Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Eds\-510e_firmware
(Moxa)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 6 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-03-24 | CVE-2020-6979 | In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a hard-coded cryptographic key, increasing the possibility that confidential data can be recovered. | Eds\-510e_firmware, Eds\-G516e_firmware | 7.5 | ||
2020-03-24 | CVE-2020-6981 | In Moxa EDS-G516E Series firmware, Version 5.2 or lower, an attacker may gain access to the system without proper authentication. | Eds\-510e_firmware, Eds\-G516e_firmware | 9.8 | ||
2020-03-24 | CVE-2020-6997 | In Moxa EDS-G516E Series firmware, Version 5.2 or lower, sensitive information is transmitted over some web applications in cleartext. | Eds\-510e_firmware, Eds\-G516e_firmware | 7.5 | ||
2020-03-24 | CVE-2020-6991 | In Moxa EDS-G516E Series firmware, Version 5.2 or lower, weak password requirements may allow an attacker to gain access using brute force. | Eds\-510e_firmware, Eds\-G516e_firmware | 9.8 | ||
2020-03-24 | CVE-2020-7001 | In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed. | Eds\-510e_firmware, Eds\-G516e_firmware | 7.5 | ||
2020-03-24 | CVE-2020-7007 | In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the attacker may execute arbitrary codes or target the device, causing it to go out of service. | Eds\-510e_firmware, Eds\-G516e_firmware | 9.8 |