cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-46680,https://securityvulnerability.io/vulnerability/CVE-2022-46680,Cleartext Transmission Vulnerability in Schneider Electric Products,"A vulnerability exists in Schneider Electric Network Products that allows sensitive information to be transmitted in cleartext. This issue potentially enables an attacker to intercept network traffic, leading to the exposure of confidential data, unauthorized modification of data, or even denial of service conditions. Organizations using affected products should take immediate steps to secure their network communications to mitigate these risks.",Schneider Electric,"Powerlogic Ion9000,Powerlogic Ion7400,Powerlogic Pm8000,Powerlogic Ion8650,Powerlogic Ion8800,Legacy Ion Products",8.8,HIGH,0.0013299999991431832,false,,false,false,false,,,false,false,,2023-05-22T13:25:40.615Z,0 CVE-2021-22714,https://securityvulnerability.io/vulnerability/CVE-2021-22714,Improper Memory Buffer Restriction in PowerLogic Meters by Schneider Electric,"A vulnerability exists in Schneider Electric's PowerLogic ION7400, PM8000, and ION9000 meters, affecting all versions prior to V3.0.0. This flaw involves an improper restriction of operations within the bounds of a memory buffer, potentially allowing an attacker to exploit this weakness. The exploitation may lead to unexpected device reboots or even enable remote code execution, raising significant concerns for device integrity and security in industrial settings.",Schneider Electric,"Powerlogic Ion7400, Pm8000 And Ion9000 (all Versions Prior To V3.0.0)",9.8,CRITICAL,0.007350000087171793,false,,false,false,false,,,false,false,,2021-03-11T20:13:56.000Z,0