Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| PHOENIX CONTACT | MULTIPROG | all | - | |
| PHOENIX CONTACT | ProConOS eCLR (SDK) | all | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-0757 | 9.8 CRITICAL | Phoenix Contact ProConOS prone to Incorrect Permission Assignment for Critical Resource |
| CVE-2023-46141 | 9.8 CRITICAL | Phoenix Contact: Automation Worx and classic line controllers prone to Incorrect Permissio |
| CVE-2023-46142 | 8.8 HIGH | PHOENIX CONTACT: Insufficient Read and Write Protection to Logic and Runtime Data in PLCne |
| CVE-2023-46143 | 7.5 HIGH | Phoenix Contact: Classic line industrial controllers prone to inadequate integrity check o |
| CVE-2023-46144 | 6.5 MEDIUM | PHOENIX CONTACT: PLCnext Control prone to download of code without integrity check |
No comments yet