cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2021-22720,https://securityvulnerability.io/vulnerability/CVE-2021-22720,Path Traversal Vulnerability in C-Bus Toolkit by Schneider Electric,"A path traversal vulnerability exists in C-Bus Toolkit, specifically in versions V1.15.7 and prior. This flaw may allow an attacker to exploit the software when restoring a project, potentially leading to remote code execution. By manipulating the file path during the restoration process, unauthorized access to restricted directories could be achieved, endangering the system's security and integrity.",Schneider Electric,C-bus Toolkit V1.15.7 And Prior,7.2,HIGH,0.6744099855422974,false,,false,false,false,,,false,false,,2021-04-13T18:32:29.000Z,0 CVE-2021-22719,https://securityvulnerability.io/vulnerability/CVE-2021-22719,Path Traversal Vulnerability in C-Bus Toolkit by Schneider Electric,"A vulnerability exists in the C-Bus Toolkit, where improper limitations on a pathname can lead to path traversal issues. This can allow an attacker to upload a file that may execute arbitrary code on the system. Such scenarios pose significant risks, as they potentially compromise the integrity and confidentiality of the affected systems. Users should upgrade to versions beyond V1.15.7 to safeguard against these risks.",Schneider Electric,C-bus Toolkit V1.15.7 And Prior,8.8,HIGH,0.030950000509619713,false,,false,false,false,,,false,false,,2021-04-13T18:32:12.000Z,0 CVE-2021-22718,https://securityvulnerability.io/vulnerability/CVE-2021-22718,Path Traversal Vulnerability in C-Bus Toolkit by Schneider Electric,"A path traversal vulnerability exists in the C-Bus Toolkit, enabling an attacker to manipulate project file paths, which may lead to remote code execution. This flaw, present in versions V1.15.7 and earlier, poses significant risks when restoring project files, as it could allow unauthorized access to restricted directories.",Schneider Electric,C-bus Toolkit V1.15.7 And Prior,7.8,HIGH,0.004519999958574772,false,,false,false,false,,,false,false,,2021-04-13T18:31:49.000Z,0 CVE-2021-22717,https://securityvulnerability.io/vulnerability/CVE-2021-22717,Path Traversal Vulnerability in C-Bus Toolkit by Schneider Electric,"A path traversal vulnerability is present in the C-Bus Toolkit, specifically in versions V1.15.7 and earlier. This security flaw allows an attacker to potentially execute arbitrary code remotely by manipulating the processing of configuration files. The improper limitation of a pathname to a restricted directory can be exploited, leading to unauthorized access and control over the affected system. Organizations using these versions of the C-Bus Toolkit should prioritize patching to mitigate the risk associated with this vulnerability.",Schneider Electric,C-bus Toolkit V1.15.7 And Prior,8.8,HIGH,0.030950000509619713,false,,false,false,false,,,false,false,,2021-04-13T18:31:31.000Z,0