📦 Webaccess\/scada
by Advantech
🔍 What is Webaccess\/scada?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in Advantech WebAccess/SCADA allows attackers to send malicious RPC arguments containing raw memory pointers that the server uses without validation. This could enable remote code e...
This vulnerability allows remote attackers to execute arbitrary code on Advantech WebAccess/SCADA systems via a stack-based buffer overflow. Attackers can potentially take full control of affected sys...
Advantech WebAccess/SCADA is vulnerable to unrestricted file upload, allowing attackers to upload malicious files to the server. This can lead to remote code execution, potentially compromising indust...
Advantech WebAccess/SCADA is vulnerable to directory traversal that allows attackers to delete arbitrary files on the system. This affects industrial control systems using Advantech's SCADA software, ...
This vulnerability in Advantech WebAccess/SCADA allows attackers to overwrite any file on the operating system, potentially leading to arbitrary code execution. It affects WebAccess/SCADA v9.1.3 and e...
This vulnerability allows low-privileged users in Advantech WebAccess/SCADA to reset administrator passwords and gain full system control through privilege escalation. It affects WebAccess/SCADA versi...
This vulnerability allows local attackers to escalate privileges to NT SYSTEM level by exploiting insecure file permissions in Advantech WebAccess/SCADA installation. Attackers can replace binaries or...
Advantech WebAccess/SCADA is vulnerable to directory traversal (CWE-22), allowing attackers to check if arbitrary files exist on the system. This affects organizations using Advantech's industrial con...
Advantech WebAccess/SCADA is vulnerable to SQL injection, allowing attackers to execute arbitrary SQL commands on the database. This affects industrial control systems using vulnerable versions of Adv...
Advantech WebAccess/SCADA is vulnerable to absolute directory traversal, allowing attackers to determine if arbitrary files exist on the system. This affects all organizations using vulnerable version...