Mxview Moxa Mxview

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Moxa Mxview.

By the Year

In 2026 there have been 0 vulnerabilities in Moxa Mxview. Mxview did not have any published security vulnerabilities last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 0 0.00
2022 2 8.65
2021 5 9.24
2020 2 7.80
2019 0 0.00
2018 1 0.00

It may take a day or so for new Mxview vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Moxa Mxview Security Vulnerabilities

An information disclosure vulnerability exists in the Web Application functionality of Moxa MXView Series 3.2.4
CVE-2021-40392 7.5 - High - April 14, 2022

An information disclosure vulnerability exists in the Web Application functionality of Moxa MXView Series 3.2.4. Network sniffing can lead to a disclosure of sensitive information. An attacker can sniff network traffic to exploit this vulnerability.

Cleartext Transmission of Sensitive Information

An authentication bypass vulnerability exists in the Web Application functionality of Moxa MXView Series 3.2.4
CVE-2021-40390 9.8 - Critical - April 14, 2022

An authentication bypass vulnerability exists in the Web Application functionality of Moxa MXView Series 3.2.4. A specially-crafted HTTP request can lead to unauthorized access. An attacker can send an HTTP request to trigger this vulnerability.

Use of Hard-coded Credentials

A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may
CVE-2021-38460 7.5 - High - October 12, 2021

A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.

Directory traversal

A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may
CVE-2021-38458 9.8 - Critical - October 12, 2021

A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.

Injection

A use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may
CVE-2021-38456 9.8 - Critical - October 12, 2021

A use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to gain access through accounts using default passwords

Use of Hard-coded Credentials

A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may
CVE-2021-38454 10 - Critical - October 12, 2021

A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.

Directory traversal

A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may
CVE-2021-38452 9.1 - Critical - October 12, 2021

A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.

Directory traversal

An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation
CVE-2020-13536 7.8 - High - November 05, 2020

An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation. Depending on the vector chosen, an attacker can either add code to a script or replace a binary. By default MXViewService, which starts as a NT SYSTEM authority user executes a series of Node.Js scripts to start additional application functionality.

Incorrect Default Permissions

An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation
CVE-2020-13537 7.8 - High - November 05, 2020

An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation. Depending on the vector chosen, an attacker can either add code to a script or replace a binary.By default MXViewService, which starts as a NT SYSTEM authority user executes a series of Node.Js scripts to start additional application functionality and among them the mosquitto executable is also run.

Incorrect Default Permissions

The private key of the web server in Moxa MXview versions 2.8 and prior is able to be read and accessed via an HTTP GET request, which may
CVE-2018-7506 - April 06, 2018

The private key of the web server in Moxa MXview versions 2.8 and prior is able to be read and accessed via an HTTP GET request, which may allow a remote attacker to decrypt encrypted information.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Moxa Mxview or by Moxa? Click the Watch button to subscribe.

Moxa
Vendor

Moxa Mxview
Product

subscribe