Vulnerabilities
Vulnerable Software
An unauthenticated remote attacker can exploit the behavior of the pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to blocking of valid IPsec VPN peers.
CVSS Score
5.3
EPSS Score
0.002
Published
2024-09-10
Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allow UDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding attacks.
CVSS Score
5.3
EPSS Score
0.0
Published
2023-06-13


Contact Us

Shodan ® - All rights reserved