cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-5514,https://securityvulnerability.io/vulnerability/CVE-2023-5514,Local File Enumeration Vulnerability in eSOMS by Hitachi Energy,"The eSOMS product by Hitachi Energy suffers from a local file enumeration vulnerability that can be exploited through manipulated parameter queries related to report generation. Attackers can leverage this flaw to disclose sensitive information about the local file system structure, potentially leading to further security risks. It is essential for users to implement proper input validation and restrict access to sensitive functionalities to mitigate this issue.",Hitachi,eSOMS,5.3,MEDIUM,0.0006300000241026282,false,,false,false,false,,,false,false,,2023-11-01T03:15:00.000Z,0 CVE-2023-5515,https://securityvulnerability.io/vulnerability/CVE-2023-5515,Information Disclosure in Hitachi Energy's Web Applications,"An information disclosure vulnerability in Hitachi Energy's web applications allows attackers to gain insights into the internal resource paths. By exploiting this weakness, an attacker can gather sensitive details about the application’s architecture, potentially enabling further attacks against the web server and its applications. Secure coding practices and regular security assessments are recommended to mitigate this risk.",Hitachi,eSOMS,5.3,MEDIUM,0.0006300000241026282,false,,false,false,false,,,false,false,,2023-11-01T03:15:00.000Z,0 CVE-2023-5516,https://securityvulnerability.io/vulnerability/CVE-2023-5516,Information Disclosure Vulnerability in Hitachi Energy Products,"An information disclosure vulnerability exists in various Hitachi Energy products due to poorly constructed web application requests and URI components containing special characters. This flaw triggers unhandled errors and exceptions, inadvertently revealing sensitive information including technical details such as version info, endpoint specifications, backend server data, and internal IP addresses. The exposure of this information can significantly increase the attack surface, potentially leading to further exploitation and additional vulnerabilities.",Hitachi,eSOMS,5.3,MEDIUM,0.0006300000241026282,false,,false,false,false,,,false,false,,2023-11-01T03:15:00.000Z,0 CVE-2021-35527,https://securityvulnerability.io/vulnerability/CVE-2021-35527,Password Autocomplete Vulnerability in Hitachi ABB Power Grids eSOMS Application,Password autocomplete vulnerability in the web application password field of Hitachi ABB Power Grids eSOMS allows attacker to gain access to user credentials that are stored by the browser. This issue affects: Hitachi ABB Power Grids eSOMS version 6.3 and prior versions.,Hitachi Abb Power Grids,Esoms,7.5,HIGH,0.0013099999632686377,false,,false,false,false,,,false,false,,2021-07-14T00:00:00.000Z,0 CVE-2021-26845,https://securityvulnerability.io/vulnerability/CVE-2021-26845,eSOMS Report Function Vulnerability,Information Exposure vulnerability in Hitachi ABB Power Grids eSOMS allows unauthorized user to gain access to report data if the URL used to access the report is discovered. This issue affects: Hitachi ABB Power Grids eSOMS 6.0 versions prior to 6.0.4.2.2; 6.1 versions prior to 6.1.4; 6.3 versions prior to 6.3.,Hitachi,Esoms,7.5,HIGH,0.0013099999632686377,false,,false,false,false,,,false,false,,2021-06-14T22:15:00.000Z,0