earlier allow local users to gain privileges by leveraging a misconfiguration of sudo, as demonstrated by ""sudo cat /etc/passwd.""",Solarwinds,Virtualization Manager,7.8,HIGH,0.001610000035725534,true,2021-11-03T00:00:00.000Z,false,false,true,2021-11-03T00:00:00.000Z,true,false,false,,2016-06-17T15:00:00.000Z,0