U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • CPE Product Version: cpe:/o:ewon:ewon_firmware:10.0s0
There are 6 matching records.
Displaying matches 1 through 6.
Vuln ID Summary CVSS Severity
CVE-2015-7929

eWON devices with firmware through 10.1s0 support unspecified GET requests, which might allow remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history.

Published: December 23, 2015; 6:59:05 AM -0500
V3.0: 4.3 MEDIUM
V2.0: 5.0 MEDIUM
CVE-2015-7928

eWON devices with firmware before 10.1s0 do not have an off autocomplete attribute for a password field, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation.

Published: December 23, 2015; 6:59:04 AM -0500
V3.0: 8.5 HIGH
V2.0: 5.0 MEDIUM
CVE-2015-7927

Cross-site scripting (XSS) vulnerability on eWON devices with firmware through 10.1s0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Published: December 23, 2015; 6:59:03 AM -0500
V3.0: 6.1 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2015-7926

eWON devices with firmware before 10.1s0 omit RBAC for I/O server information and status requests, which allows remote attackers to obtain sensitive information via an unspecified URL.

Published: December 23, 2015; 6:59:02 AM -0500
V3.0: 9.9 CRITICAL
V2.0: 5.0 MEDIUM
CVE-2015-7925

Cross-site request forgery (CSRF) vulnerability on eWON devices with firmware through 10.1s0 allows remote attackers to hijack the authentication of administrators for requests that trigger firmware upload, removal of configuration data, or a reboot.

Published: December 23, 2015; 6:59:01 AM -0500
V3.0: 8.0 HIGH
V2.0: 6.8 MEDIUM
CVE-2015-7924

eWON devices with firmware before 10.1s0 do not trigger the discarding of browser session data in response to a log-off action, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation.

Published: December 23, 2015; 6:59:00 AM -0500
V3.0: 8.8 HIGH
V2.0: 7.5 HIGH