|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 15, 2026, 6 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 225371 | 4.9 | 警告 | マイクロソフト | - | Microsoft Windows のカーネルモードドライバ内の win32k.sys における権限昇格の脆弱性 |
CWE-362
競合状態 |
CVE-2013-1270 | 2013-02-14 17:11 | 2013-02-12 | Show | GitHub Exploit DB Packet Storm |
| 225372 | 4.9 | 警告 | マイクロソフト | - | Microsoft Windows のカーネルモードドライバ内の win32k.sys における権限昇格の脆弱性 |
CWE-362
競合状態 |
CVE-2013-1269 | 2013-02-14 17:11 | 2013-02-12 | Show | GitHub Exploit DB Packet Storm |
| 225373 | 4.9 | 警告 | マイクロソフト | - | Microsoft Windows のカーネルモードドライバ内の win32k.sys における権限昇格の脆弱性 |
CWE-362
競合状態 |
CVE-2013-1268 | 2013-02-14 17:11 | 2013-02-12 | Show | GitHub Exploit DB Packet Storm |
| 225374 | 4.9 | 警告 | マイクロソフト | - | Microsoft Windows のカーネルモードドライバ内の win32k.sys における権限昇格の脆弱性 |
CWE-362
競合状態 |
CVE-2013-1267 | 2013-02-14 17:11 | 2013-02-12 | Show | GitHub Exploit DB Packet Storm |
| 225375 | 4.9 | 警告 | マイクロソフト | - | Microsoft Windows のカーネルモードドライバ内の win32k.sys における権限昇格の脆弱性 |
CWE-362
競合状態 |
CVE-2013-1266 | 2013-02-14 17:11 | 2013-02-12 | Show | GitHub Exploit DB Packet Storm |
| 225376 | 4.9 | 警告 | マイクロソフト | - | Microsoft Windows のカーネルモードドライバ内の win32k.sys における権限昇格の脆弱性 |
CWE-362
競合状態 |
CVE-2013-1265 | 2013-02-14 17:11 | 2013-02-12 | Show | GitHub Exploit DB Packet Storm |
| 225377 | 4.9 | 警告 | マイクロソフト | - | Microsoft Windows のカーネルモードドライバ内の win32k.sys における権限昇格の脆弱性 |
CWE-362
競合状態 |
CVE-2013-1264 | 2013-02-14 17:11 | 2013-02-12 | Show | GitHub Exploit DB Packet Storm |
| 225378 | 4.9 | 警告 | マイクロソフト | - | Microsoft Windows のカーネルモードドライバ内の win32k.sys における権限昇格の脆弱性 |
CWE-362
競合状態 |
CVE-2013-1263 | 2013-02-14 17:11 | 2013-02-12 | Show | GitHub Exploit DB Packet Storm |
| 225379 | 4.9 | 警告 | マイクロソフト | - | Microsoft Windows のカーネルモードドライバ内の win32k.sys における権限昇格の脆弱性 |
CWE-362
競合状態 |
CVE-2013-1262 | 2013-02-14 17:11 | 2013-02-12 | Show | GitHub Exploit DB Packet Storm |
| 225380 | 4.9 | 警告 | マイクロソフト | - | Microsoft Windows のカーネルモードドライバ内の win32k.sys における権限昇格の脆弱性 |
CWE-362
競合状態 |
CVE-2013-1261 | 2013-02-14 17:11 | 2013-02-12 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 15, 2026, 4:28 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 198341 | 8.8 |
HIGH
Adjacent |
honeywell | win-pak | In Honeywell WIN-PAK 4.7.2, Web and prior versions, the header injection vulnerability has been identified, which may allow remote code execution. |
CWE-74
Injection |
CVE-2020-6982 | 2024-11-21 14:36 | 2020-03-25 | Show | GitHub Exploit DB Packet Storm |
| 198342 | 9.8 |
CRITICAL
Network |
moxa |
eds-g516e_firmware eds-510e_firmware |
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, an attacker may gain access to the system without proper authentication. |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-6981 | 2024-11-21 14:36 | 2020-03-25 | Show | GitHub Exploit DB Packet Storm |
| 198343 | 7.5 |
HIGH
Network |
moxa |
eds-g516e_firmware eds-510e_firmware |
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a hard-coded cryptographic key, increasing the possibility that confidential data can be recovered. |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-6979 | 2024-11-21 14:36 | 2020-03-25 | Show | GitHub Exploit DB Packet Storm |
| 198344 | 7.2 |
HIGH
Network |
honeywell | win-pak | In Honeywell WIN-PAK 4.7.2, Web and prior versions, the affected product is vulnerable due to the usage of old jQuery libraries. |
NVD-CWE-Other
|
CVE-2020-6978 | 2024-11-21 14:36 | 2020-03-25 | Show | GitHub Exploit DB Packet Storm |
| 198345 | 8.8 |
HIGH
Network |
honeywell | win-pak | In Honeywell WIN-PAK 4.7.2, Web and prior versions, the affected product is vulnerable to a cross-site request forgery, which may allow an attacker to remotely execute arbitrary code. |
CWE-352
Origin Validation Error |
CVE-2020-7005 | 2024-11-21 14:36 | 2020-03-25 | Show | GitHub Exploit DB Packet Storm |
| 198346 | 9.8 |
CRITICAL
Network |
moxa |
pt-7528-24tx-hv_firmware pt-7528-24tx-hv-hv_firmware pt-7528-24tx-wv_firmware pt-7528-24tx-wv-hv_firmware pt-7528-24tx-wv-wv_firmware pt-7528-12msc-12tx-4gsfp-hv_firmware pt-7528-12… |
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the application utilizes weak password requirements, which may allow an attacker to gain unau… |
CWE-521
Weak Password Requirements |
CVE-2020-6995 | 2024-11-21 14:36 | 2020-03-25 | Show | GitHub Exploit DB Packet Storm |
| 198347 | 7.5 |
HIGH
Network |
moxa |
pt-7528-24tx-hv_firmware pt-7528-24tx-hv-hv_firmware pt-7528-24tx-wv_firmware pt-7528-24tx-wv-hv_firmware pt-7528-24tx-wv-wv_firmware pt-7528-12msc-12tx-4gsfp-hv_firmware pt-7528-12… |
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, an attacker can gain access to sensitive information from the web service without authorizati… |
CWE-200
Information Exposure |
CVE-2020-6993 | 2024-11-21 14:36 | 2020-03-25 | Show | GitHub Exploit DB Packet Storm |
| 198348 | 9.8 |
CRITICAL
Network |
moxa |
pt-7528-24tx-hv_firmware pt-7528-24tx-hv-hv_firmware pt-7528-24tx-wv_firmware pt-7528-24tx-wv-hv_firmware pt-7528-24tx-wv-wv_firmware pt-7528-12msc-12tx-4gsfp-hv_firmware pt-7528-12… |
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, these devices use a hard-coded service code for access to the console. |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-6985 | 2024-11-21 14:36 | 2020-03-25 | Show | GitHub Exploit DB Packet Storm |
| 198349 | 9.8 |
CRITICAL
Network |
moxa |
pt-7528-24tx-hv_firmware pt-7528-24tx-hv-hv_firmware pt-7528-24tx-wv_firmware pt-7528-24tx-wv-hv_firmware pt-7528-24tx-wv-wv_firmware pt-7528-12msc-12tx-4gsfp-hv_firmware pt-7528-12… |
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service cond… |
CWE-787
Out-of-bounds Write |
CVE-2020-6989 | 2024-11-21 14:36 | 2020-03-25 | Show | GitHub Exploit DB Packet Storm |
| 198350 | 7.5 |
HIGH
Network |
moxa |
pt-7528-24tx-hv_firmware pt-7528-24tx-hv-hv_firmware pt-7528-24tx-wv_firmware pt-7528-24tx-wv-hv_firmware pt-7528-24tx-wv-wv_firmware pt-7528-12msc-12tx-4gsfp-hv_firmware pt-7528-12… |
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential inform… |
CWE-327
Use of a Broken or Risky Cryptographic Algorithm |
CVE-2020-6987 | 2024-11-21 14:36 | 2020-03-25 | Show | GitHub Exploit DB Packet Storm |