CVE-2023-28650

An unauthenticated remote attacker could provide a malicious link and trick an unsuspecting user into clicking on it. If clicked, the attacker could execute the malicious JavaScript (JS) payload in the target’s security context.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03 Third Party Advisory US Government Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sauter-controls:ey-as525f001_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sauter-controls:ey-as525f001:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:55

Type Values Removed Values Added
References () https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03 - Third Party Advisory, US Government Resource () https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03 - Third Party Advisory, US Government Resource

Information

Published : 2023-03-27 20:15

Updated : 2024-11-21 07:55


NVD link : CVE-2023-28650

Mitre link : CVE-2023-28650

CVE.ORG link : CVE-2023-28650


JSON object : View

Products Affected

sauter-controls

  • ey-as525f001_firmware
  • ey-as525f001
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')