Vulnerabilities
Vulnerable Software
Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.
CVSS Score
7.5
EPSS Score
0.768
Published
2015-01-17


Contact Us

Shodan ® - All rights reserved