Search Results (Refine Search)
- CPE Product Version: cpe:/o:ewon:ewon_firmware:10.0s0
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2015-7929 |
eWON devices with firmware through 10.1s0 support unspecified GET requests, which might allow remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history. Published: December 23, 2015; 6:59:05 AM -0500 |
V3.0: 4.3 MEDIUM V2.0: 5.0 MEDIUM |
CVE-2015-7928 |
eWON devices with firmware before 10.1s0 do not have an off autocomplete attribute for a password field, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation. Published: December 23, 2015; 6:59:04 AM -0500 |
V3.0: 8.5 HIGH V2.0: 5.0 MEDIUM |
CVE-2015-7927 |
Cross-site scripting (XSS) vulnerability on eWON devices with firmware through 10.1s0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Published: December 23, 2015; 6:59:03 AM -0500 |
V3.0: 6.1 MEDIUM V2.0: 4.3 MEDIUM |
CVE-2015-7926 |
eWON devices with firmware before 10.1s0 omit RBAC for I/O server information and status requests, which allows remote attackers to obtain sensitive information via an unspecified URL. Published: December 23, 2015; 6:59:02 AM -0500 |
V3.0: 9.9 CRITICAL V2.0: 5.0 MEDIUM |
CVE-2015-7925 |
Cross-site request forgery (CSRF) vulnerability on eWON devices with firmware through 10.1s0 allows remote attackers to hijack the authentication of administrators for requests that trigger firmware upload, removal of configuration data, or a reboot. Published: December 23, 2015; 6:59:01 AM -0500 |
V3.0: 8.0 HIGH V2.0: 6.8 MEDIUM |
CVE-2015-7924 |
eWON devices with firmware before 10.1s0 do not trigger the discarding of browser session data in response to a log-off action, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation. Published: December 23, 2015; 6:59:00 AM -0500 |
V3.0: 8.8 HIGH V2.0: 7.5 HIGH |