Show filters
158 Total Results
Displaying 71-80 of 158
Sort by:
Attacker Value
Unknown
CVE-2011-10001
Disclosure Date: January 18, 2023 (last updated February 24, 2025)
A vulnerability was found in iamdroppy phoenixcf. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file content/2-Community/articles.cfm. The manipulation leads to sql injection. The patch is named d156faf8bc36cd49c3b10d3697ef14167ad451d8. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218491.
0
Attacker Value
Unknown
CVE-2021-46871
Disclosure Date: January 10, 2023 (last updated February 24, 2025)
tag.ex in Phoenix Phoenix.HTML (aka phoenix_html) before 3.0.4 allows XSS in HEEx class attributes.
0
Attacker Value
Unknown
CVE-2017-20154
Disclosure Date: December 30, 2022 (last updated February 24, 2025)
A vulnerability was found in ghostlander Phoenixcoin. It has been classified as problematic. Affected is the function CTxMemPool::accept of the file src/main.cpp. The manipulation leads to denial of service. Upgrading to version 0.6.6.1-pxc is able to address this issue. The name of the patch is 987dd68f71a7d8276cef3b6c3d578fd4845b5699. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217068.
0
Attacker Value
Unknown
CVE-2022-3461
Disclosure Date: November 15, 2022 (last updated February 24, 2025)
In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 manipulated PC Worx or Config+ files could lead to a heap buffer overflow and a read access violation. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.
0
Attacker Value
Unknown
CVE-2022-3737
Disclosure Date: November 15, 2022 (last updated February 24, 2025)
In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 memory can be read beyond the intended scope due to insufficient validation of input data. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.
0
Attacker Value
Unknown
CVE-2022-3480
Disclosure Date: November 15, 2022 (last updated February 24, 2025)
A remote, unauthenticated attacker could cause a denial-of-service of PHOENIX CONTACT FL MGUARD and TC MGUARD devices below version 8.9.0 by sending a larger number of unauthenticated HTTPS connections originating from different source IP’s. Configuring firewall limits for incoming connections cannot prevent the issue.
0
Attacker Value
Unknown
CVE-2021-34579
Disclosure Date: November 09, 2022 (last updated February 24, 2025)
In Phoenix Contact: FL MGUARD DM version 1.12.0 and 1.13.0 access to the Apache web server being installed as part of the FL MGUARD DM on Microsoft Windows does not require login credentials even if configured during installation.Attackers with network access to the Apache web server can download and therefore read mGuard configuration profiles (“ATV profiles”). Such configuration profiles may contain sensitive information, e.g. private keys associated with IPsec VPN connections.
0
Attacker Value
Unknown
CVE-2022-42975
Disclosure Date: October 17, 2022 (last updated February 24, 2025)
socket/transport.ex in Phoenix before 1.6.14 mishandles check_origin wildcarding. NOTE: LiveView applications are unaffected by default because of the presence of a LiveView CSRF token.
0
Attacker Value
Unknown
CVE-2022-31801
Disclosure Date: June 21, 2022 (last updated February 23, 2025)
An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
0
Attacker Value
Unknown
CVE-2022-31800
Disclosure Date: June 20, 2022 (last updated February 23, 2025)
An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
0