cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-7531,https://securityvulnerability.io/vulnerability/CVE-2020-7531,Improper Access Control in SCADAPack 7x Remote Connect by Schneider Electric,"An improper access control vulnerability in SCADAPack 7x Remote Connect allows unauthorized users to place executables in designated folders. This flaw may lead to execution of unauthorized code whenever Remote Connect is launched by users, potentially compromising the integrity and security of the system.",Schneider Electric,Scadapack 7x Remote Connect V3.6.3.574 And Prior.,7.8,HIGH,0.0006300000241026282,false,,false,false,false,,,false,false,,2020-09-16T15:40:39.000Z,0 CVE-2020-7530,https://securityvulnerability.io/vulnerability/CVE-2020-7530,Improper Authorization in SCADAPack 7x Remote Connect by Schneider Electric,"An improper authorization vulnerability exists in SCADAPack 7x Remote Connect versions up to V3.6.3.574. This flaw enables attackers to gain unauthorized access to sensitive executable code folders, potentially compromising the system's integrity and functionality. Proper access controls and security measures are crucial to prevent exploitation of this vulnerability.",Schneider Electric,Scadapack 7x Remote Connect V3.6.3.574 And Prior.,8.8,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2020-09-16T15:40:12.000Z,0 CVE-2020-7529,https://securityvulnerability.io/vulnerability/CVE-2020-7529,Path Traversal Vulnerability in SCADAPack 7x Remote Connect by Schneider Electric,"A vulnerability exists in the SCADAPack 7x Remote Connect software that allows attackers to exploit improper pathname restrictions. By using a specially crafted .RCZ file, an attacker may gain access and manipulate files in unprotected directories on the system. This type of vulnerability can lead to unauthorized actions and data exposure, making it essential for users to apply recommended mitigations to secure their systems.",Schneider Electric,Scadapack 7x Remote Connect V3.6.3.574 And Prior.,5.5,MEDIUM,0.0005200000014156103,false,,false,false,false,,,false,false,,2020-09-16T15:39:54.000Z,0 CVE-2020-7528,https://securityvulnerability.io/vulnerability/CVE-2020-7528,Deserialization Vulnerability in SCADAPack 7x Remote Connect by Schneider Electric,"A deserialization vulnerability has been identified in SCADAPack 7x Remote Connect. This flaw arises when untrusted data is deserialized, potentially allowing an attacker to execute arbitrary code on the affected system. The vulnerability is triggered by crafting a malicious .PRJ file that contains a specially designed serialized buffer, enabling unauthorized access and control over the system. It is critical for users of SCADAPack 7x Remote Connect to apply security updates and follow best practices to mitigate the risk associated with this vulnerability.",Schneider Electric,Scadapack 7x Remote Connect V3.6.3.574 And Prior.,7.8,HIGH,0.0007099999929778278,false,,false,false,false,,,false,false,,2020-09-16T15:39:38.000Z,0