cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2017-6032,https://securityvulnerability.io/vulnerability/CVE-2017-6032,,A Violation of Secure Design Principles issue was discovered in Schneider Electric Modicon Modbus Protocol. The Modicon Modbus protocol has a session-related weakness making it susceptible to brute-force attacks.,Schneider Electric,Schneider Electric Modicon Modbus Protocol,5.3,MEDIUM,0.0005600000149570405,false,,false,false,false,,,false,false,,2017-06-30T02:35:00.000Z,0 CVE-2017-6034,https://securityvulnerability.io/vulnerability/CVE-2017-6034,,"An Authentication Bypass by Capture-Replay issue was discovered in Schneider Electric Modicon Modbus Protocol. Sensitive information is transmitted in cleartext in the Modicon Modbus protocol, which may allow an attacker to replay the following commands: run, stop, upload, and download.",Schneider Electric,Schneider Electric Modicon Modbus Protocol,9.8,CRITICAL,0.002090000081807375,false,,false,false,false,,,false,false,,2017-06-30T02:35:00.000Z,0