cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-7523,https://securityvulnerability.io/vulnerability/CVE-2020-7523,Improper Privilege Management in Schneider Electric Modbus Serial Driver,"The Modbus Serial Driver from Schneider Electric is vulnerable due to improper privilege management which can be exploited to escalate local privileges. This vulnerability arises when the driver fails to effectively assign, modify, track, or verify the privileges of actors interacting with the service. As a result, unauthorized users may gain unintended control, leading to potential security risks. Ensuring that system configurations adhere to best practices and implementing timely updates are crucial to mitigate exposure to this vulnerability.",Schneider Electric,"Schneider Electric Modbus Serial Driver (64 Bits) Versions Prior To V3.20 Ie 30, Schneider Electric Modbus Serial Driver (32 Bits) Versions Prior To V2.20 Ie 30, And Schneider Electric Modbus Driver Suite Versions Prior To V14.15.0.0",7.8,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2020-08-31T16:11:46.000Z,0 CVE-2013-0662,https://securityvulnerability.io/vulnerability/CVE-2013-0662,,Multiple stack-based buffer overflows in ModbusDrv.exe in Schneider Electric Modbus Serial Driver 1.10 through 3.2 allow remote attackers to execute arbitrary code via a large buffer-size value in a Modbus Application Header.,Schneider Electric,"Somachine,Concept,Modbus Serial Driver,Sft2841,Somove,Opc Factory Server,Powersuite,Pl7,Modbuscommdtm Sl,Unity Pro,Twidosuite,Unityloader",,,0.647379994392395,false,,false,false,false,,,false,false,,2014-04-01T06:17:00.000Z,0