Show filters
296 Total Results
Displaying 211-220 of 296
Sort by:
Attacker Value
Unknown
CVE-2018-5455
Disclosure Date: March 05, 2018 (last updated November 26, 2024)
A Reliance on Cookies without Validation and Integrity Checking issue was discovered in Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. The application allows a cookie parameter to consist of only digits, allowing an attacker to perform a brute force attack bypassing authentication and gaining access to device functions.
0
Attacker Value
Unknown
CVE-2018-5453
Disclosure Date: March 05, 2018 (last updated November 26, 2024)
An Improper Handling of Length Parameter Inconsistency issue was discovered in Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. An attacker may be able to edit the element of an HTTP request, causing the device to become unavailable.
0
Attacker Value
Unknown
CVE-2018-5449
Disclosure Date: March 05, 2018 (last updated November 26, 2024)
A NULL Pointer Dereference issue was discovered in Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. The application does not check for a NULL value, allowing for an attacker to perform a denial of service attack.
0
Attacker Value
Unknown
CVE-2017-5170
Disclosure Date: January 18, 2018 (last updated November 26, 2024)
An Uncontrolled Search Path Element issue was discovered in Moxa SoftNVR-IA Live Viewer, Version 3.30.3122 and prior versions. An uncontrolled search path element (DLL Hijacking) vulnerability has been identified. To exploit this vulnerability, an attacker could rename a malicious DLL to meet the criteria of the application, and the application would not verify that the DLL is correct. The attacker needs to have administrative access to the default install location in order to plant the insecure DLL. Once loaded by the application, the DLL could run malicious code at the privilege level of the application.
0
Attacker Value
Unknown
CVE-2017-12729
Disclosure Date: January 18, 2018 (last updated November 26, 2024)
A SQL Injection issue was discovered in Moxa SoftCMS Live Viewer through 1.6. An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability has been identified. Attackers can exploit this vulnerability to access SoftCMS without knowing the user's password.
0
Attacker Value
Unknown
CVE-2017-14030
Disclosure Date: January 12, 2018 (last updated November 26, 2024)
An issue was discovered in Moxa MXview v2.8 and prior. The unquoted service path escalation vulnerability could allow an authorized user with file access to escalate privileges by inserting arbitrary code into the unquoted service path.
0
Attacker Value
Unknown
CVE-2017-16727
Disclosure Date: December 22, 2017 (last updated November 26, 2024)
A Credentials Management issue was discovered in Moxa NPort W2150A versions prior to 1.11, and NPort W2250A versions prior to 1.11. The default password is empty on the device. An unauthorized user can access the device without a password. An unauthorized user has the ability to completely compromise the confidentiality and integrity of the wireless traffic.
0
Attacker Value
Unknown
CVE-2017-13701
Disclosure Date: November 23, 2017 (last updated November 26, 2024)
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. The backup file contains sensitive information in a insecure way. There is no salt for password hashing. Indeed passwords are stored without being ciphered with a timestamped ciphering method.
0
Attacker Value
Unknown
CVE-2017-13698
Disclosure Date: November 23, 2017 (last updated November 26, 2024)
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. An attacker could extract public and private keys from the firmware image available on the MOXA website and could use them against a production switch that has the default keys embedded.
0
Attacker Value
Unknown
CVE-2017-13699
Disclosure Date: November 23, 2017 (last updated November 26, 2024)
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. The password encryption method can be retrieved from the firmware. This encryption method is based on a chall value that is sent in cleartext as a POST parameter. An attacker could reverse the password encryption algorithm to retrieve it.
0