cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-7516,https://securityvulnerability.io/vulnerability/CVE-2020-7516,Cleartext Storage Vulnerability in Easergy Builder by Schneider Electric,"A vulnerability in Easergy Builder allows sensitive information, specifically login credentials, to be stored in cleartext in memory. This exposure poses a risk as attackers could potentially access these credentials, compromising the security of the application and its users. The affected versions include Easergy Builder V1.4.7.2 and earlier, emphasizing the need for immediate updates to secure sensitive data.",Schneider Electric,Easergy Builder V1.4.7.2 And Prior,7.8,HIGH,0.00046999999904073775,false,,false,false,false,,,false,false,,2020-07-23T20:47:11.000Z,0 CVE-2020-7515,https://securityvulnerability.io/vulnerability/CVE-2020-7515,Hard-Coded Cryptographic Key Vulnerability in Easergy Builder by Schneider Electric,"A vulnerability exists in Easergy Builder that allows the use of hard-coded cryptographic keys stored in cleartext. This flaw can potentially enable an attacker to decrypt sensitive passwords, exposing critical security data and increasing the risk of unauthorized access. Users of Easergy Builder V1.4.7.2 and previous versions should take immediate action to mitigate this risk as outlined in the official guidance from Schneider Electric.",Schneider Electric,Easergy Builder V1.4.7.2 And Prior,7.8,HIGH,0.00046999999904073775,false,,false,false,false,,,false,false,,2020-07-23T20:47:02.000Z,0