| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2025-26168 | IXON VPN Client 安全漏洞 | IXON | VPN Client | High | 8.1 | 2025-05-07 00:00:00 | Deep Dive |
| CVE-2025-2781 | WatchGuard Mobile VPN with SSL Local Privilege Escalation via Non-Standard Installation Directory | WatchGuard | Mobile VPN with SSL Client | 中危 | - | 2025-03-28 22:23:51 | Deep Dive |
| CVE-2024-11667 | Zyxel多款产品 路径遍历漏洞 | Zyxel | ATP series firmware | High | 7.5 | 2024-11-27 09:39:42 | Deep Dive |
| CVE-2024-41183 | Trend Micro VPN 安全漏洞 | Trend Micro, Inc. | Trend Micro VPN (consumer) | High | 7.8 | 2024-10-22 18:26:51 | Deep Dive |
| CVE-2024-43393 | Phoenix Contact: Configuration changes of the firewall services can lead to DoS in MGUARD devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.1 | 2024-09-10 08:45:10 | Deep Dive |
| CVE-2024-43392 | Phoenix Contact: Firewall reconfiguration through the FW_environment variables in MGUARD devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.1 | 2024-09-10 08:44:56 | Deep Dive |
| CVE-2024-43391 | Phoenix Contact: Firewall reconfiguration through the FW_PORTFORWARDING.SRC_IP in MGUARD devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.1 | 2024-09-10 08:44:43 | Deep Dive |
| CVE-2024-43390 | Phoenix Contact: Firewall reconfiguration due to improper input validation in MGUARD devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.1 | 2024-09-10 08:44:31 | Deep Dive |
| CVE-2024-43389 | Phoenix Contact: OSPF reconfiguration due to improper input validation in MGUARD devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.1 | 2024-09-10 08:44:19 | Deep Dive |
| CVE-2024-43388 | Phoenix Contact: SNMP reconfiguration due to improper input validation in MGUARD devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.8 | 2024-09-10 08:44:07 | Deep Dive |
| CVE-2024-43387 | Phoenix Contact: Access files due to improper neutralization of special elements in MGUARD devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.8 | 2024-09-10 08:43:54 | Deep Dive |
| CVE-2024-43386 | Phoenix Contact: OS command execution through EMAIL_NOTIFICATION.TO in mGuard devices. | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.8 | 2024-09-10 08:43:41 | Deep Dive |
| CVE-2024-43385 | Phoenix Contact: OS command execution through PROXY_HTTP_PORT in mGuard devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.8 | 2024-09-10 08:43:26 | Deep Dive |
| CVE-2024-7699 | Phoenix Contact: OS command execution in MGUARD products | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.8 | 2024-09-10 08:42:56 | Deep Dive |
| CVE-2024-7698 | Phoenix Contact: Access to CSRF tokens of higher privileged users in MGUARD products | PHOENIX CONTACT | FL MGUARD 2102 | Medium | 5.7 | 2024-09-10 08:42:43 | Deep Dive |
| CVE-2024-7734 | Phoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptors. | PHOENIX CONTACT | FL MGUARD 2102 | Medium | 5.3 | 2024-09-10 08:03:19 | Deep Dive |
| CVE-2024-42061 | Zyxel多款产品 跨站脚本漏洞 | Zyxel | ATP series firmware | Medium | 6.1 | 2024-09-03 01:59:37 | Deep Dive |
| CVE-2024-42060 | Zyxel多款产品 操作系统命令注入漏洞 | Zyxel | ATP series firmware | High | 7.2 | 2024-09-03 01:54:57 | Deep Dive |
| CVE-2024-42059 | Zyxel多款产品 安全漏洞 | Zyxel | ATP series firmware | High | 7.2 | 2024-09-03 01:51:21 | Deep Dive |
| CVE-2024-42058 | Zyxel多款产品 代码问题漏洞 | Zyxel | ATP series firmware | High | 7.5 | 2024-09-03 01:47:29 | Deep Dive |