Show filters
36 Total Results
Displaying 1-10 of 36
Sort by:
Attacker Value
Very High

CVE-2020-14511

Disclosure Date: July 15, 2020 (last updated February 21, 2025)
Malicious operation of the crafted web browser cookie may cause a stack-based buffer overflow in the system web server on the EDR-G902 and EDR-G903 Series Routers (versions prior to 5.4).
Attacker Value
Unknown

CVE-2023-4452

Disclosure Date: November 01, 2023 (last updated November 10, 2023)
A vulnerability has been identified in the EDR-810, EDR-G902, and EDR-G903 Series, making them vulnerable to the denial-of-service vulnerability. This vulnerability stems from insufficient input validation in the URI, potentially enabling malicious users to trigger the device reboot.
Attacker Value
Unknown

CVE-2023-26239

Disclosure Date: October 05, 2023 (last updated October 12, 2023)
An issue was discovered in WatchGuard EPDR 8.0.21.0002. Due to a weak implementation of a password check, it is possible to obtain credentials to access the management console as a non-privileged user.
Attacker Value
Unknown

CVE-2023-26238

Disclosure Date: October 05, 2023 (last updated October 12, 2023)
An issue was discovered in WatchGuard EPDR 8.0.21.0002. It is possible to enable or disable defensive capabilities by sending a crafted message to a named pipe.
Attacker Value
Unknown

CVE-2023-26237

Disclosure Date: October 05, 2023 (last updated October 12, 2023)
An issue was discovered in WatchGuard EPDR 8.0.21.0002. It is possible to bypass the defensive capabilities by adding a registry key as SYSTEM.
Attacker Value
Unknown

CVE-2023-26236

Disclosure Date: October 05, 2023 (last updated October 12, 2023)
An issue was discovered in WatchGuard EPDR 8.0.21.0002. Due to a weak implementation of message handling between WatchGuard EPDR processes, it is possible to perform a Local Privilege Escalation on Windows by sending a crafted message to a named pipe.
Attacker Value
Unknown

CVE-2023-27396

Disclosure Date: June 19, 2023 (last updated October 08, 2023)
FINS (Factory Interface Network Service) is a message communication protocol, which is designed to be used in closed FA (Factory Automation) networks, and is used in FA networks composed of OMRON products. Multiple OMRON products that implement FINS protocol contain following security issues -- (1)Plaintext communication, and (2)No authentication required. When FINS messages are intercepted, the contents may be retrieved. When arbitrary FINS messages are injected, any commands may be executed on, or the system information may be retrieved from, the affected device. Affected products and versions are as follows: SYSMAC CS-series CPU Units, all versions, SYSMAC CJ-series CPU Units, all versions, SYSMAC CP-series CPU Units, all versions, SYSMAC NJ-series CPU Units, all versions, SYSMAC NX1P-series CPU Units, all versions, SYSMAC NX102-series CPU Units, all versions, and SYSMAC NX7 Database Connection CPU Units (Ver.1.16 or later)
Attacker Value
Unknown

CVE-2020-28144

Disclosure Date: February 03, 2021 (last updated February 22, 2025)
Certain Moxa Inc products are affected by an improper restriction of operations in EDR-G903 Series Firmware Version 5.5 or lower, EDR-G902 Series Firmware Version 5.5 or lower, and EDR-810 Series Firmware Version 5.6 or lower. Crafted requests sent to the device may allow remote arbitrary code execution.
Attacker Value
Unknown

CVE-2019-10963

Disclosure Date: October 08, 2019 (last updated November 27, 2024)
Moxa EDR 810, all versions 5.1 and prior, allows an unauthenticated attacker to be able to retrieve some log files from the device, which may allow sensitive information disclosure. Log files must have previously been exported by a legitimate user.
Attacker Value
Unknown

CVE-2019-10969

Disclosure Date: October 08, 2019 (last updated November 27, 2024)
Moxa EDR 810, all versions 5.1 and prior, allows an authenticated attacker to abuse the ping feature to execute unauthorized commands on the router, which may allow an attacker to perform remote code execution.