Software catalogue for Contec - page 2

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › Contec

Software catalogue for Contec - page 2

M2M Gateway CPS-MG341-ADSC1-931 M2M Gateway CPS-MG341G-ADSC1-111 M2M Gateway CPS-MG341G-ADSC1-930 M2M Gateway CPS-MG341G5-ADSC1-931 SolarView Compact SolarView Compact SV-CPT-MC310 SolarView Compact SV-CPT-MC310F


Showing elements 21 - 40 out of 27

  • Previous
  • 2
  • Next

Latest security bulletins

Secuity bulletin Severity Status Published
SB2025070135: Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS) High
Patched Public exploit
01.07.2025
SB2025013105: Multiple vulnerabilities in Contec Health CMS8000 Patient Monitor High
Not patched Exploited
31.01.2025
SB2023103040: Remote code execution in Contec SolarView Compact High
Not patched
30.10.2023
SB2023091532: Path traversal in Contec SolarView Compact Medium
Patched
15.09.2023
SB2023053133: Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS) Medium
Patched
31.05.2023
SB2023051011: Multiple vulnerabilities in SolarView Compact Medium
Patched
10.05.2023
SB2023033102: SQL injection in Contec CONPROSYS HMI System High
Patched
31.03.2023
SB2023031711: Multiple vulnerabilities in Contec CONPROSYS IoT Gateway products Medium
Patched
17.03.2023
SB2023012301: SQL injection in Contec CONPROSYS HMI System (CHS) Low
Patched
23.01.2023
SB2022121423: OS Command Injection in Contec CONPROSSYS HMI System (CHS) High
Patched
14.12.2022

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or