| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2023-39460 | Triangle MicroWorks SCADA Data Gateway Event Log Directory Traversal Arbitrary File Creation Vulnerability | Triangle MicroWorks | SCADA Data Gateway | 高危 | - | 2024-05-03 01:59:24 | Deep Dive |
| CVE-2023-39458 | Triangle MicroWorks SCADA Data Gateway Use of Hard-coded Credentials Authentication Bypass Vulnerability | Triangle MicroWorks | SCADA Data Gateway | 中危 | - | 2024-05-03 01:59:23 | Deep Dive |
| CVE-2023-39457 | Triangle MicroWorks SCADA Data Gateway Missing Authentication Vulnerability | Triangle MicroWorks | SCADA Data Gateway | 超危 | - | 2024-05-03 01:59:22 | Deep Dive |
| CVE-2024-2453 | Advantech WebAccess/SCADA SQL Injection | Advantech | WebAccess/SCADA | Medium | 6.4 | 2024-03-21 22:39:15 | Deep Dive |
| CVE-2024-21866 | Generation of Error Message Containing Sensitive Information in Rapid SCADA | Rapid Software LLC | Rapid SCADA | Medium | 5.3 | 2024-02-01 23:34:07 | Deep Dive |
| CVE-2024-21869 | Plaintext Storage of a Password in Rapid SCADA | Rapid Software LLC | Rapid SCADA | Medium | 6.2 | 2024-02-01 23:31:32 | Deep Dive |
| CVE-2024-21764 | Use of Hard-Coded Credentials in Rapid SCADA | Rapid Software LLC | Rapid SCADA | Critical | 9.8 | 2024-02-01 23:28:33 | Deep Dive |
| CVE-2024-21794 | Open Redirect in Rapid SCADA | Rapid Software LLC | Rapid SCADA | Medium | 5.4 | 2024-02-01 23:25:58 | Deep Dive |
| CVE-2024-22016 | Incorrect Permission Assignment for Critical Resource in Rapid SCADA | Rapid Software LLC | Rapid SCADA | High | 7.8 | 2024-02-01 23:19:59 | Deep Dive |
| CVE-2024-22096 | Relative Path Traversal in Rapid SCADA | Rapid Software LLC | Rapid SCADA | Medium | 6.5 | 2024-02-01 23:15:07 | Deep Dive |
| CVE-2024-21852 | Rapid SCADA Path Traversal | Rapid Software LLC | Rapid SCADA | High | 8.8 | 2024-02-01 23:10:59 | Deep Dive |
| CVE-2023-34982 | AVEVA Operations Control Logger External Control of File Name or Path | AVEVA | SystemPlatform | Medium | 5.5 | 2023-11-15 16:28:35 | Deep Dive |
| CVE-2023-33873 | AVEVA Operations Control Logger Execution with Unnecessary Privileges | AVEVA | SystemPlatform | High | 7.8 | 2023-11-15 16:22:32 | Deep Dive |
| CVE-2023-5987 | Schneider Electric EcoStruxure Power Monitoring Expert 安全漏洞 | Schneider Electric | EcoStruxure Power Monitoring Expert (PME) | Medium | 6.1 | 2023-11-15 03:48:51 | Deep Dive |
| CVE-2023-5986 | Schneider Electric EcoStruxure Power Monitoring Expert 安全漏洞 | Schneider Electric | EcoStruxure Power Monitoring Expert (PME) | High | 8.2 | 2023-11-15 03:47:18 | Deep Dive |
| CVE-2023-42494 | EisBaer Scada - CWE-749: Exposed Dangerous Method or Function | EisBaer Scada | v3.0.6433.1964 | High | 7.5 | 2023-10-25 14:45:05 | Deep Dive |
| CVE-2023-42493 | EisBaer Scada - CWE-256: Plaintext Storage of a Password | EisBaer Scada | v3.0.6433.1964 | High | 7.1 | 2023-10-25 14:44:00 | Deep Dive |
| CVE-2023-42492 | EisBaer Scada - CWE-321: Use of Hard-coded Cryptographic Key | EisBaer Scada | v3.0.6433.1964 | High | 7.1 | 2023-10-25 14:42:54 | Deep Dive |
| CVE-2023-42490 | EisBaer Scada - CWE-200: Exposure of Sensitive Information to an Unauthorized Actor | EisBaer Scada | v3.0.6433.1964 | High | 7.5 | 2023-10-25 14:41:10 | Deep Dive |
| CVE-2023-42489 | EisBaer Scada - CWE-732: Incorrect Permission Assignment for Critical Resource | EisBaer Scada | v3.0.6433.1964 | High | 7.5 | 2023-10-25 14:40:15 | Deep Dive |