CVE-2014-9195
17.01.2015, 02:59
Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.Enginsight
Vendor | Product | Version |
---|---|---|
phoenixcontact-software | multiprog | 5.0 |
phoenixcontact-software | multiprog | 5.0 |
phoenixcontact-software | multiprog | 5.0 |
phoenixcontact-software | proconos_eclr | * |
phoenixcontact-software | proconos_eclr | * |
phoenixcontact-software | proconos_eclr | * |
phoenixcontact-software | proconos_eclr | * |
𝑥
= Vulnerable software versions
Common Weakness Enumeration