Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2024-7699 | 8.8 HIGH | Phoenix Contact: OS command execution in MGUARD products |
| CVE-2024-43387 | 8.8 HIGH | Phoenix Contact: Access files due to improper neutralization of special elements in MGUARD |
| CVE-2024-43388 | 8.8 HIGH | Phoenix Contact: SNMP reconfiguration due to improper input validation in MGUARD devices |
| CVE-2024-43386 | 8.8 HIGH | Phoenix Contact: OS command execution through EMAIL_NOTIFICATION.TO in mGuard devices. |
| CVE-2024-43385 | 8.8 HIGH | Phoenix Contact: OS command execution through PROXY_HTTP_PORT in mGuard devices |
| CVE-2024-43389 | 8.1 HIGH | Phoenix Contact: OSPF reconfiguration due to improper input validation in MGUARD devices |
| CVE-2024-43393 | 8.1 HIGH | Phoenix Contact: Configuration changes of the firewall services can lead to DoS in MGUARD |
| CVE-2024-43390 | 8.1 HIGH | Phoenix Contact: Firewall reconfiguration due to improper input validation in MGUARD devic |
| CVE-2024-43392 | 8.1 HIGH | Phoenix Contact: Firewall reconfiguration through the FW_environment variables in MGUARD |
| CVE-2024-7698 | 5.7 MEDIUM | Phoenix Contact: Access to CSRF tokens of higher privileged users in MGUARD products |
| CVE-2024-7734 | 5.3 MEDIUM | Phoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptor |
No comments yet