Filtered by vendor Myscada
Subscriptions
Total
34 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-25067 | 1 Myscada | 1 Mypro | 2025-04-23 | 9.8 Critical |
mySCADA myPRO Manager is vulnerable to an OS command injection which could allow a remote attacker to execute arbitrary OS commands. | ||||
CVE-2017-12730 | 1 Myscada | 1 Mypro | 2025-04-20 | N/A |
An Unquoted Search Path issue was discovered in mySCADA myPRO Versions 7.0.26 and prior. Application services utilize unquoted search path elements, which could allow an attacker to execute arbitrary code with elevated privileges. | ||||
CVE-2022-0999 | 1 Myscada | 1 Mypro | 2025-04-16 | 8.8 High |
An authenticated user may be able to misuse parameters to inject arbitrary operating system commands into mySCADA myPRO versions 8.25.0 and prior. | ||||
CVE-2022-2234 | 1 Myscada | 1 Mypro | 2025-04-16 | 9.9 Critical |
An authenticated mySCADA myPRO 8.26.0 user may be able to modify parameters to run commands directly in the operating system. | ||||
CVE-2021-27505 | 1 Myscada | 1 Mypro | 2025-04-16 | 7.5 High |
mySCADA myPRO versions prior to 8.20.0 does not restrict unauthorized read access to sensitive directory listing information. | ||||
CVE-2021-33005 | 1 Myscada | 1 Mypro | 2025-04-16 | 7.5 High |
mySCADA myPRO versions prior to 8.20.0 allows an unauthenticated remote attacker to upload arbitrary files to arbitrary directories. | ||||
CVE-2021-33009 | 1 Myscada | 1 Mypro | 2025-04-16 | 7.5 High |
mySCADA myPRO versions prior to 8.20.0 allows an unauthenticated remote attacker to upload arbitrary files to the file system. | ||||
CVE-2021-33013 | 1 Myscada | 1 Mypro | 2025-04-16 | 8.2 High |
mySCADA myPRO versions prior to 8.20.0 does not restrict unauthorized read access to sensitive system information. | ||||
CVE-2025-24865 | 1 Myscada | 1 Mypro | 2025-03-04 | 10 Critical |
The administrative web interface of mySCADA myPRO Manager can be accessed without authentication which could allow an unauthorized attacker to retrieve sensitive information and upload files without the associated password. | ||||
CVE-2025-23411 | 1 Myscada | 1 Mypro | 2025-03-04 | 6.3 Medium |
mySCADA myPRO Manager is vulnerable to cross-site request forgery (CSRF), which could allow an attacker to obtain sensitive information. An attacker would need to trick the victim in to visiting an attacker-controlled website. | ||||
CVE-2025-22896 | 1 Myscada | 1 Mypro | 2025-03-04 | 8.6 High |
mySCADA myPRO Manager stores credentials in cleartext, which could allow an attacker to obtain sensitive information. | ||||
CVE-2023-29169 | 1 Myscada | 1 Mypro | 2025-01-17 | 8.8 High |
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands. | ||||
CVE-2023-29150 | 1 Myscada | 1 Mypro | 2025-01-17 | 8.8 High |
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands. | ||||
CVE-2023-28716 | 1 Myscada | 1 Mypro | 2025-01-17 | 8.8 High |
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands. | ||||
CVE-2023-28400 | 1 Myscada | 1 Mypro | 2025-01-17 | 8.8 High |
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands. | ||||
CVE-2023-28384 | 1 Myscada | 1 Mypro | 2025-01-17 | 8.8 High |
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands. | ||||
CVE-2024-50054 | 1 Myscada | 2 Mypro Manager, Mypro Runtime | 2024-11-26 | 7.5 High |
The back-end does not sufficiently verify the user-controlled filename parameter which makes it possible for an attacker to perform a path traversal attack and retrieve arbitrary files from the file system. | ||||
CVE-2024-47138 | 1 Myscada | 2 Mypro Manager, Mypro Runtime | 2024-11-26 | 9.8 Critical |
The administrative interface listens by default on all interfaces on a TCP port and does not require authentication when being accessed. | ||||
CVE-2024-45369 | 1 Myscada | 2 Mypro Manager, Mypro Runtime | 2024-11-26 | 8.1 High |
The web application uses a weak authentication mechanism to verify that a request is coming from an authenticated and authorized resource. | ||||
CVE-2024-47407 | 1 Myscada | 2 Mypro Manager, Mypro Runtime | 2024-11-25 | 10 Critical |
A parameter within a command does not properly validate input within myPRO Manager which could be exploited by an unauthenticated remote attacker to inject arbitrary operating system commands. |