CVE-2014-9195
17.01.2015, 02:59
Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.Enginsight
| Vendor | Product | Version |
|---|---|---|
| phoenixcontact-software | multiprog | 5.0 |
| phoenixcontact-software | multiprog | 5.0 |
| phoenixcontact-software | multiprog | 5.0 |
| phoenixcontact-software | proconos_eclr | * |
| phoenixcontact-software | proconos_eclr | * |
| phoenixcontact-software | proconos_eclr | * |
| phoenixcontact-software | proconos_eclr | * |
𝑥
= Vulnerable software versions
Common Weakness Enumeration