Show filters
296 Total Results
Displaying 201-210 of 296
Sort by:
Attacker Value
Unknown
CVE-2017-12123
Disclosure Date: May 14, 2018 (last updated November 26, 2024)
An exploitable clear text transmission of password vulnerability exists in the web server and telnet functionality of Moxa EDR-810 V4.1 build 17030317. An attacker can look at network traffic to get the admin password for the device. The attacker can then use the credentials to login as admin.
0
Attacker Value
Unknown
CVE-2017-14436
Disclosure Date: May 14, 2018 (last updated November 26, 2024)
An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP URI can cause a null pointer dereference resulting in denial of service. An attacker can send a GET request to "/MOXA\_CFG2.ini" without a cookie header to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-12125
Disclosure Date: May 14, 2018 (last updated November 26, 2024)
An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation resulting in root shell. An attacker can inject OS commands into the CN= parm in the "/goform/net_WebCSRGen" uri to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-14435
Disclosure Date: May 14, 2018 (last updated November 26, 2024)
An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP URI can cause a null pointer dereference resulting in denial of service. An attacker can send a GET request to "/MOXA\_CFG.ini" without a cookie header to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-12128
Disclosure Date: May 14, 2018 (last updated November 26, 2024)
An exploitable information disclosure vulnerability exists in the Server Agent functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted TCP packet can cause information disclosure. An attacker can send a crafted TCP packet to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-14437
Disclosure Date: May 14, 2018 (last updated November 26, 2024)
An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP URI can cause a null pointer dereference resulting in denial of service. An attacker can send a GET request to "/MOXA\_LOG.ini" without a cookie header to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-12121
Disclosure Date: May 14, 2018 (last updated November 26, 2024)
An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation resulting in root shell. An attacker can inject OS commands into the rsakey\_name= parm in the "/goform/WebRSAKEYGen" uri to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-14459
Disclosure Date: April 11, 2018 (last updated November 26, 2024)
An exploitable OS Command Injection vulnerability exists in the Telnet, SSH, and console login functionality of Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client in firmware versions 1.4 to 1.7 (current). An attacker can inject commands via the username parameter of several services (SSH, Telnet, console), resulting in remote, unauthenticated, root-level operating system command execution.
0
Attacker Value
Unknown
CVE-2018-7506
Disclosure Date: April 06, 2018 (last updated November 26, 2024)
The private key of the web server in Moxa MXview versions 2.8 and prior is able to be read and accessed via an HTTP GET request, which may allow a remote attacker to decrypt encrypted information.
0
Attacker Value
Unknown
CVE-2016-8717
Disclosure Date: April 02, 2018 (last updated November 26, 2024)
An exploitable Use of Hard-coded Credentials vulnerability exists in the Moxa AWK-3131A Wireless Access Point running firmware 1.1. The device operating system contains an undocumented, privileged (root) account with hard-coded credentials, giving attackers full control of affected devices.
0