cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-6435,https://securityvulnerability.io/vulnerability/CVE-2024-6435,Rockwell Automation Privilege Escalation Vulnerability in Pavilion8®,A privilege escalation vulnerability in Rockwell Automation products allows users with basic access rights to inadvertently gain access to functionalities typically restricted to administrators. This means that attackers can potentially read sensitive data or create new user accounts with escalated privileges. Such unauthorized access could lead to significant security breaches and unauthorized manipulation of critical system settings.,Rockwell Automation,Pavilion8®,8.8,HIGH,0.0005000000237487257,false,,false,false,false,,,false,false,,2024-07-16T13:15:00.000Z,0 CVE-2023-29463,https://securityvulnerability.io/vulnerability/CVE-2023-29463,Pavilion8 Security Misconfiguration Vulnerability," The JMX Console within the Rockwell Automation Pavilion8 is exposed to application users and does not require authentication. If exploited, a malicious user could potentially retrieve other application users’ session data and or log users out of their session. ",Rockwell Automation,Pavilion8,5.4,MEDIUM,0.00046999999904073775,false,,false,false,false,,,false,false,,2023-09-12T17:15:00.000Z,0