{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T01:14:15.980","vulnerabilities":[{"cve":{"id":"CVE-2018-7795","sourceIdentifier":"cybersecurity@se.com","published":"2018-08-29T20:29:00.437","lastModified":"2024-11-21T04:12:45.000","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Cross Protocol Injection vulnerability exists in Schneider Electric's PowerLogic (PM5560 prior to FW version 2.5.4) product. The vulnerability makes the product susceptible to cross site scripting attack on its web browser. User inputs can be manipulated to cause execution of java script code."},{"lang":"es","value":"Existe una vulnerabilidad de inyección de protocolos cruzados en el producto PowerLogic, de Schneider Electric (PM5560 anteriores a la versión de firmware 2.5.4). La vulnerabilidad hace que el producto sea susceptible a un ataque de Cross-Site Scripting (XSS) en su navegador web. Las entradas de usuario pueden manipularse para provocar la ejecución de código JavaScript."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:schneider-electric:powerlogic_pm5560_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.5.4","matchCriteriaId":"A237BEC6-C940-49B8-B39B-E3C6DF9EAA7D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:schneider-electric:powerlogic_pm5560:-:*:*:*:*:*:*:*","matchCriteriaId":"6DDB1B76-3862-462E-B55D-875EBE508B92"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105170","source":"cybersecurity@se.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-240-03","source":"cybersecurity@se.com","tags":["Mitigation","Third Party Advisory","US Government Resource"]},{"url":"https://www.schneider-electric.com/en/download/document/SEVD-2018-228-01/","source":"cybersecurity@se.com","tags":["Mitigation","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/105170","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-240-03","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Third Party Advisory","US Government Resource"]},{"url":"https://www.schneider-electric.com/en/download/document/SEVD-2018-228-01/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Vendor Advisory"]}]}}]}