Filtered by vendor Myscada Subscriptions
Total 37 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-35941 1 Myscada 1 Mypro 2025-06-12 5.5 Medium
A password is exposed locally.
CVE-2025-25067 1 Myscada 1 Mypro 2025-04-23 9.8 Critical
mySCADA myPRO Manager is vulnerable to an OS command injection which could allow a remote attacker to execute arbitrary OS commands.
CVE-2017-12730 1 Myscada 1 Mypro 2025-04-20 N/A
An Unquoted Search Path issue was discovered in mySCADA myPRO Versions 7.0.26 and prior. Application services utilize unquoted search path elements, which could allow an attacker to execute arbitrary code with elevated privileges.
CVE-2022-0999 1 Myscada 1 Mypro 2025-04-16 8.8 High
An authenticated user may be able to misuse parameters to inject arbitrary operating system commands into mySCADA myPRO versions 8.25.0 and prior.
CVE-2022-2234 1 Myscada 1 Mypro 2025-04-16 9.9 Critical
An authenticated mySCADA myPRO 8.26.0 user may be able to modify parameters to run commands directly in the operating system.
CVE-2021-27505 1 Myscada 1 Mypro 2025-04-16 7.5 High
mySCADA myPRO versions prior to 8.20.0 does not restrict unauthorized read access to sensitive directory listing information.
CVE-2021-33005 1 Myscada 1 Mypro 2025-04-16 7.5 High
mySCADA myPRO versions prior to 8.20.0 allows an unauthenticated remote attacker to upload arbitrary files to arbitrary directories.
CVE-2021-33009 1 Myscada 1 Mypro 2025-04-16 7.5 High
mySCADA myPRO versions prior to 8.20.0 allows an unauthenticated remote attacker to upload arbitrary files to the file system.
CVE-2021-33013 1 Myscada 1 Mypro 2025-04-16 8.2 High
mySCADA myPRO versions prior to 8.20.0 does not restrict unauthorized read access to sensitive system information.
CVE-2025-23411 1 Myscada 1 Mypro 2025-03-04 6.3 Medium
mySCADA myPRO Manager is vulnerable to cross-site request forgery (CSRF), which could allow an attacker to obtain sensitive information. An attacker would need to trick the victim in to visiting an attacker-controlled website.
CVE-2025-22896 1 Myscada 1 Mypro 2025-03-04 8.6 High
mySCADA myPRO Manager stores credentials in cleartext, which could allow an attacker to obtain sensitive information.
CVE-2025-24865 1 Myscada 1 Mypro 2025-03-04 10 Critical
The administrative web interface of mySCADA myPRO Manager can be accessed without authentication which could allow an unauthorized attacker to retrieve sensitive information and upload files without the associated password.
CVE-2025-20061 1 Myscada 1 Mypro Manager 2025-02-12 9.8 Critical
mySCADA myPRO does not properly neutralize POST requests sent to a specific port with email information. This vulnerability could be exploited by an attacker to execute arbitrary commands on the affected system.
CVE-2025-20014 1 Myscada 1 Mypro Manager 2025-01-29 9.8 Critical
mySCADA myPRO does not properly neutralize POST requests sent to a specific port with version information. This vulnerability could be exploited by an attacker to execute arbitrary commands on the affected system.
CVE-2023-29169 1 Myscada 1 Mypro 2025-01-17 8.8 High
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.
CVE-2023-29150 1 Myscada 1 Mypro 2025-01-17 8.8 High
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.
CVE-2023-28716 1 Myscada 1 Mypro 2025-01-17 8.8 High
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.
CVE-2023-28400 1 Myscada 1 Mypro 2025-01-17 8.8 High
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.
CVE-2023-28384 1 Myscada 1 Mypro 2025-01-17 8.8 High
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.
CVE-2024-50054 1 Myscada 2 Mypro Manager, Mypro Runtime 2024-11-26 7.5 High
The back-end does not sufficiently verify the user-controlled filename parameter which makes it possible for an attacker to perform a path traversal attack and retrieve arbitrary files from the file system.