Vulnerabilities
Vulnerable Software
Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.
CVSS Score
10.0
EPSS Score
0.864
Published
2015-01-17


Contact Us

Shodan ® - All rights reserved