Loading HuntDB...

Vulnerabilities

CVE-2024-50054

HIGH

The back-end does not sufficiently verify the user-controlled filename parameter which makes it possible for an attacker to perform a path traversal attack and retrieve arbitrary files from the file system.

Published Nov 22, 2024

CVE-2024-47138

CRITICAL

The administrative interface listens by default on all interfaces on a TCP port and does not require authentication when being accessed.

Published Nov 22, 2024

CVE-2024-45369

HIGH

The web application uses a weak authentication mechanism to verify that a request is coming from an authenticated and authorized resource.

Published Nov 22, 2024

CVE-2024-52034

CRITICAL

An OS Command Injection vulnerability exists within myPRO Manager. A parameter within a command can be exploited by an unauthenticated remote attacker to inject arbitrary operating system commands.

Published Nov 22, 2024

CVE-2024-47407

CRITICAL

A parameter within a command does not properly validate input within myPRO Manager which could be exploited by an unauthenticated remote attacker to inject arbitrary operating system commands.

Published Nov 22, 2024

CVE-2024-4708

UNKNOWN

mySCADA myPRO uses a hard-coded password which could allow an attacker to remotely execute code on the affected device.

Published Jul 02, 2024

CVE-2021-33013

HIGH

mySCADA myPRO versions prior to 8.20.0 does not restrict unauthorized read access to sensitive system information.

Published May 13, 2022

CVE-2021-33009

HIGH

mySCADA myPRO versions prior to 8.20.0 allows an unauthenticated remote attacker to upload arbitrary files to the file system.

Published May 13, 2022

CVE-2021-33005

HIGH

mySCADA myPRO versions prior to 8.20.0 allows an unauthenticated remote attacker to upload arbitrary files to arbitrary directories.

Published May 13, 2022

CVE-2021-27505

HIGH

mySCADA myPRO versions prior to 8.20.0 does not restrict unauthorized read access to sensitive directory listing information.

Published May 13, 2022

CVE-2022-0999

HIGH

An authenticated user may be able to misuse parameters to inject arbitrary operating system commands into mySCADA myPRO versions 8.25.0 and prior.

Published Apr 11, 2022

CVE-2021-43985

CRITICAL

An unauthenticated remote attacker can access mySCADA myPRO Versions 8.20.0 and prior without any form of authentication or authorization.

Published Dec 23, 2021

CVE-2021-43989

HIGH

mySCADA myPRO Versions 8.20.0 and prior stores passwords using MD5, which may allow an attacker to crack the previously retrieved password hashes.

Published Dec 23, 2021

CVE-2021-43981

CRITICAL

mySCADA myPRO: Versions 8.20.0 and prior has a feature to send emails, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.

Published Dec 23, 2021

CVE-2021-44453

CRITICAL

mySCADA myPRO: Versions 8.20.0 and prior has a vulnerable debug interface which includes a ping utility, which may allow an attacker to inject arbitrary operating system commands.

Published Dec 23, 2021

CVE-2021-43984

CRITICAL

mySCADA myPRO: Versions 8.20.0 and prior has a feature where the firmware can be updated, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.

Published Dec 23, 2021

CVE-2021-22657

CRITICAL

mySCADA myPRO: Versions 8.20.0 and prior has a feature where the API password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.

Published Dec 23, 2021

CVE-2021-43987

CRITICAL

An additional, nondocumented administrative account exists in mySCADA myPRO Versions 8.20.0 and prior that is not exposed through the web interface, which cannot be deleted or changed through the regular web interface.

Published Dec 23, 2021

CVE-2021-23198

CRITICAL

mySCADA myPRO: Versions 8.20.0 and prior has a feature where the password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.

Published Dec 23, 2021

CVE-2021-43555

HIGH

mySCADA myDESIGNER Versions 8.20.0 and prior fails to properly validate contents of an imported project file, which may make the product vulnerable to a path traversal payload. This vulnerability may allow an attacker to plant files on the file system in arbitrary locations or overwrite existing files, resulting in remote code execution.

Published Nov 19, 2021