Show filters
296 Total Results
Displaying 201-210 of 296
Sort by:
Attacker Value
Unknown

CVE-2017-12123

Disclosure Date: May 14, 2018 (last updated November 26, 2024)
An exploitable clear text transmission of password vulnerability exists in the web server and telnet functionality of Moxa EDR-810 V4.1 build 17030317. An attacker can look at network traffic to get the admin password for the device. The attacker can then use the credentials to login as admin.
Attacker Value
Unknown

CVE-2017-14436

Disclosure Date: May 14, 2018 (last updated November 26, 2024)
An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP URI can cause a null pointer dereference resulting in denial of service. An attacker can send a GET request to "/MOXA\_CFG2.ini" without a cookie header to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-12125

Disclosure Date: May 14, 2018 (last updated November 26, 2024)
An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation resulting in root shell. An attacker can inject OS commands into the CN= parm in the "/goform/net_WebCSRGen" uri to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-14435

Disclosure Date: May 14, 2018 (last updated November 26, 2024)
An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP URI can cause a null pointer dereference resulting in denial of service. An attacker can send a GET request to "/MOXA\_CFG.ini" without a cookie header to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-12128

Disclosure Date: May 14, 2018 (last updated November 26, 2024)
An exploitable information disclosure vulnerability exists in the Server Agent functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted TCP packet can cause information disclosure. An attacker can send a crafted TCP packet to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-14437

Disclosure Date: May 14, 2018 (last updated November 26, 2024)
An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP URI can cause a null pointer dereference resulting in denial of service. An attacker can send a GET request to "/MOXA\_LOG.ini" without a cookie header to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-12121

Disclosure Date: May 14, 2018 (last updated November 26, 2024)
An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation resulting in root shell. An attacker can inject OS commands into the rsakey\_name= parm in the "/goform/WebRSAKEYGen" uri to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-14459

Disclosure Date: April 11, 2018 (last updated November 26, 2024)
An exploitable OS Command Injection vulnerability exists in the Telnet, SSH, and console login functionality of Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client in firmware versions 1.4 to 1.7 (current). An attacker can inject commands via the username parameter of several services (SSH, Telnet, console), resulting in remote, unauthenticated, root-level operating system command execution.
0
Attacker Value
Unknown

CVE-2018-7506

Disclosure Date: April 06, 2018 (last updated November 26, 2024)
The private key of the web server in Moxa MXview versions 2.8 and prior is able to be read and accessed via an HTTP GET request, which may allow a remote attacker to decrypt encrypted information.
0
Attacker Value
Unknown

CVE-2016-8717

Disclosure Date: April 02, 2018 (last updated November 26, 2024)
An exploitable Use of Hard-coded Credentials vulnerability exists in the Moxa AWK-3131A Wireless Access Point running firmware 1.1. The device operating system contains an undocumented, privileged (root) account with hard-coded credentials, giving attackers full control of affected devices.