Page 56 of 290 results (0.008 seconds)

CVSS: 5.3EPSS: 0%CPEs: 16EXPL: 0

Moxa ioLogik E2200 devices before 3.12 and ioAdmin Configuration Utility before 3.18 do not properly encrypt credentials, which makes it easier for remote attackers to obtain the associated cleartext via unspecified vectors. Dispositivos Moxa ioLogik E2200 en versiones anteriores 3.12 e ioAdmin Configuration Utility en versiones anteriores a 3.18 no cifran correctamente las credenciales, lo que facilita a atacantes remotos obtener el texto plano asociado a través de vectores no especificados. • https://ics-cert.us-cert.gov/advisories/ICSA-16-063-01 • CWE-255: Credentials Management Errors •

CVSS: 8.3EPSS: 21%CPEs: 1EXPL: 0

The MessageBrokerServlet servlet in Moxa OnCell Central Manager before 2.2 does not require authentication, which allows remote attackers to obtain administrative access via a command, as demonstrated by the addUserAndGroup action. El servlet MessageBrokerServlet en Moxa OnCell Central Manager en versiones anteriores a 2.2 no requiere autenticación, lo que permite a atacantes remotos obtener acceso administrativo a través de un comando, según lo demostrado por la acción addUserAndGroup. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Moxa OnCell Central Manager Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the MessageBrokerServlet servlet, which does not ensure a user is authenticated prior to accepting commands. An attacker can exploit this condition to perform various actions, including addUserAndGroup, to take full control of the product and achieve code execution on all managed hosts. • http://zerodayinitiative.com/advisories/ZDI-15-452 https://ics-cert.us-cert.gov/advisories/ICSA-15-328-01 • CWE-287: Improper Authentication •

CVSS: 8.3EPSS: 22%CPEs: 1EXPL: 0

The login function in the RequestController class in Moxa OnCell Central Manager before 2.2 has a hardcoded root password, which allows remote attackers to obtain administrative access via a login session. La función de inicio de sesión en la clase RequestController en Moxa OnCell Central Manager en versiones anteriores a 2.2 tiene una contraseña de root embebida, lo que permite a atacantes remotos obtener acceso administrativo a través de un inicio de sesión. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Moxa OnCell Central Manager Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the RequestController class. The specific flaw exists within the login() function which contains hard-coded credentials. • http://zerodayinitiative.com/advisories/ZDI-15-453 https://ics-cert.us-cert.gov/advisories/ICSA-15-328-01 •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

Cross-site scripting (XSS) vulnerability in the Diagnosis Ping feature in the administrative web interface on Moxa EDS-405A and EDS-408A switches with firmware before 3.6 allows remote attackers to inject arbitrary web script or HTML via an unspecified field. Vulnerabilidad de XSS en la funcionalidad Diagnosis Ping en la interfaz web administrativa en switches Moxa EDS-405A y EDS-408A con firmware anterior a 3.6, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de un campo no especificado. • http://www.moxa.com/support/download.aspx?type=support&id=328 https://ics-cert.us-cert.gov/advisories/ICSA-15-246-03 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 0%CPEs: 4EXPL: 0

The GoAhead web server on Moxa EDS-405A and EDS-408A switches with firmware before 3.6 allows remote authenticated users to cause a denial of service (reboot) via a crafted URL. Vulnerabilidad en el servidor web GoAhead en switches Moxa EDS-405A y EDS-408A con firmware anterior a 3.6, permite a usuarios remotos autenticados causar una denegación de servicio (reinicio) a través de una URL manipulada. • http://www.moxa.com/support/download.aspx?type=support&id=328 http://www.securitytracker.com/id/1033543 https://ics-cert.us-cert.gov/advisories/ICSA-15-246-03 •