Moxa Mxview
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Moxa Mxview.
By the Year
In 2026 there have been 0 vulnerabilities in Moxa Mxview. Mxview did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 0 | 0.00 |
| 2022 | 2 | 8.65 |
| 2021 | 5 | 9.24 |
| 2020 | 2 | 7.80 |
| 2019 | 0 | 0.00 |
| 2018 | 1 | 0.00 |
It may take a day or so for new Mxview vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Moxa Mxview Security Vulnerabilities
An information disclosure vulnerability exists in the Web Application functionality of Moxa MXView Series 3.2.4
CVE-2021-40392
7.5 - High
- April 14, 2022
An information disclosure vulnerability exists in the Web Application functionality of Moxa MXView Series 3.2.4. Network sniffing can lead to a disclosure of sensitive information. An attacker can sniff network traffic to exploit this vulnerability.
Cleartext Transmission of Sensitive Information
An authentication bypass vulnerability exists in the Web Application functionality of Moxa MXView Series 3.2.4
CVE-2021-40390
9.8 - Critical
- April 14, 2022
An authentication bypass vulnerability exists in the Web Application functionality of Moxa MXView Series 3.2.4. A specially-crafted HTTP request can lead to unauthorized access. An attacker can send an HTTP request to trigger this vulnerability.
Use of Hard-coded Credentials
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may
CVE-2021-38460
7.5 - High
- October 12, 2021
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.
Directory traversal
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may
CVE-2021-38458
9.8 - Critical
- October 12, 2021
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.
Injection
A use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may
CVE-2021-38456
9.8 - Critical
- October 12, 2021
A use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to gain access through accounts using default passwords
Use of Hard-coded Credentials
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may
CVE-2021-38454
10 - Critical
- October 12, 2021
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.
Directory traversal
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may
CVE-2021-38452
9.1 - Critical
- October 12, 2021
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.
Directory traversal
An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation
CVE-2020-13536
7.8 - High
- November 05, 2020
An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation. Depending on the vector chosen, an attacker can either add code to a script or replace a binary. By default MXViewService, which starts as a NT SYSTEM authority user executes a series of Node.Js scripts to start additional application functionality.
Incorrect Default Permissions
An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation
CVE-2020-13537
7.8 - High
- November 05, 2020
An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation. Depending on the vector chosen, an attacker can either add code to a script or replace a binary.By default MXViewService, which starts as a NT SYSTEM authority user executes a series of Node.Js scripts to start additional application functionality and among them the mosquitto executable is also run.
Incorrect Default Permissions
The private key of the web server in Moxa MXview versions 2.8 and prior is able to be read and accessed via an HTTP GET request, which may
CVE-2018-7506
- April 06, 2018
The private key of the web server in Moxa MXview versions 2.8 and prior is able to be read and accessed via an HTTP GET request, which may allow a remote attacker to decrypt encrypted information.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Moxa Mxview or by Moxa? Click the Watch button to subscribe.