Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown

CVE-2023-30459

Disclosure Date: April 14, 2023 (last updated October 08, 2023)
SmartPTT SCADA 1.1.0.0 allows remote code execution (when the attacker has administrator privileges) by writing a malicious C# script and executing it on the server (via server settings in the administrator control panel on port 8101, by default).
Attacker Value
Unknown

CVE-2021-43938

Disclosure Date: April 29, 2022 (last updated February 23, 2025)
Elcomplus SmartPTT SCADA Server is vulnerable to an unauthenticated user can request various files from the server without any authentication or authorization.
Attacker Value
Unknown

CVE-2021-43937

Disclosure Date: April 29, 2022 (last updated February 23, 2025)
Elcomplus SmartPTT SCADA Server web application does not, or cannot, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Attacker Value
Unknown

CVE-2021-43939

Disclosure Date: April 28, 2022 (last updated February 23, 2025)
Elcomplus SmartPTT is vulnerable when a low-authenticated user can access higher level administration authorization by issuing requests directly to the desired endpoints.
Attacker Value
Unknown

CVE-2021-43934

Disclosure Date: April 28, 2022 (last updated February 23, 2025)
Elcomplus SmartPTT is vulnerable as the backup and restore system does not adequately validate upload requests, enabling a malicious user to potentially upload arbitrary files.
Attacker Value
Unknown

CVE-2021-43932

Disclosure Date: April 28, 2022 (last updated February 23, 2025)
Elcomplus SmartPTT is vulnerable when an attacker injects JavaScript code into a specific parameter that can executed upon accessing the dashboard or the main page.
Attacker Value
Unknown

CVE-2021-43930

Disclosure Date: April 28, 2022 (last updated February 23, 2025)
Elcomplus SmartPTT is vulnerable as the backup and restore system does not adequately validate download requests, enabling malicious users to perform path traversal attacks and potentially download arbitrary files from the system.