Advisories

Für CVSS 2.0, 3.0 und 3.2
VDE-2021-059
Mai 22, 2025, 3:03 nachm.
The TCP/IP stack and of the networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) contain several vulnerabilities. Nucleus NET is utilized by BLUEMARK X1 / LED / CLED. …
VDE-2022-026
Mai 22, 2025, 3:03 nachm.
ProConOS/ProConOS eCLR insufficiently verifies uploaded data.
VDE-2023-056
Mai 22, 2025, 3:03 nachm.
PLCnext Control provides authentication and integrity check for the application.An authenticated, skilled attacker might be able to manipulate the application (e.g.: logic files, executable logic, configurations) in a special crafted …
VDE-2023-051
Mai 22, 2025, 3:03 nachm.
Increased Security attacks against OT infrastructure and research of Dragos makes it necessary to publish this advisory giving users hints according to basic security measures to support automation systems using …
VDE-2023-016
Mai 22, 2025, 3:03 nachm.
Several vulnerabilities have been discovered in the LibGit2Sharp or underlying LibGit2 library.This open-source component is widely used in a lot of products worldwide.The product is vulnerable to remote code execution, …
VDE-2021-032
Mai 22, 2025, 3:03 nachm.
Third party Niche Ethernet stack has several vulnerabilities announced by the security researcher's community. Phoenix Contact Classic Line industrial controllers are developed and designed for the use in closed industrial …
VDE-2021-056
Mai 22, 2025, 3:03 nachm.
Multiple vulnerabilities were reported in CODESYS 2.3 Runtime. The CODESYS 2.3 Runtime is an essential component in several WAGO PLCs. All vulnerable PLCs are listed in chapter 'Affected Products'. https://www.codesys.com/security/security-reports.html
VDE-2019-009
Mai 22, 2025, 3:03 nachm.
Multiple vulnerabilities have been identified in PHOENIX CONTACT AXC F 2152 with firmware versions 1.x