Vulnerabilities > Rapidscada > Rapid Scada > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-09-22 | CVE-2024-47221 | Weak Password Requirements vulnerability in Rapidscada Rapid Scada CheckUser in ScadaServerEngine/MainLogic.cs in Rapid SCADA through 5.8.4 allows an empty password. | 7.5 |
2024-02-02 | CVE-2024-22016 | Incorrect Permission Assignment for Critical Resource vulnerability in Rapidscada Rapid Scada In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an authorized user can write directly to the Scada directory. | 7.8 |
2024-02-01 | CVE-2024-21852 | Path Traversal vulnerability in Rapidscada Rapid Scada In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can supply a malicious configuration file by utilizing a Zip Slip vulnerability in the unpacking routine to achieve remote code execution. | 8.8 |
2020-08-14 | CVE-2020-22722 | Unrestricted Upload of File with Dangerous Type vulnerability in Rapidscada Rapid Scada 5.8.0 Rapid Software LLC Rapid SCADA 5.8.0 is affected by a local privilege escalation vulnerability in the ScadaAgentSvc.exe executable file. | 7.8 |
2018-03-08 | CVE-2018-5313 | Incorrect Permission Assignment for Critical Resource vulnerability in Rapidscada Rapid Scada 5.5.0 A vulnerability allows local attackers to escalate privilege on Rapid Scada 5.5.0 because of weak C:\SCADA permissions. | 7.8 |