Filtered by vendor Myscada
Subscribe
Total
29 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2025-25067 | 1 Myscada | 1 Mypro | 2025-04-23 | N/A | 9.8 CRITICAL |
mySCADA myPRO Manager is vulnerable to an OS command injection which could allow a remote attacker to execute arbitrary OS commands. | |||||
CVE-2017-12730 | 1 Myscada | 1 Mypro | 2025-04-20 | 7.2 HIGH | 7.8 HIGH |
An Unquoted Search Path issue was discovered in mySCADA myPRO Versions 7.0.26 and prior. Application services utilize unquoted search path elements, which could allow an attacker to execute arbitrary code with elevated privileges. | |||||
CVE-2025-22896 | 1 Myscada | 1 Mypro | 2025-03-04 | N/A | 8.6 HIGH |
mySCADA myPRO Manager stores credentials in cleartext, which could allow an attacker to obtain sensitive information. | |||||
CVE-2025-23411 | 1 Myscada | 1 Mypro | 2025-03-04 | N/A | 6.3 MEDIUM |
mySCADA myPRO Manager is vulnerable to cross-site request forgery (CSRF), which could allow an attacker to obtain sensitive information. An attacker would need to trick the victim in to visiting an attacker-controlled website. | |||||
CVE-2025-24865 | 1 Myscada | 1 Mypro | 2025-03-04 | N/A | 10.0 CRITICAL |
The administrative web interface of mySCADA myPRO Manager can be accessed without authentication which could allow an unauthorized attacker to retrieve sensitive information and upload files without the associated password. | |||||
CVE-2023-29169 | 1 Myscada | 1 Mypro | 2025-01-17 | N/A | 8.8 HIGH |
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands. | |||||
CVE-2023-29150 | 1 Myscada | 1 Mypro | 2025-01-17 | N/A | 8.8 HIGH |
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands. | |||||
CVE-2023-28716 | 1 Myscada | 1 Mypro | 2025-01-17 | N/A | 8.8 HIGH |
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands. | |||||
CVE-2023-28400 | 1 Myscada | 1 Mypro | 2025-01-17 | N/A | 8.8 HIGH |
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands. | |||||
CVE-2023-28384 | 1 Myscada | 1 Mypro | 2025-01-17 | N/A | 8.8 HIGH |
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands. | |||||
CVE-2024-4708 | 1 Myscada | 1 Mypro | 2024-11-21 | N/A | 9.8 CRITICAL |
mySCADA myPRO uses a hard-coded password which could allow an attacker to remotely execute code on the affected device. | |||||
CVE-2022-2234 | 1 Myscada | 1 Mypro | 2024-11-21 | N/A | 9.9 CRITICAL |
An authenticated mySCADA myPRO 8.26.0 user may be able to modify parameters to run commands directly in the operating system. | |||||
CVE-2022-0999 | 1 Myscada | 1 Mypro | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
An authenticated user may be able to misuse parameters to inject arbitrary operating system commands into mySCADA myPRO versions 8.25.0 and prior. | |||||
CVE-2021-44453 | 1 Myscada | 1 Mypro | 2024-11-21 | 10.0 HIGH | 10.0 CRITICAL |
mySCADA myPRO: Versions 8.20.0 and prior has a vulnerable debug interface which includes a ping utility, which may allow an attacker to inject arbitrary operating system commands. | |||||
CVE-2021-43989 | 1 Myscada | 1 Mypro | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
mySCADA myPRO Versions 8.20.0 and prior stores passwords using MD5, which may allow an attacker to crack the previously retrieved password hashes. | |||||
CVE-2021-43987 | 1 Myscada | 1 Mypro | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An additional, nondocumented administrative account exists in mySCADA myPRO Versions 8.20.0 and prior that is not exposed through the web interface, which cannot be deleted or changed through the regular web interface. | |||||
CVE-2021-43985 | 1 Myscada | 1 Mypro | 2024-11-21 | 7.5 HIGH | 9.1 CRITICAL |
An unauthenticated remote attacker can access mySCADA myPRO Versions 8.20.0 and prior without any form of authentication or authorization. | |||||
CVE-2021-43984 | 1 Myscada | 1 Mypro | 2024-11-21 | 7.5 HIGH | 10.0 CRITICAL |
mySCADA myPRO: Versions 8.20.0 and prior has a feature where the firmware can be updated, which may allow an attacker to inject arbitrary operating system commands through a specific parameter. | |||||
CVE-2021-43981 | 1 Myscada | 1 Mypro | 2024-11-21 | 7.5 HIGH | 10.0 CRITICAL |
mySCADA myPRO: Versions 8.20.0 and prior has a feature to send emails, which may allow an attacker to inject arbitrary operating system commands through a specific parameter. | |||||
CVE-2021-43555 | 1 Myscada | 1 Mydesigner | 2024-11-21 | 6.8 MEDIUM | 7.3 HIGH |
mySCADA myDESIGNER Versions 8.20.0 and prior fails to properly validate contents of an imported project file, which may make the product vulnerable to a path traversal payload. This vulnerability may allow an attacker to plant files on the file system in arbitrary locations or overwrite existing files, resulting in remote code execution. |