{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T05:27:14.377","vulnerabilities":[{"cve":{"id":"CVE-2023-51587","sourceIdentifier":"zdi-disclosures@trendmicro.com","published":"2024-05-03T03:16:18.893","lastModified":"2025-07-09T16:58:28.247","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Voltronic Power ViewPower getModbusPassword Missing Authentication Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Voltronic Power ViewPower. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the getModbusPassword method. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-22073."},{"lang":"es","value":"Vulnerabilidad de divulgación de información de autenticación faltante en Voltronic Power ViewPower getModbusPassword. Esta vulnerabilidad permite a atacantes remotos revelar información confidencial sobre las instalaciones afectadas de Voltronic Power ViewPower. No se requiere autenticación para aprovechar esta vulnerabilidad. La falla específica existe dentro del método getModbusPassword. El problema se debe a la falta de autenticación antes de permitir el acceso a la funcionalidad. Un atacante puede aprovechar esta vulnerabilidad para revelar las credenciales almacenadas, lo que provocaría un mayor commit. Era ZDI-CAN-22073."}],"metrics":{"cvssMetricV30":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","description":[{"lang":"en","value":"CWE-306"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:voltronicpower:viewpower:1.04.21353:*:*:*:-:*:*:*","matchCriteriaId":"2CE4A520-86B5-4AE3-AD0E-7744328090E4"}]}]}],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-23-1892/","source":"zdi-disclosures@trendmicro.com","tags":["Third Party Advisory"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-23-1892/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}