Search
Search Results (16 CVEs found)
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2017-7456 | 1 Moxa | 1 Mxview | 2025-04-20 | N/A |
Moxa MXView 2.8 allows remote attackers to cause a Denial of Service by sending overly long junk payload for the MXView client login credentials. | ||||
CVE-2017-7455 | 1 Moxa | 1 Mxview | 2025-04-20 | N/A |
Moxa MXView 2.8 allows remote attackers to read web server's private key file, no access control. | ||||
CVE-2021-40390 | 1 Moxa | 1 Mxview | 2025-04-15 | 9.8 Critical |
An authentication bypass vulnerability exists in the Web Application functionality of Moxa MXView Series 3.2.4. A specially-crafted HTTP request can lead to unauthorized access. An attacker can send an HTTP request to trigger this vulnerability. | ||||
CVE-2021-40392 | 1 Moxa | 1 Mxview | 2025-04-15 | 7.5 High |
An information disclosure vulnerability exists in the Web Application functionality of Moxa MXView Series 3.2.4. Network sniffing can lead to a disclosure of sensitive information. An attacker can sniff network traffic to exploit this vulnerability. | ||||
CVE-2021-38460 | 1 Moxa | 1 Mxview | 2024-11-21 | 7.5 High |
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries. | ||||
CVE-2021-38458 | 1 Moxa | 1 Mxview | 2024-11-21 | 9.8 Critical |
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries. | ||||
CVE-2021-38456 | 1 Moxa | 1 Mxview | 2024-11-21 | 9.8 Critical |
A use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to gain access through accounts using default passwords | ||||
CVE-2021-38454 | 1 Moxa | 1 Mxview | 2024-11-21 | 10 Critical |
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries. | ||||
CVE-2021-38452 | 1 Moxa | 1 Mxview | 2024-11-21 | 7.5 High |
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries. | ||||
CVE-2020-13537 | 1 Moxa | 1 Mxview | 2024-11-21 | 7.8 High |
An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation. Depending on the vector chosen, an attacker can either add code to a script or replace a binary.By default MXViewService, which starts as a NT SYSTEM authority user executes a series of Node.Js scripts to start additional application functionality and among them the mosquitto executable is also run. | ||||
CVE-2020-13536 | 1 Moxa | 1 Mxview | 2024-11-21 | 7.8 High |
An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation. Depending on the vector chosen, an attacker can either add code to a script or replace a binary. By default MXViewService, which starts as a NT SYSTEM authority user executes a series of Node.Js scripts to start additional application functionality. | ||||
CVE-2018-7506 | 1 Moxa | 1 Mxview | 2024-11-21 | N/A |
The private key of the web server in Moxa MXview versions 2.8 and prior is able to be read and accessed via an HTTP GET request, which may allow a remote attacker to decrypt encrypted information. | ||||
CVE-2017-14030 | 1 Moxa | 1 Mxview | 2024-11-21 | N/A |
An issue was discovered in Moxa MXview v2.8 and prior. The unquoted service path escalation vulnerability could allow an authorized user with file access to escalate privileges by inserting arbitrary code into the unquoted service path. | ||||
CVE-2024-6786 | 1 Moxa | 1 Mxview One | 2024-09-30 | 6.5 Medium |
The vulnerability allows an attacker to craft MQTT messages that include relative path traversal sequences, enabling them to read arbitrary files on the system. This could lead to the disclosure of sensitive information, such as configuration files and JWT signing secrets. | ||||
CVE-2024-6787 | 1 Moxa | 1 Mxview One | 2024-09-30 | 5.3 Medium |
This vulnerability occurs when an attacker exploits a race condition between the time a file is checked and the time it is used (TOCTOU). By exploiting this race condition, an attacker can write arbitrary files to the system. This could allow the attacker to execute malicious code and potentially cause file losses. | ||||
CVE-2024-6785 | 1 Moxa | 2 Mxview One, Mxview One Central Manager | 2024-09-27 | 5.5 Medium |
The configuration file stores credentials in cleartext. An attacker with local access rights can read or modify the configuration file, potentially resulting in the service being abused due to sensitive information exposure. |
Page 1 of 1.