|
196681
|
6.1 |
MEDIUM
Network
|
mozilla fedoraproject
|
bleach fedora
|
In Mozilla Bleach before 3.11, a mutation XSS affects users calling bleach.clean with noscript and a raw tag in the allowed/whitelisted tags option.
|
CWE-79
Cross-site Scripting
|
CVE-2020-6802
|
2024-11-21 14:36 |
2020-03-25 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
196682
|
9.8 |
CRITICAL
Network
|
moxa
|
eds-g516e_firmware eds-510e_firmware
|
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the attacker may execute arbitrary codes or target the device, causing it to go out of service.
|
CWE-787
Out-of-bounds Write
|
CVE-2020-7007
|
2024-11-21 14:36 |
2020-03-25 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
196683
|
7.5 |
HIGH
Network
|
moxa
|
eds-g516e_firmware eds-510e_firmware
|
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed.
|
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
|
CVE-2020-7001
|
2024-11-21 14:36 |
2020-03-25 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
196684
|
7.5 |
HIGH
Network
|
moxa
|
eds-g516e_firmware eds-510e_firmware
|
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, sensitive information is transmitted over some web applications in cleartext.
|
CWE-319
Cleartext Transmission of Sensitive Information
|
CVE-2020-6997
|
2024-11-21 14:36 |
2020-03-25 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
196685
|
9.8 |
CRITICAL
Network
|
moxa
|
eds-g516e_firmware eds-510e_firmware
|
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, weak password requirements may allow an attacker to gain access using brute force.
|
CWE-521
Weak Password Requirements
|
CVE-2020-6991
|
2024-11-21 14:36 |
2020-03-25 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
196686
|
8.8 |
HIGH
Adjacent
|
honeywell
|
win-pak
|
In Honeywell WIN-PAK 4.7.2, Web and prior versions, the header injection vulnerability has been identified, which may allow remote code execution.
|
CWE-74
Injection
|
CVE-2020-6982
|
2024-11-21 14:36 |
2020-03-25 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
196687
|
9.8 |
CRITICAL
Network
|
moxa
|
eds-g516e_firmware eds-510e_firmware
|
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, an attacker may gain access to the system without proper authentication.
|
CWE-798
Use of Hard-coded Credentials
|
CVE-2020-6981
|
2024-11-21 14:36 |
2020-03-25 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
196688
|
7.5 |
HIGH
Network
|
moxa
|
eds-g516e_firmware eds-510e_firmware
|
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a hard-coded cryptographic key, increasing the possibility that confidential data can be recovered.
|
CWE-798
Use of Hard-coded Credentials
|
CVE-2020-6979
|
2024-11-21 14:36 |
2020-03-25 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
196689
|
7.2 |
HIGH
Network
|
honeywell
|
win-pak
|
In Honeywell WIN-PAK 4.7.2, Web and prior versions, the affected product is vulnerable due to the usage of old jQuery libraries.
|
NVD-CWE-Other
|
CVE-2020-6978
|
2024-11-21 14:36 |
2020-03-25 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
196690
|
8.8 |
HIGH
Network
|
honeywell
|
win-pak
|
In Honeywell WIN-PAK 4.7.2, Web and prior versions, the affected product is vulnerable to a cross-site request forgery, which may allow an attacker to remotely execute arbitrary code.
|
CWE-352
Origin Validation Error
|
CVE-2020-7005
|
2024-11-21 14:36 |
2020-03-25 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|