Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
phoenixcontact proconos vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2023-0757
Incorrect Permission Assignment for Critical Resource vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote malicious user to upload arbitrary malicious code and gain full access on the affected device.
Phoenixcontact Multiprog
Phoenixcontact Proconos Eclr
9.8
CVSSv3
CVE-2022-31800
An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
Phoenixcontact Axc 1050 Firmware
Phoenixcontact Axc 1050 Xc Firmware
Phoenixcontact Axc 3050 Firmware
Phoenixcontact Fc 350 Pci Eth Firmware
Phoenixcontact Ilc1x0 Firmware
Phoenixcontact Ilc1x1 Firmware
Phoenixcontact Ilc 1x1 Gsm/gprs Firmware
Phoenixcontact Ilc 3xx Firmware
Phoenixcontact Pc Worx Rt Basic Firmware
Phoenixcontact Pc Worx Srt Firmware
Phoenixcontact Rfc 430 Eth-ib Firmware
Phoenixcontact Rfc 450 Eth-ib Firmware
Phoenixcontact Rfc 460r Pn 3tx Firmware
Phoenixcontact Rfc 460r Pn 3tx-s Firmware
Phoenixcontact Rfc 470 Pn 3tx Firmware
Phoenixcontact Rfc 470s Pn 3tx Firmware
Phoenixcontact Rfc 480s Pn 4tx Firmware
1 Article
9.8
CVSSv3
CVE-2022-31801
An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
Phoenixcontact Multiprog
Phoenixcontact Proconos
Phoenixcontact-software Proconos Eclr -
1 Article
7.5
CVSSv3
CVE-2023-5592
Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote malicious user to download and execute applications without integrity checks on the device which may result in a complete loss...
Phoenixcontact Multiprog
Phoenixcontact Proconos Eclr
NA
CVE-2014-9195
Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote malicious users to execute arbitrary commands via protocol-compliant traffic.
Phoenixcontact-software Multiprog 5.0
Phoenixcontact-software Proconos Eclr
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started