Vulnerabilities
Vulnerable Software
Scadabr:  >> Scadabr  Security Vulnerabilities
ScadaBR 1.12.4 is vulnerable to Session Fixation. The application assigns a JSESSIONID session cookie to unauthenticated users and does not regenerate the session identifier after successful authentication. As a result, a session created prior to login becomes authenticated once the victim logs in, allowing an attacker who knows the session ID to hijack an authenticated session.
CVSS Score
4.8
EPSS Score
0.0
Published
2026-03-09
CVE-2021-26828
Known exploited
OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm.
CVSS Score
8.8
EPSS Score
0.8
Published
2021-06-11
CVE-2021-26829
Known exploited
OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows stored XSS via system_settings.shtm.
CVSS Score
5.4
EPSS Score
0.069
Published
2021-06-11
A cross-site scripting (XSS) vulnerability in the login form (/ScadaBR/login.htm) in ScadaBR 1.0CE allows a remote attacker to inject arbitrary web script or HTML via the username or password parameter.
CVSS Score
6.1
EPSS Score
0.002
Published
2019-10-14
ScadaBR 1.0CE, and 1.1.x through 1.1.0-RC, has XSS via a request for a nonexistent resource, as demonstrated by the dwr/test/ PATH_INFO.
CVSS Score
6.1
EPSS Score
0.002
Published
2019-09-15


Contact Us

Shodan ® - All rights reserved