Vulnerabilities

Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.

Filtering: Tag: phoenixcontact Clear
ID Title
CVE-2024-43384 Vulnerability in phoenixcontact (CVE-2024-43384)
vulnerability in phoenixcontact (CVE-2024-43384). Successful exploitation can lead to full system takeover.
CVE-2017-16723 Cross-Site Scripting (XSS) in phoenixcontact (CVE-2017-16723)
cross-site scripting in phoenixcontact (CVE-2017-16723). Risk of unauthorized operations or information disclosure.
CVE-2017-10176 Vulnerability in c (CVE-2017-10176)
vulnerability in c (CVE-2017-10176). Confidential information can be exposed externally.
CVE-2017-10198 Vulnerability in c (CVE-2017-10198)
vulnerability in c (CVE-2017-10198). Confidential information can be exposed externally.
CVE-2017-10135 Vulnerability in c (CVE-2017-10135)
vulnerability in c (CVE-2017-10135). Confidential information can be exposed externally.
CVE-2017-10102 Vulnerability in c (CVE-2017-10102)
vulnerability in c (CVE-2017-10102). Successful exploitation can lead to full system takeover.
CVE-2017-10108 Vulnerability in c (CVE-2017-10108)
vulnerability in c (CVE-2017-10108). Risk of unauthorized operations or information disclosure.
CVE-2017-10115 Vulnerability in c (CVE-2017-10115)
vulnerability in c (CVE-2017-10115). Confidential information can be exposed externally.
CVE-2017-10116 Vulnerability in c (CVE-2017-10116)
vulnerability in c (CVE-2017-10116). Successful exploitation can lead to full system takeover.
CVE-2017-10118 Vulnerability in c (CVE-2017-10118)
vulnerability in c (CVE-2017-10118). Confidential information can be exposed externally.
CVE-2017-10078 Vulnerability in c (CVE-2017-10078)
vulnerability in c (CVE-2017-10078). Confidential information can be exposed externally.
CVE-2017-10053 Vulnerability in c (CVE-2017-10053)
vulnerability in c (CVE-2017-10053). Risk of unauthorized operations or information disclosure.
CVE-2017-5159 Vulnerability in phoenixcontact (CVE-2017-5159)
vulnerability in phoenixcontact (CVE-2017-5159). Successful exploitation can lead to full system takeover.

🍪 About cookies

We use cookies to keep you logged in, remember your language, and improve the service.

Details →