Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allow UDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding...
5.3CVSS
5.3AI Score
0.0005EPSS
A remote, unauthenticated attacker could cause a denial-of-service of PHOENIX CONTACT FL MGUARD and TC MGUARD devices below version 8.9.0 by sending a larger number of unauthenticated HTTPS connections originating from different source IPโs. Configuring firewall limits for incoming connections...
7.5CVSS
7.6AI Score
0.002EPSS
M-Core stores the database under the web document root, which allows remote attackers to obtain sensitive information via a direct request to...
6.4AI Score
0.011EPSS