Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Vulnerability List
Found 181 results
CVE IDTitleVendorProductSeverityCVSS ScorePublished AtAI Analysis
CVE-2024-43390 Phoenix Contact: Firewall reconfiguration due to improper input validation in MGUARD devices PHOENIX CONTACTFL MGUARD 2102 High 8.1 2024-09-10 08:44:31 Deep Dive
CVE-2024-43389 Phoenix Contact: OSPF reconfiguration due to improper input validation in MGUARD devices PHOENIX CONTACTFL MGUARD 2102 High 8.1 2024-09-10 08:44:19 Deep Dive
CVE-2024-43388 Phoenix Contact: SNMP reconfiguration due to improper input validation in MGUARD devices PHOENIX CONTACTFL MGUARD 2102 High 8.8 2024-09-10 08:44:07 Deep Dive
CVE-2024-43387 Phoenix Contact: Access files due to improper neutralization of special elements in MGUARD devices PHOENIX CONTACTFL MGUARD 2102 High 8.8 2024-09-10 08:43:54 Deep Dive
CVE-2024-43386 Phoenix Contact: OS command execution through EMAIL_NOTIFICATION.TO in mGuard devices. PHOENIX CONTACTFL MGUARD 2102 High 8.8 2024-09-10 08:43:41 Deep Dive
CVE-2024-43385 Phoenix Contact: OS command execution through PROXY_HTTP_PORT in mGuard devices PHOENIX CONTACTFL MGUARD 2102 High 8.8 2024-09-10 08:43:26 Deep Dive
CVE-2024-7699 Phoenix Contact: OS command execution in MGUARD products PHOENIX CONTACTFL MGUARD 2102 High 8.8 2024-09-10 08:42:56 Deep Dive
CVE-2024-7698 Phoenix Contact: Access to CSRF tokens of higher privileged users in MGUARD products PHOENIX CONTACTFL MGUARD 2102 Medium 5.7 2024-09-10 08:42:43 Deep Dive
CVE-2024-7734 Phoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptors. PHOENIX CONTACTFL MGUARD 2102 Medium 5.3 2024-09-10 08:03:19 Deep Dive
CVE-2024-8105 Insecure Platform Key (PK) used in UEFI system firmware signature Acervz2694g--2024-08-26 19:15:11 Deep Dive
CVE-2024-6788 Phoenix Contact: update feature from CHARX controller can be used to reset a low privilege user password PHOENIX CONTACTCHARX SEC-3000 High 8.6 2024-08-13 13:15:03 Deep Dive
CVE-2024-3913 Phoenix Contact: Start sequence allows attack during the boot process Phoenix ContactCHARX SEC-3000 (1139022) Medium 5.9 2024-08-13 12:30:34 Deep Dive
CVE-2024-1598 Potential buffer overflow when handling UEFI variables PhoenixSecureCore™ for Intel Gemini Lake High 7.5 2024-05-14 14:56:39 Deep Dive
CVE-2024-0762 Potential buffer overflow when handling UEFI variables PhoenixSecureCore™ for Intel Kaby Lake High 7.5 2024-05-14 14:56:26 Deep Dive
CVE-2023-35841 WinFlash Driver Permissions Issue PhoenixWinFlash Driver High 7.8 2024-05-14 14:56:15 Deep Dive
CVE-2024-28137 PHOENIX CONTACT: privilege escalation due to a TOCTOU vulnerability in the CHARX Series PHOENIX CONTACTCHARX SEC-3000 High 7.8 2024-05-14 08:10:06 Deep Dive
CVE-2024-28136 PHOENIX CONTACT: command injection gains root privileges using the OCPP remote service PHOENIX CONTACTCHARX SEC-3000 High 7.8 2024-05-14 08:09:53 Deep Dive
CVE-2024-28135 PHOENIX CONTACT: command injection vulnerability in the API of the CHARX Series PHOENIX CONTACTCHARX SEC-3000 Medium 5.0 2024-05-14 08:09:40 Deep Dive
CVE-2024-28134 PHOENIX CONTACT: MitM attack gains privileges of the current logged in user in CHARX Series PHOENIX CONTACTCHARX SEC-3000 High 7.0 2024-05-14 08:09:25 Deep Dive
CVE-2024-28133 PHOENIX CONTACT: Privilege escalation in CHARX Series PHOENIX CONTACTCHARX SEC-3000 High 7.8 2024-05-14 08:09:11 Deep Dive