Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kingscada vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2014-0787
Stack-based buffer overflow in WellinTech KingSCADA prior to 3.1.2.13 allows remote malicious users to execute arbitrary code via a crafted packet.
Wellintech Kingscada 3.1
Wellintech Kingscada
1 EDB exploit
445
VMScore
CVE-2018-20410
WellinTech KingSCADA prior to 3.7.0.0.1 contains a stack-based buffer overflow. The vulnerability is triggered when sending a specially crafted packet to the AlarmServer (AEserver.exe) service listening on TCP port 12401.
Wellintech Kingscada
570
VMScore
CVE-2013-2826
WellinTech KingSCADA prior to 3.1.2, KingAlarm&Event prior to 3.1, and KingGraphic prior to 3.1.2 perform authentication on the KAEClientManager console rather than on the server, which allows remote malicious users to bypass intended access restrictions and discover credenti...
Wellintech Kingalarm\\&event
Wellintech Kingscada
Wellintech Kinggraphic
755
VMScore
CVE-2013-2827
An unspecified ActiveX control in WellinTech KingSCADA prior to 3.1.2, KingAlarm&Event prior to 3.1, and KingGraphic prior to 3.1.2 allows remote malicious users to download arbitrary DLL code onto a client machine and execute this code via the ProjectURL property value.
Wellintech Kingscada
Wellintech Kingalarm\\&event
Wellintech Kinggraphic
1 EDB exploit
632
VMScore
CVE-2012-1977
WellinTech KingSCADA 3.0 uses a cleartext base64 format for storage of passwords in user.db, which allows context-dependent malicious users to obtain sensitive information by reading this file.
Wellintech Kingview 3.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started