{"vulnerability": "CVE-2021-2328", "sightings": [{"uuid": "0ee0864e-2542-48d1-9cdf-3655d906e25c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23282", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113542718963089135", "content": "", "creation_timestamp": "2024-11-25T08:46:38.867875Z"}, {"uuid": "18d0f984-3792-494a-ad78-b9ecc42a6e73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23284", "type": "seen", "source": "https://t.me/cibsecurity/41019", "content": "\u203c CVE-2021-23284 \u203c\n\nEaton Intelligent Power Manager Infrastructure (IPM Infrastructure) version 1.5.0plus205 and all prior versions are vulnerable to Stored Cross-site Scripting vulnerability. This issue affects: Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) all version 1.5.0plus205 and prior versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-18T20:23:32.000000Z"}, {"uuid": "6ac975ef-885f-4a27-9f4b-534875020c2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23287", "type": "seen", "source": "https://t.me/cibsecurity/40053", "content": "\u203c CVE-2021-23287 \u203c\n\nThe vulnerability exists due to insufficient validation of input of certain resources within the IPM software. This issue affects: Intelligent Power Manager (IPM 1) versions prior to 1.70.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-02T02:26:13.000000Z"}, {"uuid": "da0eeacc-963f-4c5f-b071-a2eff59b119e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23285", "type": "seen", "source": "https://t.me/cibsecurity/41028", "content": "\u203c CVE-2021-23285 \u203c\n\nEaton Intelligent Power Manager Infrastructure (IPM Infrastructure) version 1.5.0plus205 and all prior versions are vulnerable to reflected Cross-site Scripting vulnerability. This issue affects: Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) all version 1.5.0plus205 and prior versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-18T20:23:47.000000Z"}, {"uuid": "6011239f-e9e1-4fea-984a-77f5c4bb70c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23288", "type": "seen", "source": "https://t.me/cibsecurity/40040", "content": "\u203c CVE-2021-23288 \u203c\n\nThe vulnerability exists due to insufficient validation of input from certain resources by the IPP software. The attacker would need access to the local Subnet and an administrator interaction to compromise the system. This issue affects: Intelligent Power Protector versions prior to 1.69.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-02T02:20:20.000000Z"}]}