Show filters
158 Total Results
Displaying 71-80 of 158
Sort by:
Attacker Value
Unknown

CVE-2011-10001

Disclosure Date: January 18, 2023 (last updated February 24, 2025)
A vulnerability was found in iamdroppy phoenixcf. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file content/2-Community/articles.cfm. The manipulation leads to sql injection. The patch is named d156faf8bc36cd49c3b10d3697ef14167ad451d8. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218491.
Attacker Value
Unknown

CVE-2021-46871

Disclosure Date: January 10, 2023 (last updated February 24, 2025)
tag.ex in Phoenix Phoenix.HTML (aka phoenix_html) before 3.0.4 allows XSS in HEEx class attributes.
Attacker Value
Unknown

CVE-2017-20154

Disclosure Date: December 30, 2022 (last updated February 24, 2025)
A vulnerability was found in ghostlander Phoenixcoin. It has been classified as problematic. Affected is the function CTxMemPool::accept of the file src/main.cpp. The manipulation leads to denial of service. Upgrading to version 0.6.6.1-pxc is able to address this issue. The name of the patch is 987dd68f71a7d8276cef3b6c3d578fd4845b5699. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217068.
Attacker Value
Unknown

CVE-2022-3461

Disclosure Date: November 15, 2022 (last updated February 24, 2025)
In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 manipulated PC Worx or Config+ files could lead to a heap buffer overflow and a read access violation. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.
Attacker Value
Unknown

CVE-2022-3737

Disclosure Date: November 15, 2022 (last updated February 24, 2025)
In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 memory can be read beyond the intended scope due to insufficient validation of input data. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.
Attacker Value
Unknown

CVE-2022-3480

Disclosure Date: November 15, 2022 (last updated February 24, 2025)
A remote, unauthenticated attacker could cause a denial-of-service of PHOENIX CONTACT FL MGUARD and TC MGUARD devices below version 8.9.0 by sending a larger number of unauthenticated HTTPS connections originating from different source IP’s. Configuring firewall limits for incoming connections cannot prevent the issue.
Attacker Value
Unknown

CVE-2021-34579

Disclosure Date: November 09, 2022 (last updated February 24, 2025)
In Phoenix Contact: FL MGUARD DM version 1.12.0 and 1.13.0 access to the Apache web server being installed as part of the FL MGUARD DM on Microsoft Windows does not require login credentials even if configured during installation.Attackers with network access to the Apache web server can download and therefore read mGuard configuration profiles (“ATV profiles”). Such configuration profiles may contain sensitive information, e.g. private keys associated with IPsec VPN connections.
Attacker Value
Unknown

CVE-2022-42975

Disclosure Date: October 17, 2022 (last updated February 24, 2025)
socket/transport.ex in Phoenix before 1.6.14 mishandles check_origin wildcarding. NOTE: LiveView applications are unaffected by default because of the presence of a LiveView CSRF token.
Attacker Value
Unknown

CVE-2022-31801

Disclosure Date: June 21, 2022 (last updated February 23, 2025)
An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
0
Attacker Value
Unknown

CVE-2022-31800

Disclosure Date: June 20, 2022 (last updated February 23, 2025)
An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
0