Filtered by vendor Myscada Subscriptions
Filtered by product Mypro Subscriptions
Total 23 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-4708 1 Myscada 1 Mypro 2024-11-21 9.8 Critical
mySCADA myPRO uses a hard-coded password which could allow an attacker to remotely execute code on the affected device.
CVE-2023-29169 1 Myscada 1 Mypro 2024-11-21 8.8 High
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.
CVE-2023-29150 1 Myscada 1 Mypro 2024-11-21 8.8 High
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.
CVE-2023-28716 1 Myscada 1 Mypro 2024-11-21 8.8 High
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.
CVE-2023-28400 1 Myscada 1 Mypro 2024-11-21 8.8 High
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.
CVE-2023-28384 1 Myscada 1 Mypro 2024-11-21 8.8 High
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.
CVE-2022-2234 1 Myscada 1 Mypro 2024-11-21 9.9 Critical
An authenticated mySCADA myPRO 8.26.0 user may be able to modify parameters to run commands directly in the operating system.
CVE-2022-0999 1 Myscada 1 Mypro 2024-11-21 8.8 High
An authenticated user may be able to misuse parameters to inject arbitrary operating system commands into mySCADA myPRO versions 8.25.0 and prior.
CVE-2021-44453 1 Myscada 1 Mypro 2024-11-21 10 Critical
mySCADA myPRO: Versions 8.20.0 and prior has a vulnerable debug interface which includes a ping utility, which may allow an attacker to inject arbitrary operating system commands.
CVE-2021-43989 1 Myscada 1 Mypro 2024-11-21 7.5 High
mySCADA myPRO Versions 8.20.0 and prior stores passwords using MD5, which may allow an attacker to crack the previously retrieved password hashes.
CVE-2021-43987 1 Myscada 1 Mypro 2024-11-21 9.8 Critical
An additional, nondocumented administrative account exists in mySCADA myPRO Versions 8.20.0 and prior that is not exposed through the web interface, which cannot be deleted or changed through the regular web interface.
CVE-2021-43985 1 Myscada 1 Mypro 2024-11-21 9.1 Critical
An unauthenticated remote attacker can access mySCADA myPRO Versions 8.20.0 and prior without any form of authentication or authorization.
CVE-2021-43984 1 Myscada 1 Mypro 2024-11-21 10 Critical
mySCADA myPRO: Versions 8.20.0 and prior has a feature where the firmware can be updated, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.
CVE-2021-43981 1 Myscada 1 Mypro 2024-11-21 10 Critical
mySCADA myPRO: Versions 8.20.0 and prior has a feature to send emails, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.
CVE-2021-33013 1 Myscada 1 Mypro 2024-11-21 8.2 High
mySCADA myPRO versions prior to 8.20.0 does not restrict unauthorized read access to sensitive system information.
CVE-2021-33009 1 Myscada 1 Mypro 2024-11-21 7.5 High
mySCADA myPRO versions prior to 8.20.0 allows an unauthenticated remote attacker to upload arbitrary files to the file system.
CVE-2021-33005 1 Myscada 1 Mypro 2024-11-21 7.5 High
mySCADA myPRO versions prior to 8.20.0 allows an unauthenticated remote attacker to upload arbitrary files to arbitrary directories.
CVE-2021-27505 1 Myscada 1 Mypro 2024-11-21 7.5 High
mySCADA myPRO versions prior to 8.20.0 does not restrict unauthorized read access to sensitive directory listing information.
CVE-2021-23198 1 Myscada 1 Mypro 2024-11-21 10 Critical
mySCADA myPRO: Versions 8.20.0 and prior has a feature where the password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.
CVE-2021-22657 1 Myscada 1 Mypro 2024-11-21 10 Critical
mySCADA myPRO: Versions 8.20.0 and prior has a feature where the API password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.