Количество 3
Количество 3
CVE-2018-11426
A weak Cookie parameter is used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. An attacker can brute force parameters required to bypass authentication and access the web interface to use all its functions except for password change.
GHSA-qg29-gw69-6h3h
A weak Cookie parameter is used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. An attacker can brute force parameters required to bypass authentication and access the web interface to use all its functions except for password change.
BDU:2020-01243
Уязвимость веб-интерфейса сотовых IP-шлюзов серии Moxa OnCell G3100-HSPA, позволяющая нарушителю получить доступ к устройству с привилегиями root
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-11426 A weak Cookie parameter is used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. An attacker can brute force parameters required to bypass authentication and access the web interface to use all its functions except for password change. | CVSS3: 9.8 | 0% Низкий | больше 6 лет назад | |
GHSA-qg29-gw69-6h3h A weak Cookie parameter is used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. An attacker can brute force parameters required to bypass authentication and access the web interface to use all its functions except for password change. | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад | |
BDU:2020-01243 Уязвимость веб-интерфейса сотовых IP-шлюзов серии Moxa OnCell G3100-HSPA, позволяющая нарушителю получить доступ к устройству с привилегиями root | CVSS3: 9.8 | 0% Низкий | больше 6 лет назад |
Уязвимостей на страницу