All the vulnerabilites related to SAUTER - EY-AS525F001 with moduWeb
cve-2023-28650
Vulnerability from cvelistv5
Published
2023-03-27 19:40
Modified
2024-08-02 13:43
Severity ?
EPSS score ?
Summary
CVE-2023-28650
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SAUTER | EY-AS525F001 with moduWeb |
Version: all versions |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:23.694Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EY-AS525F001 with moduWeb", "vendor": "SAUTER", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "descriptions": [ { "lang": "en", "value": "An unauthenticated remote attacker could provide a malicious link and trick an unsuspecting user into clicking on it. If clicked, the attacker could execute the malicious JavaScript (JS) payload in the target\u2019s security context." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-79 Cross-site Scripting", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T19:40:04.111Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03" } ], "source": { "discovery": "UNKNOWN" }, "title": "CVE-2023-28650", "x_generator": { "engine": "VINCE 2.0.7", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2023-28650" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2023-28650", "datePublished": "2023-03-27T19:40:04.111Z", "dateReserved": "2023-03-20T14:52:02.998Z", "dateUpdated": "2024-08-02T13:43:23.694Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-27927
Vulnerability from cvelistv5
Published
2023-03-27 19:33
Modified
2024-08-02 12:23
Severity ?
EPSS score ?
Summary
CVE-2023-27927
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SAUTER | EY-AS525F001 with moduWeb |
Version: all versions |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T12:23:30.295Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EY-AS525F001 with moduWeb", "vendor": "SAUTER", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "descriptions": [ { "lang": "en", "value": "An authenticated malicious user could acquire the simple mail transfer protocol (SMTP) Password in cleartext format, despite it being protected and hidden behind asterisks. The attacker could then perform further attacks using the SMTP credentials." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-319 Cleartext Transmission of Sensitive Information", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T19:33:49.432Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03" } ], "source": { "discovery": "UNKNOWN" }, "title": "CVE-2023-27927", "x_generator": { "engine": "VINCE 2.0.7", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2023-27927" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2023-27927", "datePublished": "2023-03-27T19:33:49.432Z", "dateReserved": "2023-03-20T14:52:02.983Z", "dateUpdated": "2024-08-02T12:23:30.295Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22300
Vulnerability from cvelistv5
Published
2023-03-27 19:36
Modified
2024-08-02 10:07
Severity ?
EPSS score ?
Summary
CVE-2023-22300
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SAUTER | EY-AS525F001 with moduWeb |
Version: all versions |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.208Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EY-AS525F001 with moduWeb", "vendor": "SAUTER", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "descriptions": [ { "lang": "en", "value": "An unauthenticated remote attacker could force all authenticated users, such as administrative users, to perform unauthorized actions by viewing the logs. This action would also grant the attacker privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-79 Cross-site Scripting", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T19:36:02.936Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03" } ], "source": { "discovery": "UNKNOWN" }, "title": "CVE-2023-22300", "x_generator": { "engine": "VINCE 2.0.7", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2023-22300" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2023-22300", "datePublished": "2023-03-27T19:36:02.936Z", "dateReserved": "2023-03-20T14:52:02.988Z", "dateUpdated": "2024-08-02T10:07:06.208Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28652
Vulnerability from cvelistv5
Published
2023-03-27 19:29
Modified
2024-08-02 13:43
Severity ?
EPSS score ?
Summary
CVE-2023-28652
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SAUTER | EY-AS525F001 with moduWeb |
Version: all |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:23.679Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EY-AS525F001 with moduWeb", "vendor": "SAUTER", "versions": [ { "status": "affected", "version": "all" } ] } ], "descriptions": [ { "lang": "en", "value": "An authenticated malicious user could successfully upload a malicious image could lead to a denial-of-service condition." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T19:29:45.917Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03" } ], "source": { "discovery": "UNKNOWN" }, "title": "CVE-2023-28652", "x_generator": { "engine": "VINCE 2.0.7", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2023-28652" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2023-28652", "datePublished": "2023-03-27T19:29:45.917Z", "dateReserved": "2023-03-20T14:52:02.975Z", "dateUpdated": "2024-08-02T13:43:23.679Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28655
Vulnerability from cvelistv5
Published
2023-03-27 19:38
Modified
2024-08-02 13:43
Severity ?
EPSS score ?
Summary
CVE-2023-28655
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SAUTER | EY-AS525F001 with moduWeb |
Version: all versions |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:23.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EY-AS525F001 with moduWeb", "vendor": "SAUTER", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A malicious user could leverage this vulnerability to escalate privileges or perform unauthorized actions in the context of the targeted privileged users." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-79 Cross-site Scripting", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T19:38:44.049Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03" } ], "source": { "discovery": "UNKNOWN" }, "title": "CVE-2023-28655", "x_generator": { "engine": "VINCE 2.0.7", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2023-28655" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2023-28655", "datePublished": "2023-03-27T19:38:44.049Z", "dateReserved": "2023-03-20T14:52:02.992Z", "dateUpdated": "2024-08-02T13:43:23.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }