cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-6999,https://securityvulnerability.io/vulnerability/CVE-2020-6999,,"In Moxa EDS-G516E Series firmware, Version 5.2 or lower, some of the parameters in the setting pages do not ensure text is the correct size for its buffer.",Moxa,"Moxa Eds-g516e Series Firmware, Version 5.2 Or Lower",6.5,MEDIUM,0.006819999776780605,false,,false,false,false,,,false,false,,2020-03-26T12:06:51.000Z,0 CVE-2020-6997,https://securityvulnerability.io/vulnerability/CVE-2020-6997,,"In Moxa EDS-G516E Series firmware, Version 5.2 or lower, sensitive information is transmitted over some web applications in cleartext.",Moxa,"Moxa Eds-g516e Series Firmware, Version 5.2 Or Lower",7.5,HIGH,0.0012799999676644802,false,,false,false,false,,,false,false,,2020-03-24T20:31:59.000Z,0 CVE-2020-6991,https://securityvulnerability.io/vulnerability/CVE-2020-6991,,"In Moxa EDS-G516E Series firmware, Version 5.2 or lower, weak password requirements may allow an attacker to gain access using brute force.",Moxa,"Moxa Eds-g516e Series Firmware, Version 5.2 Or Lower",9.8,CRITICAL,0.001930000027641654,false,,false,false,false,,,false,false,,2020-03-24T20:29:40.000Z,0 CVE-2020-6981,https://securityvulnerability.io/vulnerability/CVE-2020-6981,,"In Moxa EDS-G516E Series firmware, Version 5.2 or lower, an attacker may gain access to the system without proper authentication.",Moxa,"Moxa Eds-g516e Series Firmware, Version 5.2 Or Lower",9.8,CRITICAL,0.001610000035725534,false,,false,false,false,,,false,false,,2020-03-24T20:23:48.000Z,0 CVE-2020-6979,https://securityvulnerability.io/vulnerability/CVE-2020-6979,,"In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a hard-coded cryptographic key, increasing the possibility that confidential data can be recovered.",Moxa,"Moxa Eds-g516e Series Firmware, Version 5.2 Or Lower",7.5,HIGH,0.0012600000482052565,false,,false,false,false,,,false,false,,2020-03-24T20:21:41.000Z,0 CVE-2020-7001,https://securityvulnerability.io/vulnerability/CVE-2020-7001,,"In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed.",Moxa,"Moxa Eds-g516e Series Firmware, Version 5.2 Or Lower",7.5,HIGH,0.0012799999676644802,false,,false,false,false,,,false,false,,2020-03-24T20:15:15.000Z,0 CVE-2020-7007,https://securityvulnerability.io/vulnerability/CVE-2020-7007,,"In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the attacker may execute arbitrary codes or target the device, causing it to go out of service.",Moxa,"Moxa Eds-g516e Series Firmware, Version 5.2 Or Lower",9.8,CRITICAL,0.017559999600052834,false,,false,false,false,,,false,false,,2020-03-24T20:12:37.000Z,0 CVE-2020-6993,https://securityvulnerability.io/vulnerability/CVE-2020-6993,,"In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, an attacker can gain access to sensitive information from the web service without authorization.",Moxa,"Moxa Pt-7528 Series Firmware, Version 4.0 Or Lower, Pt-7828 Series Firmware, Version 3.9 Or Lower",7.5,HIGH,0.0012799999676644802,false,,false,false,false,,,false,false,,2020-03-24T19:19:09.000Z,0 CVE-2020-6995,https://securityvulnerability.io/vulnerability/CVE-2020-6995,,"In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the application utilizes weak password requirements, which may allow an attacker to gain unauthorized access.",Moxa,"Moxa Pt-7528 Series Firmware, Version 4.0 Or Lower, Pt-7828 Series Firmware, Version 3.9 Or Lower",9.8,CRITICAL,0.001930000027641654,false,,false,false,false,,,false,false,,2020-03-24T19:16:16.000Z,0 CVE-2020-6985,https://securityvulnerability.io/vulnerability/CVE-2020-6985,,"In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, these devices use a hard-coded service code for access to the console.",Moxa,"Moxa Pt-7528 Series Firmware, Version 4.0 Or Lower, Pt-7828 Series Firmware, Version 3.9 Or Lower",9.8,CRITICAL,0.001610000035725534,false,,false,false,false,,,false,false,,2020-03-24T19:11:40.000Z,0 CVE-2020-6987,https://securityvulnerability.io/vulnerability/CVE-2020-6987,,"In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed.",Moxa,"Moxa Pt-7528 Series Firmware, Version 4.0 Or Lower, Pt-7828 Series Firmware, Version 3.9 Or Lower",7.5,HIGH,0.0012799999676644802,false,,false,false,false,,,false,false,,2020-03-24T19:00:16.000Z,0 CVE-2020-6983,https://securityvulnerability.io/vulnerability/CVE-2020-6983,,"In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a hard-coded cryptographic key, which increases the possibility that confidential data can be recovered.",Moxa,"Moxa Pt-7528 Series Firmware, Version 4.0 Or Lower, Pt-7828 Series Firmware, Version 3.9 Or Lower",7.5,HIGH,0.0012600000482052565,false,,false,false,false,,,false,false,,2020-03-24T18:57:14.000Z,0 CVE-2020-6989,https://securityvulnerability.io/vulnerability/CVE-2020-6989,,"In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code.",Moxa,"Moxa Pt-7528 Series Firmware, Version 4.0 Or Lower, Pt-7828 Series Firmware, Version 3.9 Or Lower",9.8,CRITICAL,0.4338900148868561,false,,false,false,false,,,false,false,,2020-03-24T18:54:19.000Z,0 CVE-2020-7003,https://securityvulnerability.io/vulnerability/CVE-2020-7003,,"In Moxa ioLogik 2500 series firmware, Version 3.0 or lower, and IOxpress configuration utility, Version 2.3.0 or lower, sensitive information is transmitted over some web applications in clear text.",Moxa,"Moxa Iologik 2500 Series Firmware, Version 3.0 Or Lower, Ioxpress Configuration Utility, Version 2.3.0 Or Lower",7.5,HIGH,0.0012799999676644802,false,,false,false,false,,,false,false,,2020-03-24T17:02:34.000Z,0 CVE-2019-18242,https://securityvulnerability.io/vulnerability/CVE-2019-18242,,"In Moxa ioLogik 2500 series firmware, Version 3.0 or lower, and IOxpress configuration utility, Version 2.3.0 or lower, frequent and multiple requests for short-term use may cause the web server to fail.",Moxa,"Moxa Iologik 2500 Series Firmware, Version 3.0 Or Lower, Ioxpress Configuration Utility, Version 2.3.0 Or Lower",7.5,HIGH,0.0008500000112690032,false,,false,false,false,,,false,false,,2020-03-24T16:53:32.000Z,0 CVE-2019-18238,https://securityvulnerability.io/vulnerability/CVE-2019-18238,,"In Moxa ioLogik 2500 series firmware, Version 3.0 or lower, and IOxpress configuration utility, Version 2.3.0 or lower, sensitive information is stored in configuration files without encryption, which may allow an attacker to access an administrative account.",Moxa,"Moxa Iologik 2500 Series Firmware, Version 3.0 Or Lower, Ioxpress Configuration Utility, Version 2.3.0 Or Lower",7.5,HIGH,0.0008699999889358878,false,,false,false,false,,,false,false,,2020-02-26T21:19:56.000Z,0