| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2024-43390 | Phoenix Contact: Firewall reconfiguration due to improper input validation in MGUARD devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.1 | 2024-09-10 08:44:31 | Deep Dive |
| CVE-2024-43389 | Phoenix Contact: OSPF reconfiguration due to improper input validation in MGUARD devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.1 | 2024-09-10 08:44:19 | Deep Dive |
| CVE-2024-43388 | Phoenix Contact: SNMP reconfiguration due to improper input validation in MGUARD devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.8 | 2024-09-10 08:44:07 | Deep Dive |
| CVE-2024-43387 | Phoenix Contact: Access files due to improper neutralization of special elements in MGUARD devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.8 | 2024-09-10 08:43:54 | Deep Dive |
| CVE-2024-43386 | Phoenix Contact: OS command execution through EMAIL_NOTIFICATION.TO in mGuard devices. | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.8 | 2024-09-10 08:43:41 | Deep Dive |
| CVE-2024-43385 | Phoenix Contact: OS command execution through PROXY_HTTP_PORT in mGuard devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.8 | 2024-09-10 08:43:26 | Deep Dive |
| CVE-2024-7699 | Phoenix Contact: OS command execution in MGUARD products | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.8 | 2024-09-10 08:42:56 | Deep Dive |
| CVE-2024-7698 | Phoenix Contact: Access to CSRF tokens of higher privileged users in MGUARD products | PHOENIX CONTACT | FL MGUARD 2102 | Medium | 5.7 | 2024-09-10 08:42:43 | Deep Dive |
| CVE-2024-7734 | Phoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptors. | PHOENIX CONTACT | FL MGUARD 2102 | Medium | 5.3 | 2024-09-10 08:03:19 | Deep Dive |
| CVE-2024-8105 | Insecure Platform Key (PK) used in UEFI system firmware signature | Acer | vz2694g | - | - | 2024-08-26 19:15:11 | Deep Dive |
| CVE-2024-6788 | Phoenix Contact: update feature from CHARX controller can be used to reset a low privilege user password | PHOENIX CONTACT | CHARX SEC-3000 | High | 8.6 | 2024-08-13 13:15:03 | Deep Dive |
| CVE-2024-3913 | Phoenix Contact: Start sequence allows attack during the boot process | Phoenix Contact | CHARX SEC-3000 (1139022) | Medium | 5.9 | 2024-08-13 12:30:34 | Deep Dive |
| CVE-2024-1598 | Potential buffer overflow when handling UEFI variables | Phoenix | SecureCore™ for Intel Gemini Lake | High | 7.5 | 2024-05-14 14:56:39 | Deep Dive |
| CVE-2024-0762 | Potential buffer overflow when handling UEFI variables | Phoenix | SecureCore™ for Intel Kaby Lake | High | 7.5 | 2024-05-14 14:56:26 | Deep Dive |
| CVE-2023-35841 | WinFlash Driver Permissions Issue | Phoenix | WinFlash Driver | High | 7.8 | 2024-05-14 14:56:15 | Deep Dive |
| CVE-2024-28137 | PHOENIX CONTACT: privilege escalation due to a TOCTOU vulnerability in the CHARX Series | PHOENIX CONTACT | CHARX SEC-3000 | High | 7.8 | 2024-05-14 08:10:06 | Deep Dive |
| CVE-2024-28136 | PHOENIX CONTACT: command injection gains root privileges using the OCPP remote service | PHOENIX CONTACT | CHARX SEC-3000 | High | 7.8 | 2024-05-14 08:09:53 | Deep Dive |
| CVE-2024-28135 | PHOENIX CONTACT: command injection vulnerability in the API of the CHARX Series | PHOENIX CONTACT | CHARX SEC-3000 | Medium | 5.0 | 2024-05-14 08:09:40 | Deep Dive |
| CVE-2024-28134 | PHOENIX CONTACT: MitM attack gains privileges of the current logged in user in CHARX Series | PHOENIX CONTACT | CHARX SEC-3000 | High | 7.0 | 2024-05-14 08:09:25 | Deep Dive |
| CVE-2024-28133 | PHOENIX CONTACT: Privilege escalation in CHARX Series | PHOENIX CONTACT | CHARX SEC-3000 | High | 7.8 | 2024-05-14 08:09:11 | Deep Dive |