cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-6787,https://securityvulnerability.io/vulnerability/CVE-2024-6787,Race Condition Vulnerability Could Lead to File Tampering and Code Execution,"This vulnerability occurs when an attacker exploits a race condition between the time a file is checked and the time it is used (TOCTOU). By exploiting this race condition, an attacker can write arbitrary files to the system. This could allow the attacker to execute malicious code and potentially cause file losses.",Moxa,Mxview One Series,5.9,MEDIUM,0.0004799999878741801,false,,false,false,false,,,false,false,,2024-09-21T04:20:22.302Z,0 CVE-2024-6786,https://securityvulnerability.io/vulnerability/CVE-2024-6786,Vulnerability in MQTT Allowes Arbitrary File Reading,"The vulnerability allows an attacker to craft MQTT messages that include relative path traversal sequences, enabling them to read arbitrary files on the system. This could lead to the disclosure of sensitive information, such as configuration files and JWT signing secrets.",Moxa,Mxview One Series,6.5,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2024-09-21T04:14:22.667Z,0 CVE-2024-6785,https://securityvulnerability.io/vulnerability/CVE-2024-6785,Sensitive Information Exposure Risk Due to Cleartext Credentials Storage,"A vulnerability in the Moxa MXView and MXView One Central Manager series allows for credential storage in cleartext within the configuration file. This may enable an attacker with local access rights to read or modify the configuration file. The implications of this vulnerability could lead to the exposure of sensitive information and potential misuse of the service, threatening the overall security posture of affected systems.",Moxa,"Mxview One Series,Mxview One Central Manager Series",7.1,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2024-09-21T04:07:27.736Z,0 CVE-2021-40392,https://securityvulnerability.io/vulnerability/CVE-2021-40392,Information Disclosure Vulnerability in Moxa MXView Series,An information disclosure vulnerability in the Web Application functionality of Moxa MXView Series 3.2.4 allows an attacker to exploit network sniffing techniques. This vulnerability enables the unauthorized disclosure of sensitive information as an attacker can intercept and analyze the network traffic. Organizations using this product should take necessary precautions to secure their network against potential exploitation.,Moxa,Mxview Series,5.3,MEDIUM,0.003599999938160181,false,,false,false,false,,,false,false,,2022-04-14T20:15:00.000Z,0 CVE-2021-40390,https://securityvulnerability.io/vulnerability/CVE-2021-40390,Authentication Bypass in Moxa MXView Series Web Application,"An authentication bypass vulnerability affects the Web Application functionality of Moxa MXView Series 3.2.4. This issue allows attackers to gain unauthorized access by sending specially crafted HTTP requests. Exploiting this flaw can potentially compromise the integrity and confidentiality of the affected systems, making it crucial for users to address this vulnerability promptly.",Moxa,Mxview Series,10,CRITICAL,0.004310000222176313,false,,false,false,false,,,false,false,,2022-04-14T20:15:00.000Z,0 CVE-2021-38456,https://securityvulnerability.io/vulnerability/CVE-2021-38456,Moxa MXview Network Management Software,A use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to gain access through accounts using default passwords,Moxa,Mxview Network Management Software,9.8,CRITICAL,0.013860000297427177,false,,false,false,false,,,false,false,,2021-10-12T14:15:00.000Z,0 CVE-2021-38454,https://securityvulnerability.io/vulnerability/CVE-2021-38454,Moxa MXview Network Management Software,"A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.",Moxa,Mxview Network Management Software,10,CRITICAL,0.013580000028014183,false,,false,false,false,,,false,false,,2021-10-12T14:15:00.000Z,0 CVE-2021-38452,https://securityvulnerability.io/vulnerability/CVE-2021-38452,Moxa MXview Network Management Software,"A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.",Moxa,Mxview Network Management Software,7.5,HIGH,0.006409999914467335,false,,false,false,false,,,false,false,,2021-10-12T14:15:00.000Z,0 CVE-2021-38458,https://securityvulnerability.io/vulnerability/CVE-2021-38458,Moxa MXview Network Management Software,"A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.",Moxa,Mxview Network Management Software,9.8,CRITICAL,0.01655999943614006,false,,false,false,false,,,false,false,,2021-10-12T14:15:00.000Z,0 CVE-2021-38460,https://securityvulnerability.io/vulnerability/CVE-2021-38460,Moxa MXview Network Management Software,"A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.",Moxa,Mxview Network Management Software,7.5,HIGH,0.014510000124573708,false,,false,false,false,,,false,false,,2021-10-12T14:15:00.000Z,0 CVE-2017-14030,https://securityvulnerability.io/vulnerability/CVE-2017-14030,,An issue was discovered in Moxa MXview v2.8 and prior. The unquoted service path escalation vulnerability could allow an authorized user with file access to escalate privileges by inserting arbitrary code into the unquoted service path.,Moxa,Moxa Mxview,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2018-01-12T20:00:00.000Z,0 CVE-2017-7455,https://securityvulnerability.io/vulnerability/CVE-2017-7455,,"Moxa MXView 2.8 allows remote attackers to read web server's private key file, no access control.",Moxa,Mxview,7.5,HIGH,0.4987500011920929,false,,false,false,false,,,false,false,,2017-04-14T14:00:00.000Z,0 CVE-2017-7456,https://securityvulnerability.io/vulnerability/CVE-2017-7456,,Moxa MXView 2.8 allows remote attackers to cause a Denial of Service by sending overly long junk payload for the MXView client login credentials.,Moxa,Mxview,7.5,HIGH,0.03531999886035919,false,,false,false,false,,,false,false,,2017-04-14T14:00:00.000Z,0