Show filters
296 Total Results
Displaying 151-160 of 296
Sort by:
Attacker Value
Unknown

CVE-2018-11426

Disclosure Date: July 03, 2019 (last updated November 27, 2024)
A weak Cookie parameter is used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. An attacker can brute force parameters required to bypass authentication and access the web interface to use all its functions except for password change.
0
Attacker Value
Unknown

CVE-2018-11427

Disclosure Date: July 03, 2019 (last updated November 27, 2024)
CSRF tokens are not used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior, which makes it possible to perform CSRF attacks on the device administrator.
0
Attacker Value
Unknown

CVE-2018-10700

Disclosure Date: June 07, 2019 (last updated November 27, 2024)
An issue was discovered on Moxa AWK-3121 1.19 devices. It provides functionality so that an administrator can change the name of the device. However, the same functionality allows an attacker to execute XSS by injecting an XSS payload. The POST parameter "iw_board_deviceName" is susceptible to this injection.
0
Attacker Value
Unknown

CVE-2018-10702

Disclosure Date: June 07, 2019 (last updated November 27, 2024)
An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_filename" is susceptible to command injection via shell metacharacters.
Attacker Value
Unknown

CVE-2018-10692

Disclosure Date: June 07, 2019 (last updated November 27, 2024)
An issue was discovered on Moxa AWK-3121 1.14 devices. The session cookie "Password508" does not have an HttpOnly flag. This allows an attacker who is able to execute a cross-site scripting attack to steal the cookie very easily.
0
Attacker Value
Unknown

CVE-2018-10690

Disclosure Date: June 07, 2019 (last updated November 27, 2024)
An issue was discovered on Moxa AWK-3121 1.14 devices. The device by default allows HTTP traffic thus providing an insecure communication mechanism for a user connecting to the web server. This allows an attacker to sniff the traffic easily and allows an attacker to compromise sensitive data such as credentials.
Attacker Value
Unknown

CVE-2018-10701

Disclosure Date: June 07, 2019 (last updated November 27, 2024)
An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_filename" is susceptible to buffer overflow. By crafting a packet that contains a string of 162 characters, it is possible for an attacker to execute the attack.
0
Attacker Value
Unknown

CVE-2018-10698

Disclosure Date: June 07, 2019 (last updated November 27, 2024)
An issue was discovered on Moxa AWK-3121 1.14 devices. The device enables an unencrypted TELNET service by default. This allows an attacker who has been able to gain an MITM position to easily sniff the traffic between the device and the user. Also an attacker can easily connect to the TELNET daemon using the default credentials if they have not been changed by the user.
Attacker Value
Unknown

CVE-2018-10695

Disclosure Date: June 07, 2019 (last updated November 27, 2024)
An issue was discovered on Moxa AWK-3121 1.14 devices. It provides alert functionality so that an administrator can send emails to his/her account when there are changes to the device's network. However, the same functionality allows an attacker to execute commands on the device. The POST parameters "to1,to2,to3,to4" are all susceptible to buffer overflow. By crafting a packet that contains a string of 678 characters, it is possible for an attacker to execute the attack.
0
Attacker Value
Unknown

CVE-2018-10691

Disclosure Date: June 07, 2019 (last updated November 27, 2024)
An issue was discovered on Moxa AWK-3121 1.14 devices. It is intended that an administrator can download /systemlog.log (the system log). However, the same functionality allows an attacker to download the file without any authentication or authorization.
0