Filtered by vendor Measuresoft Subscriptions
Filtered by product Scadapro Server Subscriptions
Total 8 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2022-3263 1 Measuresoft 1 Scadapro Server 2024-11-21 7.8 High
The security descriptor of Measuresoft ScadaPro Server version 6.7 has inconsistent permissions, which could allow a local user with limited privileges to modify the service binary path and start malicious commands with SYSTEM privileges.
CVE-2022-2898 1 Measuresoft 2 Scadapro Client, Scadapro Server 2024-11-21 6.1 Medium
Measuresoft ScadaPro Server and Client (All Versions) do not properly resolve links before file access; this could allow a denial-of-service condition.
CVE-2022-2897 1 Measuresoft 2 Scadapro Client, Scadapro Server 2024-11-21 7.8 High
Measuresoft ScadaPro Server and Client (All Versions) do not properly resolve links before file access; this could allow privilege escalation..
CVE-2022-2896 1 Measuresoft 1 Scadapro Server 2024-11-21 7.8 High
Measuresoft ScadaPro Server (All Versions) allows use after free while processing a specific project file.
CVE-2022-2895 1 Measuresoft 1 Scadapro Server 2024-11-21 7.8 High
Measuresoft ScadaPro Server (All Versions) uses unmaintained ActiveX controls. These controls may allow two stack-based buffer overflow instances while processing a specific project file.
CVE-2022-2894 1 Measuresoft 1 Scadapro Server 2024-11-21 7.8 High
Measuresoft ScadaPro Server (All Versions) uses unmaintained ActiveX controls. The controls may allow seven untrusted pointer deference instances while processing a specific project file.
CVE-2022-2892 1 Measuresoft 1 Scadapro Server 2024-11-21 7.8 High
Measuresoft ScadaPro Server (Versions prior to 6.8.0.1) uses an unmaintained ActiveX control, which may allow an out-of-bounds write condition while processing a specific project file.
CVE-2012-1824 1 Measuresoft 2 Scadapro Client, Scadapro Server 2024-11-21 N/A
Untrusted search path vulnerability in Measuresoft ScadaPro Client before 4.0.0 and ScadaPro Server before 4.0.0 allows local users to gain privileges via a Trojan horse DLL in the current working directory.