{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T12:02:06.862","vulnerabilities":[{"cve":{"id":"CVE-2023-31177","sourceIdentifier":"security@selinc.com","published":"2023-11-30T17:15:08.763","lastModified":"2024-11-21T08:01:34.057","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An Improper Neutralization of Input During Web Page Generation  ('Cross-site Scripting') in the Schweitzer Engineering Laboratories SEL-451 could allow an attacker to craft a link that could execute arbitrary code on a victim's system.\n\n\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\n\n\n"},{"lang":"es","value":"Una neutralización inadecuada de la entrada durante la generación de páginas web (\"Cross-site Scripting\") en Schweitzer Engineering Laboratories SEL-451 podría permitir a un atacante crear un enlace que podría ejecutar código arbitrario en el sistema de una víctima. Consulte el Apéndice A del Manual de instrucciones del producto con fecha 20230830 para obtener más detalles."}],"metrics":{"cvssMetricV31":[{"source":"security@selinc.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:H\/UI:R\/S:U\/C:L\/I:L\/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":0.9,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"security@selinc.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:selinc:sel-451_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"r315-v0","versionEndExcluding":"r315-v4","matchCriteriaId":"567CA071-8A2D-40DD-A3DF-0FD73739476F"},{"vulnerable":true,"criteria":"cpe:2.3:o:selinc:sel-451_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"r316-v0","versionEndExcluding":"r316-v4","matchCriteriaId":"EE50B5EC-2A69-4EA9-A16D-5A0BF38D2861"},{"vulnerable":true,"criteria":"cpe:2.3:o:selinc:sel-451_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"r317-v0","versionEndExcluding":"r317-v4","matchCriteriaId":"D9D6B6F3-8D35-46B5-879C-26F22ED4AA2D"},{"vulnerable":true,"criteria":"cpe:2.3:o:selinc:sel-451_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"r318-v0","versionEndExcluding":"r318-v5","matchCriteriaId":"5DC6FE46-8B20-47D6-8A88-1708978C49D1"},{"vulnerable":true,"criteria":"cpe:2.3:o:selinc:sel-451_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"r320-v0","versionEndExcluding":"r320-v3","matchCriteriaId":"9E3E5B0A-E01A-4A5B-894C-DF83E4E5B23F"},{"vulnerable":true,"criteria":"cpe:2.3:o:selinc:sel-451_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"r321-v0","versionEndExcluding":"r321-v3","matchCriteriaId":"7505AF51-82AF-4145-B794-CA0B5048DD7E"},{"vulnerable":true,"criteria":"cpe:2.3:o:selinc:sel-451_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"r322-v0","versionEndExcluding":"r322-v3","matchCriteriaId":"6F092F10-4440-4FC4-8B0B-44B86F1742B8"},{"vulnerable":true,"criteria":"cpe:2.3:o:selinc:sel-451_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"r323-v0","versionEndExcluding":"r323-v5","matchCriteriaId":"B80DF635-298D-45B6-A5F7-71386587E6A8"},{"vulnerable":true,"criteria":"cpe:2.3:o:selinc:sel-451_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"r324-v0","versionEndExcluding":"r324-v4","matchCriteriaId":"3E9473AE-F0E1-49A2-BD2E-CEAC21B5CF9C"},{"vulnerable":true,"criteria":"cpe:2.3:o:selinc:sel-451_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"r325-v0","versionEndExcluding":"r325-v3","matchCriteriaId":"77E42746-C95B-476B-8734-0DE9FA1C611C"},{"vulnerable":true,"criteria":"cpe:2.3:o:selinc:sel-451_firmware:r326-v0:*:*:*:*:*:*:*","matchCriteriaId":"8EF1EF31-FFF7-4A3B-8A9F-2BD4CC355CD2"},{"vulnerable":true,"criteria":"cpe:2.3:o:selinc:sel-451_firmware:r327-v0:*:*:*:*:*:*:*","matchCriteriaId":"B9C7EDD0-52E2-45E7-975C-B194F2902F5D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:selinc:sel-451:-:*:*:*:*:*:*:*","matchCriteriaId":"9BBDB9B5-DAF0-4A78-88E3-1EB6486F8A13"}]}]}],"references":[{"url":"https:\/\/selinc.com\/support\/security-notifications\/external-reports\/","source":"security@selinc.com","tags":["Vendor Advisory"]},{"url":"https:\/\/www.nozominetworks.com\/blog\/","source":"security@selinc.com","tags":["Third Party Advisory"]},{"url":"https:\/\/selinc.com\/support\/security-notifications\/external-reports\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https:\/\/www.nozominetworks.com\/blog\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}