高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2024-43387 | 8.8 HIGH | Phoenix Contact: Access files due to improper neutralization of special elements in MGUARD |
| CVE-2024-43388 | 8.8 HIGH | Phoenix Contact: SNMP reconfiguration due to improper input validation in MGUARD devices |
| CVE-2024-43386 | 8.8 HIGH | Phoenix Contact: OS command execution through EMAIL_NOTIFICATION.TO in mGuard devices. |
| CVE-2024-43385 | 8.8 HIGH | Phoenix Contact: OS command execution through PROXY_HTTP_PORT in mGuard devices |
| CVE-2024-43391 | 8.1 HIGH | Phoenix Contact: Firewall reconfiguration through the FW_PORTFORWARDING.SRC_IP in MGUARD d |
| CVE-2024-43389 | 8.1 HIGH | Phoenix Contact: OSPF reconfiguration due to improper input validation in MGUARD devices |
| CVE-2024-43393 | 8.1 HIGH | Phoenix Contact: Configuration changes of the firewall services can lead to DoS in MGUARD |
| CVE-2024-43390 | 8.1 HIGH | Phoenix Contact: Firewall reconfiguration due to improper input validation in MGUARD devic |
| CVE-2024-43392 | 8.1 HIGH | Phoenix Contact: Firewall reconfiguration through the FW_environment variables in MGUARD |
| CVE-2024-7698 | 5.7 MEDIUM | Phoenix Contact: Access to CSRF tokens of higher privileged users in MGUARD products |
| CVE-2024-7734 | 5.3 MEDIUM | Phoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptor |
まだコメントはありません