Show filters
296 Total Results
Displaying 1-10 of 296
Sort by:
Attacker Value
Very High

CVE-2020-14511

Disclosure Date: July 15, 2020 (last updated February 21, 2025)
Malicious operation of the crafted web browser cookie may cause a stack-based buffer overflow in the system web server on the EDR-G902 and EDR-G903 Series Routers (versions prior to 5.4).
Attacker Value
Unknown

CVE-2024-7695

Disclosure Date: January 29, 2025 (last updated February 23, 2025)
Multiple switches are affected by an out-of-bounds write vulnerability. This vulnerability is caused by insufficient input validation, which allows data to be written to memory outside the bounds of the buffer. Successful exploitation of this vulnerability could result in a denial-of-service attack.
0
Attacker Value
Unknown

CVE-2025-0193

Disclosure Date: January 15, 2025 (last updated January 15, 2025)
A stored Cross-site Scripting (XSS) vulnerability exists in the MGate 5121/5122/5123 Series firmware version v1.0 because of insufficient sanitization and encoding of user input in the "Login Message" functionality. An authenticated attacker with administrative access can exploit this vulnerability to inject malicious scripts that are continuously stored on the device. These scripts are executed when other users access the login page, potentially resulting in unauthorized actions or other impacts, depending on the user's privileges.
0
Attacker Value
Unknown

CVE-2024-12297

Disclosure Date: January 15, 2025 (last updated January 15, 2025)
Moxa’s Ethernet switch EDS-508A Series, running firmware version 3.11 and earlier, is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.
0
Attacker Value
Unknown

CVE-2024-9140

Disclosure Date: January 03, 2025 (last updated January 05, 2025)
Moxa’s cellular routers, secure routers, and network security appliances are affected by a critical vulnerability, CVE-2024-9140. This vulnerability allows OS command injection due to improperly restricted commands, potentially enabling attackers to execute arbitrary code. This poses a significant risk to the system’s security and functionality.
0
Attacker Value
Unknown

CVE-2024-9138

Disclosure Date: January 03, 2025 (last updated January 05, 2025)
Moxa’s cellular routers, secure routers, and network security appliances are affected by a high-severity vulnerability, CVE-2024-9138. This vulnerability involves hard-coded credentials, enabling an authenticated user to escalate privileges and gain root-level access to the system, posing a significant security risk.
0
Attacker Value
Unknown

CVE-2024-9404

Disclosure Date: December 04, 2024 (last updated February 20, 2025)
This vulnerability could lead to denial-of-service or service crashes. Exploitation of the moxa_cmd service, because of insufficient input validation, allows attackers to disrupt operations. If exposed to public networks, the vulnerability poses a significant remote threat, potentially allowing attackers to shut down affected systems.
0
Attacker Value
Unknown

CVE-2024-4740

Disclosure Date: October 18, 2024 (last updated October 19, 2024)
MXsecurity software versions v1.1.0 and prior are vulnerable because of the use of hard-coded credentials. This vulnerability could allow an attacker to tamper with sensitive data.
Attacker Value
Unknown

CVE-2024-4739

Disclosure Date: October 18, 2024 (last updated October 23, 2024)
The lack of access restriction to a resource from unauthorized users makes MXsecurity software versions v1.1.0 and prior vulnerable. By acquiring a valid authenticator, an attacker can pose as an authorized user and successfully access the resource.
Attacker Value
Unknown

CVE-2024-9139

Disclosure Date: October 14, 2024 (last updated October 25, 2024)
The affected product permits OS command injection through improperly restricted commands, potentially allowing attackers to execute arbitrary code.
0