cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-5629,https://securityvulnerability.io/vulnerability/CVE-2023-5629,Open Redirect Vulnerability in Schneider Electric’s Products,"A vulnerability related to open redirect has been identified in certain products by Schneider Electric, potentially allowing attackers to redirect users to untrusted sites. This could facilitate phishing attacks and lead to the unauthorized disclosure of sensitive information. Users are advised to review security notices and implement necessary safeguards to protect against such threats.",Schneider Electric,"Trio Q-Series Ethernet Data Radio,Trio E-Series Ethernet Data Radio,Trio J-Series Ethernet Data Radio",8.2,HIGH,0.0006300000241026282,false,,false,false,false,,,false,false,,2023-12-14T05:15:00.000Z,0 CVE-2023-5630,https://securityvulnerability.io/vulnerability/CVE-2023-5630,Code Integrity Bypass in Schneider Electric Devices,"A vulnerability allows a privileged user to bypass the integrity checks of firmware, potentially enabling the installation of untrusted firmware on Schneider Electric devices. This compromise poses risks by allowing the introduction of malicious code, leading to system instability and unauthorized access. It is crucial for users to review their firmware versions and apply necessary patches to mitigate these risks.",Schneider Electric,"Trio Q-Series Ethernet Data Radio,Trio E-Series Ethernet Data Radio,Trio J-Series Ethernet Data Radio",6.5,MEDIUM,0.0005300000193528831,false,,false,false,false,,,false,false,,2023-12-14T05:15:00.000Z,0