Vulnerabilities (CVE)

Filtered by vendor Moxa Subscribe
Total 287 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2015-6458 1 Moxa 1 Softcms 2024-11-21 6.8 MEDIUM 8.8 HIGH
Moxa SoftCMS 1.3 and prior is susceptible to a buffer overflow condition that may crash or allow remote code execution. Moxa released SoftCMS version 1.4 on June 1, 2015, to address the vulnerability.
CVE-2015-6457 1 Moxa 1 Softcms 2024-11-21 6.8 MEDIUM 8.8 HIGH
Moxa SoftCMS 1.3 and prior is susceptible to a buffer overflow condition that may crash or allow remote code execution. Moxa released SoftCMS version 1.4 on June 1, 2015, to address the vulnerability.
CVE-2024-4739 1 Moxa 1 Mxsecurity 2024-10-22 N/A 5.3 MEDIUM
The lack of access restriction to a resource from unauthorized users makes MXsecurity software versions v1.1.0 and prior vulnerable. By acquiring a valid authenticator, an attacker can pose as an authorized user and successfully access the resource.
CVE-2024-4740 1 Moxa 1 Mxsecurity 2024-10-18 N/A 5.3 MEDIUM
MXsecurity software versions v1.1.0 and prior are vulnerable because of the use of hard-coded credentials. This vulnerability could allow an attacker to tamper with sensitive data.
CVE-2024-6786 1 Moxa 1 Mxview One 2024-09-30 N/A 6.5 MEDIUM
The vulnerability allows an attacker to craft MQTT messages that include relative path traversal sequences, enabling them to read arbitrary files on the system. This could lead to the disclosure of sensitive information, such as configuration files and JWT signing secrets.
CVE-2024-6787 1 Moxa 1 Mxview One 2024-09-30 N/A 5.3 MEDIUM
This vulnerability occurs when an attacker exploits a race condition between the time a file is checked and the time it is used (TOCTOU). By exploiting this race condition, an attacker can write arbitrary files to the system. This could allow the attacker to execute malicious code and potentially cause file losses.
CVE-2024-6785 1 Moxa 2 Mxview One, Mxview One Central Manager 2024-09-27 N/A 5.5 MEDIUM
The configuration file stores credentials in cleartext. An attacker with local access rights can read or modify the configuration file, potentially resulting in the service being abused due to sensitive information exposure.