{"vulnerability": "cve-2018-1070", "sightings": [{"uuid": "e48aca73-9734-4505-85e4-f718b7805a33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-10703", "type": "seen", "source": "https://t.me/cibsecurity/4779", "content": "ATENTION\u203c New - CVE-2018-10703\n\nAn issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter \"iw_serverip\" is susceptible to buffer overflow. By crafting a packet that contains a string of 480 characters, it is possible for an attacker to execute the attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-06-08T00:28:14.000000Z"}, {"uuid": "fe3e53ce-efb6-4420-8bfa-1db074084fd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-10702", "type": "seen", "source": "https://t.me/cibsecurity/4780", "content": "ATENTION\u203c New - CVE-2018-10702\n\nAn issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter \"iw_filename\" is susceptible to command injection via shell metacharacters.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-06-08T00:28:15.000000Z"}, {"uuid": "175dd3a5-1074-41ae-a70f-cfabb792d7dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-10701", "type": "seen", "source": "https://t.me/cibsecurity/4781", "content": "ATENTION\u203c New - CVE-2018-10701\n\nAn issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter \"iw_filename\" is susceptible to buffer overflow. By crafting a packet that contains a string of 162 characters, it is possible for an attacker to execute the attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-06-08T00:28:16.000000Z"}, {"uuid": "15b00416-b2dd-43fc-bc6e-25fec8142534", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-10700", "type": "seen", "source": "https://t.me/cibsecurity/4782", "content": "ATENTION\u203c New - CVE-2018-10700\n\nAn issue was discovered on Moxa AWK-3121 1.19 devices. It provides functionality so that an administrator can change the name of the device. However, the same functionality allows an attacker to execute XSS by injecting an XSS payload. The POST parameter \"iw_board_deviceName\" is susceptible to this injection.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-06-08T00:28:17.000000Z"}, {"uuid": "2a7dae76-e56c-4b02-ae6c-8f04917ba0df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-10704", "type": "seen", "source": "https://t.me/cibsecurity/10485", "content": "ATENTION\u203c New - CVE-2018-10704\n\nyidashi yii2cmf 2.0 has XSS via the /search q parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-03-13T00:02:08.000000Z"}, {"uuid": "6f71725a-42f0-432c-8738-eb07397475c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-10709", "type": "seen", "source": "MISP/5bd748ef-f174-4809-8a2d-628f0a021402", "content": "", "creation_timestamp": "2018-10-29T17:54:56.000000Z"}]}